From one4evil at juno.com Mon Jun 1 01:38:27 1998
From: one4evil at juno.com (Nalus Optic)
Date: Mon, 1 Jun 1998 01:38:27 -0700 (PDT)
Subject: que pasa
Message-ID: <19980531.003128.9966.0.one4evil@juno.com>
Cypherpunks,
I would like to thank Xcott for sending me that faq. Alos,
thanks to the other guy who sent the info on e-mailing your way around
the web...It is VERY confusing...
I just have a few quick questions. I have gotten well over 25
messages from this list and so far only one of them had _anything_ to do
with crypto...I know that most or all of you have a bit of background in
crypto but I am just learning. So what I am wanting to know is a: are
there any other crypto e-lists that are for newbies? b: are there any
better text philes to read that give a better introduction that is for a
newbie and c: what do you people feel is the best encryption someone can
have that I could get?
Thanks,
D.
_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]
From jya at pipeline.com Mon Jun 1 08:38:44 1998
From: jya at pipeline.com (John Young)
Date: Mon, 1 Jun 1998 08:38:44 -0700 (PDT)
Subject: RSA, NAI Settle Suit
Message-ID: <199806011538.LAA11092@camel8.mindspring.com>
PR Newswire, June 1, 1998 [Excerpt]:
RSA Data Security and Network Associates Announce Settlement of Lawsuit;
Network Associates Licenses RSA Crypto-security Software
Redwood City and Santa Clara, Calif., June 1 -- RSA Data Security,
Inc. and Network Associates today announced that the companies have
settled patent infringement and copyright lawsuits brought by RSA
against Network Associates and its subsidiaries PGP, Inc., and Trusted
Information Systems (TIS). In addition, Network Associates entered
into a new royalty-bearing license for RSA's crypto-security engines,
providing Network Associates with rights to include RSA components
within a number of Network Associates, PGP, and TIS products.
Under the terms of the settlement agreement, Network Associates
will draw on a previously established escrow set at the time of the
PGP acquisition to pay RSA an undisclosed sum to settle past issues and
for legal fees. As a result of today's settlement agreement, three
federal actions and a court-ordered arbitration related to the dispute
have been resolved.
From sunder at brainlink.com Mon Jun 1 09:21:55 1998
From: sunder at brainlink.com (Sunder)
Date: Mon, 1 Jun 1998 09:21:55 -0700 (PDT)
Subject: When write high-speed implementation,
In-Reply-To: <19980530042752.25126.qmail@hotmail.com>
Message-ID: <3572D417.5145276A@brainlink.com>
It's actually expressed as a set of complex numbers with lots of data in the
imaginary side. These are displayed with fixed point decimals (or static
point decimals) expressing a width and height for the rectangle hence the term
S-Box. Since DES works on 64 bit blocks using a 56 bit key, you can use either
56 decimal places, or 64 for more accuracy, but far less speed.
For purposes of optimization to extreme high speed, you should take your key
and sort it (be sure to use Quick Sort here, and not bubble sort!), that is put
all the 1 bits to the right, all the 0 bits to the left, and the naughty bits
in your head. Then take the result and express it as 2^X-1, and extract X.
Once you have X, repeat the process until X=2.
With me so far? Good, now you have to extract the naughty bits from your mind,
and let N express them. Your S boxes are now comprised of X+Ni which you can
simply express as 2+Ni. Now, if you recall, Ni is the symbol for nickel, which
is what this algorithm is worth $2.05 payable in Monopoly dollars. If you've
been following the news, you'll know that Microsoft is a monopoly and therefore
weighs the same as a duck. Since ducks float, and wood also floats, ducks must
weigh the same as wood, and therefore are witches. Multiply this by the flight
speed of an unladen African swallow, and divide it by the flight speed of a
laden european swallow, then add your favorite color, and substract your name.
Okay, so that's the high-speed write implementation, don't forget that the high
speed read implementation is the opposite of the write, so reverse the sort and
this time, make sure you use random sort. (That is toss the bits up randomly,
and if they wind up in the order you wanted, you're done, otherwise keep
tossing.) And don't forget that tossed bits require Ranch dressing or Italian,
with onion crutons, but never Russian (because the USSR never used DES.)
Now that we've told you the secret of high speed DES, your assignment is to
come back in a week with source code to the above written in SNOBOL which can
run on CP/M 6502 machines. Of course you'll need to roll your own CP/M 6502 OS
as well as a SNOBOL compiler and assembler, but heck, that's easy. Oh, one
catch, make sure your CP/M runs on all C64 and Apple II's, or you can't
properly consider it a portable DES implementation.
Good luck.
[ Snicker, snicker, ROTFLMAO! I wonder how long it will take him to figgure
out that he's being trolled... heh... ]
Nobuki Nakatuji wrote:
>
> When write high-speed implementation,
> Is S-box written by hexadecimal or
> written by decimal?
> Thanks.
--
=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run |\/|\/
../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were.... |.....
======================= http://www.sundernet.com ==========================
From jya at pipeline.com Mon Jun 1 10:33:08 1998
From: jya at pipeline.com (John Young)
Date: Mon, 1 Jun 1998 10:33:08 -0700 (PDT)
Subject: Counterpane Cracks MS's PPTP
Message-ID:
http://www.counterpane.com/pptp.html
Thanks to GM
From jya at pipeline.com Mon Jun 1 11:26:58 1998
From: jya at pipeline.com (John Young)
Date: Mon, 1 Jun 1998 11:26:58 -0700 (PDT)
Subject: Foundation for Information Policy Research
Message-ID: <199806011826.OAA15687@camel14.mindspring.com>
Source: http://www.ntk.net/fipr/
Subject: URGENT: press release - FIPR
Date: Thu, 28 May 1998 16:52:16 +0100
From: Ross Anderson
Title: New Independent Research Foundation Backed by Microsoft
Embargoed until 11.00 Friday 29th May
Too often, policy issues relating to information technology are
seperately debated by two distinct grouups: technology experts and
those focused on social concerns. Policy makers face the challenge of
reconciling the seperate debates in areas where technology is often
evolving very quickly. A new research foundation aims to provide clear
advice that spans this gap and is independent of vested interests.
The Foundation for Information Policy Research will fund research into
how information technology affects society. It is launched at a press
conference on Friday 29th May at 11.00 am. (1)
Microsoft has contributed a six-figure sum to cover the launch costs.
Internet service providers Poptel and Demon are also supporting the
Foundation. Its independence will be guaranteed, however, by a board
of trustees. (2) In the medium term it will be supported by
subscriptions from a range of firms in commerce and industry.
The goal of the Foundation is to promote research and understanding of
the effects, and the likely future effects, of IT on society. Its
areas of investigation include: (3)
* the regulation of electronic commerce;
* consumer protection;
* data protection and privacy;
* copyright;
* law enforcement;
* evidence and archiving;
* electronic interaction between government, businesses and individuals;
* the extent to which various information technologies discriminate
against the less advantaged members of society; and
* the new risks that computer and communication systems pose to
life, health and economic well-being
The Foundation will also provide a valuable resource for the press as
it will be able to put journalists in touch with a wide range of
experts who can explain IT issues as they arise.
Contact: Caspar Bowden (Director of the Foundation) 0171 837 8706
Ross Anderson (Chair of the Foundation) 01223 334733
QUOTES
The Director of the Foundation, Caspar Bowden, said: ``The IT policies
(and failures) which the current government inherited, and the
decisions which will be made by them in the future, will have
far-reaching effects on who society's winners and losers will be. We
have a duty to prevent technological innovation and development taking
place at the expense of the poor, the old, the sick and the disabled.
We believe that so long as we understand the social and policy
implications of new technical innovations, we can make IT into a means
to facilitate social inclusion. The Foundation's mission will be to
achieve and to spread that understanding.''
The Managing Director of Microsoft UK, David Svendsen, said: ``It's
important that we contribute to a broad and informed public discussion
on these information society issues.''
The Chair of the Foundation, Ross Anderson of Cambridge University,
said: ``We welcome this new source of funding for IT related
research. An increase in the diversity of funding sources is almost
always a good thing, and the Foundation will be particularly valuable
as much of the available IT funding is directed to very short-term and
narrowly technical agendas.''
NOTES
(1) The press conference is at the "Scrambling for Safety"
conference, at the Bloomsbury Theatre, University College, London.
URL:
(2) The Foundation's Director and full-time CEO, Caspar Bowden, has
for the last three years been running Qualia, a consultancy business
specialising in internet implementations. Before that he was a
financial strategist with Goldman Sachs. He also researched IT and
communications issues for Scientists for Labour.
Its chair, Ross Anderson, is a faculty member at Cambridge University
Computer Laboratory and has done extensive research on topics related
to electronic commerce.
BACKGROUND
The "Millennium Bug" - the problem that many computers cannot deal
correctly with the date roll-over from 1999 to 2000 - threatens to
cause havoc with many systems and has been declared a national
emergency by the Prime Minister.
Another problem that has worried policymakers and concerned citizens
is that new developments in IT may discriminate against the less well
off members of society. For example, the current mechanisms for
electronic commerce depend on consumers using their credit cards to
order goods and services over the net. They often get a big discount
for buying this way; but people without credit cards may lose out.
The first task that the Foundation has set itself is to examine the
underpinnings of electronic commerce. The European Commission has
recently published a draft Directive on this subject and will launch a
period of public consultation at the same conference at which the
Foundation itself will be launched. (The draft directive is at
[missing].)
Other topics which the Foundation plans to investigate include:
* the maintenance of public records in electronic form. We do not
fully understand how to ensure that word processor files and other
electronic documents created today can be safely stored for many
years, and reliably made available in the future. This affects not
just the new Freedom of Information Act, but also the work of future
librarians and historians.
* the development of copyright law. There are some industry proposals
which would restrict the ability of libraries to lend out digital
works. Will this mean the end of the public library, as more and more
books, videos and other material become digital? What are the
implications for schools and universities? What are the implications
for the public, if all major sports events in future are pay-per-view?
Are these developments inevitable, or is there something we can do
about them?
* the introduction of electronic communication between the citizen and
the government has the potential to cut queues and the frustration of
dealing with people on the phone. However, are these changes
intrinsically more likely to favour the articulate, and to bring the
most benefit to well-off people with their own computers? What
technical developments are reasonably possible to ensure that all
citizens get a fair deal?
* the previous government's proposal for a "personal signature card"
that would give access to all government services had a distinct
flavour of an ID card. Are such developments necessary, or can we
find workable alternatives?
* the police are concerned about the spread of prepaid mobile phones,
which are increasingly used by stalkers and extortionists. However, if
they are banned, then how would people without credit cards obtain a
mobile phone service?
* there have been many disputes in the past over "phantom withdrawals"
from bank cash machines, and banks have defended themselves by
claiming that their computers cannot be wrong. How can this approach
work when millions of merchants are selling services through a wide
variety of computer systems? What will consumer rights amount to in
the information age?
* the failure of government computer systems - whether spectacular
failure due to the millennium bug, or the continuing sporadic
failures in the NHS - does most harm to pensioners, the disabled,
single mothers, the unemployed and people on NHS waiting lists (who
are typically elderly, female and working class). How can we
encourage best engineering practice in the public sector?
- - - ends - -
Thanks to Danny O'Brien, UK Crypto
Story: http://www.wired.com/news/news/politics/story/12624.html
Web site under construction: http://www.fipr.org
From StanSqncrs at aol.com Mon Jun 1 12:09:06 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Mon, 1 Jun 1998 12:09:06 -0700 (PDT)
Subject: Nobody comes up with a great point!
Message-ID: <9082dcf2.3572fc2e@aol.com>
Unfortunately, he didn't seem to want to share it with the Cypherpunks.
Nobody - << >> Of course, I do admit, that I do speak from a left POV.
Which one? >>
Mine.
<< There are so many left POVs! >>
Correctamundo! We aren't a bunch of brain-washed DittoHeads like the right
is. :-)
Stan
From one4evil at juno.com Mon Jun 1 12:18:08 1998
From: one4evil at juno.com (Nalus Optic)
Date: Mon, 1 Jun 1998 12:18:08 -0700 (PDT)
Subject: I need a compiler!
Message-ID: <19980601.031903.11638.0.one4evil@juno.com>
Cypherpunks,
Tis I, D, again...I just have one other question...Could some of
you tell me what C compilers you use...Also, could you just tell me every
program you would have that has anything to do with crypto if you had the
cash? I guess one would need a C compiler, a hex editer maybe, are there
any crypto programs that are sort of like templates, where you set the
paramiters and the program compiles the encryption for you...Pipe dream I
am sure...
That is about it...
D.
_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]
From angelos at dsl.cis.upenn.edu Mon Jun 1 12:58:59 1998
From: angelos at dsl.cis.upenn.edu (Angelos D. Keromytis)
Date: Mon, 1 Jun 1998 12:58:59 -0700 (PDT)
Subject: KeyNote v0.1 Release Announcement
Message-ID: <199806011956.PAA12769@adk.gr>
-----BEGIN PGP SIGNED MESSAGE-----
To: coderpunks at toad.com
Subject: KeyNote v0.1 Release Announcement
Cc: cypherpunks at toad.com
Date: 06/01/98, 15:56:45
KeyNote is a trust-management system, designed on the same principles
as PolicyMaker, but simpler and better-defined. This is the first
public release, and although the code has been tested, it is by no
means guaranteed bug-free (but then, what is). That said, you can get
a copy from
http://www.cis.upenn.edu/~angelos/keynote-0.1.tar.gz
-Angelos
PS. From the README file:
There should be a real README file here, but in the meantime read
draft-angelos-spki-keynote-01.txt for the spec of KeyNote.
There's much to be done yet to improve the user interface(s). Signature
verification is (deliberately) missing from this release, but the next one
will have it. The hooks are obvious in the code (search for XXX in
parse_assertion.c).
The makefile creates the libkeynote.a library which can be linked with other
applications. The program keynote-verify can be used to verify a request,
given a set of assertions and an environment. There will be a man page
in the next release both for the library and the program, along with some
sort of graphical UI to make assertion generation (including signing) easier.
For any questions, comments, bug reports, praise, or anything else you have
in mind, contact me at angelos at dsl.cis.upenn.edu
Angelos D. Keromytis
May 31 1998
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv
Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface
iQCVAwUBNXMHfr0pBjh2h1kFAQElOgP9FyKPDQPvctQyJLl5djz4xj/edgRgQrlb
YmqwVQqGrKKC/KrgUbu/A6c/RyqT1l1/nk9U4pONQaJoAtT0pQcgpYISQ2Ji/0JY
tG8y+r+WqhWElgUuPxZff5jH5V3mbCDInKoe4BvkE0wwnW7QvwCSVa/nP/Ecs+1e
KpiewSL6Ug8=
=0f31
-----END PGP SIGNATURE-----
From J-Dog at Elitehackers.org Mon Jun 1 13:35:07 1998
From: J-Dog at Elitehackers.org (J-Dog)
Date: Mon, 1 Jun 1998 13:35:07 -0700 (PDT)
Subject: I need a compiler!
In-Reply-To: <19980601.031903.11638.0.one4evil@juno.com>
Message-ID:
gee, gcc seems to always do teh trick for me when I want to compile some
C.....
Then again, if I was to say linux to you, you would prolly run in ph33r
... so, why don't you call bill up and ask him to send you a free version
of Visual C++.... so that you too can crank out useless winblowz code...
Latez
JD
On Mon, 1 Jun 1998, Nalus Optic wrote:
> Cypherpunks,
>
> Tis I, D, again...I just have one other question...Could some of
> you tell me what C compilers you use...Also, could you just tell me every
> program you would have that has anything to do with crypto if you had the
> cash? I guess one would need a C compiler, a hex editer maybe, are there
> any crypto programs that are sort of like templates, where you set the
> paramiters and the program compiles the encryption for you...Pipe dream I
> am sure...
>
> That is about it...
>
> D.
>
> _____________________________________________________________________
> You don't need to buy Internet access to use free Internet e-mail.
> Get completely free e-mail from Juno at http://www.juno.com
> Or call Juno at (800) 654-JUNO [654-5866]
>
From whgiii at invweb.net Mon Jun 1 14:38:44 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Mon, 1 Jun 1998 14:38:44 -0700 (PDT)
Subject: Counterpane Cracks MS's PPTP
In-Reply-To:
Message-ID: <199806012143.QAA018.23@geiger.com>
-----BEGIN PGP SIGNED MESSAGE-----
In , on 06/01/98
at 12:23 PM, John Young said:
>http://www.counterpane.com/pptp.html
>Thanks to GM
when will people learn?
Microsoft is *incapable* and *unwilling* to provide even nominal security
for it's platforms.
Several problems that exist:
Technical Ability -- Microsoft is seriously lacking in the technical
know-how when it comes to cryptology and data security.
Corporate Mentality -- Microsoft does not have the mentality needed to
produce secure products. This is a company that has historically shipped
poorly designed, bug filled products out the door. Bugs are not seen as a
problem but as an opportunity to sell upgrades. While this has done them
well in selling their overpriced GameBoys (the sheeple never cease to
disappoint me) it is *not* the environment for developing secure products.
Previous security foobars by M$:
NT C2 <---- LOL!!!
Active X <---- Who was the brain child that though *that* up?
Auto-Launch attached binaries in E-Mail <-- Can we say GoodTimes?
Crypto-API <--- Right I would *trust* that. Honest. :)
TCP/IP Stack <--- Too many flaws to list.
Why would anyone trust these simpletons to produce any type of security
product?
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
Tag-O-Matic: I love running Windows! NOT!
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNXMgd49Co1n+aLhhAQHmjAQArwgJj4kG8O+MYYCag4Xc8vr4zK4XDdGX
niqu8nzfsJPfA2TisyFFyuFv9gejXQ6QhO7+tT2KQbbWJllPBIqIjjIqH8XkhcEW
XhtMV/CoWprOp3tAHZi/n2LLn1kqtdhWG4FewGHn6R0Tzy6vq74ygk+qo9BeZNAd
F92bia6qGio=
=Cvy6
-----END PGP SIGNATURE-----
From dorisaw at idt.net Mon Jun 1 14:59:30 1998
From: dorisaw at idt.net (Doris Woods)
Date: Mon, 1 Jun 1998 14:59:30 -0700 (PDT)
Subject: Kirtland Air Force Base
In-Reply-To: <35709AFC.7DD3@nmol.com>
Message-ID: <35732427.ECA43EB9@idt.net>
Hi all,
bill payne wrote:
>
> Saturday 5/30/98 5:15 PM
>
>
> Masanori, the book Decision to Use the Atomic Bomb by Gar Alperovitz
> presents fairly good evidence some in US government nuked Hiroshima and
> Nagasaki merely to impress the Russians.
>
Carroll Quigley said in Tragedy and Hope... they were worried the
war would be over with before they got their chance to use it!
Doris
From whgiii at invweb.net Mon Jun 1 15:56:14 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Mon, 1 Jun 1998 15:56:14 -0700 (PDT)
Subject: Kirtland Air Force Base
In-Reply-To: <35732427.ECA43EB9@idt.net>
Message-ID: <199806012257.RAA019.42@geiger.com>
-----BEGIN PGP SIGNED MESSAGE-----
In <35732427.ECA43EB9 at idt.net>, on 06/01/98
at 05:59 PM, Doris Woods said:
>Hi all,
>bill payne wrote:
>>
>> Saturday 5/30/98 5:15 PM
>> Masanori, the book Decision to Use the Atomic Bomb by Gar Alperovitz
>> presents fairly good evidence some in US government nuked Hiroshima and
>> Nagasaki merely to impress the Russians.
>>
>Carroll Quigley said in Tragedy and Hope... they were worried the war
>would be over with before they got their chance to use it!
Was this before or after they estimated that it would cost upwards of 1
Million lives to take the Japan mainland by conventional forces?
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
Tag-O-Matic: I went window shopping...and bought OS/2!
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNXMx849Co1n+aLhhAQEF/QP/Xz/1vWT108GyHjPe77raaL8JQRcfMa7N
fwhcVkQcNMfwMlpEJC3F9eiEk5jpSD5papD3HA8Q7pSDX0vS5L7j7w9d2Xwc1vc/
+uEuZzGUqat5F4P0Iv2/KKPLDHgL/bL+2TkcyyLKkxj0e/IQQWCHIlirDXhY3zz2
TkJqXCgY9Mg=
=a01s
-----END PGP SIGNATURE-----
From one4evil at juno.com Mon Jun 1 16:17:09 1998
From: one4evil at juno.com (Nalus Optic)
Date: Mon, 1 Jun 1998 16:17:09 -0700 (PDT)
Subject: I need a compiler!
In-Reply-To:
Message-ID: <19980601.071648.10254.1.one4evil@juno.com>
J-Dog
>who says I am socalled "elite"?
Gee, your 'handle' is J-Dog...And your sending your mail through
EliteHackers.org...Very original...I think have been to your web site
once or twice...The EliteHackers.org that is...
>WOW.. A dual PII 266... then you will really be elite... because you
>know.. if you have a fast machine, you don't ahve to know shit.. you can
>just fake it.. because your machine will cover up for you..... fuqin
>moron...
First...I am not a hacker and don't pretend to be...I phreak a little and
like phones and shit...I subscribe to Telecom Digest and just like to
play with phones...I like to blow shit up for fun so you could say I am a
pyro...I got five bitches on my dick so you could call me a pimp...But I
never said I was a hacker...I just like to know about how shit
works...And in order to exploit any system, for fun or money or super
3l33t props, you gots to know the system...I want to put linux on my
system because linux does have bugs and quirks and you have to know how
to do more than click a mouse button for the shit to work.
>bwhahahhaha....if you can not detect the sarcasm in here, then damn, you
>are a bigger idiot than I thought..... geez man..
Ya, sure...Sarcasm...You laugh at me but dude...William is to busy with
Netscape trying to dick him up the ass for me to call him again...
>> And you know this...MAN! I am wanting to write my own supper
program...I
>> want to take all the good h/p/v/c apps out there and make a nice point
> >and click interface for them all...one in linux and one in win (
...fuck
>> the mac people... ) Put it all on a CD and send free copies to all the
>> cool hackers out there...Sort of a library O' chaos...Of coarse, I
would
>> not send one to just anyone...r00t would get a copy...I would send
Eric B
>> one just for kicks...Then I would send one to Death Vegi and the rest
of
>> the cDc...They got the cool philes....Anywhoo...Let me know who bill
is.
>Good Yogi, and while your att it, stop world Hunger, Racism, and poverty
>with your uberhacker program...
Again, you laugh at me for sarcasm....
But back to the real problem...yes, gcc would be ideal...How ever...I am
not running Linux as of yet...so do you or any of you know any OTHER
WINDOWS BASED COMPILERS that are worth a shit...I know it is a stretch
but god...
And J-Dog, what is up with the fucked up lingo...This ain't the movies...
_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]
From jya at pipeline.com Mon Jun 1 16:38:15 1998
From: jya at pipeline.com (John Young)
Date: Mon, 1 Jun 1998 16:38:15 -0700 (PDT)
Subject: Echelon Furor
Message-ID: <199806012338.TAA09612@camel14.mindspring.com>
The UK Sunday Times on the Internet had a story yesterday on
the rising Echelon furor in Europe, "Spy Station F83."
http://www.sunday-times.co.uk (see Focus feature)
If you don't want to register we've mirrored the piece:
http://jya.com/nsa-f83.htm
It reviews the rapidly-growing NSA operation at Menwith Hill and
Bad Aibling, with some recent information not covered in earlier
reports.
Several European pols -- German, French, Italian, et al -- are
calling for investigations of alleged economic spying by NSA.
NSA denies all, the writers say, except the Agency claims it's the
best in the world at what it's capable of but not doing.
From jya at pipeline.com Mon Jun 1 16:51:04 1998
From: jya at pipeline.com (John Young)
Date: Mon, 1 Jun 1998 16:51:04 -0700 (PDT)
Subject: Commerce Echelon
Message-ID: <199806012350.TAA13897@camel14.mindspring.com>
The UK Sunday Times article claims that there is a unit in
the Department of Commerce that receives NSA Echelon
interceptions of economic data for massaging and passing
on to interested US parties. Any information on this unit and
how it decides who gets which secrets?
From J-Dog at Elitehackers.org Mon Jun 1 16:57:27 1998
From: J-Dog at Elitehackers.org (J-Dog)
Date: Mon, 1 Jun 1998 16:57:27 -0700 (PDT)
Subject: I need a compiler!
In-Reply-To: <19980601.071648.10254.1.one4evil@juno.com>
Message-ID:
>
> >WOW.. A dual PII 266... then you will really be elite... because you
> >know.. if you have a fast machine, you don't ahve to know shit.. you can
> >just fake it.. because your machine will cover up for you..... fuqin
> >moron...
>
> First...I am not a hacker and don't pretend to be...I phreak a little and
> like phones and shit...I subscribe to Telecom Digest and just like to
> play with phones...I like to blow shit up for fun so you could say I am a
> pyro...I got five bitches on my dick so you could call me a pimp...But I
> never said I was a hacker...I just like to know about how shit
> works...And in order to exploit any system, for fun or money or super
> 3l33t props, you gots to know the system...I want to put linux on my
> system because linux does have bugs and quirks and you have to know how
> to do more than click a mouse button for the shit to work.
hah.. the fact that you are claiming that you are going to write a
"program" that will combine all the good /h/p/v/c apps out there and
combine them into one is simply ridiculous..
what you are claiming is that you are going to write a program that will
have builting crackers, sniffers, DoSes, Tone Generators, Virii creation
utils, box plans...etc. This is absolutely ridiculous...
just for the record, what would you consider the "good /h/p/v/c" apps out
there? the uberl33t winnuke.exe.. or perhaps maybe the k-rad linklooker..
it is ppl like you sho seriously make me wonder where society is headed...
>
> >bwhahahhaha....if you can not detect the sarcasm in here, then damn, you
> >are a bigger idiot than I thought..... geez man..
>
> Ya, sure...Sarcasm...You laugh at me but dude...William is to busy with
> Netscape trying to dick him up the ass for me to call him again...
ok hippy.... why don't you sport your /<-rad pvc pants and vinyl shirt and
talk smack about how you are the uberhacker....
I think you have seen Hackers the movie one to many times there acid
burn...
>
> >> And you know this...MAN! I am wanting to write my own supper
> program...I
> >> want to take all the good h/p/v/c apps out there and make a nice point
> > >and click interface for them all...one in linux and one in win (
> ...fuck
> >> the mac people... ) Put it all on a CD and send free copies to all the
> >> cool hackers out there...Sort of a library O' chaos...Of coarse, I
> would
> >> not send one to just anyone...r00t would get a copy...I would send
> Eric B
> >> one just for kicks...Then I would send one to Death Vegi and the rest
> of
> >> the cDc...They got the cool philes....Anywhoo...Let me know who bill
> is.
> >Good Yogi, and while your att it, stop world Hunger, Racism, and poverty
> >with your uberhacker program...
>
> Again, you laugh at me for sarcasm....
hell ya I laugh at you... either you are too big of an idiot to reaalize
that you are being made fun of.. or you are to stupid to care.... at any
rate, kill yourself... you are breating air I might need someday....
>
> But back to the real problem...yes, gcc would be ideal...How ever...I am
> not running Linux as of yet...so do you or any of you know any OTHER
> WINDOWS BASED COMPILERS that are worth a shit...I know it is a stretch
> but god...
Not running linux as of yet? hehe so when are you gong to do a search for
linux.exe and start to run it?.. as soon as your superkool P2 266 gets
here... wowwie... I am impressed...... Hey DK.. pass me another beer...
>
> And J-Dog, what is up with the fucked up lingo...This ain't the movies...
fucked up lingo? gee, I am very sorry if your small mind can not make out
my words.. but I can assure you that this is NOT fucked up lingo... go
read some h4x0r Br0s and then tell me about how fuct up my lingo is....
Latez
JD
btw... congrats on your really kool superl33t juno.com account.. you are
r33t now.
>
>
>
> _____________________________________________________________________
> You don't need to buy Internet access to use free Internet e-mail.
> Get completely free e-mail from Juno at http://www.juno.com
> Or call Juno at (800) 654-JUNO [654-5866]
>
From one4evil at juno.com Mon Jun 1 17:19:45 1998
From: one4evil at juno.com (Nalus Optic)
Date: Mon, 1 Jun 1998 17:19:45 -0700 (PDT)
Subject: I need a compiler!
In-Reply-To:
Message-ID: <19980601.081903.10230.0.one4evil@juno.com>
Ok, this is starting to get really odd. I am not a hacker...I DO NOT
want to make some supper program...IT WAS A CRACK BASED ON WHAT YOU SAID
ABOUT WIDOZE CODE!!! I don't know shit about hacking other than how to
maybe use a cheese scanner like 'Phonetag' (which I have set up at school
so that I don't get busted useing it at home.) I mean what is the
argument here?
Also, you keep putting things in here like:
> uberl33t
> k-rad
> /<-rad
Well, what the hell is up with that...I don't talk like that...Do you
talk like that? Do you walk up to your local dealer and say you want
some K-rad KB? No! You just say you want a fat once of KB! You don't
fuck around.
>Not running linux as of yet? hehe so when are you gong to do a search
for
>linux.exe and start to run it?.. as soon as your superkool P2 266 gets
>here... wowwie... I am impressed...... Hey DK.. pass me another beer...
Well, I have no net access...Boy that's 3L33T...and when I tried last
time I had access, I kept having trouble makeing the boot disk...Maybe
you can explane it to me...You do know stuff about linux and for that I
ask a question...The page I was trying to get it from said that I needed
to save some program ( this has been like eight months ago ) and then put
the program, which was 1.44 mb, onto a floppy then boot your computer off
the floppy...I put in a brand new, unnamed formated disk and it said that
there was not enough disk space...I dont' have a damn clue as to why it
would not work...Also, with my thirst for info, I am going to get the QUE
linux book that comes with Linux 3.0.8 (?) slackware, redhat, a disk of
misc. utilitys and a disk of net utilitys...
I don't know why we are bitching at each other...You hack, I don't, you
use jargon, I don't, I can spell and type, you can't...Where is the
problem? Anyone back me up on this?
I really don't like to fight with people I don't know...So what does the
J stand for? Sort of ironic, my initals are JD, Jordan David...Fucked
up, O my brothers...
D.
_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]
From caj at math.niu.edu Mon Jun 1 17:42:49 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Mon, 1 Jun 1998 17:42:49 -0700 (PDT)
Subject: Holy QPRNF, part II (Re: Counterpane Cracks MS's PPTP)
In-Reply-To: <199806012143.QAA018.23@geiger.com>
Message-ID:
> >http://www.counterpane.com/pptp.html
This has got to be the scariest crypto-related paper I've
ever read. Detailed therein is just an unnatural amount of
screwing up for any one company, much less one product.
How many of us had to explain to a sci.crypt newbie why we can't
use the same one-time-pad string or cipher stream repeatedly? Here
we have Microsoft re-using RC4 keys in OUTPUT FEEDBACK MODE. In the
same session, fer God's sake, you and the server both use the same
XOR stream to encrypt?
This is not a subtle, excusable boo-boo. It's not even a crypto
mistake: it's a basic inability to comprehend what the exclusive-or
operation does.
I gotta admit, my first impression was that Schneier, et al,
were engaging in a heapin' helpin' of MS-bashing on their page.
Having read the paper, however, I'm now convinced that they
brushed too (po-)lightly over some real howlers. One might
get the false impression that these are subtle flaws, rather
than gaping holes from Hell.
We gotta convince Bill to fire his crypto people, for the
good of humanity. I suggest we get the message across by
sending MS a bunch of t-shirts reading, "Everything I ever
needed to know about crypto I learned from the LANMAN hash."
-Xcott
==- Xcott Craver -- Caj at niu.edu -- http://www.math.niu.edu/~caj/ -==
"This is a different thing: it's spontaneous and it's called 'wit.'"
-The Black Adder
From caj at math.niu.edu Mon Jun 1 18:01:56 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Mon, 1 Jun 1998 18:01:56 -0700 (PDT)
Subject: I need a compiler!
In-Reply-To:
Message-ID:
On Mon, 1 Jun 1998, J-Dog wrote:
> at any rate, kill yourself... you are breating air I might need someday...
Ah, lack of oxygen! I was going to blame a broken CAPS LOCK key.
-Caj
==- Xcott Craver -- Caj at niu.edu -- http://www.math.niu.edu/~caj/ -==
"This is a different thing: it's spontaneous and it's called 'wit.'"
-The Black Adder
From rah at shipwright.com Mon Jun 1 18:33:48 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Mon, 1 Jun 1998 18:33:48 -0700 (PDT)
Subject: Commerce Echelon
In-Reply-To: <199806012350.TAA13897@camel14.mindspring.com>
Message-ID:
At 7:48 PM -0400 on 6/1/98, John Young wrote:
> Any information on this unit and
> how it decides who gets which secrets?
It helps if you're Chinese or Indonesian...
Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga
Philodox Financial Technology Evangelism
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Philodox: , e$:
From one4evil at juno.com Mon Jun 1 18:36:12 1998
From: one4evil at juno.com (Nalus Optic)
Date: Mon, 1 Jun 1998 18:36:12 -0700 (PDT)
Subject: No Subject
Message-ID: <19980601.093541.11502.0.one4evil@juno.com>
Ok, I was just going through Phrack 51again and found this...I don't know
if you people care or are seeing it for the 51 time, but if you want the
whole thing, e-mail me or just go do a search for Phrack and look at
there archives...There is a lot more to the artical, but this little bit
lets you know what it is about.
D.
---[ Phrack Magazine Volume 7, Issue 51 September 01, 1997, article 13
of 17
-------------------------[ Monoalphabetic Cryptanalysis (Cyphers, Part
One)
--------[ Jeff Thompson aka 'Mythrandir'
Written for Phrack and completed on Sunday, August 31st, 1997.
---------
First a quick hello to all of those I met at DefCon this year. It was
incredible fun to finally put faces to many of the people I have been
talking
with for some time. It was truly was a treat to meet so many others who
are
alive with the spirit of discovery.
----------
This is the first in a series of articles on Cryptology that I am
writing.
The goals of these articles will be to attempt to convey some of the
excitement
and fun of cyphers. A topic of much discussion in regards to
cryptography
currently, is about computer based cyphers such as DES, RSA, and the PGP
implementation. I will not be discussing these. Rather, these articles
will
cover what I will term classical cryptology. Or cryptology as it existed
before fast number crunching machines came into existance. These are the
sorts
of cyphers which interested cryptographers throughout time and continue
to be
found even to this very day. Even today, companies are producing
software
whose encryption methods are attackable. You will find these commonly
among
password protection schemes for software programs. Through the course of
these
articles I will explain in practical terms several common cypher types
and
various implementations of them as well as cryptanalytic techniques for
breaking these cyphers.
Creating cyphers is fun and all, but the real excitement and often times
tedium
is found in Cryptanalysis. Many of the ideas presented in these articles
will
based on three sources. The following two books: The Codebreakers by
David
Kahn (ISBN: 0-684-83130-9) and Decrypted Secrets by F.L. Bauer
(ISBN: 3-540-60418-9). Both authors have put together wonderful books
which
both cover the history and methods of Cryptology. Do yourself and the
authors
a favor and purchase these books. You will be very pleased with the lot.
Finally, a miniscule amount of these articles will be written based on my
own
personal experience.
The fun is in the journey and I welcome you on what is certain to be an
interesting trip. Please feel free to raise questions, engage me in
discussions, correct me, or simply offer suggestions at
jwthomp at cu-online.com.
Please be patient with me as I am traveling extensively currently, and
may be
away from the computer at length occasionally.
Out the door and into the wild...
--Monoalphabetic Cyphers
Monoalphabetic cyphers are often currently found in simple cryptograms in
books
and magazines. These are just simple substitution cyphers. This does
not
mean that they are always simple for the beginning amateur to solve.
Three common monoalphabetic cyphers which are used are substitution,
cyclical,
and keyed cyphers.
-Substitution Cyphers
By taking an alphabet and replacing each letter with another letter in a
unique fashion you create a simple monoalphabetic cypher.
Plaintext Alphabet A B C D E F G H I J K L M N O P Q R S T U V W X
Y Z
Cypher Alphabet Z I K M O Q S U W Y A C E B D F H J L N P
R T V X G
Plaintext Message
The blue cow will rise during the second moon from the west field.
Cyphertext Message
nuo icpo kdt twcc jwlo mpjwbs nuo lokdbm eddb qjde nuo toln qwocm.
-Cyclical Cyphers
By taking an alphabet and aligning it with a rotated alphabet you get a
cyclical cypher. For example:
Plaintext Alphabet A B C D E F G H I J K L M N O P Q R S T U V W X
Y Z
Cypher Alphabet N O P Q R S T U V W X Y Z A B C D E F G H
I J K L M
Indeed, you may recognize this cypher as a ROT13 which is commonly used
on
news groups to obscure messages.
-Keyed Cypher
Another way to create a monoalphabetic cypher is to choose a keyword or
phrase
as the beginning of the cypher alphabet. Usually, only the unique letters
from
the phrase are used in order to make sure the plaintext to cyphertext
behaves
in a one to one fashion.
For example:
Plaintext Alphabet: A B C D E F G H I J K L M N O P Q R S T U V W
X Y Z
Cypher Alphabet L E T O S H D G F W A R B C I J K M N P Q
U V X Y Z
The passphrase in this cypher is "Let loose the dogs of war" The
advantage of
such a system is that the encryption method is easy to remember. Also, a
method of key change can be created without ever having to distribute the
keys.
For example, one could use the 4 words at a time of some piece of
literature.
Every message could use the next four words. Indeed, this change could
occur
more frequently, but that is a subject for another article.
_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]
From one4evil at juno.com Mon Jun 1 18:58:38 1998
From: one4evil at juno.com (Nalus Optic)
Date: Mon, 1 Jun 1998 18:58:38 -0700 (PDT)
Subject: I need a compiler!
In-Reply-To:
Message-ID: <19980601.095731.12158.0.one4evil@juno.com>
On Mon, 01 Jun 1998 21:37:58 -0400 "Robert A. Costner"
writes:
>People are making fun of you for the following reasons:
>
> * The 'C' compiler comes with the operating system
What OS?
> * Your email address is well... you look at it :)
I am a satanist, sorry...
> * Most of the crypto programs are GPL, which is not freeware, but
> you probably would not know the difference. (You don't need cash)
I don't care if I have to pay...I was just asking for everyone's oppinion
> * You sound like you are under 25
17...
> * You use vulgarities (Juno kicking my ass, net access blows)
And always will...Sorry, nothing gets the point across like a good
vulgarity
> * You can't spell. OK w/o the other stuff.
I know I can't spell...But I am doing better than J-Dog, what other
stuff?
> * Your dual PII-266 that you need, seems overblown to those running
> 386-25Mhz, or even 10Mhz systems.
Hey, at least I didn't say I wanted my oun cray or a duel 400 :)
> * You don't seem to know what PGP is.
PGP: Pretty Good Privicy...Not for export, puplic encryption, you
puplish your key then people can send you encrypted files...I think...
>Try reading the list for a month before you make your next message.
>It
>might work better. Or just get PGP and learn how to use it without
>asking
>the list. Besides, my domain is more elite than the other guy's
>hackerorg
>domain.
I have been on for about a week...My welcome message got no replys, all I
seam to get are political messages, I have seen one question about
crypto, and the reply was half joke...I DO NOT HAVE NET ACCESS! how do I
get pgp with out net access...I just wanted to know what everyone else
was useing...What is up with J-Dog jumping my shit (sorry) with this
stuff about, "Then again, if I was to say linux to you, you would prolly
run in ph33r"? I know linux, I want linux, you have read the other posts
so I won't go into it...I guess i am just on the wrong list...I sent out
a post befor about are there any better 'newbie' lists on crypto but got
no responce...oh well.
D.
p.s, I like Juno... :(
_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]
From chris at cybernet.co.nz Mon Jun 1 20:24:24 1998
From: chris at cybernet.co.nz (Chris Wedgwood)
Date: Mon, 1 Jun 1998 20:24:24 -0700 (PDT)
Subject: Counterpane Cracks MS's PPTP
In-Reply-To:
Message-ID: <19980602152326.B32084@caffeine.ix.net.nz>
On Mon, Jun 01, 1998 at 04:24:44PM -0500, William H. Geiger III wrote:
> Previous security foobars by M$:
>
> NT C2 <---- LOL!!!
Standard marketroid talk, I think M$ still tout this, but not so loudly
these days. Last I heard they were trying to get C2 with network
connectivity, but that was a while ago (2 years?) so they may have given up.
I'm sure I would have heard if it had.
That said, C2 doesn't necessarily buy you all that much.
> Active X <---- Who was the brain child that though *that* up?
Sure it sucks, it sucks for lots of reasons. But for the average luser it
still better than plugins so thats why its taken off. And what make
downloading a plugin and installing that any better?
> Auto-Launch attached binaries in E-Mail <-- Can we say GoodTimes?
Can anyone confirm that this has indeed been fixed yet?
I should also point out that buffer overflow bugs have been known for some
time (years?) with various unix mailers and their handling of .mailcap which
essentially amounts to the same thing.
> Crypto-API <--- Right I would *trust* that. Honest. :)
Does anyone have a list of design and implementation flaws for CAPI? I've
had discussions with a couple of people about these, but never seen anything
published.
> TCP/IP Stack <--- Too many flaws to list.
Yeah... its crap, but not necessarily that much worse that some of the
others out there. If someone were keeping score on which stacks help up the
best against all the attacks of the last two years it probably wouldn't be
the worst.
> Why would anyone trust these simpletons to produce any type of security
> product?
Sure. 95% of the population does.
People need to be educated about important issues, and using lots of
complicated gobbledygook doesn't help. If you, like me, have a loved one
that isn't terribly interested in computers or encryption, then see if the
phrase 'modular exponentiation' doesn't kick there eye-glaze-secreting gland
into over drive.
I guess this is something Bruce Schneier has done well - a report for
technical people who will read it, laugh and say they aren't surprised, and
press releases with LOTS OF BIG LETTERS AND SMALL WORDS for the rest of the
population including morons that are the media.
I think everyone is waiting for NT5. Multi-user NT is at best an interesting
concept. I remember at university using (arguably buggy) unix boxen with
200+ users simultaneously, with relatively few problems, but I'll be really
surprised if NT could get close to this....
I am so looking forward to NT5, it should prove to be very entertaining and
perhaps a really good opportunity to educate the public.
OK, getting bored with this reply now, so here it goes, errors and all....
-Chris
P.S. How does M$ sidestep the ITAR with ipsec code in Win98/NT5?
From StanSqncrs at aol.com Mon Jun 1 21:19:17 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Mon, 1 Jun 1998 21:19:17 -0700 (PDT)
Subject: I need a compiler!
Message-ID: <8d3fc421.35737c2b@aol.com>
In a message dated 6/1/98 7:11:19 PM Central Daylight Time, J-
Dog at Elitehackers.org writes:
<< (1 4 Evil)> Ya, sure...Sarcasm...You laugh at me but dude...William is to
busy with
> Netscape trying to dick him up the ass for me to call him again...
ok hippy... >>
Hey, I didn't say that! Why are you talking to me?
Stan
From StanSqncrs at aol.com Mon Jun 1 21:25:13 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Mon, 1 Jun 1998 21:25:13 -0700 (PDT)
Subject: Counterpane Cracks MS's PPTP
Message-ID:
In a message dated 6/1/98 10:38:20 PM Central Daylight Time,
chris at cybernet.co.nz writes:
<< > Auto-Launch attached binaries in E-Mail <-- Can we say GoodTimes?
Can anyone confirm that this has indeed been fixed yet? >>
It was my understanding, that the so-called GoodTimes virus was a farce,
apparently aimed at specific commercial spammers.
Stan
From cyburai at earthlink.net Mon Jun 1 21:27:50 1998
From: cyburai at earthlink.net (Christopher Turner)
Date: Mon, 1 Jun 1998 21:27:50 -0700 (PDT)
Subject: Tax revolt book
Message-ID: <199806020427.VAA06278@italy.it.earthlink.net>
C-punks,
my apologies if this book was discussed on the list back when it first
came out...
in the course of cleaning up and packing in preparation for our move, I
came across Bill Branon's first book, _Let Us Prey_. W/out going into any
detail, the backdrop of the book takes place in present-day America where
a sort of tax revolt is going on - over 1/3 of the taxpayers filed a Form
4868 - an automatic extension form - and 22% of those filers failed to
enclose a check of any kind.
There's a great part where the prez is freaking out because 1/3 of
Americans are getting a gov't check of some kind and where the hell are
they going to get the money when over another 1/3 of Americans won't pay
their taxes.
I highly recommend it.
Take care all, and watch your six,
Chris
---
Ubi dubium ibi libertas
Where there is doubt, there is freedom -Latin proverb
From dave at bureau42.ml.org Mon Jun 1 22:17:55 1998
From: dave at bureau42.ml.org (David E. Smith)
Date: Mon, 1 Jun 1998 22:17:55 -0700 (PDT)
Subject: I need a compiler!
In-Reply-To: <19980601.071648.10254.1.one4evil@juno.com>
Message-ID:
> But back to the real problem...yes, gcc would be ideal...How ever...I am
> not running Linux as of yet...so do you or any of you know any OTHER
> WINDOWS BASED COMPILERS that are worth a shit...I know it is a stretch
> but god...
um... so, why not get the Win32 port of GCC?
...dave
----- David E. Smith, P O Box 324, Cape Girardeau MO 63702
http://bureau42.base.org/people/dave/ dave at bureau42.ml.org
From alan at ctrl-alt-del.com Mon Jun 1 22:23:25 1998
From: alan at ctrl-alt-del.com (Alan)
Date: Mon, 1 Jun 1998 22:23:25 -0700 (PDT)
Subject: Counterpane Cracks MS's PPTP
In-Reply-To: <199806012143.QAA018.23@geiger.com>
Message-ID: <3.0.5.32.19980601220343.04443930@ctrl-alt-del.com>
At 03:23 PM 6/2/98 +1200, Chris Wedgwood wrote:
>
>On Mon, Jun 01, 1998 at 04:24:44PM -0500, William H. Geiger III wrote:
>
>> Previous security foobars by M$:
>>
>> NT C2 <---- LOL!!!
>
>Standard marketroid talk, I think M$ still tout this, but not so loudly
>these days. Last I heard they were trying to get C2 with network
>connectivity, but that was a while ago (2 years?) so they may have given up.
>I'm sure I would have heard if it had.
>
>That said, C2 doesn't necessarily buy you all that much.
Is this not what they claimed when they sold NT to the Air Force? Judging
by some of the Air Force software I have seen, this frightens me more than
most things.
>> Active X <---- Who was the brain child that though *that* up?
>
>Sure it sucks, it sucks for lots of reasons. But for the average luser it
>still better than plugins so thats why its taken off. And what make
>downloading a plugin and installing that any better?
You have a little more control over plug-ins.
>> Auto-Launch attached binaries in E-Mail <-- Can we say GoodTimes?
>
>Can anyone confirm that this has indeed been fixed yet?
>
>I should also point out that buffer overflow bugs have been known for some
>time (years?) with various unix mailers and their handling of .mailcap which
>essentially amounts to the same thing.
But those are specific to the client. Most Unix users know better.
>> Crypto-API <--- Right I would *trust* that. Honest. :)
>
>Does anyone have a list of design and implementation flaws for CAPI? I've
>had discussions with a couple of people about these, but never seen anything
>published.
I know of one, but I cannot release details yet. (I did not discover it
and i need to wait until the non-beta version of the product is released.)
Besides, I have been told I will be killed if I reveal it before it is time.
>> TCP/IP Stack <--- Too many flaws to list.
>
>Yeah... its crap, but not necessarily that much worse that some of the
>others out there. If someone were keeping score on which stacks help up the
>best against all the attacks of the last two years it probably wouldn't be
>the worst.
A great deal of this blame can be placed on the WinSock spec. The spec was
quite "loose" in many details of the implementation. You could be
complient and still not be able to deal with much of the software out
there. My vote for bad PC stack of the century was the one put out by Sun.
Not even close to compatible...
>> Why would anyone trust these simpletons to produce any type of security
>> product?
>
>Sure. 95% of the population does.
Sturgeon's law applies to people as well...
>People need to be educated about important issues, and using lots of
>complicated gobbledygook doesn't help. If you, like me, have a loved one
>that isn't terribly interested in computers or encryption, then see if the
>phrase 'modular exponentiation' doesn't kick there eye-glaze-secreting gland
>into over drive.
Most everything involving computers tends to do that.
>I guess this is something Bruce Schneier has done well - a report for
>technical people who will read it, laugh and say they aren't surprised, and
>press releases with LOTS OF BIG LETTERS AND SMALL WORDS for the rest of the
>population including morons that are the media.
You can type it out in clear, short sentences and the media will still
screw it up. If you have no clue as to what you are writing about, the
accuracy of what you write will suffer.
>I think everyone is waiting for NT5. Multi-user NT is at best an interesting
>concept. I remember at university using (arguably buggy) unix boxen with
>200+ users simultaneously, with relatively few problems, but I'll be really
>surprised if NT could get close to this....
Multi-user NT is available now. Citrix and NCD both have versions out now.
(Both are based on NT 3.51. They would have released a 4.0 product long
ago, but Microsoft wanted the product for themselves.) The server load
seems to be about 50 users per box. Depends on what you are running.
>I am so looking forward to NT5, it should prove to be very entertaining and
>perhaps a really good opportunity to educate the public.
Assuming that they can be educated. Better to offer them a choice. It is
hard to say "X is bad" unless you have an alternative.
From chris at cybernet.co.nz Tue Jun 2 00:17:02 1998
From: chris at cybernet.co.nz (Chris Wedgwood)
Date: Tue, 2 Jun 1998 00:17:02 -0700 (PDT)
Subject: Counterpane Cracks MS's PPTP
In-Reply-To:
Message-ID: <19980602191625.A14758@caffeine.ix.net.nz>
On Tue, Jun 02, 1998 at 12:20:11AM -0400, StanSqncrs at aol.com wrote:
> In a message dated 6/1/98 10:38:20 PM Central Daylight Time,
> chris at cybernet.co.nz writes:
>
> << > Auto-Launch attached binaries in E-Mail <-- Can we say GoodTimes?
>
> Can anyone confirm that this has indeed been fixed yet? >>
>
> It was my understanding, that the so-called GoodTimes virus was a farce,
> apparently aimed at specific commercial spammers.
GoodTimes is a hoax.
I'm talking about a bug in Outlook (Express?) that will execute code when
email messages are opened.
-Chris
From icollins at sol.co.uk Tue Jun 2 01:45:25 1998
From: icollins at sol.co.uk (Iain Collins)
Date: Tue, 2 Jun 1998 01:45:25 -0700 (PDT)
Subject: I need a compiler!
Message-ID: <3573BB3C.BFF57DC@sol.co.uk>
>> And J-Dog, what is up with the fucked up lingo...This ain't the
movies...
>fucked up lingo? gee, I am very sorry if your small mind can not make
out
>my words.. but I can assure you that this is NOT fucked up lingo... go
>read some h4x0r Br0s and then tell me about how fuct up my lingo is....
>
>Latez
>JD
>
>btw... congrats on your really kool superl33t juno.com account.. you
are
>r33t now.
Both of you lose all all guru/elite points accumulated thus far by
wasting bandwidth due to (repeatedly) inapproproately posting to the
CypherPunks mailling list. Doh!
Iain Collins, icollins at sol.co.uk
From chris at cybernet.co.nz Tue Jun 2 04:16:03 1998
From: chris at cybernet.co.nz (Chris Wedgwood)
Date: Tue, 2 Jun 1998 04:16:03 -0700 (PDT)
Subject: Counterpane Cracks MS's PPTP
In-Reply-To: <199806012143.QAA018.23@geiger.com>
Message-ID: <19980602231500.A532@caffeine.ix.net.nz>
On Mon, Jun 01, 1998 at 10:03:43PM -0700, Alan wrote:
> >That said, C2 doesn't necessarily buy you all that much.
>
> Is this not what they claimed when they sold NT to the Air Force? Judging
> by some of the Air Force software I have seen, this frightens me more than
> most things.
Either M$ lied, or the Air Force should no better. In the former, the Air
Force should sue M$, but more likely its the latter. Why should the Air
Force have clue-full people when most large corporates, banks, governments,
IT companies and software companies do not?
Governments with large databases full of all your personal details and banks
with all your financial details are two really good examples of
organizations which should do a good job with system security and
reliability but invariably do the worst (some exceptions apply).
> >Sure it sucks, it sucks for lots of reasons. But for the average luser it
> >still better than plugins so thats why its taken off. And what make
> >downloading a plugin and installing that any better?
>
> You have a little more control over plug-ins.
It doesn't really buy much. Most people will blindly download anything and
install it. If it doesn't install the first time by finding all the right
file locations, etc. and allowing the use to click Next every time, they
will start deleting files at random trying to remove it.
Perhaps I'm over stating things, but I'm a tad jaded from having to make
documentation and software work for morons (the public at large).
> But those are specific to the client. Most Unix users know better.
The M$ example is confined to a specific client. Many unix users use unix
because they are required too, these people are probably as clue-less and
luse95 users.
On average the number of clue-full 95 users against the number of clue-full
unix users is probably 10:1 despite luse95 large user base, quoting numbers
which I just made up of course and clue-full being defined by me, and able
to be redefined whenever I feel like it.
This is all beside the point - someone mentioned that a M$ mailer had a very
nasty bug, I just pointed out that can and has also occurred elsewhere.
> >Does anyone have a list of design and implementation flaws for CAPI? I've
> >had discussions with a couple of people about these, but never seen
> >anything published.
>
> I know of one, but I cannot release details yet. (I did not discover it
> and i need to wait until the non-beta version of the product is released.)
> Besides, I have been told I will be killed if I reveal it before it is
> time.
It can wait. It seems plenty of others are waiting....
> >Yeah... its crap, but not necessarily that much worse that some of the
> >others out there. If someone were keeping score on which stacks help up
> >the best against all the attacks of the last two years it probably
> >wouldn't be the worst.
>
> A great deal of this blame can be placed on the WinSock spec. The spec
> was quite "loose" in many details of the implementation. You could be
> complient and still not be able to deal with much of the software out
> there.
The issues most people complain about are not related to the WinSock API,
but poor coding in the stack that make stack overflows and memory buffer
curruption trivial. Similar bugs used to exist in the *BSD and linux stacks,
as with the streams library used by SCO and Solaris (although maybe solaris
has something funny there).
> My vote for bad PC stack of the century was the one put out by Sun.
> Not even close to compatible...
No, my shit-stack-off-the-week (I just decided now) goes to Ultrix stack
which barfs on unknown tcp options and hence is complete fucked when tying
to comminicate with a recent *BSD or linux boxes, solaris and possible
Win98/NT5.
> Sturgeon's law applies to people as well...
?
Sorry... don't know it.
> >People need to be educated about important issues, and using lots of
> >complicated gobbledygook doesn't help. If you, like me, have a loved one
> >that isn't terribly interested in computers or encryption, then see if
> >the phrase 'modular exponentiation' doesn't kick there
> >eye-glaze-secreting gland into over drive.
>
> Most everything involving computers tends to do that.
Only because people are fed bullshit and lies by 80% of the industry
'consultants' who don't know much and use big words to cover this up.
I really think people would be much more willing if they weren't feed so
much crap at times.
> You can type it out in clear, short sentences and the media will still
> screw it up. If you have no clue as to what you are writing about, the
> accuracy of what you write will suffer.
Again, the above applies, but bear in mind that most people in the modern
media have little interest in the truth unless it helps sales, and if not
then just 'modify the story a bit'.
It also helps to consider that most reporters are pretty dumb and lack any
real qualifications to talk about the things that they do, PC rag. editors
being a really good example.
Lets face it, we use the 'net and crypto, so we are dirty filthy prevented
peadophile unabomber criminals who are going to pervert the youth and
corrupt the America way. If you deny this it just proves what an
untrustworthy person you are.
> Multi-user NT is available now. Citrix and NCD both have versions out now.
> (Both are based on NT 3.51. They would have released a 4.0 product long
> ago, but Microsoft wanted the product for themselves.) The server load
> seems to be about 50 users per box. Depends on what you are running.
Slightly different that NT5 though... I know people working on large Citrix
boxes with 2GB of ram and they speak quite highly of it, but their 40+ users
are running custom apps. with an NT4 like gui.
I'm not so sure it would work so great with 10+ people running Visual C++ to
compile and debug code.... where as unix boxen have been doing this for
years with 500+ people.
What really sucks is there is some nice ideas in bits of NT, only what
little kewl stuff there is has lost all credibility because of the
atrociously large bloated buggy code that constitutes the other 99% of it.
> Assuming that they can be educated. Better to offer them a choice. It is
> hard to say "X is bad" unless you have an alternative.
The real shame in all this is there is no really viable choice to the evil
borg. Not yet anyhow....
-Chris
From adam at homeport.org Tue Jun 2 05:19:38 1998
From: adam at homeport.org (Adam Shostack)
Date: Tue, 2 Jun 1998 05:19:38 -0700 (PDT)
Subject: Commerce Echelon
In-Reply-To:
Message-ID: <199806021218.IAA27678@homeport.org>
Robert Hettinga wrote:
| > Any information on this unit and
| > how it decides who gets which secrets?
|
| It helps if you're Chinese or Indonesian...
I am shocked, shocked, to hear you suggest such a thing about our
government. They don't care about these people's ethnicity, only
their wallets.
Thus, its helps if you're rich or stinkin' rich. That it came from
the sweat of the peasants doesn't matter a whit.
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
From kemp at indusriver.com Tue Jun 2 06:09:55 1998
From: kemp at indusriver.com (Brad Kemp)
Date: Tue, 2 Jun 1998 06:09:55 -0700 (PDT)
Subject: Counterpane Cracks MS's PPTP
In-Reply-To:
Message-ID: <3.0.3.32.19980602090947.0317cc10@pop3.indusriver.com>
This is a good paper. It covered almost all of the failures of MS PPTP.
However, I think it missed a big one.
It is possible to recover all the clear text from a PPTP session,
even if most of the traffic is going in one direction only.
The failure is in MPPE. When MPPE gets a sequenceing error, it
resets the key. This causes the cipher stream to be reset. It is
partially covered in section 5.4 .
Since RC4 is a stream cipher, it generates the same
cipher stream for a given key. This cipher stream is XORed with the clear
text.
To recover the clear text, an attacker just needs to force a
resyncronization by
sending a packet that has a bogus coherency count.
If the attacker captures the original stream and the resynchronized stream
a simple XOR of the two streams results in an XOR of the cleartext.
While compression does make it harder to determine what the cleartext is,
It is likely that a determined attacker can decrypt and decompress the
XORed result.
Brad
Brad Kemp
Indus River Networks, Inc. BradKemp at indusriver.com
31 Nagog Park 978-266-8122
Acton, MA 01720 fax 978-266-8111
From icollins at scotland.net Tue Jun 2 08:20:43 1998
From: icollins at scotland.net (Iain Collins)
Date: Tue, 2 Jun 1998 08:20:43 -0700 (PDT)
Subject: Counterpane Cracks MS's PPTP
In-Reply-To: <19980602152326.B32084@caffeine.ix.net.nz>
Message-ID: <002301bd8e39$c8b18880$c7f3b094@webadmin.sol.co.uk>
As reguards:
> Previous security foobars by M$:
>
> NT C2 <---- LOL!!!
I beleive that no operating system has ever been given a C2 certification,
and that only indiviual installations can be certifed.
This requries that each installation be transported and conducted under
armed guard, which is case with certain US government Microsoft NT
Workstation installations.
It is also stated (somewhere, but I don't have the details to hand) that no
C2 rated system should be plugged in to an external network connection (i.e.
the internet), and that only connections to secure LAN's/WAN's are permitted
(otherwise the C2 certification is meaningless, hence why NT Sever has never
been C2 certified IIRC).
I would be grateful if anyone can categorically deny or in any way support
this.
> Auto-Launch attached binaries in E-Mail <-- Can we say GoodTimes?
The GoodTimes virus was, according to the DOE's CAIC a hoax. This is also my
personal opinion. This is what DOE's CAIC have to say:
http://ciac.llnl.gov/ciac/CIACHoaxes.html#goodtimes
Or, more amusingly.
http://ciac.llnl.gov/ciac/CIACHoaxes.html#goodspoof
However All E-mail readers that support HTML & JavaScript/Java/Active-X are
inherantly insecure. This inlcudes Netscape Navigator and Microsoft Outlook,
where mearly the act of previewing a malicious message can cause adverse
effects.
If anyone were to include a embed a malicious Java or Active-X control then
the supposed sandbox in Windows 9X/NT would be ineffectual as one could
conceviably create a control which could execute software anywhere on the
hard disk (this has already been done using both Active-X and IE under
Windows 95). Thus it follows that it could determain what viewer it is being
read under and execute any other attachments in the same e-mail from where
the are stored (in Netscape/Outlook) which could then...
Iain Collins, icollins at sol.co.uk
From paulmerrill at acm.org Tue Jun 2 09:37:48 1998
From: paulmerrill at acm.org (Paul H. Merrill)
Date: Tue, 2 Jun 1998 09:37:48 -0700 (PDT)
Subject: Counterpane Cracks MS's PPTP
In-Reply-To: <002301bd8e39$c8b18880$c7f3b094@webadmin.sol.co.uk>
Message-ID: <3574553D.3F0BE65A@acm.org>
Iain Collins wrote:
<>
> I beleive that no operating system has ever been given a C2 certification,
> and that only indiviual installations can be certifed.
>
Both Right and WrongC2 (or other) certification is given to a product system,
not an OS nor an installation. NT on a specific configuration of a specific
manufacturer, fo instance. (and with a specific mix of other software) The
intent was to make available Commercial Off The Shelf (COTS) systems for gov
purchase.) But the concept was generated in the mainframe/Mini frame of mind.
> This requries that each installation be transported and conducted under
> armed guard, which is case with certain US government Microsoft NT
> Workstation installations.
>
> It is also stated (somewhere, but I don't have the details to hand) that no
> C2 rated system should be plugged in to an external network connection (i.e.
> the internet), and that only connections to secure LAN's/WAN's are permitted
> (otherwise the C2 certification is meaningless, hence why NT Sever has never
> been C2 certified IIRC).
>
The network issue is one with deep ramifications and not as simple as listed in
the above Para. Two totally secure nets can be not secure when connected to
each other because of the data interface for security levels, user permisisions
etc.
> I would be grateful if anyone can categorically deny or in any way support
> this.
>
NCSC has a whole line of books on it all. Red is the Network Interpretation,
Orange is the Criteria itself.
> <>
PHM
author, NOT the Orange Book -- A Guide to the Definition, Specification,
Tasking, and Documentation for the Development of Secure Computer Systems --
Including Condensations of the Memebers of the Rainbow Series and Related
Documents, Merlyn Press, WPAFB, 1992
NTOB is available for those who want it.
From richardt at midgard.net Tue Jun 2 14:02:09 1998
From: richardt at midgard.net (Richard Threadgill)
Date: Tue, 2 Jun 1998 14:02:09 -0700 (PDT)
Subject: subscribe richardt@midgard.net
Message-ID: <29466.896821142@yggdrasil.midgard.net>
From gwb at gwb.com.au Tue Jun 2 15:57:13 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Tue, 2 Jun 1998 15:57:13 -0700 (PDT)
Subject: Pauline Hanson's speech in parliament
Message-ID: <1.5.4.32.19980602225151.00b8d840@mail.pronet.net.au>
G'day,
The media are once again blatantly misrepresenting the issues that Pauline
Hanson raised in parliament yesterday.
We would invite you to see for yourself a verbatim transcript of what she
said and view direct links to the ATSIC and UN home pages which confirm her
concerns on the issues raised such as the planned "formation of independent
Aboriginal states" in Australia.
View: http://www.gwb.com.au/un.html
Be informed! Do not believe the lies the media tell.
Please print out her speech and distribute it freely.
GWB
Scott Balson
From jtatz at chemistry.ohio-state.edu Tue Jun 2 16:10:10 1998
From: jtatz at chemistry.ohio-state.edu (Jim Tatz)
Date: Tue, 2 Jun 1998 16:10:10 -0700 (PDT)
Subject: WinNT C2?
In-Reply-To: <002301bd8e39$c8b18880$c7f3b094@webadmin.sol.co.uk>
Message-ID:
Windows NT4.0 has been tested under the red book spec published by the
NCSC. That means in effect, NT is C2 compliant in a stand alone
environment. Howver, NT does NOT comply with the orange book spec which
defines additional requirements when the machine is used in a networked
environment. It *IS* possible for an operating system that is on a
networked machine to be C2(Orange Book) compliant. Microsoft has never
stated that it is C2 compliant on a network, however their page about C2
and NT is poorly worded, and effectively discounts the importance of the
Orange Book spec.
It would be fun to get ahold of the specs from the NCSC.
-Jim
From caj at math.niu.edu Tue Jun 2 16:31:53 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Tue, 2 Jun 1998 16:31:53 -0700 (PDT)
Subject: Counterpane Cracks MS's PPTP
In-Reply-To: <3.0.3.32.19980602090947.0317cc10@pop3.indusriver.com>
Message-ID:
On Tue, 2 Jun 1998, Brad Kemp wrote:
> It is possible to recover all the clear text from a PPTP session,
> even if most of the traffic is going in one direction only.
> The failure is in MPPE. When MPPE gets a sequenceing error, it
> resets the key. This causes the cipher stream to be reset. It is
> partially covered in section 5.4.
I really think the XOR weaknesses deserve as much publicity
as possible, because they are IMHO the simplest to exploit,
and the result of the dumbest mistakes.
So far we have three: 40-bit RC4 uses the same key with every
session (!!), the client and server seems to encrypt with the same
key stream going both ways (!!!), and then this resequencing
attack.
Are all three of these fixed? The certainly aren't
"theoretical."
==- Xcott Craver -- Caj at niu.edu -- http://www.math.niu.edu/~caj/ -==
"This is a different thing: it's spontaneous and it's called 'wit.'"
-The Black Adder
From whgiii at invweb.net Tue Jun 2 16:51:48 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Tue, 2 Jun 1998 16:51:48 -0700 (PDT)
Subject: WinNT C2?
In-Reply-To:
Message-ID: <199806022355.SAA008.18@geiger.com>
-----BEGIN PGP SIGNED MESSAGE-----
In
,
on 06/02/98
at 07:09 PM, Jim Tatz said:
>Windows NT4.0 has been tested under the red book spec published by the
>NCSC. That means in effect, NT is C2 compliant in a stand alone
>environment. Howver, NT does NOT comply with the orange book spec which
>defines additional requirements when the machine is used in a networked
>environment. It *IS* possible for an operating system that is on a
>networked machine to be C2(Orange Book) compliant. Microsoft has never
>stated that it is C2 compliant on a network, however their page about C2
>and NT is poorly worded, and effectively discounts the importance of the
>Orange Book spec.
>It would be fun to get ahold of the specs from the NCSC.
You have this backward,
The "Red Book": NCSC-TG-005 "Trusted Network Interpretation of the Trusted
Computer System Evaluation Criteria"
The "Orange Book": DOD 5200.28-STD "DOD Trusted Computer System Evaluation
Criteria"
A NT machine to meet DOD 5200.28 C2 rating needs to be seriously crippled
when comapired to normal operation. No removable media, No Modem, No
Network Connection, hell pluging the dam thing and turning it on probably
puts it's C2 rating in jepordy.
The reason M$ downplays their C2 rating is that in average day to day use
of this OS it does not meet this rating.
NT has never had any RedBook rating and is not certified for use in a
secure network.
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
Tag-O-Matic: OS/2 means...CURTAINS for Windows!
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNXSQ/I9Co1n+aLhhAQH0/AQAmuhCSKG8mogzfbvq9x7Z90vghRWPOKzJ
4AMffpsPh4mpUnx6VHPLBksa4j3lyUh/67WwqozILzDna1fXfbYu/7eFsWltjw2n
yb1YQKOIhJU+SgbO5kSfakc3oGaKAXElmHDcdTWJdl+g6PShDTM6KXRPgqcMi55I
jfnqVPDKics=
=CPFu
-----END PGP SIGNATURE-----
From ryan at michonline.com Tue Jun 2 16:54:58 1998
From: ryan at michonline.com (Ryan Anderson)
Date: Tue, 2 Jun 1998 16:54:58 -0700 (PDT)
Subject: WinNT C2?
In-Reply-To:
Message-ID:
On Tue, 2 Jun 1998, Jim Tatz wrote:
>
> Windows NT4.0 has been tested under the red book spec published by the
> NCSC. That means in effect, NT is C2 compliant in a stand alone
> environment. Howver, NT does NOT comply with the orange book spec which
> defines additional requirements when the machine is used in a networked
> environment. It *IS* possible for an operating system that is on a
> networked machine to be C2(Orange Book) compliant. Microsoft has never
> stated that it is C2 compliant on a network, however their page about C2
> and NT is poorly worded, and effectively discounts the importance of the
> Orange Book spec.
>
> It would be fun to get ahold of the specs from the NCSC.
I believe you've got your colors backwards here..
NT is C2 compliant in standalone format, with Posix disabled. It's an
unusable configuration. That's all I can remember off the top of my head
though..
Ryan Anderson
PGP fp: 7E 8E C6 54 96 AC D9 57 E4 F8 AE 9C 10 7E 78 C9
From jtatz at chemistry.ohio-state.edu Tue Jun 2 17:14:27 1998
From: jtatz at chemistry.ohio-state.edu (Jim Tatz)
Date: Tue, 2 Jun 1998 17:14:27 -0700 (PDT)
Subject: WinNT C2?
In-Reply-To: <199806022355.SAA008.18@geiger.com>
Message-ID:
> A NT machine to meet DOD 5200.28 C2 rating needs to be seriously crippled
> when comapired to normal operation. No removable media, No Modem, No
> Network Connection, hell pluging the dam thing and turning it on probably
> puts it's C2 rating in jepordy.
>
> The reason M$ downplays their C2 rating is that in average day to day use
> of this OS it does not meet this rating.
>
> NT has never had any RedBook rating and is not certified for use in a
> secure network.
In addition to the converstaion, MS says:
Microsoft has opted not to include certain components of Windows NT in the
evaluation process, not because they would not pass the evaluation, but to
save time by reducing the load on the NSA. Additionally, the
MS-DOS/Windows on Windows (WOW) system may be treated as a Win32
application and would therefore not need to be evaluated as part of the
Trusted Computer Base (TCB). Networking on NT may not have to go
through the "Red Book," or "Trusted Network Interpretation." It may be
enough to consider networking to be another subsystem, and therefore only
the Orange Book would apply. New or modified components and other hardware
platforms can go through a "RAMP" process to be included in the evaluation
at a later time.
http://support.microsoft.com/support/kb/articles/q93/3/62.asp
[Isn't it great, you have to register for FREE support?]
-Jim
From DarkKnight at Elitehackers.org Tue Jun 2 17:42:52 1998
From: DarkKnight at Elitehackers.org (Dark Knight)
Date: Tue, 2 Jun 1998 17:42:52 -0700 (PDT)
Subject: WinNT C2?
In-Reply-To: <199806022355.SAA008.18@geiger.com>
Message-ID:
>
> >Windows NT4.0 has been tested under the red book spec published by the
> >NCSC. That means in effect, NT is C2 compliant in a stand alone
> >environment. Howver, NT does NOT comply with the orange book spec which
> >defines additional requirements when the machine is used in a networked
> >environment. It *IS* possible for an operating system that is on a
> >networked machine to be C2(Orange Book) compliant. Microsoft has never
> >stated that it is C2 compliant on a network, however their page about C2
> >and NT is poorly worded, and effectively discounts the importance of the
> >Orange Book spec.
Do you know the Redbook specs? From my understanding of the specs to have
a C2 rateing you can't have a NIC card or Disk Drive. But I think you can
have a NIC card in the machine connected to a network that is enrycpted
network. But I could be wrong but I don't forget most of what I read..
>
> >It would be fun to get ahold of the specs from the NCSC.
>
> You have this backward,
>
> The "Red Book": NCSC-TG-005 "Trusted Network Interpretation of the Trusted
> Computer System Evaluation Criteria"
> The "Orange Book": DOD 5200.28-STD "DOD Trusted Computer System Evaluation
> Criteria"
>
> A NT machine to meet DOD 5200.28 C2 rating needs to be seriously crippled
> when comapired to normal operation. No removable media, No Modem, No
> Network Connection, hell pluging the dam thing and turning it on probably
> puts it's C2 rating in jepordy.
>
> The reason M$ downplays their C2 rating is that in average day to day use
> of this OS it does not meet this rating.
>
> NT has never had any RedBook rating and is not certified for use in a
> secure network.
MS is haveing problems meeting the standards and they have alot of work
to do on NT when it comes to Secuirty. Any was see MSN.com today?
|)ark |(night
DEFINITION.
Windows 95: n. 32 bit extensions and a graphical shell for a
16 bit patch to an 8 bit operating system originally coded for
a 4 bit microprocessor, written by a 2 bit company, that can't
stand 1 bit of competition.
Http://www.EliteHackers.org/DarkKnight
From whgiii at invweb.net Tue Jun 2 18:22:02 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Tue, 2 Jun 1998 18:22:02 -0700 (PDT)
Subject: WinNT C2?
In-Reply-To:
Message-ID: <199806030125.UAA009.35@geiger.com>
-----BEGIN PGP SIGNED MESSAGE-----
In
,
on 06/02/98
at 08:14 PM, Jim Tatz said:
>In addition to the converstaion, MS says:
>Microsoft has opted not to include certain components of Windows NT in
>the evaluation process, not because they would not pass the evaluation,
>but to save time by reducing the load on the NSA. Additionally, the
>MS-DOS/Windows on Windows (WOW) system may be treated as a Win32
>application and would therefore not need to be evaluated as part of the
>Trusted Computer Base (TCB). Networking on NT may not have to go through
>the "Red Book," or "Trusted Network Interpretation." It may be enough to
>consider networking to be another subsystem, and therefore only the
>Orange Book would apply. New or modified components and other hardware
>platforms can go through a "RAMP" process to be included in the
>evaluation at a later time.
Good God what kind of double talk is this? It doesn't need Red Book eval.
and networking can be treated as a sub-system?!? Well I guess the guys
down at NSA just wrote the Red Book (which is significantly larger than
the Orange Book) because they were board.
I would not trust Micky$lop to tell me that the sky was blue and water was
wet let alone trust them to provide *any* form of security product.
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
Tag-O-Matic: Get OS/2 - the best Windows tip around!
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNXSmHI9Co1n+aLhhAQEdowP9FsXmZOEk8KMKvgVun8wbMQqIUoGjB3wj
e+dXsPglA/ya2S2+/wwdQFW2UEXvqHYR4MNV8Af/jqnxQgOk//4ZJVUrf+dkd65u
dOfa2eICbFyRg8OgZZgWDXFr1IvgLpcS36U0V+LyebaoyCqI/WsMnx6zcx8qEzHs
iiF7kDJJPmE=
=HBxD
-----END PGP SIGNATURE-----
From whgiii at invweb.net Tue Jun 2 18:46:20 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Tue, 2 Jun 1998 18:46:20 -0700 (PDT)
Subject: WinNT C2?
In-Reply-To:
Message-ID: <199806030150.UAA009.49@geiger.com>
-----BEGIN PGP SIGNED MESSAGE-----
In , on
06/02/98
at 12:35 PM, Dark Knight said:
>Do you know the Redbook specs? From my understanding of the specs to
>have a C2 rateing you can't have a NIC card or Disk Drive. But I think
>you can have a NIC card in the machine connected to a network that is
>enrycpted network. But I could be wrong but I don't forget most of what
>I read..
You are making the same mistake the previous poster made on this.
Orange Book == Standalone
Red Book == Network
The numerious criteria for the various levels of trusted systems are too
numerious to list here. I *strongly* recomend obtaining copies of the
Rainbow Series from the NSA (they will mail a copy for free) and studying
the documentation. They are well written and easy to read (unlike many
such papers which are techno-bable filled).
There are aprox. 30 manuals in the Rainbow Series that cover a wide range
of topics related to Trusted Systems of which the Orange Book is a small
part. I doubt you could find more than 5 M$ employees that have read more
than a quarter of the manuals let alone are able to implement their
principals.
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
Tag-O-Matic: I love running Windows! NOT!
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNXSr2Y9Co1n+aLhhAQGtDAQApkDb/TiweTEuMnijTqOVcwcFuqQGKh/7
wZjiBu6S+VcyVUj/dcTyUwszqD1vuBUuevD8W9+dGdqjxRz/P8nxYelqaZfza997
sraI5Wc3MjGxp64plbRAt6qOzZjfFCXOv/ZSuRrf9tXjHFJeZz0KSkNex3Haz54j
zmxljrbnmB8=
=J5Mg
-----END PGP SIGNATURE-----
From q772d3 at att.net Tue Jun 2 19:31:51 1998
From: q772d3 at att.net (q772d3)
Date: Tue, 2 Jun 1998 19:31:51 -0700 (PDT)
Subject: No Subject
Message-ID: <19943672.886214@relay.comanche.denmark.eu>
Authenticated sender is
Subject: q 77
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
EMAIL MARKETING WORKS!!
Bull's Eye Gold is the PREMIER email address collection tool.
This program allows you to develop TARGETED lists of email
addresses. Doctors, florists, MLM, biz opp,...you can collect
anything...you are only limited by your imagination! You can
even collect email addresses for specific states, cities, and
even countries! All you need is your web browser and this program.
Our software utilizes the latest in search technology called
"spidering". By simply feeding the spider program a starting
website it will collect for hours. The spider will go from website
to targeted website providing you with thousands upon thousands of
fresh TARGETED email addresses. When you are done collecting, the
spider removes duplicates and saves the email list in a ready to
send format. No longer is it necessary to send millions of ads to
get a handful of responses...SEND LESS...EARN MORE!!!
A terrific aspect of the Bull's Eye software is that there is
no difficult set up involved and no special technical mumbo-jumbo
to learn. All you need to know is how to search for your targeted
market in one of the many search engines and let the spider do the
rest! Not familiar with the search engines? No problem, we provide
you with a list of all the top search engines. Just surf to the
location of a search engine on your browser then search for the
market you wish to reach...it's that easy!
For instance if you were looking for email addresses of Doctors
in New York all you would do is:
1) Do a search using your favorite search engine by typing in
the words doctor(s) and New York
2) Copy the URL (one or more)...that's the stuff after the
http://... for instance it might look like
http://www.yahoo.com/?doctor(s)/?New+York
3) Press the START button
THAT's IT!!! The Bull's Eye spider will go to all the websites
that are linked, automatically extracting the email addresses
you want.
The spider is passive too! That means you can let it run all
day or all night while you are working on important things or
just having fun on your computer. There is no need to keep a
constant watch on it, just feed it your target market and give
it praise when it delivers thousands of email addresses at
the end of the day!
Features of the Bull's Eye Software:
* Does TARGETED searches of websites collecting the email
addresses you want!
* Collects Email addresses by City, State, even specific
Countries
* Runs Automatically...simply enter the Starting information,
press The Start Button, and it does the rest
* Filters out duplicates
* Keeps track of URLs already visited
* Can run 24 hours per day, 7 days per week
* Fast and Easy List Management
* Also has built in filtering options...you can put in words
that it "Must" have while searching,...you can even put in
criteria that it "Must NOT Have"...giving you added flexibility
* Also imports email addresses from any kind of files (text
files, binary files, database files)
* List editor handles Multiple files to work on many lists
simultaneously
* Has a Black-Book feature... avoid sending emails to people
who do not want to receive it
* Built-in Mail program...send email directly on the internet
with just a click of your mouse
* Personalized Emails...if the email address has the user's
name when it is collected,..you can send Personalized emails!!!
* Sort by Location, Server, User Name, Contact Name
* Advanced Operations:
� Email address lists export in many different formats
(HTML, Comma delimited, text file)
� Advanced editing...Transfer, Copy, Addition, Delete, Crop,
Move to Top/Bottom
� Operations between lists...Union, Subtraction, Comparison
* Program is Passive,...meaning you can run other programs at
the same time
CALL FOR MORE INFORMATION 213-980-7850
CALL FOR MORE INFORMATION 213-980-7850
ORDERING INFORMATION
Customer Name
Company Name
Address
City
State Zip
Phone Fax
Email Address
______ BULL'S EYE SOFTWARE $259.00
Includes Software, Instructions, Technical Support
______ Shipping & Handling (2-3 Day Fedex) $10.00
(Fedex Overnite) $20.00
______ TOTAL
(CA Residents add applicable sales tax)
*All orders are for Win 95 and Win NT
*****CREDIT CARDS ACCEPTED*****
MASTERCARD VISA AMEX
PLEASE CALL 213-980-7850 to process your order
9am-5pm Pacific Time
Checks or Money Orders send to:
WorldTouch Network Inc.
5670 Wilshire Blvd. Suite 2170 Los Angeles, CA 90036
Please note: Allow 5 business days for all checks to
clear before order is shipped.
From jimmy at weboneinc.net Tue Jun 2 20:29:48 1998
From: jimmy at weboneinc.net (jimmy at weboneinc.net)
Date: Tue, 2 Jun 1998 20:29:48 -0700 (PDT)
Subject: $25.00 Signup!
Message-ID: <199806030329.XAA32240@josh1.weboneinc.com>
This message is intended for Adult Webmasters only. We are sorry if you
received this message in error. Just type remove and put your e-mail
address on the subject line.
Thank you for your consideration.
Hello,
Earn $25.00 per signup!
XTV- 2000's adult webmaster referral program pays you $25.00
for every person that signs up on our site! You get paid more than any
other program!
We have the hottest online hardcore videos and spy-cams that everyone wants
to see, so it will be easy to make money with our high commisions.
Real time stats, bi-monthly payout, and all other details are on the
sign-up page:
http://208.156.131.103/xtv
Sign-up and start making money right now!
Thanks,
Jim Stevenson
VP Marketing
XTV-2000
jimmy at weboneinc.net
From DarkKnight at Elitehackers.org Tue Jun 2 21:32:09 1998
From: DarkKnight at Elitehackers.org (Dark Knight)
Date: Tue, 2 Jun 1998 21:32:09 -0700 (PDT)
Subject: WinNT C2?
In-Reply-To: <199806030150.UAA009.49@geiger.com>
Message-ID:
> -----BEGIN PGP SIGNED MESSAGE-----
>
> In , on
> 06/02/98
> at 12:35 PM, Dark Knight said:
>
> >Do you know the Redbook specs? From my understanding of the specs to
> >have a C2 rateing you can't have a NIC card or Disk Drive. But I think
> >you can have a NIC card in the machine connected to a network that is
> >enrycpted network. But I could be wrong but I don't forget most of what
> >I read..
>
> You are making the same mistake the previous poster made on this.
>
> Orange Book == Standalone
> Red Book == Network
>
> The numerious criteria for the various levels of trusted systems are too
> numerious to list here. I *strongly* recomend obtaining copies of the
> Rainbow Series from the NSA (they will mail a copy for free) and studying
> the documentation. They are well written and easy to read (unlike many
> such papers which are techno-bable filled).
>
> There are aprox. 30 manuals in the Rainbow Series that cover a wide range
> of topics related to Trusted Systems of which the Orange Book is a small
> part. I doubt you could find more than 5 M$ employees that have read more
> than a quarter of the manuals let alone are able to implement their
> principals.
I had a copy but like a dumb ass I forgot them where I used to live. I
don't think the NSA or DOD I think it's the NSA gives away free copys any
more..
|)ark |(night
DEFINITION.
Windows 95: n. 32 bit extensions and a graphical shell for a
16 bit patch to an 8 bit operating system originally coded for
a 4 bit microprocessor, written by a 2 bit company, that can't
stand 1 bit of competition.
Http://www.EliteHackers.org/DarkKnight
From samantha21 at worldnet.att.net Tue Jun 2 21:53:36 1998
From: samantha21 at worldnet.att.net (samantha21 at worldnet.att.net)
Date: Tue, 2 Jun 1998 21:53:36 -0700 (PDT)
Subject: Lunch...
Message-ID: <199806030453.AAA18564@spruce.libertynet.org>
The Best Adults Only Website I've Seen!
This one has EVERYTHING!
Take a Look
CLICK ONCE
From awhite at indigo.ie Tue Jun 2 22:06:40 1998
From: awhite at indigo.ie (Andrew White)
Date: Tue, 2 Jun 1998 22:06:40 -0700 (PDT)
Subject: WinNT C2?
Message-ID: <008e01bd8ead$5cdc4db0$0100007f@localhost>
Versions are important, too...
Quote from current Microsoft Web site...
" evaluation along with the US TCSEC class C2 evaluation
completed in 1995 for Windows NT 3.5
demonstrates Microsoft's commitment to building a secure operating system
and continuing to provide customers
with assurance of its security characteristics based on these evaluations>"
NT 4.0 has never passed ANY security evaluation. NT 3.51 passed a UK one in
October 1996, NT 3.5 passed C2 in
1995. Both these earlier versions are effectively unusable due to diverse
and numerous bugs unrelated to security,
and both the evaulations were without a network card.
Later,
Andrew.
From jtatz at chemistry.ohio-state.edu Tue Jun 2 23:05:48 1998
From: jtatz at chemistry.ohio-state.edu (Jim Tatz)
Date: Tue, 2 Jun 1998 23:05:48 -0700 (PDT)
Subject: WinNT C2? - How about WinNT and some C-4?
In-Reply-To: <008e01bd8ead$5cdc4db0$0100007f@localhost>
Message-ID:
> NT 4.0 has never passed ANY security evaluation. NT 3.51 passed a UK one in
> October 1996, NT 3.5 passed C2 in
> 1995. Both these earlier versions are effectively unusable due to diverse
> and numerous bugs unrelated to security,
> and both the evaulations were without a network card.
Surprisingly enough NT4.0 has not received the C2 rating, although I could
have sworn I have seen remarks about Nt4.0 and C2 certification on a
Microsoft page. According to WIRED, NT 4.0 is undergoing testing, and will
supposedly be certified in Oct.
Apparently the gov't isn't too happy with the way MS is bluring the edges
of C2 certification of their products [Which they are buying].
http://www.wired.com/news/news/technology/story/12121.html
-Jim
From billp at nmol.com Tue Jun 2 23:18:02 1998
From: billp at nmol.com (bill payne)
Date: Tue, 2 Jun 1998 23:18:02 -0700 (PDT)
Subject: refrigerator magnet
Message-ID: <35734441.38FF@nmol.com>
Monday 6/1/98 6:05 PM
Masanori
I put the refrigerator magnet
1945 509th COMPOSITE GROUP 1995
FIRST ATOMIC BOMBARDMENT
50th ANNIVERSARY
in the mail to you today.
Reason I sent the magnet is to show THAT THERE ARE SOME REALLY-SICK
MINDS [see reverse side of magnet] IN POWER in the US.
Just got off the phone with John Young.
Governments, including Japan, TRY to mess with peoples'
minds. There is a book on this.
http://www.amazon.com/exec/obidos/quicksearch-query/002-2147604-1106833
But I have a solution. I do not read e-mail. At this time.
I also believe in what Kahn wrote
Thursday, March 20, 1980, 09:30 David Kahn addressed Congress,
the Committee on Government Operations.
Kahn stated to the committee,
A final benefit is that refusing to restrict cryptologic
studies erects yet another rampart against the chipping
away
of American liberties. Is this rampart, again, worth the
danger to national security? Yes, because the danger is
not
as acute as the N.S.A. wishes people to see it. N.S.A.
wants people to think that publication of cryptologic
material would slam shut its window into the Third World
countries. In fact such publication has little effect ...
The national security dangers are not so great as to
dismantle individual freedom.
For all of these reasons, then, no limitation should be
placed on the study of cryptology. And beyond them all
lies
something more fundamental, in the end, will probably
prevent any restrictions anyway. It is called the First
Amendment.
I thank you.
I hope you see that I am using the seventh amendment.
http://www.jya.com/whp052898.htm
And even more adamantly I believe
For what shall it profit a man if he shall gain the whole world and
lose his own soul.
Kahn on Codes page 172
Best regards
bill
From billp at nmol.com Tue Jun 2 23:20:54 1998
From: billp at nmol.com (bill payne)
Date: Tue, 2 Jun 1998 23:20:54 -0700 (PDT)
Subject: Dr. Abdul Qadeer [Kahn]
Message-ID: <3571FB7B.7338@nmol.com>
Sunday 5/31/98 6:06 PM
J Orlin Grabbe
Read at http://www.aci.net/kalliste/ tonight
India vs. Pakistan
Another Pakistan Nuke.. Dr. Abdul Qadeer
Friday 5/15/1998 Albuquerque Journal, Universal Press Syndicate,
Syndicated Columnist Richard Reeves writes
U.S. Indignation at India�s Nuclear Testing Hypocritical
London - So, India has conducted its second test of a nuclear weapon,
and its
third, fourth, and fist and sixth, in the past few days. That put it
1,026 tests
behind the United States. ...
This has been coming for a long, time - and we have been foolish or
deliberately
looking the wrong way for decades. Fifteen years ago, in 1983, we the
Reeves family,
were living in the district called E-7, the best neighborhood in
Islamabad, the capital of
Pakistan. (My wife was doing work involving refugee camps in the
northwest of the
country, across the border from the Afghan-Soviet war.)
Like everyone else around there, including American diplomats, we
knew why military
car arrived each morning to take the fellow around the corer, Abdel
Qadeer Kahn, to his
office - or laboratory. Kahn was in charge of building the bomb out
in the Pakistani desert
at a place called Kahuta. This was the so-called �Islamic bomb� ready
for use against India,
which had conducted its first test in 1974. Whatever we though,
Pakistanis believed nuclear
weapons were essential to checkmate the change of being overwhelmed by
India., their
10-time-as-big neighbor. ...
Small world. See Los Angeles Times syndicated columnist Richard Reeves
at http://www.jya.com/whp052898.htm
John Young's voice telephone is being picked-up by his fax tonight.
Let's all hope for prompt peaceful settlement of the unfortunate matter.
Later
bill
From billp at nmol.com Tue Jun 2 23:22:58 1998
From: billp at nmol.com (bill payne)
Date: Tue, 2 Jun 1998 23:22:58 -0700 (PDT)
Subject: Reeves 5/15/98 conclusion
Message-ID: <35720025.1B0A@nmol.com>
Sunday 5/31/98 7:03 PM
Orlin
I erred by not transcribing Reeve's conclusion in his Friday 5/15/1998
Albuquerque Journal editorial
Our policy is not stupid. It's hypocritical and delusionary, but
not stupid. What was stupid was to actually believe that countries
like India, Pakistan, China, and Iran and Israel, too, would act on
American words and illusions rather than on their own national interests
and fears. This American blunder of intelligence and intellect is
not another inside-the-beltway, Ken-and-Monica joke. This is an
affair of state, a failure of state. Officials should not be
subpoenaed or mocked; they should resign or be fired.
Let ALL hope for release of the documents requested at
http://www.jya.com/whp052898.htm and peaceful
settlement of another �American blunder of intelligence�.
Later
bill
From billp at nmol.com Tue Jun 2 23:23:18 1998
From: billp at nmol.com (bill payne)
Date: Tue, 2 Jun 1998 23:23:18 -0700 (PDT)
Subject: punching the Great FASCIST Satan in the nose
Message-ID: <357352A0.6A81@nmol.com>
Monday 6/1/98 7:16 PM
John Young
The SAND report you posted at http://jya.com/whpfiles.htm was a
DELIBERATE attempt to send NSA a message. I had some help
from Sandia classification.
Bill
Subject:
refrigerator magnet
Date:
Mon, 01 Jun 1998 18:16:01 -0600
From:
bill payne
To:
masanori fushimi
CC:
cypherpunks at toad.com, ukcrypto at maillist.ox.ac.uk
Monday 6/1/98 6:05 PM
Masanori
I put the refrigerator magnet
1945 509th COMPOSITE GROUP 1995
FIRST ATOMIC BOMBARDMENT
50th ANNIVERSARY
in the mail to you today.
Reason I sent the magnet is to show THAT THERE ARE SOME REALLY-SICK
MINDS [see reverse side of magnet] IN POWER in the US.
Just got off the phone with John Young.
Governments, including Japan, TRY to mess with peoples'
minds. There is a book on this.
http://www.amazon.com/exec/obidos/quicksearch-query/002-2147604-1106833
David Felton
But I have a solution. I do not read e-mail. At this time.
I also believe in what Kahn wrote
Thursday, March 20, 1980, 09:30 David Kahn addressed Congress,
the Committee on Government Operations.
Kahn stated to the committee,
A final benefit is that refusing to restrict cryptologic
studies erects yet another rampart against the chipping
away of American liberties. Is this rampart, again, worth
the
danger to national security? Yes, because the danger is
not as acute as the N.S.A. wishes people to see it. N.S.A.
wants people to think that publication of cryptologic
material would slam shut its window into the Third World
countries. In fact such publication has little effect ...
The national security dangers are not so great as to
dismantle individual freedom.
For all of these reasons, then, no limitation should be
placed on the study of cryptology. And beyond them all
lies something more fundamental, in the end, will probably
prevent any restrictions anyway. It is called the First
Amendment.
I thank you.
I hope you see that I am using the seventh amendment.
http://www.jya.com/whp052898.htm
And even more adamantly I believe
For what shall it profit a man if he shall gain the whole world and
lose his own soul.
Kahn on Codes page 172
Best regards
bill
From dac at zurich.ibm.com Wed Jun 3 03:28:09 1998
From: dac at zurich.ibm.com (Marc Dacier)
Date: Wed, 3 Jun 1998 03:28:09 -0700 (PDT)
Subject: Last Call For Participation - RAID 98
Message-ID: <9806031027.AA140462@collon.zurich.ibm.com>
Last Call For Participation - RAID 98
(also available at http://www.zurich.ibm.com/~dac/RAID98)
First International Workshop on the Recent Advances in Intrusion
Detection
September 14-15, 1998 Louvain-la-Neuve, Belgium
We solicit your participation in the first International Workshop on the
Recent Advances in Intrusion Detection (RAID 98).
This workshop, the first in an anticipated annual series, will bring
together leading figures from academia, government, and industry to talk
about the current state of intrusion detection technologies and paradigms
from the research and commercial perspectives.
Research into and development of automated intrusion detection systems
(IDS) has been under way for nearly 10 years. By now a number of systems
have been deployed in the commercial or government arenas, but all are
limited in what they do. At the same time, the numerous research and
prototype systems developed have been more engineering than scientific
efforts, with scant quantitative performance figures. As we survey the
field of automated intrusion detection, we are faced with many questions:
1. What research questions have yet to be answered (or even
asked) about IDS?
2. What are the open challenges, limitations, and fundamental
concerns about present intrusion detection methodologies?
3. What metrics can we use to measure IDS performance and thus
compare different systems and methodologies? These
measurements should highlight the successes and expose the
limitations of current IDS approaches.
4. What factors are inhibiting transfer of research ideas into
functional deployed systems? How can those be addressed?
5. What is the role of a deployed IDS? How should or can it fit in
with other security systems?
6. What are the typical IDS operating environments? What can be
done to configure IDS to unique operating environments?
7. What are the challenges for IDS in very large environments, such
as the Internet?
8. Is it time to contemplate IDS standards? What are the advantages
and disadvantages of standardizing components of IDS?
What forums (e.g., IETF, ISO) would be appropriate for
pursuing such standards?
9. What are the problems of turning the results of intrusion
detection tools into legally reliable evidence? What are the
problems of admissibility and of courtroom presentation?
We invite proposals and panels that explore these questions or any other
aspect of automated intrusion detection. We especially solicit proposals
and panels that address:
1. New results related to intrusion detection methodologies and
technologies.
2. Innovative ways of thinking about intrusion detection; for
example, the applicability of R&D in the fields of survivable
and/or dependable systems, data mining, etc.
3. User experiences and lessons learned from fielded intrusion
detection systems.
4. IDS for emerging computer environments (e.g., Java, CORBA, and
NT).
5. Commercial intrusion detection systems.
We have scheduled RAID 98 immediately before ESORICS 98, at the same time
as CARDIS 98, and at the same location as both of these conferences. This
provides a unique opportunity for the members of these distinct, yet
related, communities to participate in all these events and meet and share
ideas during joined organized external events.
GENERAL CO-CHAIRS
*****************
Marc Dacier (IBM Zurich Research Laboratory, Switzerland)
Kathleen Jackson (Los Alamos National Laboratory, USA)
PROGRAM COMMITTEE
*****************
Matt Bishop (University of California at Davis, USA)
Dick Brackney (National Security Agency, USA)
Yves Deswarte (LAAS-CNRS & INRIA, France)
Baudouin Le Charlier (Universite de Namur, Belgium)
Stuart Staniford-Chen (University of California at Davis, USA)
Rowena Chester (University of Tennessee, USA)
Deborah Frincke (University of Idaho, USA)
Tim Grance (National Institute of Standards and Technology, USA)
Sokratis Katsikas (University of the Aegean, Greece)
Jean-Jacques Quisquater (Universite Catholique de Louvain, Belgium)
Mark Schneider (National Security Agency, USA)
Marv Schaefer (Arca Systems, USA)
Peter Sommer (London School of Economics & Political Science, England)
Steve Smaha (Free Agent, USA)
Gene Spafford (Purdue University, USA)
Chris Wee (University of California at Davis, USA)
Kevin Ziese (Cisco, USA)
SUBMISSIONS
***********
The program committee invites proposals for both technical and general
interest talks and panels.
Each talk or panel submission must contain:
1) A separate title page with:
The type of submission (talk or panel);
The title or topic; and
The name(s) of the speaker or panel chair and probable
panelists, with their organizational affiliation(s), telephone
and FAX numbers, postal address, and Internet electronic mail
address.
2) A brief biography of each participant.
3) The time desired for the talk or panel.
Talk proposals must also include an abstract that is a maximum of 600
words in length. Papers are not required, but if included as an addendum,
will be used as supplementary information for the evaluation of the talk
proposal. The program committee will allocate each accepted presenter
either a 15 or 30-minute slot for the talk, based on the complexity and
interest of the proposed topic and the wishes of the speaker. The
presenter will be informed the slot length when notified of acceptance.
Panel proposals must also include a description that is a maximum of 300
words, the format of the presentation, and short rationale for the panel.
The program committee will allocate accepted panel sessions one to
two-hour time slots, based on the complexity and interest of the proposed
topic, the number of panelists, and the wishes of the panel chair. The
panel chair will be informed the slot length when notified of acceptance.
All proposals must be in English. Plan to give all panels and talks in
English.
We must receive all proposals before June 15, 1998. We strongly prefer
they be submitted by e-mail to raid98 at zurich.ibm.com. Various formats
(ASCII, postscript, Word, WordPro, Framemaker, and LaTex) are acceptable.
If necessary, hardcopy proposals may be sent to:
Marc Dacier
Global Security Analysis Lab
IBM Zurich Research Laboratory
Saeumerstrasse 4
CH-8803 Rueschlikon
Switzerland
Each submission will be acknowledged by e-mail. If acknowledgment is not
received within seven days, please contact the one of the General
Co-Chairs.
A preliminary program will be available at the RAID web site
(http://www.zurich.ibm.com/~dac/RAID98) by August 1, 1998.
CORPORATE SPONSORS
******************
We solicit interested organizations to contribute to student travel
expenses for RAID 98. Corporate sponsorship will cost 2500 US$, and will
entitle the organization to four general attendance workshop passes.
Please contact a General Co-Chair for more information.
REGISTRATION
************
Registration will open on 1 August 1998, at which point detailed
registration information (including a list of recommended hotels) will be
provided at the RAID 98 web site (http://www.zurich.ibm.com/~dac/RAID98).
Travel instructions to Louvain-la-Neuve are available at
http://www.dice.ucl.ac.be/crypto/acces-lln.html (courtesy of the UCL
Crypto Group). Registration will close on 21 August 1998. Late
registration will continue until 4 September 1998, but only on a
space-available basis, and will include a penalty of 50 US$ (in addition
to the fees specified below).
Fees will be levied on a sliding scale, as follows:
Student: $200
Speaker or Panel Member: 250 US$
General attendance: 350 US$
This fee will include workshop sessions, banquet, hosted reception,
luncheons, light breakfast service, and coffee and refreshment breaks.
There will be no special rate for one-day or other limited attendance.
Payment in full will be required at registration.
We are negotiating a registration discount for those attending both the
ESORICS conference and the RAID or CARDIS workshops, and for
interchangeable workshop registration. Further information will be
available when detailed registration information is posted.
PROCEEDINGS
***********
On-line workshop proceedings will be posted on the RAID web site
(http://www.zurich.ibm.com/~dac/RAID98) immediately following the workshop.
It will include:
1) The final program;
2) A list of corporate sponsors;
3) A list of attendees (subject to each attendee's approval);
4) The submitted abstract and slides used by each speaker;
5) The submitted description and rationale for each panel;
6) The slides used by each panelist; and,
7) Written position statements from each panelist.
In addition, the most outstanding workshop participants will be invited to
submit an analogous formal paper to a special RAID edition of the refereed
journal "Computer Networks and ISDN Systems."
IMPORTANT DATES
***************
Deadline for submission: 15 June 1998
Registration opens: 1 August 1998
Notification of proposal acceptance or rejection: 1 August 1998
Preliminary program posted to web: 1 August 1998
Registration closes: 21 August 1998
Late registration closes: 4 September 1998
Workshop: 14-15 September 1998
MORE INFORMATION
****************
For further information contact one of the General Co-chairs:
Marc Dacier
IBM Zurich Research Laboratory
Switzerland
E-mail: dac at zurich.ibm.com
Tel.: +41-1-724-85-62
Fax.: +41-1-724-89-53
Kathleen Jackson
Los Alamos National Laboratory
USA
E-mail: kaj at lanl.gov
Tel.: +41-1-724-86-29
Fax.: +41-1-724-89-53
The RAID 98 web site: http://www.zurich.ibm.com/~dac/RAID98,
The ESORICS 98 web site: http://www.dice.ucl.ac.be/esorics98.
The CARDIS 98 web site: http://www.dice.ucl.ac.be/cardis98/
From rescue9111 at hotmail.com Wed Jun 3 04:29:59 1998
From: rescue9111 at hotmail.com (rescue9111 at hotmail.com)
Date: Wed, 3 Jun 1998 04:29:59 -0700 (PDT)
Subject: 10-03
Message-ID: <>
BENCHMARK PRINT SUPPLY
1091 REDSTONE LANE
ATLANTA GA 30338
FOR ORDERS/PRICING ONLY PLEASE CALL (770)399-0953
CUSTOMER SERVICE/SUPPORT ISSUES PLEASE CALL (770)399-5505
FOR COMPLAINTS OR E-MAIL REMOVAL PLEASE CALL (770)399-5614
OUR LASER PRINTER/FAX/COPIER TONER CARTRIDGES, PRICES
NOW AS LOW AS $39 & UP
WE CARRY MOST ALL LASER PRINTER CARTRIDGES, FAX SUPPLIES
AND COPIER TONERS AT WAREHOUSE PRICES INCLUDING:
HEWLETT PACKARD SERIES 2/3/4/2P/4P/5P/4L/5L/3SI/4SI/5SI
IBM/LEXMARK OPTRA SERIES 4019/4029/4039/4049/4059
EPSON SERIES 2/1100/1500/6000/7000/8000
NEC SERIES 90/95
CANON COPIER PC SERIES INCLUDING 3/6RE/7/11/320/720/10/20/25 ETC...
HP FAX SERIES 700/720/5000/7000/FX1/FX2/FX3/FX4/FX5
CANON FAX ALL MODELS
WE DO NOT CARRY : BROTHER - PANASONIC - XEROX - FUJITSU - OKIDATA - SHARP
PRICES DO CHANGE PERIODICALLY. PLEASE CALL TO GET THE MOST
RECENT PRICING/AVAILABILTY AND SPECIALS OF THE WEEK!!!!
ORDERS/PRICING LINE ONLY CALL (770)399-0953
*****NEW,NEW,NEW $10 MAIL IN REBATE ON ALL CARTRIDGES*****
****SIMPLY ORDER YOUR NEW CARTRIDGE, WHEN IT ARRIVES MAIL BACK****
****YOUR REBATE CERTIFICATE WITH ANY USED CARTRIDGE FOR INSTANT CREDIT****
WE ACCEPT ALL MAJOR CREDIT CARDS OR COD ORDERS
CORPORATE ACCOUNTS AVAILABLE WITH APPROVED CREDIT
ALL PACKAGES SHIPPED UPS GROUND UNLESS SPECIFIED OTHERWISE
.
PLEASE NOTE: WE ARE CURRENTLY BUYING
HP-SERIES 5L - 5P - AND 4000 CARTRIDGES
ALL LEXMARK OPTRA CARTRIDGES
CANON PC COPIER CARTRIDGES
NOTE: THESE ARE THE ONLY CARTRIDGES CURRENTLY INCLUDED
IN OUR BUY BACK PROGRAM
TO ARRANGE CARTRIDGE PICKUP CALL CUSTOMER SERVICE (770)399-5505
From rescue9111 at hotmail.com Wed Jun 3 04:29:59 1998
From: rescue9111 at hotmail.com (rescue9111 at hotmail.com)
Date: Wed, 3 Jun 1998 04:29:59 -0700 (PDT)
Subject: 10-03
Message-ID: <>
BENCHMARK PRINT SUPPLY
1091 REDSTONE LANE
ATLANTA GA 30338
FOR ORDERS/PRICING ONLY PLEASE CALL (770)399-0953
CUSTOMER SERVICE/SUPPORT ISSUES PLEASE CALL (770)399-5505
FOR COMPLAINTS OR E-MAIL REMOVAL PLEASE CALL (770)399-5614
OUR LASER PRINTER/FAX/COPIER TONER CARTRIDGES, PRICES
NOW AS LOW AS $39 & UP
WE CARRY MOST ALL LASER PRINTER CARTRIDGES, FAX SUPPLIES
AND COPIER TONERS AT WAREHOUSE PRICES INCLUDING:
HEWLETT PACKARD SERIES 2/3/4/2P/4P/5P/4L/5L/3SI/4SI/5SI
IBM/LEXMARK OPTRA SERIES 4019/4029/4039/4049/4059
EPSON SERIES 2/1100/1500/6000/7000/8000
NEC SERIES 90/95
CANON COPIER PC SERIES INCLUDING 3/6RE/7/11/320/720/10/20/25 ETC...
HP FAX SERIES 700/720/5000/7000/FX1/FX2/FX3/FX4/FX5
CANON FAX ALL MODELS
WE DO NOT CARRY : BROTHER - PANASONIC - XEROX - FUJITSU - OKIDATA - SHARP
PRICES DO CHANGE PERIODICALLY. PLEASE CALL TO GET THE MOST
RECENT PRICING/AVAILABILTY AND SPECIALS OF THE WEEK!!!!
ORDERS/PRICING LINE ONLY CALL (770)399-0953
*****NEW,NEW,NEW $10 MAIL IN REBATE ON ALL CARTRIDGES*****
****SIMPLY ORDER YOUR NEW CARTRIDGE, WHEN IT ARRIVES MAIL BACK****
****YOUR REBATE CERTIFICATE WITH ANY USED CARTRIDGE FOR INSTANT CREDIT****
WE ACCEPT ALL MAJOR CREDIT CARDS OR COD ORDERS
CORPORATE ACCOUNTS AVAILABLE WITH APPROVED CREDIT
ALL PACKAGES SHIPPED UPS GROUND UNLESS SPECIFIED OTHERWISE
.
PLEASE NOTE: WE ARE CURRENTLY BUYING
HP-SERIES 5L - 5P - AND 4000 CARTRIDGES
ALL LEXMARK OPTRA CARTRIDGES
CANON PC COPIER CARTRIDGES
NOTE: THESE ARE THE ONLY CARTRIDGES CURRENTLY INCLUDED
IN OUR BUY BACK PROGRAM
TO ARRANGE CARTRIDGE PICKUP CALL CUSTOMER SERVICE (770)399-5505
From Quisquater at dice.ucl.ac.be Wed Jun 3 06:15:02 1998
From: Quisquater at dice.ucl.ac.be (Jean-Jacques Quisquater)
Date: Wed, 3 Jun 1998 06:15:02 -0700 (PDT)
Subject: CARDIS 98: smart card research
Message-ID: <199806031314.PAA10742@ns1.dice.ucl.ac.be>
CARDIS Conference Announcement
Final Call for Papers and Panels
-------------------------------------------------------------
THIRD SMART CARD RESEARCH AND ADVANCED APPLICATION CONFERENCE
SEPTEMBER 14-16, 1998
UCL, LOUVAIN-LA-NEUVE, BELGIUM
------------------------------------------------------------
Aims and Goals
Smart cards, or IC cards, offer a huge potential for information processing
purposes. The portability and processing power of IC cards allow for highly
secure conditional access and reliable distributed information systems.
There are IC cards available that can perform highly sophisticated cryptographic
computations. The applicability of IC cards is currently limited mainly
by our imagination; the information processing power that can be gained
by using IC cards remains as yet mostly untapped and is not well understood.
Here lies a vast uncovered research area which we are only beginning to
assess, and which will have a great impact on the eventual success of the
technology. The research challenges range from electrical engineering on
the hardware side to tailor-made cryptographic applications on the software
side, and their synergies.
Many currently existing events are mainly devoted to commercial and
application aspects of IC cards. In contrast, the CARDIS conferences aim
to bring together researchers who are active in all aspects of the design
of IC cards and related devices and environments, such as to stimulate
synergy between different research communities and to offer a platform
for presenting the latest research advances.
CARDIS 1994, sponsored by the International Federation for Information
Processing (IFIP), held in November 1994 in Lille, France, successfully
brought together representatives from leading IC research centers from
all over the world. CARDIS 1996 was the second occasion for the IC
card community in this permanent activity. CARDIS 1996 was organized jointly
by the Centre for Mathematics and Computer Science at Amsterdam (CWI) and
the Department of Logic and Computer Science of the University of Amsterdam
(UvA).
Organization
General Chair
Catherine Rouyer (UCL, Louvain-la-Neuve, Belgium)
Program Chairs
Jean-Jacques Quisquater (UCL, Louvain-la-Neuve, Belgium)
Bruce Schneier (Counterpane, USA)
Program Committee (in construction)
William Caelli (QUT, Brisbane, Australia)
Vincent Cordonnier (R2DP, Lille, France)
David Chan (HP Labs, Bristol, UK)
Jean-Fran�ois Dhem (Belgacom, Belgium)
J. Eloff (RAU, South Africa)
Marc Girault (CNET, France)
Louis Guillou (CNET, France)
Pieter Hartel (Southampton, UK and Amsterdam, The Netherlands)
Peter Honeyman (Michigan U., USA)
Pierre Paradinas (Gemplus, France)
Qiang (Acad. Sciences, Beijing, China)
Michel Ugon (Bull CP-8, France)
Doug Tygar (Carnegie-Mellon Univ., USA)
Anthony Watson (ECU, Perth, Australia)
Wijang Zhang (Shangai, China)
Steering Committee Chair
Vincent Cordonnier (Rd2p, Lille, France)
Local Organization
Catherine Rouyer (UCL)
Benoit Macq (UCL)
SUBMISSIONS
Submissions will be judged on relevance, originality, significance,
correctness, and clarity. Each paper should explain its contribution
in both general and technical terms, identifying what has been
accomplished, saying why it is significant, and comparing it with
previous work. Authors should make every effort to make the technical
content of their papers understandable to a broad audience. Papers
should be written in English. Working papers, research in progress
are welcome.
Authors should submit: an extended abstract (more or less 5 pages) either
by email to jjq at dice.ucl.ac.be (we prefer the electronic submission)
using one of the following formats: postscript, rtf, latex or word 6.
or send 12 copies of the paper to
Jean-Jacques Quisquater
UCL/DICE
Place du Levant, 3
B-1348 Louvain-la-Neuve
Belgium
The paper should be formatted using the LNCS format from Springer-Verlag, if possible.
In any case, each paper should be accompanied by information
submitted via email to jjq at dice.ucl.ac.be that consists of:
* a single postal address and electronic mail address for communication
* complete title, author and affiliation information
* the abstract of the paper
* a small selection of the keywords that appear on this call for
papers, which best describes the contribution of the paper
Preproceedings will be available at the conference. It is intended to
publish the proceedings in the Springer-Verlag LNCS series. Authors of
accepted papers may be expected to sign a copyright release form.
IMPORTANT DATES
Submission deadline June 15, 1998
Acceptance notification July 15, 1998
Camera ready paper due Augustus 15, 1998
Conference September 14-16 1998
THEMES
Technology/hardware
IC architecture and techniques
Memories and processor design
Read/Write unit engineering
Specific co-processors for cryptography
Biometry
Communication technologies
Interfaces with the user, the service
suppliers
Reliability and fault tolerance
Special devices
Standards
Software
The operating system, Java, ...
Models of data management
Communication protocols
IC Card design
Tools for internal or external software production
Validation and verification
Methodology for application design
Electronic payment systems
Road pricing
Internet payment systems
Untraceability
Algorithms
Formal specification and validation
Identification
Authentication
Cryptographic protocols for IC cards
Complexity
Security
Models and schemes of security
Security interfaces
Hardware and software implementation
Security of information systems including cards
Formal verification of transaction sets
Protocol verification
IC Cards, individuals and the society
IC cards and privacy
Owner access of data
IC cards: political and economical aspects
Is the IC card going to change legislation?
Patents, copyrights
Future of IC cards
Innovative technologies
Moving towards the pocket intelligence
Convergence with portable PCs, lap tops etc ...
PCMCIA
Innovative applications
Design methodology of applications
IC cards and the information system
Examples of new applications
Requirements for innovative cards
Standards
Emerging standards
Compliance and approval
From jya at pipeline.com Wed Jun 3 08:47:39 1998
From: jya at pipeline.com (John Young)
Date: Wed, 3 Jun 1998 08:47:39 -0700 (PDT)
Subject: DNA sequencing info needed
In-Reply-To:
Message-ID: <199806031547.LAA04781@dewdrop2.mindspring.com>
It's now a cliche of bio-terrorism bellringers that
"this stuff scares me silly," with scientists, pols
and first responders now comically repeating the
code.
A technological artist on Long Island has set up in
his studio a collection of the most deadly germs known
on earth, in a small glass display, with labels and
descriptions of what they are and can do: dosages, kill
ratios, distribution methods, sources of specimens
and food supplies, URLs for bio-terrorists.
He invites art connoisseurs to visit. They walk around
the room looking for the show, see little except typical
suburban living room furniture, then spy the glass
tank, approach, read, freeze, then begin to tremble.
Some scream, some faint, some vomit in horror,
claw clothing, stampede for the exit.
The artist tries to reassure them it's only a carefully
constructed simulation. None believe him. They shiver
outside in the yard and whimper accusations of terrorism,
which, he confesses, is the truth of bio-terrorism, to
scare sane people silly.
From jimd at starshine.org Wed Jun 3 09:03:50 1998
From: jimd at starshine.org (Jim Dennis)
Date: Wed, 3 Jun 1998 09:03:50 -0700 (PDT)
Subject: subscribe richardt@midgard.net
In-Reply-To:
Message-ID: <199806031452.HAA08039@canopus.starshine.org>
Hey Richard,
I think you may have sent this the wrong way. You may want to
resend it.
Here's a summary of the headers as I recieved them:
From: Richard Threadgill
Subject: subscribe richardt at midgard.net
To: cypherpunks-announce at toad.com
Date: Tue, 02 Jun 1998 13:59:02 -0700
Message-Id: <29466.896821142 at yggdrasil.midgard.net>
--
Jim Dennis (800) 938-4078 consulting at starshine.org
Proprietor, Starshine Technical Services: http://www.starshine.org
From billp at nmol.com Wed Jun 3 10:03:17 1998
From: billp at nmol.com (bill payne)
Date: Wed, 3 Jun 1998 10:03:17 -0700 (PDT)
Subject: My knowledge of NSA 'deficient' crypto algorithms
Message-ID: <3575813B.4DBE@nmol.com>
Wednesday 6/3/98 10:55 AM
jensul
So as not to misspell J[G]en[n]ifer.
You might be interested to look at the University of Southern
California home page on the gfsr.
My co-author Lewis was one of my former ms and phd students.
NSA's crypto algorithms are okay - for hardware implementation -
but are classified, in my opinion, to possibly hide embarrassment.
Some of us at Sandia offered to help NSA fix its 'deficient' crypto
algorithms. For money, of course.
It is EASY to make a BLUNDER in crypto. For theoretical or
implementation reasons. NSA knows this too. And is pretty cautious
about what it does.
I partially read another crypto-related article at
http://www.news.com/News/Item/0%2C4%2C22705%2C00.html?st.ne.fd.gif.j
Best
bill
Subject:
Marc Dacier
Date:
Wed, 03 Jun 1998 07:34:04 -0600
From:
bill payne
To:
jy at jya.com
CC:
dac at zurich.ibm.com, kaj at lanl.gov
Wednesday 6/3/98 7:25 AM
John Young
I looked at http://www.zurich.ibm.com/~dac/RAID98
I was in Marc Dacier's (IBM Zurich Research Laboratory, Switzerland)
office last April in Zurich.
Dacier was quizzing me about what the US was concerned about,
secuity-wise, inside weapons systems. Spiking, of course.
And it was so nice to learn only yesterday that USC has a home page
something I thought-up.
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html
I SURE UNDERSTOOD the algorithms behind the NSA KG schematics
Brian Snow showed me.
Let's continue to hope for prompt settlement of the unfortunate matter
BEFORE things get WORSE.
And we can all get onto better and hopefully less destructive,
http://www.aci.net/kalliste/, endeavors.
Later
bill
From SMODeLUX at aol.com Wed Jun 3 14:12:31 1998
From: SMODeLUX at aol.com (SMODeLUX at aol.com)
Date: Wed, 3 Jun 1998 14:12:31 -0700 (PDT)
Subject: [E-WRESTLING] New fed that's superior to all others ...
Message-ID: <4abf174c.3575b995@aol.com>
b r u t e f o r c e w r e s t l i n g .
............................................................
BFW HANDBOOK
Last Revised: 4.22.98
-=-=-=-=-=-=-=-=-=-=-=-=-=-
BFW INTRODUCTION:
-=-=-=-=-=-=-=-=-=-=-=-=-=-
Screw organization with those "preppy handbooks," Screw the weenies
that take e-Wrestling seriously, and screw the critics. Do you think you're a
tough guy? Are you _brutal_? Are you sure? You can't be sure unless you
strut your stuff in the paragon of e-Wrestling fun, the BFW (Brute Force
Wrestling).
We don't really care what all the other fed heads think, and we're
going to approach this federation a little differently. No longer will you
see the 20k BORING as hell matches, we're going to keep them short, with the
occasional overdrive. Now let me ask you, do you REALLY see 55 minute
matches
on regular broadcasts such as RAW or Nitro? I don't. Maybe on a PPV, but
we'll
stretch our matches on PPVs a little. Anywhoo, what will this short match
process result in? Fewer late cards, I know you all love that.
What else will make this fed fun? We'll give magazines instead of
updates, updates usually just have the same stuff anyway. In fact, I
always skip
to the rankings when I read an update. We'll show you a good product with our
magazine. In-depth articles, and must-read writing. Do you think you're
up for
it? If so, fill out this application form, but remember, we can only fit
20 singles
wrestler's and 10 tags on our roster.
But beware... those who enter shall never leave... for they will be
engulfed in
fun and excitement, and they'll never even shed the thought of leaving!
Thanks,
Sean and Chris
-=-=-=-=-=-=-=-=-=-=-=-=-=-
BFW ROLEPLAYING:
-=-=-=-=-=-=-=-=-=-=-=-=-=-
BFW is a booked wrestling league, meaning that you roleplay to win matches.
We do not use TNM, WLS, or any other simulator. All matches are hand
written for the
most exciting action anywhere.
The only rule for roleplaying is that you must do it often. If you don't
roleplay for a month, you're history. We may keep you around as a scrub and
job the
hell out of you, ruining your reputation. We may also just kick you out of
the fed
completely.
-=-=-=-=-=-=-=-=-=-=-=-=-=-
BFW SPECIFICS:
-=-=-=-=-=-=-=-=-=-=-=-=-=-
Headquarters: BFW Arena in Salt Lake City, Utah
Cards: House shows (Quick Result Report sent out weekly)
Tuesday's televised show, BFW Tuesday Tap-Out
Friday's televised show, BFW Friday Fright Night
Monthly Pay-Per-View events
Titles: BFW World Heavy-Weight Champion
BFW World Tag Team Champions
BFW Network Champion
-=-=-=-=-=-=-=-=-=-=-=-=-=-
BFW APPLICATION
-=-=-=-=-=-=-=-=-=-=-=-=-=-
========================
YOUR INFORMATION:
Hey, we can get to know ya.
========================
YOUR NAME -
YOUR AGE - (optional)
========================
WRESTLER'S INFORMATION:
Duh!
========================
WRESTLER'S NAME -
ALLIGNMENT - (heel/face/neutral)
WRESTLER'S HEIGHT - (nothing above 7", please)
WRESTLER'S WEIGHT - (nothing extraordinary here, either)
WRESTLER'S LOOKS - (breif description here. Add in attire)
WRESTLER'S HISTORY - (Who, what, where, why, when?)
TWENTY MOVES YOUR WRESTLER APPLIES -
YOUR WRESTLER'S FINISHING MANEUVER -
DESCRIBE IT - (it doesn't have to be TOO complex)
YOUR WRESTLER'S MANAGER - (optional)
YOUR WRESTLER'S THEME MUSIC - (nothing other than music done by real
musicians, no real wrestler music)
========================
TAG TEAM INFORMATION
(Optional)
========================
NAME OF TAG TEAM -
WHO DOES HE TAG WITH? -
TAG TEAM FINISHER -
DESCRIBE IT -
From az096 at freenet.toronto.on.ca Wed Jun 3 14:53:56 1998
From: az096 at freenet.toronto.on.ca (Robert Guerra)
Date: Wed, 3 Jun 1998 14:53:56 -0700 (PDT)
Subject: PGP Keysigning Announcement page
In-Reply-To: <199806021710.NAA28763@shell1.interlog.com>
Message-ID:
-----BEGIN PGP SIGNED MESSAGE-----
I would like to know if you could include a link the following www address
which I have setup in the PGP FAQ that you maintain.
If you place a link to the page on your www page...please let me know so
that I can place a reciprocal link.
- ---
In an attempt to encourage PGP keysigning parties
I have created a PGP Keysigning Announcement page.
(http://www.geocities.com/CapitolHill/3378/pgpparty.html)
It is my hope that with time it will be a place where PGP users
can know when & where the next keysigning session (in thier area)
will be held.
If you know of a keysigning party that is held anywhere please
let me know so that I can list it.
(any other comments or suggestions also welcome)
regards
robert
-----BEGIN PGP SIGNATURE-----
Version: PGP for Business Security 5.5.3
Comment: Digital signatures verify author and unaltered content
iQEVAwUBNXVj2Is5aKqJYZvFAQF+Wwf9HPcukFKiYhFYN5h8dIFNApF8/+89kudu
NWKWLy5WEEDvcK12Unf0i9Ihwch8a5hANb3oP5R57hNttUUJa+7Lb4O5pg/D52XM
7aHu+JHW/4ZCVhGUAqBvuV+rJkRZJgvCe1vGC3JsB6V3vBm+pNEmyz5C9w7R00nW
7dTG4wXlzxda8fIPbcdOC8iZYR3j2YeEiQvuV5gktsx0VIk9ZLn1Pz4TqNQCTUmW
qyVTZz5LV6EKsjr2/SM1OLIJkjNZyCYMqQZ3Bt/ZPMXKuaYmhcTyYOXggEuU2r9W
4mITGDuHItyUwV45lJUBCzZYYowSNBABOXGJ4fwkpKRKWo1Uuw0vZg==
=EmIr
-----END PGP SIGNATURE-----
Robert Guerra - Email-> mailto:az096 at freenet.toronto.on.ca ICQ #10266626
Home Page-> http://www.geocities.com/CapitolHill/3378
PGPKeys available on WWW Page & via finger://rguerra at flare.dynip.com
From roy26 at prodigy.com Wed Jun 3 17:41:19 1998
From: roy26 at prodigy.com (roy26 at prodigy.com)
Date: Wed, 3 Jun 1998 17:41:19 -0700 (PDT)
Subject: Awesome!
Message-ID: <199805190417.AAA07146@rly-zb04.mx.aol.com>
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
This is intended for adults. If you are under 18, or viewing these materials is illegal where
you live, please delete this now.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
AWESOME!
http://www.pornsitez.com/hardcore/xxxmovies/
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
From dorisaw at idt.net Thu Jun 4 12:14:22 1998
From: dorisaw at idt.net (Doris Woods)
Date: Thu, 4 Jun 1998 12:14:22 -0700 (PDT)
Subject: Kirtland Air Force Base
In-Reply-To: <199806012257.RAA019.42@geiger.com>
Message-ID: <3576F1BE.BA662E1B@idt.net>
William H. Geiger III wrote:
>
> -----BEGIN PGP SIGNED MESSAGE-----
>
> In <35732427.ECA43EB9 at idt.net>, on 06/01/98
> at 05:59 PM, Doris Woods said:
>
> >Hi all,
>
> >bill payne wrote:
> >>
> >> Saturday 5/30/98 5:15 PM
>
> >> Masanori, the book Decision to Use the Atomic Bomb by Gar Alperovitz
> >> presents fairly good evidence some in US government nuked Hiroshima and
> >> Nagasaki merely to impress the Russians.
> >>
>
> >Carroll Quigley said in Tragedy and Hope... they were worried the war
> >would be over with before they got their chance to use it!
>
> Was this before or after they estimated that it would cost upwards of 1
> Million lives to take the Japan mainland by conventional forces?
>
> - --
Well... a Leo Szilard web site ( How do you say it? Say sil'-ahrd.)
has an article where he is interviewed titled
_Leo Szilard, Interview: President Truman Did Not Understand_
http://www.peak.org/~danneng/decision/usnews.html
"After all, Japan was suing for peace."
"Today I would say that the confusion arose from considering the fake
alternatives of either having to invade Japan or of having to use the
bomb against her cities."
I admit I only followed a link from Home Page of J. Orlin Grabbe
titled...
_Target Committee Meeting, Los Alamos, May 10-11, 1945_
to get to that particular story.
Of more particular interest to myself is the shipment of 65% uranium
oxide,
sent from the Belgian Congo, in 1939-40. 1250 tons were sent to
Staten Island, NY, by Edward Sengier of Union Miniere, to prevent the
Axis powers from obtaining it. p 852.
It is a _good_ book. I enjoyed it.
Doris Woods
From sprokkit at hotmail.com Thu Jun 4 12:36:43 1998
From: sprokkit at hotmail.com (Sprokkit Amhal)
Date: Thu, 4 Jun 1998 12:36:43 -0700 (PDT)
Subject: anonymous mailboxes
Message-ID: <19980604193606.27765.qmail@hotmail.com>
Some time ago I heard about Lucky Green's then-immature scheme for
anonymous email boxes, whereby a user can receive email and even a
traffic analysis attacker is unable to glean information about who
received what when. I forget exactly what ve called vis method...
Is there a paper available anyplace?
Has the scheme been validated mathematically?
Has it been implemented?
::sprokkit::
______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com
From shamrock at cypherpunks.to Thu Jun 4 14:10:55 1998
From: shamrock at cypherpunks.to (Lucky Green)
Date: Thu, 4 Jun 1998 14:10:55 -0700 (PDT)
Subject: anonymous mailboxes
In-Reply-To: <19980604193606.27765.qmail@hotmail.com>
Message-ID:
It was not my scheme. I simply gave a presentation at HIP of a system that
was designed by a person wishing to remain anonymous.
Much of the design has changed since. I am not at liberty to discuss
futher details. The original presentation in MS
PowerPoint format is still sitting at
http://www.cypherpunks.to/~shamrock/anonmail.ppt
I have no plans to update or convert this particular presentation.
On Thu, 4 Jun 1998, Sprokkit Amhal wrote:
> Some time ago I heard about Lucky Green's then-immature scheme for
> anonymous email boxes, whereby a user can receive email and even a
> traffic analysis attacker is unable to glean information about who
> received what when. I forget exactly what ve called vis method...
>
>
>
>
> Is there a paper available anyplace?
>
> Has the scheme been validated mathematically?
>
> Has it been implemented?
>
>
>
>
> ::sprokkit::
>
> ______________________________________________________
> Get Your Private, Free Email at http://www.hotmail.com
>
>
-- Lucky Green PGP v5 encrypted email preferred.
"Tonga? Where the hell is Tonga? They have Cypherpunks there?"
From jya at pipeline.com Thu Jun 4 14:12:59 1998
From: jya at pipeline.com (John Young)
Date: Thu, 4 Jun 1998 14:12:59 -0700 (PDT)
Subject: NIST Publishes Draft FIPS for FKMI
Message-ID: <199806042112.RAA12886@camel14.mindspring.com>
The NIST Technical Advisory Committee has published its final
draft for a FIPS for the Federal Key Management Infrastructure
and a letter from the chairman to the Secretary of Commerce
on the completion of the task in preparation for the final
meeting of the committee June 17-19:
http://csrc.nist.gov/tacdfipsfkmi/
under the "June 1998" section
We offer mirrors of the drafts:
http://jya.com/nist-fkmi.htm (chairman's letter)
http://jya.com/FIPS698.txt (the FIPS, 222K)
From bill.stewart at pobox.com Thu Jun 4 19:10:35 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Thu, 4 Jun 1998 19:10:35 -0700 (PDT)
Subject: Spamford's new business venture
Message-ID: <3.0.5.32.19980604155141.008fc6f0@popd.ix.netcom.com>
Seems Spamford has found yet another way to Make M0ney 0n the Net -
as an expert witness for people suing spammers.
The paper said he'll be working for the law firm that nailed
him with a $2M case earlier this year.
Sigh.....
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From maxinux at khercs.dyn.ml.org Thu Jun 4 19:25:01 1998
From: maxinux at khercs.dyn.ml.org (Max Inux)
Date: Thu, 4 Jun 1998 19:25:01 -0700 (PDT)
Subject: Meetings and PGP 6.0
Message-ID:
Now that Network General and Network Associates (McAfee) have merged
(business wise aswell as buildings), I was wondering where the CypherPunks
meetings are going to be at the old netgen building or the new (BIG)
Network Associates (netass.com) building? And is it still gonna be at 12
on the second saturday of the month? (seeing as this saturday(first) is
the NAI company picnic).
And, has anyone here played with PGP 6.0 (still in developement). I hope
they do more changes in the final, Photo ID's and the misc other changes.
Thanks, Billy
-- Max Inux (MaxInux at bigfoot.com) UIN: 207447, http://khercs.dyn.ml.org
Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59
Or Kinky sex makes the world go round- Christie: Your in my sig too
^^ If Cryptography is outlawed, only outlaws will have cryptography ^^
From jf_avon at citenet.net Thu Jun 4 22:28:27 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Thu, 4 Jun 1998 22:28:27 -0700 (PDT)
Subject: Fwd: NEWS - NRA Charles Heston speech
Message-ID: <199806050537.BAA14762@cti06.citenet.net>
==================BEGIN FORWARDED MESSAGE==================
>Date: Fri, 05 Jun 1998 09:50:22 +0930
>From: SSAA
>Subject: NEWS - NRA Charles Heston speech
>Organization: Sporting Shooters Association of Australia
Speech by National Rifle Association First Vice President Charlton
Heston Delivered at the Free Congress Foundation's 20th Anniversary Gala
December 7, 1997
I like it when the party of Lincoln honors our free heritage. This
nation has been blessed by the minds and mettle of many good people, and
indeed Abe was among the best. A man of great moral character... a trait
often lacking among our leaders. This is disturbing, but not without
remedy. One good election can correct such ills.
Above all, I hope those of us gathered here tonight have more in common
with Mr. Lincoln than just party affiliation. Better that we grasp a
common vision than simply wear the cloak. Even our President pretends to
be a conservative when it suits him. We must be more than that.
I know, I know... it is not easy. Imagine being point man for the
National Rifle Association, preserving the right to keep and bear arms.
Well, I ran for office, I was elected, and now I serve... as a moving
target for pundits who've called me everything from "ridiculous" and
"duped" to a "brain-injured, senile, crazy old man."
Well, I guess that goes with the territory. But as I've stood in the
cross hairs of those who aim at Second Amendment freedom, I've realized
that guns are not the only issue, and I am not the only target. It is
much, much bigger than that which is what I want to talk to you about.
I have come to realize that a cultural war is raging across our land...
storming our values, assaulting our freedoms, killing our
self-confidence in who we are and what we believe, where we come from.
How many of you here own a gun? A show of hands?
How many own two or more guns?
Thank you. I wonder how many of you in this room own guns but chose not
to raise your hand?
How many of you considered revealing your conviction about a
constitutional right, but then thought better of it?
Then you are a victim of the cultural war. You are a casualty of the
cultural warfare being waged against traditional American freedom of
beliefs and ideas.
Now maybe you don't care one way or the other about owning a gun. But I
could've asked for a show of hands on Pentecostal Christians, or
pro-lifers, or right-to-workers, or Promise Keepers, or school
voucher-ers, and the result would be the same. What if the same question
were asked at your PTA meeting? Would you raise your hand if Dan Rather
were in the back of the room there with a film crew?
See? Good. Still, if you didn't, you have been assaulted and robbed of
the courage of your convictions. Your pride in who you are, and what you
believe, has been ridiculed, ransacked, plundered. It may be a war
without bullet or bloodshed, but with just as much liberty lost: You and
your country are less free.
And you are not inconsequential people! You in this room, whom many
would say are among the most powerful people on earth, you are shamed
into silence!
Because you embrace a view at odds with the cultural warlords. If that
is the outcome of cultural war, and you are the victims, I can only ask
the gravely obvious question: What'll become of the right itself? Or
other rights not deemed acceptable by the thought police? What other
truth in your heart will you disavow with your hand?
I remember when European Jews feared to admit their faith. The Nazis
forced them to wear six-pointed yellow stars sewn on their chests as
identity badges. It worked. So what color star will they pin on our
coats? How will the self- styled elite tag us? There may not be a
Gestapo officer on every street corner yet, but the influence on our
culture is just as pervasive.
Now, I am not really here to talk about the Second Amendment or the NRA,
but the gun issue clearly brings into focus the war that's going on.
Rank-and-file Americans wake up every morning, increasingly bewildered
and confused at why their views make them lesser citizens. After enough
breakfast- table TV promos hyping tattooed sex-slaves on the next Rikki
Lake show, enough gun-glutted movies and tabloid talk shows, enough
revisionist history books and prime-time ridicule of religion, enough of
the TV anchor who cocks her pretty head, clucks her tongue and sighs
about guns causing crime and finally the message gets through: Heaven
help the God-fearing, law-abiding, Caucasian, middle class, Protestant,
or even worse Evangelical Christian, Midwest, or Southern, or even
worse rural, apparently straight, or even worse admittedly
heterosexual, gun-owning or even worse NRA-card-carrying, average
working stiff, or even worse male working stiff, because not only don't
you count, you're a downright obstacle to social progress. Your tax
dollars may be just as delightfully green as you hand them over, but
your voice requires a lower decibel level, your opinion is less
enlightened, your media access is insignificant, and frankly mister, you
need to wake up, wise up and learn a little something about your new
America...in fact, why don't you just sit down and shut up?
That's why you don't raise your hand. That's how cultural war works. And
you are losing.
That's what happens when a generation of media, educators, entertainers
and politicians, led by a willing president, decide the America they
were born into isn't good enough any more. So they contrive to change it
through the cultural warfare of class distinction. Ask the Romans if
powerful nations have ever fallen as a result of cultural division.
There are ruins around the world that were once the smug centers of
small-minded, arrogant elitism. It appears that rather than evaporate in
the flash of a split atom, we may succumb to a divided culture.
Although my years are long, I was not on hand to help pen the Bill of
Rights. And popular assumptions aside, the same goes for the Ten
Commandments. Yet as an American and as a man who believes in God's
almighty power, I treasure both.
The Constitution was handed down to guide us by a bunch of those wise
old dead white guys who invented this country. Now, some flinch when I
say that. Why?
It's true...they were white guys. So were most of the guys who died in
Lincoln's name opposing slavery in the 1860s. So why should I be ashamed
of white guys? Why is "Hispanic pride" or "black pride" a good thing,
while "white pride" conjures up shaved heads and white hoods? Why was
the Million Man March on Washington celebrated in the media as progress,
while the Promise Keepers March on Washington was greeted with suspicion
and ridicule? I'll tell you why: Cultural warfare.
Now, Chuck Heston can get away with saying I'm proud of those wise old
dead white guys because Jesse Jackson and Louie Farrakhan know I fought
in their cultural war. I was one of the first white soldiers in the
civil rights movement in 1961, long before it was fashionable in
Hollywood believe me or in Washington for that matter. In 1963 I marched
on Washington with Dr. Martin Luther King to uphold the Bill of Rights.
I'm very proud of that. As vice- president of the NRA I am doing the
same thing.
But you don't see many other Hollywood luminaries speaking out on this
one, do you? It's not because there aren't any. It's because they can't
afford the heat. They dare not speak up for fear of CNN or the IRS or
SAG or the ATF or NBC or even W-J-C. It saps the strength of our country
when the personal price is simply too high to stand up for what you
believe in. Today, speaking with the courage of your conviction can be
so costly, the price of principle so high, that legislators won't lead
so citizens can't follow, and so there is no army to fight back. That's
cultural warfare.
For instance: It's plain that our Constitution guarantees law-abiding
citizens the right to own a firearm. But if I stand up and say so, why
does the media assault me with such a slashing, sinister brand of
derision filled with hate?
Because Bill Clinton's cultural warriors want a penitent cleansing of
firearms, as if millions of lawful gun owners should genuflect in shame
and seek absolution by surrendering their guns. That's what is now
literally happening in England and Australia, of course. Lines long
lines of submissive citizens, threatened with imprisonment, are
bitterly, reluctantly surrendering family heirlooms, guns that won their
freedom, to the blast furnace. If that fact doesn't unsettle you, then
you are already anesthetized, a ready victim of the cultural war.
You know, I think, that I stand first in line in defense of free speech.
But those who speak against the perverted and profane should be given as
much due as those who profit by it. You also know I welcome cultural
diversity. But those who choose to live on the fringe should not tear
apart the seams that secure the fabric of our society.
Now I've earned a fine and rewarding living in the motion picture
industry, yet increasingly I find myself embarrassed by the dearth of
conscience that drives the world's most influential art form. And I'm an
example of what a lonely undertaking that can be.
Nobody opposed the obscene rapper Ice-T until I stood at Time-Warner's
stockholders meeting and was ridiculed by its president for wanting to
take the floor to read Ice-T's lyrics. Since I held several hundred
shares of stock he had no choice, though the media were barred. I read
those lyrics to a stunned audience of average American people the
stockholders who were shocked at the lyrics that advocating killing
cops, sexually abusing women, and raping the nieces of our
Vice-President. True, the good guys won that time though:
Time-Warner fired Ice-T.
The gay and lesbian movement is another good example. Many homosexuals
are hugely talented artists and executives... also dear friends. I don't
despise their lifestyle, though I don't share it. As long as gay and
lesbian Americans are as productive, law-abiding and private as the rest
of us, I think America owes them absolute tolerance. It's the right
thing to do.
But on the other hand, I find my blood pressure rising when Clinton's
cultural shock troops participate in homosexual-rights fund-raisers but
boycott gun- rights fund-raisers... and then claim it's time to place
homosexual men in tents with Boy Scouts, and suggest that sperm donor
babies born into lesbian relationships are somehow better served and
more loved.
Such demands have nothing to do with equality. They're about the
currency of cultural war money and votes and the Clinton camp will let
anyone in the tent if there's a donkey on his hat, or a check in the
mail or some yen in the fortune cookie.
Mainstream America is depending on you counting on you to draw your
sword and fight for them. These people have precious little time or
resources to battle misguided Cinderella attitudes, the fringe
propaganda of the homosexual coalition, the feminists who preach that
it's a divine duty for women to hate men, blacks who raise a militant
fist with one hand while they seek preference with the other, and all
the New-Age apologists for juvenile crime, who see roving gangs as a
means of youthful expression, sex as a means of adolescent
merchandising, violence as a form of entertainment for impressionable
minds, and gun bans as a means to lord-knows-what. We've reached that
point in time when our national social policy originates on Oprah. I say
it's time to pull the plug.
Americans should not have to go to war every morning for their values.
They already go to war for their families. They fight to hold down a
job, raise responsible kids, make their payments, keep gas in the car,
put food on the table and clothes on their backs, and still save a
little for their final days in dignity. They prefer the America they
built - where you could pray without feeling naive, love without being
kinky, sing without profanity, be white without feeling guilty, own a
gun without shame, and raise your hand without apology. They are the
critical masses who find themselves under siege and are
long for you to get some guts, stand on principle and lead them to
victory in this cultural war.
Now all this sounds a little Mosaic, the punch-line of my sermon is as
elementary as the Golden Rule. In a cultural war, triumph belongs to
those who arm themselves with pride in who they are and then do the
right thing. Not the most expedient thing, not the politically correct
thing, not what'll sell, but the right thing.
And you know what? Everybody already knows what the right thing is. You,
and I, President Clinton, even Ice-T, we all know. It's easy. You say
wait a minute, you take a long look in the mirror, then into the eyes of
your kids, your grandchildren, and you'll know what's right.
Don't run for cover when the cultural cannons roar. Remember who you are
and what you believe, and then raise your hand, stand up, and speak out.
Don't be shamed or startled into lockstep conformity by seemingly
powerful people. The maintenance of a free nation is a long, slow,
steady process. And it is in your hands.
Yes, we can have rules and still have rebels that's democracy. But as
leaders you must we must do as Lincoln would do, confronted with the
stench of cultural war: Do what's right. As Mr. Lincoln said, "With
firmness in the right, as God gives us to see the right, let us finish
the work we are in... and then we shall save our country."
Defeat the criminals and their apologists, oust the biased and bigoted,
endure the undisciplined and unprincipled, but disavow the
self-appointed social engineers whose relentless arrogance fuels this
vicious war against so much we hold so dear. Do not yield, do not
divide, do not call a truce. Be fair, but fight back.
It's the same blueprint our founding fathers left to guide us. Our
enemies see it as the senile prattle of an archaic society. I still
honor it as the United States Constitution, and that timeless document
we call the Bill of Rights.
Freedom is our fortune and honor is our saving grace.
Thank you.
===================END FORWARDED MESSAGE===================
Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
JFA Technologies, R&D physicists & engineers
Instrumentation & control, LabView programming.
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
From StanSqncrs at aol.com Thu Jun 4 23:23:39 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Thu, 4 Jun 1998 23:23:39 -0700 (PDT)
Subject: NEWS - NRA Charles Heston speech
Message-ID: <93c4594e.35778eca@aol.com>
McVeigh is alot better than Heston (at lying-type propaganda. I couldn't even
call McVeigh's "lying-type." It was filled with MUCH more fact than Heston's
speech.)
The glaring over-all problem I see with his speech, is his hypocracy when it
comes to the 1st amendment (yea, I know he *claimed* to be a 1st amendments
rights supporter, BUT his actions (the rest of the speech) counters that
claim.)
Here's why they want to remove our freedom of speech. It's because - dig this
Cypherpunks - 'The pen is mightier than the sword.' If they take away our
ability to speak, and they keep their silly guns, guess what. Then they have
the more powerful weapon. And dig this - yes it IS that simple.
Stan
From bill.stewart at pobox.com Fri Jun 5 02:48:16 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 5 Jun 1998 02:48:16 -0700 (PDT)
Subject: Meetings and PGP 6.0
In-Reply-To:
Message-ID: <3.0.5.32.19980605022508.00952530@popd.ix.netcom.com>
At 08:25 PM 6/4/98 -0700, Max Inux wrote:
>Now that Network General and Network Associates (McAfee) have merged
>(business wise aswell as buildings), I was wondering where the CypherPunks
>meetings are going to be at the old netgen building or the new (BIG)
>Network Associates (netass.com) building? And is it still gonna be at 12
>on the second saturday of the month? (seeing as this saturday(first) is
>the NAI company picnic).
Cypherpunks meeting is almost always at the same time,
but often changes locations, depending on the availability of meeting places
and the whims of the organizers :-) This month, we'll be meeting in
Berkeley, and as usual I'd appreciate anybody suggesting topics
they'd like to talk about there.
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From netcenter-news at netscape.com Fri Jun 5 03:15:03 1998
From: netcenter-news at netscape.com (netcenter-news at netscape.com)
Date: Fri, 5 Jun 1998 03:15:03 -0700 (PDT)
Subject: Netcenter News - Volume 7
Message-ID: <199806051014.DAA03401@toad.com>
Title: Netscape Netcenter News - May 1998
Welcome to Netcenter
Netcenter is dedicated to the proposition that you should be able to find everything you need online in one place. This newsletter is one of the free benefits you receive for registering with a Netcenter program.
Electronic commerce is creating one of the fastest growing marketplaces on the planet. Can small-scale entrepreneurs join the movement? Professional Connections Events Forum presents "E-Commerce and the Entrepreneur," featuring ZDNet's e-commerce expert Mitch Ratcliffe.
Netscape proudly announces Netscape WebMail by USA.net, offering free web-based email accounts and value-added mail services, accessible from any computer across the globe.
CNET honors Netscape Communicator with its Readers' Choice Award for Internet Excellence, noting that it far surpasses all other Net products and browser packages on the market.
Enter to win a $5000 shopping spree from netMarket - the premier discount shopping club. Get guaranteed low prices and 5 percent cash back on purchases.
�
This issue of Netcenter News is brought to you by the Netscape Store.
NETCENTER
EXPANDS
BUSINESS
CHANNEL
WITH
DEBUT
OF
NETSCAPE
SMALL
BUSINESS
SOURCE
Small Business Source is designed to provide small businesses with the latest news, information, and services online for managing and growing their businesses. Whether you simply use the Internet to conduct research or leverage it to run a business online, this unique, one-stop Internet destination provides the best and most current web-based content and services available to help small businesses succeed.
Launched on May 11, Small Business Source provides visitors with a wealth of free information and resources as well as easy access to leading Internet-based business tools. Did you know that a hard drive crashes every 15 seconds? With Netscape Online Backup by Atrieva, you never have to worry about your data being safe. Need to communicate or collaborate with colleagues and clients more efficiently? With Netscape Virtual Office by Netopia, you can have your own web office up and running in minutes. All the resources you'll find in Small Business Source have been tailored to meet the needs of small businesses - from news provided by NewsEdge and content from the Mining Co. to special services from Amazon.com, Travelocity, and software.net. Small Business Source is the smart choice for growing your business. Visit it today!
Want to get the latest version of Communicator? Upgrade now to Communicator 4.05, using SmartUpdate - the fast, easy, and personalized way to keep your software up-to-date.
Need to get the message out ASAP? Get real-time communication with Netscape AOL Instant Messenger - just released for the Macintosh.
Stores closed? Tired? Curious about shopping online? Try Netcenter Marketplace. Your one stop for great deals on books, music, travel, and much more.
Thanks to everyone who took last month's small-business survey!�
Here is what you told us:
50 percent of you buy products online
28 percent of you sell products online
44 percent of you have a web page or home page for your company, while 56 percent have yet to make one
the service you'd most like to see added to Netcenter is a contact manager
This month, tell us what you'd like in an online community!
Netscape respects your online time and Internet privacy. If you would prefer not to receive future issues, click here to to send an unsubscribe email or reply to this message with the word unsubscribe in the subject line.
Copyright � 1998. Netscape Communications Corporation. All rights reserved.
From waekualo98 at msn.com Fri Jun 5 04:45:54 1998
From: waekualo98 at msn.com ( )
Date: Fri, 5 Jun 1998 04:45:54 -0700 (PDT)
Subject: L@@KING FOR A FRIEND or LOVER!! NOT A SEX SITE!!
Message-ID: <199806051210ZAA212@emal2.net-serv.com>
LIVE***LIVE***LIVE***LIVE***LIVE***LIVE***LIVE***LIVE
**THE INTERNETS MOST POPULAR PARY LINES!!!!!!!!
Join the Party Line!! It's your chance to be the life of the party. Meet new and interesting people who want to get to know you ALOT better. Or if your preferences are a little more Intimate we have the connections for you. 1 on 1 Fantasy, talk live with the opposite sex.
For those with a bit more spice & energy talk live with 2 count em' 2 members of the opposite sex.
Double your pleasure & Double your fun.
For people with a different lifestyle we have live talks for Gays & Lesbians. You can let go and be yourself with someone who understands & shares your feelings. Maybe you're looking to find
that special someone who's also looking for you. This is the safest, easiest way to connect with a new person. Skip the meat markets & all of the guess work. Spend your time choosing who & when, not wasting time hoping for maybe.
Our Recorded Date Line is the key to all your dreams coming true. We have Recorded Fantasy Lines for those who might be a little shy, or who just like to be entertained without joining in on a dialogue.
You won't be disappointed!
1-900-993-3284
Must be 18 or older
(2.50-3.99min)
You will have the choice of anyone of the services when y
From billp at nmol.com Fri Jun 5 08:21:31 1998
From: billp at nmol.com (bill payne)
Date: Fri, 5 Jun 1998 08:21:31 -0700 (PDT)
Subject: twa 800, semiconductors & internet, polyforth & Java
Message-ID: <35780C56.4E5C@nmol.com>
Friday 6/5/98 9:11 AM
J Orlin Grabbe
Albuquerque Journal w 6/3/98
TWA 800 Explosion Not on �High Seas�
NEW YORK - A judge said Tuesday that the TWA 800 explosion did not
occur on the �high seas,� a
ruling that could make victim eligible for additional money in their
lawsuit. against the airline and the aircraft manufacturers. ...
http://www.aci.net/kalliste/navy800.htm and other electronic articles on
TWA 800 at http://www.aci.net/kalliste/
Albuquerque Journal f 6/5/98
Motorola To Cut 15,000 Jobs
No Word of Impact In Albuquerque
The Associated Press
CHICAGO - Motorola Inc., struggling to weather the Asian economic
crisis, said
Thursday it is eliminating 15,000 jobs over the coming 12 months.
Profits plunged 45 percent to !180 million ...
But in the same issue
Chip Sales Expected to Rebound
Semiconductor Group Predicts Double-Digit Growth in 1999
The Associated Press
SAN JOSE, Calif. Asia�s weak economies, a slow-down in personal
computer sales and
an overabundance of memory chips will push own semiconductor sales
nearly 2 percent this
year, according to an industry group.
But those troubles are expected to ease in the second half of 1998,
boosting sales and returning the industry to double-digit growth
next year and beyond, the Semiconductor Industry Association said.
�Thanks to the unprecedented growth of Internet usage, we now expect
the industry�s expansion to occur in 1999 as semiconductor growth
rates return to their historical averages of 17 percent or more,�
said SIA president George Scalise. ...
John Young
Albuquerque Journal f 6/5/98
India, Pakistan Nuke Claims Exaggerated, Scientists Say
By David S. Cloud
Chicago Tribune
WASHINGTON - American scientists monitoring remote sites where India
and Pakistan detonated nucleardevices sharply question public claims
by both nations about the size and number of weapons tested.
Scientists examining seismic data on the tests, picked up at
monitoring stations around the globe, say that both India and Pakistan
have exaggerated the explosive power of the detonations and
perhaps even the total number of devices tested. The Clinton
administration has similar doubts about the claims by the South Asian
rivals.
Pakistani officials apparently disconnect a seismic monitor that
would have given outsiders more precise data about their tests. And
two nuclear devices that India claimed to have set off were not
detected by a single known seismic monitor station anywhere in the
world. ...
The gap between the claims and the seismic data suggests that the
test may not have gone as well as each side announced, said experts
interviewed by the Chicago Tribune.
The discrepancies in monitoring data prove ammunition for some
critics of an international test-ban treaty. These critics argue that
the lack of data for India�s announced second round of nuclear weapons
tests calls into question whether clandestine nuclear test can be
accurately monitored. ...
Jim Durham, Sandia�s seismic CTBT project leader
http://jya.com/da/whpda.htm, told me that the coupling [impendance
match?] between the bomb and the surrounding ground had much to do with
what a seismic station receives.
Lastly, and what I think is the most important, Albuquerque Journal f
6/5/98
USS Yorktown Found
Explorer Located Titanic Wreck
By Randolph E. Schmidt
The Associated Press
WASHINGTON - Three miles under water, the USS Yorktown�s four-barrel
anti-aircraft gun still aims skyward 56 years after the aircraft
carrier went to the bottom of the Pacific Ocean, a victim of the
Battle of Midway.
Photos and video of the giant ship, sitting upright on the ocean
floor, were unveiled Thursday by Robert Ballard, the undersea
explorer who found the wrecks of the Titanic and the German battleship
Bismarck.
http://www.nationalgeographic.com/features/98/midway/
REASON is that Ballard uses PolyForth
http://av.yahoo.com/bin/query?p=polyforth&z=2&hc=0&hs=0
in the submersible robots, Jeff Allsup of Woods Hole told me.
Allsup downloaded ALL of the code and documentation from my Forth
http://jya.com/f86/whpf86.htm
book from Vesta in Colorado at 1,200 bps.
Allsup told me this took several days.
This is same software technology which is used for the US satellite
program. http://groucho.gsfc.nasa.gov/forth/
Java http://www.mrl.nyu.edu/meyer/jvmref/ appears also to be a byte
threaded code
technology.
Let�s hope for settlement of the unfortunate matter so that we can all
got on to other constructive projects.
I would like to do some more with
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html
and revise
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
for the 80C32 communicating over ieee 1284 ecp to a Windows PC.
Later,
bill
From billp at nmol.com Fri Jun 5 15:19:57 1998
From: billp at nmol.com (bill payne)
Date: Fri, 5 Jun 1998 15:19:57 -0700 (PDT)
Subject: Site Secrets
Message-ID: <35786E62.1452@nmol.com>
Friday 6/5/98 3:49 PM
John Young
NOTHING from the court, DOE or EEOC today.
Good.
I loaded my boat in the back of my truck.
Fishing tomorrow and Sunday at Navajo lake.
Navajo lake is on the Colorado border.
My primary goal is to finish the digital FX. But I need
a mental health break.
I got kick out of the moralist lecture to schneier at counterpane.com.
http://www.jya.com/bud-avbsp.htm
I can only imagine "Bud" �s horror when
he reads about Morales and my genocide, deficient crypto, and crooked
judge lawsuit.
But, of course, we are merely trying to promote settlement of this
UNFORTUNATE matter before something POSSIBLY serious happens.
Settlement progress is reported to our friends at http://www.wpiran.org/
and others in hope it is passed along to the interested.
Peaceful MONETARY settlement of this UNFORTUNATE matter is clearly in
everyone's best interest.
Thoroughly enjoyed Site Secrets. http://www.jya.com/crypto.htm#site
The Real World again.
Have a good weekend all.
bill
From gwb at gwb.com.au Fri Jun 5 15:21:29 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Fri, 5 Jun 1998 15:21:29 -0700 (PDT)
Subject: Sixty Minutes vs Pauline Hanson
Message-ID: <1.5.4.32.19980605221229.0070d830@mail.pronet.net.au>
Dear One Nation Supporter in NSW,
PLEASE READ THIS EXTREMELY IMPORTANT MESSAGE and CIRCULATE WIDELY TO ALL YOU
CAN.
In the lead up to the Queensland State and Federal Elections there has been
growing hysteria in the media, major political parties and by minority
groups that "support for Pauline Hanson's One Nation is somehow bad for
Australia".
It should be of no surprise that One Nation has one goal in mind and that is
to bring equity in treatment back to ALL Australians irrespective of colour,
race, or creed. If you read the first sentence again you will see who is
going to 'lose' when divisive policies are removed by One Nation from the
Australian equation.
However, the most divisive force in Australia today is the mainstream media,
carefully controlled by men of enormous wealth who now seek the ultimate
prize, 'power over the politicians who run Australia'.
Many believe that they have already achieved this goal. Many believe that
the support for Pauline Hanson's One Nation is a direct result of
'populist' Australians (that's you and me) seeing through the deals being
done between the major political parties and the media barons.
Today Australians face a real fight to retain their democratic rights in the
face of the media moguls. This is the 'real' media-hidden war that is being
raged right now with Pauline Hanson being the focus, the enemy. The coming
Queensland state and Federal elections are not over 'race' as the media
would have you believe, they are over our freedom of speech and democracy
which has already being largely destroyed through the concentration of our
media.
Last Tuesday Pauline Hanson raised the issue of 'The Draft Declaration on
the Rights of Indigenous Peoples' in Parliament.
What followed was the most disgraceful vilification by Howard, Beazley,
supported by the media, of Pauline Hanson, the messenger, while the message
- the potential impact of this treaty on all Australians - was totally ignored.
This vilification was epitomised by the live interview with Ray Martin on
Channel 9's 'A Current Affair' during which he changed the 'rules of
engagement' previously agreed to. The interview was supposed to be about
Pauline's speech in parliament and the ramifications of the UN draft agreement.
A range of links to documents related to Pauline Hanson's speech can be seen at:
http://www.gwb.com.au/un.html
Channel 9 have used these tactics before to secure an interview under
blatantly dishonest terms. Sixty Minutes approached Pauline Hanson to do a
'prime time' broadcast on 'a new political party in the making'... in 1997.
The original letter to David Ettridge confirming the 'rules of engagement'
with Pauline Hanson can be seen at this link:
http://www.gwb.com.au/gwb/news/onenation/letter.gif
In both Channel 9 interviews Pauline Hanson has appeared stunned, was
ridiculed by those interviewing her and thereafter denigrated by many of her
opponents. Quite simply she has been ambushed with unrelated questioning by
a less than ethical media doing the bidding of powers higher up.
This Sunday Channel 9's 'Sixty Minutes' has intimated that it will be doing
an 'expose' on Pauline Hanson's One Nation links to 'American influences'.
As of late yesterday they had refused to supply the source of their
information so that One Nation could respond. It will be an interesting time
for 'Sixty Minutes' to carry such a damaging, unsubstantiated programme,
less than a week before the Queensland state election.
The background to the programme to be run tomorrow can be seen at:
http://sixtyminutes.ninemsn.com.au/news/17029.asp
Here is a quote from that page:
'But as 60 Minutes has discovered, Pauline Hanson's one nation has little to
do with our nation. Much of her ideology is borrowed from loony extremists
in the United States, right down to her claim this week that the UN was
undermining Australia's sovereignty. Jeff McMullen reports that this fear of
a UN-led global world order is the central theme in the thinking of militia
groups at war with the US Government. And the militia leaders admit they
know and admire Pauline Hanson and have advised her supporters.'
With this in mind I would ask you to take this personal assurance from me.
I have been privileged to get to know Pauline and understand the fire that
burns within her for Australia and her children, our future. She is not
influenced by anybody from overseas, her gun laws actually tighten gun
control through
"an instant record check to ensure those persons ineligible to own a firearm
can be quickly identified; we shall establish a register of persons
prohibited from firearm ownership. Prohibited persons: ie those convicted of
a violent offence."
See: http://www.gwb.com.au/onenation/press/guns.html
Pauline's aims are to work for the return of Australia to Australians - away
from the negative, direct influence of overseas-based multinationals; to
introduce Citizen Based Referendums; to allow you to have a real say in your
future (One Nation's policies can be seen at:
http://www.gwb.com.au/onenation/policy.html) and to dismantle the power
blocks controlled by the media barons.
It is this last goal which is behind the vilification of Pauline Hanson by
the media and what she stands for, not the opinions expressed by those who
do their master's bidding.
You may like to tell 'Sixty Minutes' what you think of their programme, if
so use this link:
http://sixtyminutes.ninemsn.com.au/60m/content/email.asp
PLEASE BROADCAST THIS EMAIL WIDELY
A personal message from
Scott Balson, Pauline Hanson's One Nation web master
One Nation home page:
http://www.gwb.com.au/onenation
From bill.stewart at pobox.com Fri Jun 5 19:12:02 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 5 Jun 1998 19:12:02 -0700 (PDT)
Subject: IP: Uncle Sam is Hooked on Forfeiture (fwd)
In-Reply-To: <19980605092007.3442.qmail@hades.rpini.com>
Message-ID: <3.0.5.32.19980605092233.008e0100@popd.ix.netcom.com>
Somebody, probably Vlad, forwarded this via Swiss Remailer.
I normally try not to reply to Ignition-Points forwards here,
but this one's relevant. "Access devices" often includes things like
computer passwords as well as smartcards for building entry.
So "Crack a password, lose your computer" would apply
as well as "Crack 15+ passwords, get busted".
I don't know if that was Senator Sleazy's intent with the bill,
but it's an obvious application if not. Did the bill pass?
>---------- Forwarded message ----------
>Date: Wed, 03 Jun 1998 16:21:31 -0400
>From: Patricia Neill
>To: ignition-point at majordomo.pobox.com
>Subject: IP: Uncle Sam is Hooked on Forfeiture
>
> 4.Counterfeit Access Devices
> S.1148
> SPONSOR: Sen D'Amato (introduced 09/04/97)
> TITLE(S):
> OFFICIAL TITLE AS INTRODUCED:
> A bill to amend title 49, United States Code, to require the
>forfeiture of counterfeit access devices and device-making equipment.
> "Amends Federal transportation law to declare counterfeit
>access devices and device-making equipment contraband subject to mandatory
>seizure and forfeiture."
>
> Well, what are we talking about here? Duplicate key for the apartment?
>What can it be extended to tomorrow, is the real question.
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From StanSqncrs at aol.com Fri Jun 5 21:46:38 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Fri, 5 Jun 1998 21:46:38 -0700 (PDT)
Subject: Nobody on Video ;-)
Message-ID:
It appears the Cypherpunks have infiltrated the FBI and have installed a
survailence camera on one of the agents investigating the Cypherpunks. ;-)
Here's one of them FBI agents tryin' to track you guys down ;-) , check this
out -
http://www.cnbc.com/moreinfo/badday.mpeg
4.5 meg (but worth every byte)
Stan
'Amazing! How can you tell the dancer from the dance' (Brave Combo - The
Jeffrey)
Visit 'What's A Meta U (and What's It 2U)
http://members.aol.com/WhtsAMetaU/
(Cypherpunks, the Brave Combo's latest studio release ('Group Dance Epidemic -
Fun .... and Functional!' - Rounder Records) is themed on my war with the
Bucketheads that led me to this list. The cover picture depicts the
Bucketheads (a group of people pretending to be having a good time.) It was
the leader of the Bucketheads that subscribed me to this list (I'm VERY sure).
The song, 'The Jeffrey', in particular, is all about the 'flame' (as 'they'
call it) war, and based much on some of my posts. The list is now un-
moderated, and in the control of free persons. Check out that cd.)
From vac22737889 at msn.com Sat Jun 6 01:54:37 1998
From: vac22737889 at msn.com (vac22737889 at msn.com)
Date: Sat, 6 Jun 1998 01:54:37 -0700 (PDT)
Subject: URGENT BUY RECOMMENDATION
Message-ID: <221548788987.MAA45587@mail.msn.com>
R & R Resources.
Symbol: R R R I
Recent Price: 8 3/4 ($8.75/share)
Wall Street analysis from Harvard Equity Research has issued a STRONG
BUY recommendation on RRRI stock. Robert Renquist was quoted as
predicting a $13.50-$15.00 price near-term with "the high probability of
continuing appreciation during the 4th quarter of 1998".
Harvard Equity Research's recommendation AATK went
from $3 to $9.00 in ten trading days!
Harvard Equity Research is so confident of their projections that they
are offering their subscribers a money-back guarantee on their
subscription if RRRI doesn't at least double within the next year.
To reiterate: an IMMEDIATE & STRONG BUY recommendation
on RRRI.
For further information go to:
http://quote.yahoo.com/
or send a SASE, for a free issue of Harvard Equity Research's latest
top-rated newsletter, to:H.E.R., 35 rue des Bains, CH-1205 Geneve,
Switzerland.
From gwb at gwb.com.au Sat Jun 6 03:26:22 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Sat, 6 Jun 1998 03:26:22 -0700 (PDT)
Subject: Statement on Sixty Minutes by Pauline Hanson
Message-ID: <1.5.4.32.19980606101637.0084b320@mail.pronet.net.au>
Date: Sat, 6 Jun 1998 20:00:04 +1000
NEWS RELEASE
6/6/98
60 minutes' Fairytales
"This Sunday, 60 Minutes is airing a segment devoted to connecting
Pauline Hanson with individuals or groups in the United States. While we
don't know who these people are, what is certain is that Pauline Hanson
is not in contact politically or organisationally with anyone in the
United States - the 60 Minutes story is a fairytale.
After hearing of an advertisement for this Sunday's 60 minutes, David
Oldfied contacted the programme to check its content. Despite making it
clear there was absolutely no communication between Pauline Hanson, her
advisers, or the organisation's heads and anyone in the United States,
60 minutes refused to even consider they had manufactured the story.
They also refused to allow One Nation an opportunity to rebut their
fairytale until the programme the following week. This is a nefariously
timed lie.
This is deceptive and dishonest journalism at its worst and all credible
journalists, whatever their personal feelings, should be appalled at 60
minutes' approach. Regardless of what evidence 60 Minutes produce or
what they may state, the whole story is a fairytale fabricated without
the slightest basis of truth. There is no connection or communication
between the United States and Pauline Hanson or One Nation.
While we have no knowledge of such activities, it is possible some
individual member may be in contact with people overseas but this, if it
has happened, is a personal affair and unrelated to us as an
organisation.
It should also be understood that One Nation letterhead and other
documents have been forged on a number of occasions. Further to this,
people have falsely claimed to be party officials and candidates as well
as one incident where a person in Western Australia claimed to be a
close personal adviser to Pauline when in fact she had never even met
him.
We are not sure what 60 minutes will put to air, but having spoken to
them twice, it is clear they will peddle the lie of links that simply do
not exist. Perhaps they have cleverly manufactured a fairytale with the
help of people either willing to perjure themselves or who are just not
aware they are not really in contact with Pauline or One Nation, but
whatever the case, their story is fiction in the 1st, 2nd and 3rd
degree.
60 minute's refusal of an opportunity for us to face their fairytale on
their programme this Sunday night, in itself, proves their intention to
simply maliciously attack Pauline and One Nation by any means regardless
of the total lack of truth. 60 minutes has no credibility and should be
treated accordingly. Even their Internet story announcing their
programme is filled with lies when factual evidence is clearly available
by speaking to us, something they chose not to do because the truth
would ruin their dishonest and despicable claims."
"Pauline Hanson and One Nation is, and will always be, 100% Australian
owned and 100% Australian influenced."
Statement issued by request of Pauline Hanson MP.
From kip at bdi.sem.hhs.nl Sat Jun 6 05:05:52 1998
From: kip at bdi.sem.hhs.nl (kip at bdi.sem.hhs.nl)
Date: Sat, 6 Jun 1998 05:05:52 -0700 (PDT)
Subject: JUST RELEASED! 10 Million!!!
Message-ID: <011297055501222@g_fantasm.com>
IT WAS JUST RELEASED!!
INTRODUCING...MILLIONS VOL. 1A
We took a total of over 92 million email addresses from many of the
touted CD's that are out there (bought them all - some were $300+)!
We added the millions we had in storage to those. When we
combined them all, we had in excess of 100+ million addresses
in one huge file.
We then ran a super "sort/de-dupe" program against this huge list.
It cut the file down to less than 25 million!!! Can you believe that? It
seems that most people that are selling CD's are duping the public
by putting numerous files of addresses in the CD over and over. This
created many duplicate addresses. They also had many program
"generated" email addresses like Compuserve, MCI, ANON's, etc.
This causes a tremendous amount of undeliverables, and for those
that use Stealth programs, clogs up servers quickly with trash, etc.
We then ran a program that contained 1800+ keywords to remove
addresses with vulgarity, profanity, sex-related names, postmaster,
webmaster, flamer, abuse, spam, etc., etc. Also eliminated all .edu,
.mil, .org, .gov, etc. After that list was run against the remaining list,
it reduced it down to near 10 million addresses!
So, you see, our list will save people hundreds of dollars buying all
others that are out there on CD and otherwise. Using ours will be like
using the 100+ million that we started with, but a lot less money and
alot less time!!
We also purchased Cyber-Promos ($995.00) CD. We received it just
prior to finishing production work on the new CD. We had our people
take a random sample of 300,000 addresses from the touted 2.9 that
they advertised. We used a program that allows us to take a random
sample of addresses from any list. We were able to have the program
take every 9th address, thus giving us a 300,000 list of Cyber's email
addresses from top to bottom. We cleaned these, and came up with about
100,000 addresses. These are also mixed in.
We also included a 6+ million "Remove/Flamer" file broke into seperate
files for ease of extracting and adding to your own database of removes.
"You can buy from the REST or you can buy from the BEST. Your choice.
_____________________________
What others are saying:
"I received the CD on Friday evening. Like a kid with a new toy, I
immediately started bulking out using the new email addresses. Over
the course of the weekend, I emailed out over 500,000 emails and I
received less than TWENTY undeliverables!! I am totally satisfied
with my purchase!! Thanks Premier!!"
Dave Buckley
Houston, TX
"This list is worth it's weight in gold!! I sent out 100,000 emails for my
product and received over 55 orders!
Ann Colby
New Orleans, LA
****************************************
HERE'S THE BOTTOM LINE
Here is what you get when you order today!
>> 10 Million Email Addresses... 1 per line in simple text format on a CD.
Files are in lots of 5,000 (no codes needed to open files).
All files are separated by domain name for your convenience.
PLUS you receive a tremendous REMOVE list!
6 Million+
>>> NOW ONLY $150.00!
This price is effective for the next seven days, thereafter the price will be
$199.00 so ORDER NOW!
All lists are completely free of any Duplicates. We also on a continual
basis, add New Names and Remove Undeliverables and Remove
Requests.
The result is the Cleanest Email Addresses Available Anywhere
to use over and over again, for a FRACTION of the cost that other
companies charge. Typical rates for acquiring email lists are from
1 cent to as high as 3 cents per email address - that's
"INFORMATION HIGHWAY" ROBBERY!.
***ADDED BONUS***
All our customers will have access to our updates on the CD volume
they purchase. That's right, we continually work on our CD. Who
knows when those other CDs were made. We're constantly adding
and deleting addresses, removes. Etc. It all comes back to quality.
No one else offers that!
Don't even hesitate on this one or you will miss out on the most
effective way to market anywhere...PERIOD!
If you have any further questions or to place an order by
phone, please do not hesitate to call us at:
800-600-0343 Ext. 2693
To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
We accept Visa, Mastercard, AMEX, Checks by Fax.
_________________
EZ Order Form
_____Yes! I would like to order MILLIONS Vol. 1A email addresses
for only $150.00.
*Please select one of the following for shipping..
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping. (outside US add an additional $25 for shipping)
DATE_____________________________________________________
NAME____________________________________________________
COMPANY NAME___________________________________________
ADDRESS_________________________________________________
CITY, STATE, ZIP___________________________________________
PHONE NUMBERS__________________________________________
FAX NUMBERS_____________________________________________
EMAIL ADDRESS___________________________________________
TYPE OF CREDIT CARD:
______VISA _____MASTERCARD
CREDIT CARD# __________________________________________
EXPIRATION DATE________________________________________
NAME ON CARD___________________________________________
AMOUNT $____________________
(Required) SIGNATURE:x________________________
DATE:x__________________
You may fax your order to us at: 1-212-504-8192
CHECK BY FAX SERVICES!
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-212-504-8192
******************************************************
***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
CHECK HERE AND FAX IT TO US AT 1-212-504-8192
*******************************************************
If You fax a check, there is no need for you to send the original check.
We will draft up a new check, with the exact information from your
original check. All checks will be held for bank clearance. (7-10 days)
Make payable to: "GD Publishing"
From sahazali at ew.mimos.my Sat Jun 6 11:13:39 1998
From: sahazali at ew.mimos.my (sahazali at ew.mimos.my)
Date: Sat, 6 Jun 1998 11:13:39 -0700 (PDT)
Subject: Find out what "They" don't want you to know!!!
Message-ID: <011297033301222@g_fantasmimages.com>
Dear Friend:
If you have already responded to the following announcement a few
days ago, that means your package is already on its way and it
should be arriving soon! If you have not responded to this before,
please pay attention to it now. This is very important!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!
IMPORTANT ANNOUNCEMENT
IMPORTANT ACCOUNCEMENT
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
'''''''''''''''''''''''''''
Your future May Depend on it !
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Before you know about this 'Important Announcement', you must
first read the following 'Editorial Excerpts' from some important
publications in the United States:
NEW YORK TIMES: "In concluding our review of Financial
organizations to effect change in the 90's, special attention
should be called to a California based organization, 'WORLD
CURRENCY CARTEL'. Members of this organization are amassing
hundred of millions of dollars in the currency market using a very
LEGAL method which has NEVER been divulged to the general public.
While their purpose is not yet known, their presence has most
certainly been felt".
NBC NIGHTLY NEWS: "Members of 'World Currency Cartel', who always
keep a low profile, are considered to be some of the most
wealthiest people in North America".
More excerpts later, but first let us give you this very
'IMPORTANT ANNOUNCEMENT":
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
'''''''''
We are glad to announce that for the first time and for a very
short period of time, WORLD CURRENCY CARTEL will instruct a
LIMITED number of people worldwide on 'HOW TO CONVERT $25 INTO ONE
HUNDRED OF LEGAL CURRENCY'. We will transact the first conversion
for you, after that you can easily and quickly do this on your own
hundreds or even thousands of times every month.
TAKE ADVANTAGE OF THIS "SECRET FLAW" !
******************************************************************
******************************************************************
***
It is even more explosive than we have yet disclosed. While
currency does fluctuate daily, we can show you 'HOW TO CONVERT $99
INTO $588 AS MANY TIMES AS YOU WANT'. That means, you will be able
to EXCHANGE $99, AMERICAN LEGAL CURRENCY DOLLARS, FOR $580 OF THE
SAME. You can do this as many times as you wish, every day, every
week, every month. All very LEGAL and effortlessly!
It takes only 5 to 10 minutes each time you do this. You can do
this from home, office or even while traveling. All you need is
an access to a phone line and an address. Best of all, you can do
this from ANY CITY ON THIS EARTH!!!
Again, we must reiterate, anyone can do this and the source is
NEVER-ENDING. For as long as the global financial community
continues to use different currencies with varying exchange rates,
the "SECRET FLAW" will exist.
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
As we said earlier , we will do the first transaction for you and
will show you exactly how to do this on your own, over and over
again!
The amount of exchange you would do each time is entirely up to
you. Working just 2 to 10 hours a week, you can soon join the list
of Millionaires who do this on a daily basis many times a day. The
transaction is so simple that even a high school kid can do it!
We at the World Currency Cartel would like to see a uniform global
currency backed by Gold. But, until then, we will allow a LIMITED
number of individuals worldwide to share in the UNLIMITED PROFITS
provided for by the world currency differentials.
We will espouse no more political views nor will we ask you to do
so. We can say however, that our parent organization, NDML,
benefits greatly by the knowledge being shared, as we
ourselves, along with YOU, benefit likewise. Your main concern
surely will be, how you will benefit.
As soon as you become a member, you will make transactions from
your home, office, by telephone or through the mail. You can
conduct these transactions even while traveling.
Don't believe us? Experience it for yourself!
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
Unlike anyone else, we will assure you great financial freedom and
you will add to our quickly growing base of supporters and join
the list of MILLIONAIRES being created using this very "SECRET
FLAW" in the world currency market.
******************************************************************
******************************************************************
***
DON'T ENVY US, JOIN US TODAY!!!
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
'''''''''
There is a one time membership fee of only $195. BUT, if you join
us by June 29th, 1998, you can join us for only $25 administrative cost.
Your important documents, instructions, contact name/address, phone
number and all other pertinent information will be mailed to you
immediately. So take advantage of our Anniversary date and join us
today.
(If you are replying after June 29th, you must pay $195.00 for
the membership fee. NO EXCEPTIONS, and no more E-mail inquiries
please).
Upon becoming a member, you promise to keep all infos
CONFIDENTIAL!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~
Should you choose to cancel your membership for any reason, you
must return all papers/documents for a refund within 60 days.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~--
IMPORTANT:
****************
1...Please write your name & mailing address VERY CLEARLY on a
paper
2...Below your mailing address, please write your E-mail address
3...At the top left hand corner, please write the words "NEW
MEMBER"
4...Attach a CHECK or MONEY ORDER for $25 + $10 for the shipping
and handling of documents (TOTAL = $35.00) Outside US add $10 (TOTAL = $45)
PAYABLE TO "EBSN" and mail to:
EBSN
PO BOX 66
ROSELLE PARK, NJ 07204
}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}
}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}} }}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}
Here are some more 'Editorial Excerpts':
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
WALL STREET: "A discreet group of Americans, operating under the
guise of World Currency Cartel have recently begun making rumbles in
world finance market. While at this time, their game is not completely
known, they certainly will be watched by those making major moves in the
currency contracts".
FINANCIAL WEEK: "Watch them, monitor them, extract their knowledge
and try to become one of them. That is the soundest financial
advice we could give to anyone".
NATIONAL BUSINESS WEEKLY: "While this reporter has been left in
the cold as to its method of operation, we have been able to
confirm that 'World Currency Cartel' and its members are literally
amassing great fortunes overnight".
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$END$$$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
We thankfully credit DIAMOND INT. for the content of this
IMPORTANT ANNOUNCEMENT.
From gwb at gwb.com.au Sat Jun 6 13:26:58 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Sat, 6 Jun 1998 13:26:58 -0700 (PDT)
Subject: Toyota - Sixty Minutes' sponsors need to know
Message-ID: <1.5.4.32.19980606202036.00b43b7c@mail.pronet.net.au>
Dear One Nation supporters
Toyota are the bona-fide sponsors of Sixty Minutes.
Further to our email yesterday about their coverage of Pauline Hanson
tonight, ****I would encourage**** you to take a moment to send your message
of concern about the unethical behaviour of this Channel 9 programme and
express yours views clearly on how you feel this might reflect on their
business.
Here is Toyota's email address:
toyota at spike.com.au
GWB
Scott Balson
Here is a copy of the email sent to you yesterday from Pauline Hanson:
NEWS RELEASE
6/6/98
60 minutes' Fairytales
"This Sunday, 60 Minutes is airing a segment devoted to connecting
Pauline Hanson with individuals or groups in the United States. While we
don't know who these people are, what is certain is that Pauline Hanson
is not in contact politically or organisationally with anyone in the
United States - the 60 Minutes story is a fairytale.
After hearing of an advertisement for this Sunday's 60 minutes, David
Oldfied contacted the programme to check its content. Despite making it
clear there was absolutely no communication between Pauline Hanson, her
advisers, or the organisation's heads and anyone in the United States,
60 minutes refused to even consider they had manufactured the story.
They also refused to allow One Nation an opportunity to rebut their
fairytale until the programme the following week. This is a nefariously
timed lie.
This is deceptive and dishonest journalism at its worst and all credible
journalists, whatever their personal feelings, should be appalled at 60
minutes' approach. Regardless of what evidence 60 Minutes produce or
what they may state, the whole story is a fairytale fabricated without
the slightest basis of truth. There is no connection or communication
between the United States and Pauline Hanson or One Nation.
While we have no knowledge of such activities, it is possible some
individual member may be in contact with people overseas but this, if it
has happened, is a personal affair and unrelated to us as an
organisation.
It should also be understood that One Nation letterhead and other
documents have been forged on a number of occasions. Further to this,
people have falsely claimed to be party officials and candidates as well
as one incident where a person in Western Australia claimed to be a
close personal adviser to Pauline when in fact she had never even met
him.
We are not sure what 60 minutes will put to air, but having spoken to
them twice, it is clear they will peddle the lie of links that simply do
not exist. Perhaps they have cleverly manufactured a fairytale with the
help of people either willing to perjure themselves or who are just not
aware they are not really in contact with Pauline or One Nation, but
whatever the case, their story is fiction in the 1st, 2nd and 3rd
degree.
60 minute's refusal of an opportunity for us to face their fairytale on
their programme this Sunday night, in itself, proves their intention to
simply maliciously attack Pauline and One Nation by any means regardless
of the total lack of truth. 60 minutes has no credibility and should be
treated accordingly. Even their Internet story announcing their
programme is filled with lies when factual evidence is clearly available
by speaking to us, something they chose not to do because the truth
would ruin their dishonest and despicable claims."
"Pauline Hanson and One Nation is, and will always be, 100% Australian
owned and 100% Australian influenced."
Statement issued by request of Pauline Hanson MP.
From StanSqncrs at aol.com Sat Jun 6 16:40:23 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Sat, 6 Jun 1998 16:40:23 -0700 (PDT)
Subject: FBI Video
Message-ID: <544efa54.3579d342@aol.com>
Bill had a correction for me (Thanks Bill!). That cypherpunks survailance
video is only 416k (I've got .MP3 sizes on my mind, sorry)
Download it if you haven't seen it -
http://www.cnbc.com/moreinfo/badday.mpeg
Stan
From gwb at gwb.com.au Sat Jun 6 17:44:27 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Sat, 6 Jun 1998 17:44:27 -0700 (PDT)
Subject: Queensland State Elections Live
Message-ID: <1.5.4.32.19980607003915.023003b4@mail.pronet.net.au>
Dear One Nation supporter
Bookmark this page:
http://www.gwb.com.au/onenation/qldstate/june13
We will be covering the state elections live from here on behalf of One Nation.
You will be able to participate in live IRC Chat (find out how now)
and
Follow stories and images as they unfold.
GWB
Scott Balson
From martybishop at yahoo.com Sat Jun 6 18:59:38 1998
From: martybishop at yahoo.com (Martin Bishop)
Date: Sat, 6 Jun 1998 18:59:38 -0700 (PDT)
Subject: Tigerteam Contract
Message-ID: <19980607015916.1565.rocketmail@send1e.yahoomail.com>
A request for all tigerteam specialists:
If any of you has access to a sample of a tigerteam contract (a
company orders an attempt to break into their information system) -
for any country - preferably
European, I would very much appreciate you directing me to it (or
sending it). I
have assembled a team of various security specialists but really
wouldn't like to step into some legal trap that may have been avoided.
My primary concerns
are:
- attempt to "steal" information that the company considers
confidential or classified (are they allowed to authorize such attempt
at all and who gets
sued if they can't but do it anyway)
- possible hinderance or partial destruction of company's information
system - software, data, functionality (e.g. when conducting highly
violent attacks)
- using forged identity (very handy when doing social engineering but
what is the legal aspect of it?)
- "attacking" company's employees (can a company authorize someone to
do a background research on their employees, to hack into their home
computers as well, to social engineer them out-of-work, to abduct and
threaten them etc.?)
- protecting from your own team members (trust nobody: a member of my
team could eventually - under threat or some other pressure - insert a
backdoor/trojan/virus
etc. into the company's information system)
Thank you in advance for your answers and have a nice day.
Please respond to me directly or CC.
Martin Bishop
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com
From reoru89 at demeter.psych.uw.edu.pl Sat Jun 6 23:16:29 1998
From: reoru89 at demeter.psych.uw.edu.pl (THE HOBBY PROS)
Date: Sat, 6 Jun 1998 23:16:29 -0700 (PDT)
Subject: CABLE DECSRAMBLER Now Only $6.00 !!
Message-ID: <199806063592AAA6754@564897845784511@Inovations.com.inmh.ro>
This is really cool!
PREMIUM CHANNELS and PAY PER VIEW EVENTS
**** FREE ****
EASY to assemble plans for only $6.00 !
We will send your plans the day we receive your order!
YOU WILL BE WATCHING HBO, SHOWTIME,
THE MOVIE CHANNEL, Pay per view events, Adult stations,
and any other scrambled signal NEXT WEEK!
You can EASILY assemble a cable descrambler in less than 30 minutes!
You have probably seen many advertisments for similar plans....
BUT OURS are BETTER!
We have compared it to all the others and have actually
IMPROVED the quality and SIMPLIFIED the design !!!
** We even include PHOTOS! **
OUR PLANS ARE BETTER!
We have NEW, EASY TO READ,EASY to assemble plans for only $6.00!
We have seen them advertised for as much as $29.00 and you have
to wait weeks to receive them!
WHAT THE OTHERS SAY IS TRUE!
Parts are available at "The R***O S***k" Trademark rights
do not allow us to use a national electronics retail chains' name
but there is one in your town!
Call and ask them BEFORE you order!
They are very familiar with these plans and
will tell you that it.......
DOES INDEED WORK! ASK THEM!
You will need part #'s
270-235
271-1325
278-212
RG59 coaxial cable,
#12 copper wire,
and a variable capacitor.
They may have to special order the variable capacitor....
But WHY WAIT for a special order? WE have them!
** WE have secured a supply of the capacitors directly from
the manufacturer, and We WILL include one with your plans
for an ADDITIONAL $10.00 only!
It is LEGAL, providing of course you use these
plans for educational purposes only.
IT'S FUN!
We're sure you'll enjoy this! Our FAMILIES sure do!
* you need one descrambler for each TV.
NO MORE MONTHLY BILLS!
$ 6.00 for plans only
$10.00 for variable capacitor only
$16.00 for The easy to assemble plans and one variable capacitor!
Pay by check or money order payable to:
The Hobby Pros
336 Bon Air Center #254
Greenbrae, Ca.
94904
Please provide a self addressed stamped envelope (.64)
So we can RUSH your order to you!
ot3
^^
If this E-mail offends anyone, we apologize ......and feel free to use the DEL key.
"By deleting your unwanted E-Mail you waste one key stroke, yet by
throwing away paper mail you waste a planet! SAVE OUR TREES and
support internet E-Mail instead of traditional mail"!
^^
From s955349 at mailserv.cuhk.edu.hk Sat Jun 6 23:20:57 1998
From: s955349 at mailserv.cuhk.edu.hk (s955349 at mailserv.cuhk.edu.hk)
Date: Sat, 6 Jun 1998 23:20:57 -0700 (PDT)
Subject: What "THEY" Don't Want You To Find Out!!
Message-ID: <53556360_13892432>
Dear Friend:
If you have already responded to the following announcement a few
days ago, that means your package is already on its way and it
should be arriving soon! If you have not responded to this before,
please pay attention to it now. This is very important!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
IMPORTANT ANNOUNCEMENT
IMPORTANT ANNOUNCEMENT
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
Your future May Depend on it!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Before you know about this 'Important Announcement', you must
first read the following 'Editorial Excerpts' from some important
publications in the United States:
NEW YORK TIMES: "In concluding our review of Financial
organizations to effect change in the 90's, special attention
should be called to a California based organization, 'WORLD
CURRENCY CARTEL'. Members of this organization are amassing
hundred of millions of dollars in the currency market using a very
LEGAL method which has NEVER been divulged to the general public.
While their purpose is not yet known, their presence has most
certainly been felt".
NBC NIGHTLY NEWS: "Members of 'World Currency Cartel', who always
keep a low profile, are considered to be some of the most
wealthiest people in North America".
More excerpts later, but first let us give you this very
"IMPORTANT ANNOUNCEMENT":
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
We are glad to announce that for the first time and for a very
short period of time, WORLD CURRENCY CARTEL will instruct a
LIMITED number of people worldwide on 'HOW TO CONVERT $25 INTO
ONE HUNDRED OF LEGAL CURRENCY'. We will transact the first
conversion for you, after that you can easily and quickly do this
on your own hundreds or even thousands of times every month.
TAKE ADVANTAGE OF THIS "SECRET FLAW" !
******************************************************************
It is even more explosive than we have yet disclosed. While
currency does fluctuate daily, we can show you 'HOW TO CONVERT $99
INTO $588 AS MANY TIMES AS YOU WANT'. That means, you will be able
to EXCHANGE $99, AMERICAN LEGAL CURRENCY DOLLARS, FOR $580 OF THE
SAME. You can do this as many times as you wish, every day, every
week, every month. All very LEGAL and effortlessly!
It takes only 5 to 10 minutes each time you do this. You can do
this from home, office or even while traveling. All you need is
an access to a phone line and an address. Best of all, you can do
this from ANY CITY ON THIS EARTH!!!
Again, we must reiterate, anyone can do this and the source is
NEVER-ENDING. For as long as the global financial community
continues to use different currencies with varying exchange rates,
the "SECRET FLAW" will exist.
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
As we said earlier , we will do the first transaction for you and
will show you exactly how to do this on your own, over and over
again!
The amount of exchange you would do each time is entirely up to
you. Working just 2 to 10 hours a week, you can soon join the list
of Millionaires who do this on a daily basis many times a day. The
transaction is so simple that even a high school kid can do it!
We at the World Currency Cartel would like to see a uniform global
currency backed by Gold. But, until then, we will allow a LIMITED
number of individuals worldwide to share in the UNLIMITED PROFITS
provided for by the world currency differentials.
We will espouse no more political views nor will we ask you to do
so. We can say however, that our parent organization, NBT, benefits
greatly by the knowledge being shared, as we ourselves, along with
YOU, benefit likewise. Your main concern surely will be,
how you will benefit.
As soon as you become a member, you will make transactions from
your home, office, by telephone or through the mail. You can
conduct these transactions even while traveling.
=================================================================
Don't believe us? Experience it for yourself!
=================================================================
Unlike anyone else, we will assure you great financial freedom and
you will add to our quickly growing base of supporters and join
the list of MILLIONAIRES being created using this very "SECRET
FLAW" in the world currency market.
==================================================================
DON'T ENVY US, JOIN US TODAY!!!
==================================================================
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
There is a one time membership fee of only $195. BUT, if you join
us by June 30, 1998, you can join us for only $25 administrative
cost. Your important documents, instructions, contact name/address,
phone number and all other pertinent information will be mailed to
you immediately. So take advantage of our Anniversary date and join
us today.
(If you are replying after June 30, you must pay $195.00 for the
membership fee. NO EXCEPTIONS, and no more E-mail inquiries please).
Upon becoming a member, you promise to keep all info. CONFIDENTIAL!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Should you choose to cancel your membership for any reason, you
must return all papers/documents for a refund within 60 days.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
**************************
IMPORTANT:
**************************
1...Please write your name & mailing address VERY CLEARLY on a
piece of paper or index card.
2...Below your mailing address, please write your E-mail address
(optional).
3...At the top left hand corner, please write the words:
"NEW MEMBER"
4...Attach a CHECK or MONEY ORDER for $25 + $5 for the shipping of
documents (TOTAL = $30.00) PAYABLE TO "NBT" and mail to:
NBT
PO BOX 1129
UNION, NJ 07083-1129
*If outside US add an additional $10 (TOTAL = $40.00, International
Money Orders Only)
}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}
Here are some more "Editorial Excerpts":
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
WALL STREET: "A discreet group of Americans, operating under the
guise of World Currency Cartel have recently begun making rumbles
in world finance market. While at this time, their game is not
completely known, they certainly will be watched by those making
major moves in the currency contracts".
FINANCIAL WEEK: "Watch them, monitor them, extract their knowledge
and try to become one of them. That is the soundest financial advice
we could give to anyone".
NATIONAL BUSINESS WEEKLY: "While this reporter has been left in
the cold as to its method of operation, we have been able to
confirm that 'World Currency Cartel' and its members are literally
amassing great fortunes overnight".
END
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
We thankfully credit DIAMOND INT. for the content of this
IMPORTANT ANNOUNCEMENT!
From favvafeephjmg.com at uk.newbridge.com Sat Jun 6 23:23:51 1998
From: favvafeephjmg.com at uk.newbridge.com (favvafeephjmg.com at uk.newbridge.com)
Date: Sat, 6 Jun 1998 23:23:51 -0700 (PDT)
Subject: E-Mail anything to 57 million people for only $99
Message-ID: <76cd44dbs84f81co640a655aa@myweb.com>
57 MILLION EMAILS FOR ONLY $99
INCLUDES STEALTH MAILER
That's right, I have 57 Million Fresh email addresses that I will sell for only $99. These are all fresh addresses that include almost every person on the internet today, with no duplications. They are all sorted and ready to be mailed. That is the best deal anywhere today ! Imagine selling a product for only $5 and getting only a 1/10% response. That's $2,850,000 in your pocket !!!
Don't believe it? People are making that kind of money right now by doing the same thing, that is why you get so much email from people selling you their product....it works ! I will even tell you how to mail them with easy to follow step-by-step instruction I include with every order. These 57 Million email addresses are yours to keep, so you can use them over and over and they come on 1 CD.
I will also include the stealth mailer - this is a full version of the incredibly fast mailing program that hides your email address when you send mail so no one will find out where it came from and you won't lose your dial up account. The stealth mailer is an incredible program and absolutly FREE with your order !
If you are not making at least $50,000 a month, then ORDER NOW.
ORDER NOW BY FAX: Simply print out this order form and fax it to us along with your check made payable to: Cyber Bulk for only $99. Our Fax # is: 760 430 2220
We will confirm your order by email and then mail your cd out via priority mail.
Name:_____________________________
Street Address:______________________________
City:_____________________
State:________________ZipCode:_____________
Phone number:__________________________
Email:_______________________________
Tape your check here. Returned checks are subject to $25 NSF Fee.
Fax it to 760 430 2220
Or
You can mail a check or money order to:
Cyber Bulk
167 Hamilton ST
Oceanside, CA 92054
If you want to be removed from our mailing list just send a email here
From bill.stewart at pobox.com Sun Jun 7 12:40:45 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Sun, 7 Jun 1998 12:40:45 -0700 (PDT)
Subject: Counterpane Cracks MS's PPTP
In-Reply-To:
Message-ID: <3.0.5.32.19980607123650.008cf970@popd.ix.netcom.com>
>> << > Auto-Launch attached binaries in E-Mail <-- Can we say G**dT*mes?
>> It was my understanding, that the so-called GoodTimes virus was a farce,
>> apparently aimed at specific commercial spammers.
>G**dT*mes is a hoax.
>
>I'm talking about a bug in Outlook (Express?) that will execute code when
>email messages are opened.
G**dT*mes and its ilk are hoaxes, which infect the mind of some readers,
causing Fear and Panic, and propagating around like chain letters.
But the fear-causing part is the assertion that if you read the message,
it will execute on your computer and do Bad Scary Things.
In the case of G**dT*mes, this was bogus, but it doesn't have to be.
In a passive-mail-reader environment, this won't happen,
because there's no reason your mailreader will execute commands
embedded in email, but if you've got a mail-reader that
executes scripts sent to it in the mail, you don't need the
human reader's participation to spread things,
you just need to tell the mail-reader to propagate and then
do whatever payload you've sent along as well.
The IBM Christmas-Tree Virus didn't use Fear to execute -
it promised the readers an amusing animated Christmas Tree on their terminals
(back when that was still perceived as cool :-) and if the sucker ran it,
it ran its propagation phase before or during the animation.
And back when we used Real Terminals instead of emulators,
you could send a crafty escape sequence to an HP2621 or VT100
to stash material in a register or on the screen and
get it sent back to the computer. If you made a good guess
about the environment, this was enough ("Quit mailreader, run /tmp/boom".)
There was an article in the SFChron or Oakland Trib in spring 1979
about how "hackers at Berkeley" discovered a security hole in
"the Unix, a computer made by DEC", which was really a terminal exploit.
How good is that VT100 emulator you're using to telnet to that shell account?
.
.
.
.
.
.
.
ESC[42m;
.
yeah, that was fake.....
From jya at pipeline.com Sun Jun 7 12:46:03 1998
From: jya at pipeline.com (John Young)
Date: Sun, 7 Jun 1998 12:46:03 -0700 (PDT)
Subject: PGP International Accused
Message-ID: <199806071407.KAA08652@camel8.mindspring.com>
There are accusations from Russia and France that
PGP International and Network Associates are
improperly and probably illegally refusing downloads
of PGP to legitimate users.
http://jya.com/pgpi-x-ru.htm
http://jya.com/nai-x-fr.htm
Phil Zimmermann and the companies have been asked
by the plaintiffs to explain why public affirmations of open
access are contradicted by illegal restrictions.
Could this be due to pressure from US agencies or
legal counsel to comply with covert directives of the
nations to restrict access or pay the price of being
denied markets?
Maybe this is the way the Stewart Baker policy of encryption
duplicity is being spread from NSA to the marketeers: Public
assurances of concern and covert arrangements with authority
to assure perpetuation of national security lockdown.
From usethe800number at mailexcite.com Sun Jun 7 15:15:11 1998
From: usethe800number at mailexcite.com (usethe800number at mailexcite.com)
Date: Sun, 7 Jun 1998 15:15:11 -0700 (PDT)
Subject: Search Engines
Message-ID: <29348246_22149450>
I saw your web site on the internet. I work for
a company that specializes in submitting web sites
to search engines. We can submit your web site to
over 350 of the world's best search engines for
only $39.95! All work is verified. If you would
like to get more traffic to your web site feel
free to give me a call at our toll-free number
listed below or order directly from our web site.
We are a U.S. Based company that does business
world wide.
Sincerely,
David Scott
(800) 484-2621 X5568
http://www.skymax.net/searchengines
From net10 at mail.domain-serv.com Sun Jun 7 18:19:09 1998
From: net10 at mail.domain-serv.com (net10 at mail.domain-serv.com)
Date: Sun, 7 Jun 1998 18:19:09 -0700 (PDT)
Subject: Don't Risk Losing That Great Domain Name!
Message-ID: <199806080049.RAA05067@outlook.domain-serv.com>
*********************************************************************
Don't Risk Losing That Great Domain Name For
Your Personal Or Business Use.
*********************************************************************
Register your Domain Name for a one time fee of $35.00.
Planet Net's Domain Registration Services will not only
register your domain name, but for no monthly charge,
allow you to use the Planet Net Name Service. When you
are ready to post your web site or use your domain for
mail, The decision is up to you; select another website
hosting company or Host with Planet Net. We'll even
waive the set-up fees. Also available are packages with
custom "under construction" pages and mail services allowing
you to use your new domain for e-mail.
Planet Net, the Internet's premier webmasters resource,
offers high performance Website Hosting and Dedicated
Servers. Lightning fast 30 MB virtual web hosting packages
starting at $19.99/Month. Reseller packages with domain hosting
as low as $10 /month All packages include bundles of free
webmaster tools.
Sign-up before June 30, 1998 and receive up to 3 Free months
of web site hosting.
If you would like to check the availability of your domain name or
learn more about Planet Net type the following address in your web browser.
http://www.serveramerica.com
See You On The Net!!
From zenna at mail.com Sun Jun 7 19:23:26 1998
From: zenna at mail.com (zenna at mail.com)
Date: Sun, 7 Jun 1998 19:23:26 -0700 (PDT)
Subject: Do you need extra money
Message-ID: <51603356@teleport.com>
Hello: Forgive us for the intrusion.
Let me ask you a question. Are you in debt?
Think about that for a moment while I introduce our company.
We are American Capital Mortgage Services, we specialize
in helping homeowners establish ONE easy LOW monthly
payment with the added benefit of not needing any equity in your
home. American Capital is constantly working with other lenders
throughout the U.S. to provide you with the best interest rate
possible. We have a number of different companies that we work
with and this is at NO cost to you EVER. We are
simply a referral agency.
If you answered yes to the above question, please
read on as I am sure American Capital can save you a huge amount
of money on monthly payments as well as in taxes..
Consider This.....Did you know that:
~78% of Americans are in debt...
~$5,000.00 is the average Credit Card balance...
~8 Million plus people will file Bankruptcy in
1998 alone...
Are you aware that banks throughout the United States are
pressuring Congress that people in a high tax bracket can only
file Chapter 13 so that the banks have some kind of recourse.
Let me assure you these statistics are not to scare you
but rather to inform you that you may or may not be alone.
The goal of American Capital is to provide homeowners
with lenders that fit your needs. We can provide you with
lenders that will loan you up to 125% of the value of your
home and there is NO equity needed.. In any case there
are NO upfront fees or advances of ANY KIND on your part.
What do you have to lose, why not give it a shot and see if you
can better your situation.
Utilize the loan for whatever purpose you may need:
~ A new car
~ College tuition
~ Taxes
~ Credit Cards
~ Vacation
~ Home improvements
and the list goes on.......
You can have the cash in your pocket usually within 7-14
days. Did you also know that your loan is tax deductible?
All we simply ask for is your name, address, phone number
and e-mail address. The rest is optional. This way a
representative can personally call you so he or she can answer
all your detailed questions.
For a FREE loan evaluation please,
visit our website by
CLICKING HERE
or type: www.debtmasters.as/131.html in your browser
Thank you for your time and I know that
we can help you in getting the money you deserve
and in some cases need.
TO BE REMOVED FROM OUR MAIL LIST CLICK
HERE NOW
****************************************************
The mailing list for this message has been
preprocessed by an independent service to remove
the addresses of those who are not interested in
unsolicited email. Free registration for this
mailer-independent removal service is at
http://www.ctct.com
****************************************************
From gnu at toad.com Sun Jun 7 21:39:00 1998
From: gnu at toad.com (John Gilmore)
Date: Sun, 7 Jun 1998 21:39:00 -0700 (PDT)
Subject: President's Export Council advisors consider Encryption Policy
Message-ID: <199806080438.VAA05215@toad.com>
[Largely bureaucratic, but there may be some interesting nuggets.
This is an advisory group to watch over exports in general, with a
subcommittee that is chartered to watch over encryption issues. --gnu]
EXECUTIVE SUMMARY
PRESIDENT'S EXPORT COUNCIL SUBCOMMITTEE ON ENCRYPTION
APRIL 23, 1998
SUMMARY OF OPEN SESSION
The open session of the President's Export Council Subcommittee on
Encryption (PECSENC) was called to order at 8:30 a.m. Mr. Adorjan noted
the Committee's mandate and described the framework and agenda of the
meeting. He then described the proposed focus of the Subcommittee
working groups on U.S. regulation and legislation, international, and
technology. He emphasized that the objective would be for each working
group to address the many subjects related to encryption export policy
from the perspective of the primary topic. He noted that as the working
groups made progress on issues, they would bring recommendations for
decision to the entire Subcommittee. He added that each working group
would issue individual reports or recommendations rather than waiting
for an integrated report of all three working groups. He again noted
his hope that the work of the three groups be integrated further on in
the process. He commented that there had been discussion of a fourth
group focused on law enforcement, but concluded that it would be more
valuable to integrate law enforcement issues into the work of the three
groups because of its impact on these areas. He then described the
proposed list of working group participants and possible chairs, noting
that his goal was to get a balanced representation of members within
each group. He said that during the afternoon breakout sessions, he
would like each working group to reach a set of decisions on the scope
and approach of its work plan, and the timetable for completion.
Mr. Adorjan then discussed how the PECSENC, as a Subcommittee of the
President's Export Council, would communicate any formal activity to the
Administration, noting that the process used by the PEC Subcommittee on
Export Administration (PECSEA) worked well. He described this process,
and explained that any proposals to send reports or letters to the
Administration were submitted by the Subcommittee Chair to the PEC Chair
for distribution to Committee members, with the PEC staff coordinating
this effort.
Mr. Adorjan then commented on Mr. Stewart Baker's e-mail recommendation
to submit a letter urging the Administration to move forward on the
financial institutions regulation which had been pending. He agreed
with Mr. Baker's assessment that the Subcommittee should focus not only
on long-term issues, but also intervene in short-term issues. Mr.
Adorjan added that issuing a letter to the Administration with support
of PEC and Subcommittee members was an effective means of bringing a
topic to the forefront. He then suggested that the working groups
address such time sensitive issues, as appropriate, and formulate
recommendations for circulation throughout the entire Subcommittee. Mr.
Adorjan then asked for any comments with regard to the working group
activities. As there were none, he turned to the issue of membership,
noting that the PECSENC had 23 members with approximately 30 total
members planned. He added that at the previous meeting, members had
discussed the importance of having a cryptographer and insurance
industry representative as members. He assured members that the
department was pursuing these recommendations.
At the request of Subcommittee members, Under Secretary Reinsch
discussed Secretary Daley's recent remarks to a group of information
technology associations regarding the release of the Commerce Department
report titled "The Emerging Digital Economy." Mr. Reinsch noted that
while the report focused on electronic commerce, the Secretary also took
the opportunity to comment on the encryption debate. He emphasized that
the Secretary supported the President's policy to balance national
security, privacy, and commercial interests, but believed that
implementation of the policy had not been as successful as it should
be. He added that if it could not be implemented successfully, the
victims would be the law enforcement community and U.S. business, as
foreign products would become more dominant. With respect to the
ability of the United States to impact the activities of foreign
countries on encryption, Mr. Reinsch noted that each country that
confronted the issue had to work out the debate in its own way.
Responding to Mr. Lynn McNulty's request for views on the Economic
Strategy Institute's report entitled "Finding the Key, Reconciling
National and Economic Security Interests in Cryptography Policy", Mr.
Reinsch noted that while the report did not offer alternatives, it
demonstrated that balancing the competing interests in the debate was
difficult.
Mr. Adorjan then introduced the first presenter in the Justice
Department's threat assessment briefing, Mr. Charles Barry Smith,
Supervisory Special Agent, Office of Public and Congressional Affairs at
the Federal Bureau of Investigation. Agent Smith began by stating that
law enforcement was supportive of strong encryption to protect privacy,
but that it would be adversely impacted by commercially available
non-recovery encryption products. He discussed the legal issues related
to wiretapping, describing it as a technique of last resort done under
strict judicial procedures. He then described the adverse impact of
non-recovery encryption on law enforcement's ability to perform search
and seizure of criminally related electronically stored data. He
provided case examples where electronic surveillance had been used
successfully and described high-profile cases where encryption played a
role. In response to Raymond Humphrey's question as to whether or not
criminals would use key recovery products, Agent Smith said that past
experience showed that criminals tended to use what was generally
available, citing the use of cellular phones as an example. Ambassador
Katz raised the issue of whether it was too late to reverse the impact
of the general availability of non-key recovery encryption. Agent Smith
responded that at this point encryption was just an added feature, but
would soon become integrated into products and user-friendly, resulting
in increased use. In response to Ms. Simons' question of the issue of
domestic controls, Agent Smith noted that law enforcement was in fact
concerned about the proliferation of non-recovery products within the
United States, as well as the impact of imports of such products. Agent
Smith emphasized that law enforcement did not advocate that the
government be the holder of the information or key, but that it have
access to information pursuant to lawful authority without having to go
to the individual who may be engaged in the illegal activity.
Adorjan then introduced the second Justice Department speaker, Mr. Scott
Charney, Chief of the Computer Crime and Intellectual Property Section
in the Criminal Division of the Justice Department. Mr. Charney began
by commenting that his office was a large proponent of using
cryptography to protect systems for both authentication and privacy and
commerce purposes based on its experience with hacker cases. He noted
that if information was encrypted, it was not as much of a concern if
hackers gained access to it. He said that the question to ask was
whether the public wanted the kind of infrastructure that helped
criminals protect themselves because products were unbreakable and law
enforcement had no access to data, or the kind of infrastructure where
the public got the benefits of robust cryptography but where it did more
to preserve public safety. Mr. Douglas McGowan asked about the method
of controlling keys for individual users of key recovery encryption
outside of the corporate environment. Mr. Charney responded that there
were many ingenious ways to implement the technology which allow people
to retain control to information and keys while providing for government
access with the necessary authority. He added that there were ways to
implement key recovery that offered benefits for the consumer and public
safety, and used the example of "self-wrapping" encryption. Mr. Donald
Goldstein noted that there was evidence that the public was relatively
trusting and accepting of key management and recovery techniques, citing
the example of ATM card usage. He cautioned that the network might
become unreliable if a vulnerability was introduced which could result
in the public not trusting the system anymore. Mr. Chaney responded
that this vulnerability was far less than what existed in today's
plaintext world and that an expectation of zero risk on networks was not
realistic. He added that there needed to be a balance of benefits and
risks and that it was difficult to quantify risks to privacy versus
public safety.
There was also a general discussion with Messrs. Smith and Charney on
related issues, including the concept of a "Net Center", the policies of
other countries, imports of non-recovery encryption, the difficulty in
designing different products in different markets, the possibility of a
single law enforcement standard, economic intelligence and espionage,
including losses to the economy if robust encryption was not available,
the need for real time access to encrypted communications, and the
ability of law enforcement to solve crimes in the future if constrained
by non key-recovery encryption products. Mr. Anthony Pentino of the
National Security Agency suggested that law enforcement might find a
better way to communicate its position beyond the congressional level to
the general public at large to counter what appeared to be an
exaggeration of privacy concerns fostered by its detractors. Ms. Simons
then asked that in the future, the Subcommittee members have the
opportunity to submit questions to speakers. Mr Adorjan suggested that
these questions be conveyed through the working groups.
Mr. Linton Wells from the Department of Defense commented that Deputy
Secretary of Defense John Hamre recently spoke to NATO allies in
Brussels regarding the importance of each country developing national
solutions on encryption. He noted that Hamre's point was that
encryption needed to be regarded not just from commerce and law
enforcement standpoint, but as a national security issue as well. As
NATO moved from military dedicated command and control to public
networks, strong identification, authentication, and interoperability
were crucial. He also noted that with respect to the Defense
Department engaging in electronic commerce, key recovery encryption
would be necessary from an internal control standpoint. Mr. Adorjan
agreed that this issue was not unique to the Defense Department, but
corporations as well.
Turning to the briefing foreign activities, Mr. Adorjan introduced Ms.
Michelle O'Neill, Executive Director to Ambassador Aaron and Mr. James
Lewis, Director of the Office of Strategic Trade and Foreign Policy
Controls. Ms. O'Neill began by explaining that Ambassador Aaron, who
was unable to attend the meeting, had been appointed as Special Envoy
for Cryptography in November 1996. The goal of his discussions with
other countries was international consensus on the development of key
management and key recovery architectures that would foster robust,
dependable security for global information infrastructure while
protecting public safety and national security. She said that two key
issues were the need for harmonized export control policies and the
development compatible infrastructures, as it was clear that no widely
used encryption system or any successful national policy would be
possible without international cooperation. She also noted that while
governments must provide appropriate policy framework, the task of
building this infrastructure would lie with the private sector. She
said that through Ambassador Aaron's discussions, they had learned that
while most governments were behind the United States in development of
encryption policies, each shared the same concerns as the United States
in trying to strike the right balance.
Mr. Lewis' discussion focused on multilateral controls on encryption
exports. He began by noting that a number of countries controlled the
export of encryption, but that the task was to modernize encryption
export controls to reflect today's environment and agree to the
implementation of common policies. He added that most governments had
common concerns about role of encryption in society. He noted that the
U.S. objectives with respect to encryption policy were law enforcement
access, use of recoverable encryption, and promotion of electronic
commerce. He then explained the history and structure of Wassenaar
Arrangement and outlined the issues that the forum was considering with
respect to encryption, including moving to a positive control list,
consideration of the treatment of commercial encryption products given
widespread commercial use, treatment of software and intangible
technology (phone conversations, faxes, Internet transmissions),
decontrol levels, and transparency in reporting. He said that the
United States had raised encryption as an issue for discussion at the
last Wassenaar Arrangement plenary in December 1997 and asked countries
to adopt similar policies as the United States. He indicated that given
the scope of the issues under consideration, he was not sure that
resolution would happen anytime soon. He added that Ambassador Aaron's
group was finding that other countries were moving slowly in the U.S.
direction and had more sympathy for the U.S. position than it would
appear. There was a general discussion of the issue of mass market
encryption software, the treatment of intangible technology and the need
to develop a common approach on encryption.
Following the lunch break and the meeting of the non-public working
group sessions, Chairman Adorjan reconvened the Subcommittee at 3:00
p.m. He asked each group to give a report on its discussions and began
with Mr. Gant Redmon and the working group on technology. Mr. Redmon
began by noting that the issue of interoperability was a key part of the
group's discussion and said that building key recovery was not an
impossible project (with respect to stored data). He said that from a
technological standpoint, interoperability could cause a great deal of
difficulty in terms of those products that have key recovery and those
that do not. He also noted the strong domestic impact of export issues
and other pressures to create encryption products a certain way. With
respect to mass market software, he said that the working group
generally agreed that 56 bit encryption products were the de facto
standard.
Mr. Adorjan then turned to Ambassador Katz for a briefing on the
international working group discussion. Katz noted that the first task
they agreed to focus on was developing an understanding of the state of
current encryption policies, including foreign availability and policies
of other governments. He said that the working group would seek
briefings from government and the private sector and perhaps survey
suppliers and users. He indicated that the group had identified another
issue: whether export control policy is the most effective instrument
to meet broader objectives of law enforcement, national security, and
privacy. He finished by noting that the working group planned on
completing its information gathering prior to the September meeting and
would then work on policy recommendations.
Mr. Adorjan then turned to the Regulatory and Legislative working
group. Mr. Richard Barth began by noting that the working group had
considered the letter drafted by Mr. Baker and supported it with minor
edits. He added that they felt that the issue of raising the decontrol
level to 56 bit encryption products could be included as a second
point. He then noted that the group had agreed on a set of operating
principles for themselves and perhaps for the use of the entire
Subcommittee. These included the objective of balancing the interests
of law enforcement, privacy and national, seeking this balance via
market driven forces and, where necessary, taking a legislative
approach. He concluded with a request for a panel briefing on the
legislative environment and a briefing on the export control
requirements on encryption.
Adorjan agreed that briefings on three issues would be useful,
specifically briefings on the status of legislative issues, export
policies and administration, and international threat briefing by the
National Security Agency. With respect to these briefings, he would ask
the presenters to provide topical outlines in advance of the briefings.
Mr. Adorjan said he looked forward to the working groups developing a
defined scope of work by the next meeting, and suggested that they
interact by e-mail. He added that the working groups did not need to
get consensus, but that the long term objective was to formulate a set
of recommendations. Finally, he noted that he and Under Secretary
Reinsch would invite Secretary Daley to participate at the June 22
meeting. Mr. Adorjan asked if there were other issues to be discussed.
As there were none, he adjourned the session at 3:35 p.m.
From jmatk at tscm.com Sun Jun 7 23:49:35 1998
From: jmatk at tscm.com (James M. Atkinson, Comm-Eng)
Date: Sun, 7 Jun 1998 23:49:35 -0700 (PDT)
Subject: TSCM-L Technical Security List
Message-ID:
A non-text attachment was scrubbed...
Name: not available
Type: text/enriched
Size: 10579 bytes
Desc: not available
URL:
From hollyelliott at hotmail.com Mon Jun 8 00:00:34 1998
From: hollyelliott at hotmail.com (hollyelliott at hotmail.com)
Date: Mon, 8 Jun 1998 00:00:34 -0700 (PDT)
Subject: Take your business to the next level...
Message-ID: <198701171124.gbc hollyelliott@hotmail.com>
Direct E-mail is the future of your business over the Internet.
Reach millions of potential customers, imagine, just a 1% return.
We are the professionals of the e-mail Industry. We have been sending
e-mail for two years with no interruptions.
We will also help you with your subject line and letter. NO CHARGE.
We guarantee results. ( depending on what you are marketing )
CALL NOW limit openings 1-800-600-0343 ext.1256
From StanSqncrs at aol.com Mon Jun 8 01:45:20 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Mon, 8 Jun 1998 01:45:20 -0700 (PDT)
Subject: Amway and Brave Combo Evidence Update
Message-ID: <81aeaeca.357ba471@aol.com>
On that page I point to with the X-tian fish discussion, I linked the
"moderator nazi" with the right-wing because of his use of this symbol "&" to
replace the "And" in "Andy". I have come to learn, it's got 2 meanings. It
looks like the symbol for the "Know-nothing" movement is - "K & N". Of
course, to know the significance of that, you have to know something about the
"Know-nothing" movement. I think anyone that's ever observed many of the
lists around, will see some remarkable similarities. Check this out -
====
Know-nothing (1827) 1 a : IGNORAMUS b: AGNOSTIC 2 cap K & N : a member of a
19th century secret American political organization hostile to the political
influence of recent immigrants and Roman Catholics
Know-nothingism (1854) 1 cap K & N : the principles and policies of the Know-
Nothings 2 : the condition of knowing nothing or desiring to know nothing or
the conviction that nothing can be known with certainty esp. in religion or
morality 3 often cap K & N : a mid-twentieth century political attitude
characterized by anti=intellectualism, exaggerated patriotism, and fear of
foreign subversive influences
Merriam-Webster's Collegiate Dictionary, 10th edition
====
'Know-Nothing' Movement
U.S. political movement in the mid-19th cent. The increased immigration of the
1840s had resulted in concentrations of Roman Catholic immigrants in the
Eastern cities. The Democrats welcomed them, but local nativist societies were
formed to combat "foreign" influences and uphold the "American" view. The
American Republican party, formed (1843) in New York, spread to neighboring
states as the Native American party and became a national party in 1845. Many
secret orders sprang up, and when outsiders made inquiries of supposed
members, they were met with a statement that the person knew nothing; hence
members were called Know-Nothings. The Know-Nothings sought to elect only
native Americans to office and to require 25 years of residence for
citizenship. Allied with a faction of the WHIG PARTY, they almost captured New
York in the 1854 election and swept the polls in Massachusetts and Delaware.
In 1855 they adopted the name American party and dropped much of their
secrecy. The issue of slavery, however, split the party, and many antislavery
members joined the new REPUBLICAN PARTY. Millard FILLMORE, the American
party's presidential candidate in 1856, won only Maryland, and the party's
national strength was broken.
The Concise Columbia Encyclopedia is licensed from Columbia University Press.
Copyright � 1995 by Columbia University Press. All rights reserved.
====
Cypherpunks, these are the bastards that have control of congress. If you are
serious about freedom, you must go out and register to vote, and you must vote
the real punks (Christian Coalition types (the CC is simply a front for the
Know-nothing movement, and I'll bet you now believe me. ;-) )) out of power.
They are the bastards that are controlling speech (and thought, IMHO) on that
Camelogue list (the Humpheads). AND they were doing the same thing on that
Brave Combo list (The Bucketheads gang that I seem to have incapacitated.
Hey, can I say that I saved the Brave Combo? ;-) )
And the evidence is on Brave Combo cds. Not only the one that I'm on, but now
that I've gone in looking at it from this angle, I see they've been
documenting the invasion of the Bucketheads for 10 years.
It starts with Humansville with the cover showing a "the" 'beast', IMHO
raising it's ugly head out of the water. Also on that one, is a song called
"Move" which starts with a message that was left on Jeffrey Barnes answering
machine one night, that threatened him to turn down his music. There was no
music being played in his house that night. They were trying to tell him to
censor the Brave Combo. I haven't had a chance to search that album for other
stuff yet. Those were the obvious things.
The theme continues for the next 4 Brave Combo (only (they were doing
collabarations also during this period)) studio releases. Since yous guys are
Cypherpunks, I'm not gonna give you that many more clues (for right now, there
are some songs patterned after certain specific Bucketheads that you probably
won't get the connection, but if you think of various folk you've met on the
net, I'll bet you find some remarkable similarities in the
lyrics/titling/liner notes)
So, it continues on to the next ones (and in this order) -
Night On Earth
No No No-Cha Cha Cha
Polkas For A Gloomy World (BTW: Grammy nominated, lost (probably due to the
Know-nothings. Study this one's liner notes VERY carefully (and Mystery Spot
Polka lyrics for sure))
And up to the one I'm on - 'Group Dance Epidemic - Fun ...... and Functional!'
Those are all excellent cds, but if you don't want to spend the money, all of
the lyrics are on the Discography page (http://www.brave.com/bo/discography/)
at the official website (which the Bucketheads still seem to have some control
of. How do I know? Guess which lyrics they DON'T have there. The Jeffrey.
(and other reasons) I forced them to put the Mystery Spot Polka's lyrics up
there when I attempted to discuss it on the list (and I was censored.) They
had to try to show that it wasn't being censored.)
So, I'll post my interpretation of The Jeffrey because of that -
=====
The Jeffrey
(Barnes, Cripps, Finch, Hernandez - Wise Monkey Music)
(Jeffrey (spoken)) I am the master of my own universe
And I dance just as good as I want to
======
I am a genius because I want to be
====
I have created a dance in my own image
Look at me!
======
I have written a song and dance just like me, I expect all BRAVE Combo fans to
look for it's meaning! I'm not happy! (see insert photo of the Part 1 (The)
Jeffrey)
====
(backup) One, two, three, four
======
I want you to analyze my song and dance line-by-line.
====
Nothing ((backup) Nada)
======
I'm waiting. I've been waiting.
====
Amazing!
======
Wow! Someone came along and analyzed my song, and (pretty much) nailed it!
====
How can you tell the dancer from the dance.
======
That is what is revealed by careful analysis of my song - how YOU can know
about certain-type of people that "lurk (dictionary definition)" the Brave
Combo list
====
(girl) moans - Oh, Oh, Oh Oh Jeff, your dance is devine
====
I like your song, Jeff (SERIOUSLY! :-) (I really mean this, Combo fans! ;-)
))
======
Teach me to dance Jeffrey
====
I want to learn how to tell the difference between reality and perception of
reality
======
Move my body with your hands
====
Dazzle me with how simple it all is
======
How should I move my hips?
====
How can I learn how to do that?
======
(Jeffrey) Your hips will take care of themselves.
====
Jeffrey's answer - Join FreeGroup
(http://members.aol.com/whtsametau/FreeGroup.html) and/or Visit What's A Meta
U (http://members.aol.com/WhtsAMetaU/)
======
(backup (sung)) Your hips will take care of themselves
====
Hippies will take care of themselves
======
(Jeffrey) 'Hip'ssssssss
====
Hippies
======
Creator
====
Yes, he's the creator of his song and dance. The song describes a dance
created by man, the "Know-nothing" movement (otherwise known around here as
the "Chicken" Coalition). The dance is, well, I've already given you a hint
as to where that is, Cypherpunks!
======
Nowwwww.
Resume the active things!
====
Get off of your butts and stop being politically apathetic. NOW! Take these
guys out of power (they're preventing you from expressing yourself, and
they're trying with all their might to prevent Jeffrey (Carl, etc.) from
expressing himself)
======
(backup (sung)) Hips will take care of themselves
Hips
====
Hippies
======
I am the master of my own universe
And I dance just as good as I want to
====
I am a (UNDISPUTED) genius, because I used my own free will to decide to play
the 'United Snakes ... ' ;-) in the BRAVE Combo (he plays 2 saxaphones at the
same time. In harmony)
======
I have created a dance in my own image
====
My song and dance is just like me.
======
LOOK AT ME!
====
He's Mad! Only one Combo fan knowing the true meaning of his song and dance
is NOT good enough for a genius! Analyze his song and dance. He's waiting.
A review of recent history reveals that Brave Combo fans that truly 'get'
their music are HIGHLY rewarded.
(liner notes)
The band once discovered Jeffrey Barnes doing this dance all by himself in a
corner. He denies all responsibility, as his conscious mind was elsewhere at
the time.
Part I
All dancers get on dance floor
(with great enthusiasm)
1. Do nothing.
2. Stand with your arms folded across your chest.
3. Shift your weight from one leg to another
4. Exhibit all symptoms of extreme boredom.
When this becomes unbearable, move on to Part II.
======
Part I represents 'closed-mindedness'/censorship/Bucketheads
====
Part II
1. Put fist out with thumbs up.
2. Attach your thumbs to turntables in your mind.
3. Rotate your thumbs clockwise.
======
Check out the right
====
4. Rotate your thumbs counter-clockwise.
======
Check out the left
====
5. Your hips will want to wiggle, let them.
======
But Hippies will want to investigate things other than just left and right,
you better let them. :-)
====
When this becomes unbearable, return to Part I.
======
Part II represents "open-mindedness"/freedom/Stan
====
Repeat Part I and Part II until you wish to stop.
======
So you Bucketheads can do your 'dance' for as long as you want, but while
you're doing that, us Hippies will take care of ourselves.
Stan
============
Various lines in there refer to various posts that I posted during that so-
called "flame" war. If anyone wants to see a few of those, let me know.
"I want you to know", that compared to breaking the Buckethead gang, getting
on that cd meant very little to me, except, that it was designed as a tool for
me to use against the Know-nothings.
I think I'll go post that over on the Brave Combo list. 'Tis a shame that my
only audience, is the Bucketheads (and the Camelogue moderator nazi is lurking
(dictionary definition) the list.). The Bucketheads ran everyone who wouldn't
"drink" with them off.
Guess what, Cypherpunks. I'm betting that 95% of the music (probably other
forums as well (Republicans For All Americans is one I know about for sure))
lists (and websites) are in control of the "Know-nothings." We have got to
get those kooks out of power, or it will be too late.
It's VERY possible that your favorite musicians are trying to send secret
messages out to thier fans through their music/lyrics and cover art, personal
notes, etc., on this very same subject matter. Look for these clues to find
out if your favorite bands lists/websites have the same "pesky" problem. They
can't tell you outright because they got Know-nothing goons watching 'em.
"That's all we know."
Serious shit, Sherlock(s)!
Stan
From bill.stewart at pobox.com Sun Jun 7 12:59:22 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Mon, 8 Jun 1998 03:59:22 +0800
Subject: anonymous mailboxes
In-Reply-To: <19980604193606.27765.qmail@hotmail.com>
Message-ID: <3.0.5.32.19980607021342.008b1370@popd.ix.netcom.com>
>On Thu, 4 Jun 1998, Sprokkit Amhal wrote:
>> anonymous email boxes, whereby a user can receive email and even a
>> traffic analysis attacker is unable to glean information about who
>> received what when. I forget exactly what ve called vis method...
One way to do pseudonymous email boxes is to use a web-based
mailbox server such as hotmail and pick up the mail through
anonymizers or onion routers. Obviously you need SSL for the
anonymizer connections, and for the mailbox connection as well,
and the name of the mailbox needs to be in the encrypted portion
of the SSL requests rather than in the sniffable URL parts.
The main threat is eavesdroppers watching the anonymizers
over a period of time, picking up patterns that may not show
during a single mail pickup. So you need enough anonymizers out there,
or enough cover traffic on a smaller number of anonymizers,
but it should basically be doable.
It also helps if you can send mail to the mailer using the web,
with SSL and chains of anonymizers to do it, to protect the sender,
but anonymous remailers can also solve that problem.
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From billp at nmol.com Mon Jun 8 07:33:24 1998
From: billp at nmol.com (bill payne)
Date: Mon, 8 Jun 1998 07:33:24 -0700 (PDT)
Subject: Spiking keyboards, digital cash, appeals, shift registers
Message-ID: <357BF591.7D7@nmol.com>
Monday 6/8/98 7:53 AM
John Young
I am reading http://jya.com/sitesec.htm a bit more carefully.
You have NEVER WRITTEN SO MUCH.
Fishing was great.
I used a
$10 THE INSTANT CALLING CARD [TM]
VOCALL COMMUNICATIONS CORP
The World's Most advanced prepaid Calling Card
which allows access with a pin of 718-2455-7091-xxx [my SECRET]
in ENGLISH, SPANISH, ARABIC, URDU, KOREAN, JAPANESE, GERMAN,
FRENCH, ITALIAN to call you TWICE on Saturday. At only $.14/min.
I left one message about Xandi and spiking computer keyboards.
Xandi MADE low-power transmitters,
http://www.gernsback.com/HyperNews/get/forums/resource/226.html
like the kind I MIGHT use IF I were going to spike a keyboard [most
which use an 8051
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2]
so that the keystrokes would be broadcast.
This, of course, defeats crypto attempts to cipher keystrokes.
But I DO NOT DO, or have to do, ILLEGAL THINGS for the FBI or any other
government agency.
I, as a DOE contractor employee, was protected under 10 CFR 708.
http://av.yahoo.com/bin/query?p=10+cfr+708&hc=0&hs=0
But 10 CFR 708 does not appear to be working well in my case.
Therefore, we had to try other remedies.
VOCALL is getting real close to digital cash, one of Orlin Grabbe's
interests. http://www.aci.net/kalliste/dcguide.htm
I have to do mostly technical work on the digital FX this week but will
try to
get two notices of appeal to the Tenth circuit written.
http://jya.com/whp043098.htm
Morales and I, with all the publicity you and Orlin have given us, can
go all the way to the Supreme Court with our genocide and crypto
deficiency lawsuits. http://jya.com/whpfiles.htm
Pro se, of course.
Too bad NSA did not take my criticisms of its shift register work
more constructively. http://jya.com/da/whpda.htm, click on Appendix S
Perhaps NSA should have worked with some of us at Sandia to come-up
with fixes to overcome deficiencies. This unpleasantness could have been
avoided.
I�ve had ideas to improve shift register algorithm operation before.
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html
Let�s all hope for settlement of this UNFORTUNATE matter before it
gets worse.
Later
bill
From jya at pipeline.com Mon Jun 8 09:08:27 1998
From: jya at pipeline.com (John Young)
Date: Mon, 8 Jun 1998 09:08:27 -0700 (PDT)
Subject: Campaign Against Global War on Drugs
Message-ID: <199806081608.MAA00773@camel14.mindspring.com>
The New York Times today has a two-page ad:
"We believe the global war on drugs is now causing
more harm than drug abuse itself," with a letter to UN
Secretary General Annan signed by hundreds
from around the world, across the political spectrum.
Web site for list and invitation to sign:
http://www.lindesmith.org/news/un.html
Public Letter to Kofi Annan
June 1, 1998
Mr. Kofi Annan
Secretary General
United Nations
New York, New York
United States
Dear Secretary General,
On the occasion of the United Nations General Assembly Special
Session on Drugs in New York on June 8-10, 1998, we seek your
leadership in stimulating a frank and honest evaluation of global
drug control efforts.
We are all deeply concerned about the threat that drugs pose to
our children, our fellow citizens and our societies. There is no
choice but to work together, both within our countries and across
borders, to reduce the harms associated with drugs. The United
Nations has a legitimate and important role to play in this
regard
-- but only if it is willing to ask and address tough
questions about
the success or failure of its efforts.
We believe that the global war on drugs is now causing more
harm than drug abuse itself.
Every decade the United Nations adopts new international
conventions, focused largely on criminalization and punishment,
that restrict the ability of individual nations to devise
effective
solutions to local drug problems. Every year governments enact
more punitive and costly drug control measures. Every day
politicians endorse harsher new drug war strategies.
What is the result? U.N. agencies estimate the annual revenue
generated by the illegal drug industry at $400 billion, or the
equivalent of roughly eight per cent of total international
trade.
This industry has empowered organized criminals, corrupted
governments at all levels, eroded internal security, stimulated
violence, and distorted both economic markets and moral values.
These are the consequences not of drug use per se, but of
decades of failed and futile drug war policies.
In many parts of the world, drug war politics impede public
health
efforts to stem the spread of HIV, hepatitis and other infectious
diseases. Human rights are violated, environmental assaults
perpetrated and prisons inundated with hundreds of thousands of
drug law violators. Scarce resources better expended on health,
education and economic development are squandered on ever
more expensive interdiction efforts. Realistic proposals to
reduce
drug-related crime, disease and death are abandoned in favor of
rhetorical proposals to create drug-free societies.
Persisting in our current policies will only result in more drug
abuse, more empowerment of drug markets and criminals, and
more disease and suffering. Too often those who call for open
debate, rigorous analysis of current policies, and serious
consideration of alternatives are accused of "surrendering." But
the true surrender is when fear and inertia combine to shut off
debate, suppress critical analysis, and dismiss all
alternatives to
current policies. Mr. Secretary General, we appeal to you to
initiate a truly open and honest dialogue regarding the future of
global drug control policies - one in which fear, prejudice and
punitive prohibitions yield to common sense, science, public
health and human rights.
----------
There are a gang of heads of state gathering at the UN, with
cavalcades of limosines and guards racing around Manhattan
to indifference, except for me, the only one jumping hurray at the
sirens, whirling lights and bristling vans. All the SS guys facing
backwards finger shot my middle digit aimed at them, then a
sniper behind me put a red dot on it, scaring me shitless, I ran
home.
From jya at pipeline.com Mon Jun 8 11:50:42 1998
From: jya at pipeline.com (John Young)
Date: Mon, 8 Jun 1998 11:50:42 -0700 (PDT)
Subject: Update of Risks of Key Recovery Report
Message-ID: <199806081850.OAA09458@camel14.mindspring.com>
http://www.cdt.org/crypto/risks98
The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption 1998
Hal Abelson
Ross Anderson
Steven M. Bellovin
Josh Benaloh
Matt Blaze
Whitfield Diffie
John Gilmore
Peter G. Neumann
Ronald L. Rivest
Jeffrey I. Schiller
Bruce Schneier
Final Report -- 27 May 1997
Updated -- June 8, 1998
----------
Introduction and CDT's press release:
http://jya.com/risks98.htm
From hedges at infonex.com Mon Jun 8 14:56:39 1998
From: hedges at infonex.com (Mark Hedges)
Date: Mon, 8 Jun 1998 14:56:39 -0700 (PDT)
Subject: Campaign Against Global War on Drugs
In-Reply-To: <199806081608.MAA00773@camel14.mindspring.com>
Message-ID:
And Marijuana remains California's number one cash crop as long as it is
illegal... documented way back when by Dukmejian's (sp) agriculture
secretary, whom he fired after the report. The cops cite you, confiscate it
and smoke it, and everyone's happy because they're all making $480 per
ounce from the end consumer on this crazy gene-engineered greenbud
designed, catalogued, and bred by the University of California biology
departments (esp. Santa Cruz). If it were legal, tobacco shops would stock
joints for a tenth the price... they need new markets with the stricter
tobacco legislation; maybe there's a lobby. I watched Dennis Peron battle
it out with some meat-fisted guy from the Sherrifs' orgs in Congress. The
cop went on about how
"if we decriminalize marijuana, marijuana would no longer be illegal"
and attempted to justify its classification with crack, methamphetamines
and heroin. He and Peron were two extremes. Peron, who drove the medical
marijuana bill and is also gay, runs under the republican ticket. So, I
voted for him in the open primary to screw up their statist ics. I had fun
with that open primary.
--mark--
-hedges-
>The New York Times today has a two-page ad:
>
>"We believe the global war on drugs is now causing
>more harm than drug abuse itself," with a letter to UN
>Secretary General Annan signed by hundreds
>from around the world, across the political spectrum.
>Web site for list and invitation to sign:
>
> http://www.lindesmith.org/news/un.html
>
>Public Letter to Kofi Annan
>
> June 1, 1998
>
> Mr. Kofi Annan
> Secretary General
> United Nations
> New York, New York
> United States
>
> Dear Secretary General,
>
> On the occasion of the United Nations General Assembly Special
> Session on Drugs in New York on June 8-10, 1998, we seek your
> leadership in stimulating a frank and honest evaluation of global
> drug control efforts.
From StanSqncrs at aol.com Mon Jun 8 16:01:42 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Mon, 8 Jun 1998 16:01:42 -0700 (PDT)
Subject: Campaign Against Global War on Drugs
Message-ID:
In a message dated 6/8/98 5:34:38 PM Central Daylight Time, hedges at infonex.com
writes:
<< And Marijuana remains California's number one cash crop as long as it is
illegal... documented way back when by Dukmejian's (sp) agriculture
secretary, whom he fired after the report. The cops cite you, confiscate it
and smoke it, and everyone's happy because they're all making $480 per
ounce from the end consumer on this crazy gene-engineered greenbud
designed, catalogued, and bred by the University of California biology
departments (esp. Santa Cruz). If it were legal, tobacco shops would stock
joints for a tenth the price... they need new markets with the stricter
tobacco legislation; maybe there's a lobby. I watched Dennis Peron battle
it out with some meat-fisted guy from the Sherrifs' orgs in Congress. The
cop went on about how
"if we decriminalize marijuana, marijuana would no longer be illegal" >>
It's illegal because of 1 reason. The "Know-nothings" have control of the
illegal market. It's how they invade the bands. They create a dry spell, and
then they come around offering free/cheap smoke, gain the trust of the band,
and then they say - 'Say, could I create a little official webpage for you?
You need to be on the net anyway (the big lie). I'll take care of it all for
you.'
Stan
From user at ybecker.ribbetnet.cc Mon Jun 8 16:14:09 1998
From: user at ybecker.ribbetnet.cc (user at ybecker.ribbetnet.cc)
Date: Mon, 8 Jun 1998 16:14:09 -0700 (PDT)
Subject: Talk to me.
Message-ID:
Dear Friend;
Whether it is a soft talking Country Gal or a hard talking
Dominatrix....
At "Exotic Whispers" we strive to satisfy everyone....
We have the largest & sexiest selection of Models, Dancers,
Housewives, & Single Women.
Call 011-592-565-093
Call now and let our receptionist connect you with a WOMAN
or WOMEN of your choice.
For Adults ONLY.
The SERVICE IS FREE......JUST YOUR LD CHARGES.
Talk To ME Live.............I Aim To Please!!!!!!!!!
Call 011-592-565-093
From user at e-bizness.com Tue Jun 9 01:50:04 1998
From: user at e-bizness.com (user at e-bizness.com)
Date: Tue, 9 Jun 1998 01:50:04 -0700 (PDT)
Subject: BULK EMAIL SERVER IS UP!
Message-ID: <93904039291232@hsd_hypothesis.com>
ATTENTION ONLINE ENTRAPRENEUR!
OUR BULK EMAIL SERVERS ARE UP!
YOU CAN BE SENDING BULK EMAIL TO THOUSANDS OF POTENTIAL CUSTOMERS
WITH OUR SMTP RELAY CONNECTION!
OUR NETWORK STRIPS OUT YOUR IP ADDRESS SO YOUR LOCAL ISP WILL
NEVER EVER KNOW!
BULLETPROOF WEBHOSTING AND POP ACCT
AVAILABLE AT $245.00 MONTHLY + $150 SETUP
SMTP IS AVAILABLE AT $245.00 MONTHLY + SETUP
OR GET THE COMPLETE PACKAGE OF POP3 EMAIL, SMTP, AND BULLETPROOF
WEBHOSTING FOR ONLY $395.00 + 300.00 SETUP
TAKE ACTION!
CALL NOW!
ACCOUNTS ARE AVAILABLE IMMEDIATELY!
PLEASE CALL 1-905-714-7510 FOR MORE INFO!
WEB MARKETING NETWORK
From cuceke80 at sprintmail.com Tue Jun 9 06:50:32 1998
From: cuceke80 at sprintmail.com (IRA & 401K APPROVED! REPLACE YOUR CD'S!)
Date: Tue, 9 Jun 1998 06:50:32 -0700 (PDT)
Subject: GET 1% to 6% PER MONTH! Forget the Bank!!!!!!!!
Message-ID: <19980609193YAA41826@post.ibm.net>
GET YOUR MONEY OUT OF THE BANK OR LOW INTEREST INVESTMENTS AND INTO OUR HIGH INTEREST INVESTMENT!
Funds are totally liquid. You can make deposits or withdrawls from your account. You get a monthly statement. Our average return over the last five years is 58%. Our worst year was 43%. Our best year was 102%. You pay no commissions, no fees and it's at no cost to you to open an account. This is IRA approved and 401K approved. To have information mailed call 954-421-2376. All
responses will be confidential, and will not be sold or passed on to others. I have no clients who have lost any of their principal.
From billp at nmol.com Tue Jun 9 12:41:35 1998
From: billp at nmol.com (bill payne)
Date: Tue, 9 Jun 1998 12:41:35 -0700 (PDT)
Subject: NOTICE OF APPEALs
Message-ID: <357D8F35.536A@nmol.com>
Tuesday 6/9/98 1:10 PM
Lawyers
Morales and I met for lunch today to discuss legal strategies.
Morales is scheduled for a court hearing on Thursday. Therefore,
it is time to increase the pressure.
These cases are not going away.
A fellow from Washington DC visited me some months ago.
The fellow told me that LOTS of people fighting with the IRS are
watching this pro se lawsuit seen at http://www.jya.com/whp052898.htm.
Reason I was told is that the IRS is using lawyers to go after
taxpayers.
Taxpayers NOW feel that either they have to pay what the IRS DEMANDS OR
get a lawyer to fight the IRS.
Hiring a lawyer is usually uneconomical. And an ineffective way to
fight the US
government.
Readers of jya.com want to learn how to do pro se lawsuits EFFECTIVELY.
Morales and I are, of course, showing how to do pro se lawsuits
effectively
and inexpensively.
Morales and I are experienced at WINNING appeals at the Tenth Circuit.
http://jya.com/whp-10usca.htm
But we have yet to address the problem of Tenth Circuits awarding the
win to Sandia
when, in fact, Sandia lost on the common technicality of not filing its
Brief of the Appellees on time.
Sandia did not request an enlargement of time in both our cases. In my
case Sandia falsified the certificate of service.
Tenth Circuit rules forbid stamping FILED on late briefs where
permission to
file late is not requested at least five days prior to the deadline
date.
We will be getting around to filing criminal complaint affidavits on the
judges and clerks
involved. At the right time, of course.
But the time has come for Morales and I to file attached NOTICE OF
APPEALs.
We really should settle these unfortunate cases before matters get
WORSE.
Later
bill
UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF NEW MEXICO
William H. Payne )
Arthur R. Morales )
)
Plaintiffs, )
)
v ) CIV NO 97 0266
) SC/DJS
)
Lieutenant General Kenneth A. Minihan, USAF )
Director, National Security Agency )
National Security Agency )
)
Defendant )
NOTICE OF APPEAL Santiago E. Campos MEMORANDUM OPINION AND ORDER FILED 98 APR 30
AM 11:45
1 COMES NOW plaintiffs Payne and Morales [Plaintiffs] to exercise their rights under the
Federal Rules of Appellate Procedure http://www.ca5.uscourts.gov/docs/frap-iop.htm
FRAP 4. APPEAL AS OF RIGHT--WHEN TAKEN http://www.ca5.uscourts.gov/docs/frap-iop.htm#4
a) Appeal in a Civil Case.
(1) Except as provided in paragraph (a)(4) of this Rule, in a civil case in which an appeal is permitted by law
as of right from a district court to a court of appeals the notice of appeal required by Rule 3 must be filed with
the clerk of the district court within 30 days after the date of entry of the judgment or order appealed from;
but if the United States or an officer or agency thereof is a party, the notice of appeal may be filed by any
party within 60 days after such entry. If a notice of appeal is mistakenly filed in the court of appeals, the clerk
of the court of appeals shall note thereon the date when the clerk received the notice and send it to the clerk
of the district court and the notice will be treated as filed in the district court on the date so noted.
2 Defendant Minihan is officer of the United States.
3 Plaintiff�s appeal
A NOW, THEREFORE, IT IS ORDERED that sua sponte, Defendant is DEEMED by the Court to be the
NSA, and not Lt. Gen. Kenneth A. Minihan. Future captions for this case should reflect this change.
B IT IS FURTHER ORDERED that Defendant's Motion to Dismiss Plaintiff Morales is GRANTED.
C IT IS FURTHER ORDERED that Plaintiff's Motion for Summary Judgment Based on Evidence from
Admissions is DENIED as MOOT.
seen at http://jya.com/whp043098.htm to the Tenth Circuit Court of Appeals.
Respectfully submitted,
William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
Arthur R. Morales
1024 Los Arboles NW
Albuquerque, NM 87107
Pro se litigants
CERTIFICATE OF SERVICE
I HEREBY CERTIFY that a copy of the foregoing memorandum
was mailed to Lieutenant General Kenneth A. Minihan, USAF,
Director, National Security Agency, National Security Agency,
9800 Savage Road, Fort George G. Meade, MD 20755-6000
and hand delivered to Jan E Mitchell, Assistant US Attorney,
9 Floor, Bank of America Building, 4th and Tijeras, ABQ, NM 87102
this Wednesday June 10, 1998.
2
UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF NEW MEXICO
William H. Payne )
)
Plaintiff, )
)
v ) CIV NO 97 0266
) SC/DJS
)
National Security Agency )
)
Defendant )
NOTICE OF APPEAL from Santiago E. Campos MEMORANDUM OPINION AND ORDER FILED
May 21, 1988 11:35
1 COMES NOW plaintiff Payne [Plaintiff] to exercise his rights under the
Federal Rules of Appellate Procedure http://www.ca5.uscourts.gov/docs/frap-iop.htm
FRAP 4. APPEAL AS OF RIGHT--WHEN TAKEN http://www.ca5.uscourts.gov/docs/frap-iop.htm#4
a) Appeal in a Civil Case.
(1) Except as provided in paragraph (a)(4) of this Rule, in a civil case in which an appeal is permitted by law
as of right from a district court to a court of appeals the notice of appeal required by Rule 3 must be filed with
the clerk of the district court within 30 days after the date of entry of the judgment or order appealed from;
but if the United States or an officer or agency thereof is a party, the notice of appeal may be filed by any
party within 60 days after such entry. If a notice of appeal is mistakenly filed in the court of appeals, the clerk
of the court of appeals shall note thereon the date when the clerk received the notice and send it to the clerk
of the district court and the notice will be treated as filed in the district court on the date so noted.
2 Defendant NSA is an agency of the United States.
3 Plaintiff appeals
NOW, THEREFORE, IT IS ORDERED that Plaintiff's Motion to Amend should be, and is hereby, DENIED.
seen at http://jya.com/whp052198.htm to the Tenth Circuit Court of Appeals.
Respectfully submitted,
William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
Pro se litigant
CERTIFICATE OF SERVICE
I HEREBY CERTIFY that a copy of the foregoing memorandum
was mailed to Lieutenant General Kenneth A. Minihan, USAF,
Director, National Security Agency, National Security Agency,
9800 Savage Road, Fort George G. Meade, MD 20755-6000
and hand delivered to Jan E Mitchell, Assistant US Attorney,
9 Floor, Bank of America Building, 4th and Tijeras, ABQ, NM 87102
this Wednesday June 10, 1998.
2
From hello at asianet.co.th Tue Jun 9 13:58:58 1998
From: hello at asianet.co.th (hello at asianet.co.th)
Date: Tue, 9 Jun 1998 13:58:58 -0700 (PDT)
Subject: This is fun!!!
Message-ID: <3.0.5.32.19980610010242.007cf180@classic.asianet.co.th>
Hi,
Would you like to send someone a letter from Bangkok ?
Well, you can! Put the letter to be remailed in a
larger envelope with U.S.$3 cash and I will post it
from Bangkok bearing a Bangkok postmark to any country
in the world. If you want the letter to be registered
then enclose U.S.$4 cash. I will pay the postage from
the enclosed fee. The letter must be lightweight air-
mail only containing not more than 2 sheets of writing
paper. Here's the address...
Snailer
P.O. Box 3,
Bang Or, 10704,
Bangkok, Thailand.
...
Please register your mail to me.
A must for secret lovers.
Great for practical jokes and pranksters.
Inform your boss what you think about his ideas.
Tell your ex-wife/husband you're living in Bangkok.
Go on, give it a try it's great fun.
You can put as many envelopes in the larger one
as you like but you must enclose the fee for
each remailed item. The 10th one goes free!
Mail to be remailed is sent the same day I
receive it unless you specify a date for it to be
remailed.
No rcords kept and you are completely anonymous
to me so don't put your name and address on any
of the envelopes.
Have fun!!!
***********
From manager at musicblvd.com Tue Jun 9 15:57:34 1998
From: manager at musicblvd.com (http://MusicBLVD.com/)
Date: Tue, 9 Jun 1998 15:57:34 -0700 (PDT)
Subject: MUSIC BOULEVARD'S SUMMER BLOWOUT SALE!
Message-ID: <3.0.32.19980609153459.0079d430@207.67.22.140>
Music Boulevard is having a Summer Blowout Sale in celebration of our new
look! You'll find everything at the lowest prices of the year. As a
special bonus, shipping is FREE when you buy three items or more when
shipped within the U.S.
Come explore the new and enhanced version of Music Boulevard. It�s faster
than ever, easier to find the music you love, and now even more convenient
to make a purchase.
Take this opportunity to buy all of those items that never seem to go on
sale anywhere...ever! Every CD, Cassette, Video, T-shirt, LP, and Import is
now available at a reduced price.
Remember,
This sale will last for only a limited time, so visit Music Boulevard right
away to take advantage of our low prices and great selection. You�ll love
the new Music Boulevard.
http://www.musicblvd.com/cgi-bin/tw/2161_0_main.txt
TO UNSUBSCRIBE: To unsubscribe from this mailing list, send an email to:
remove-musicblvd at sparklist.com and you will be automatically removed from
this list.
From billp at nmol.com Tue Jun 9 16:00:35 1998
From: billp at nmol.com (bill payne)
Date: Tue, 9 Jun 1998 16:00:35 -0700 (PDT)
Subject: FILED 98 JUN-9 PM 3:13
Message-ID: <357DBE05.6960@nmol.com>
Tuesday 6/9/98 4:29 PM
John Young
J Orlin Grabbe
Attached is
FILED
UNITED STATES DISTRICT COURT
DISTRICT OF NEW MEXICO
98 JUN-9 PM 3:13
Robert M. March
Clerk, ALBUQUERQUE
NOTICE OF APPEAL.
Morales will sign and I will file our joint appeal tomorrow.
Morales showed me an e-mail he received from Gilmore
http://www.cygnus.com/~gnu/.
Gilmore apparently is not interested in pursuing a joint NSA fee waiver
lawsuit.
The public CAN UNDERSTAND a federal agency squandering their tax
dollars on a project which did not work out for the government. Public
key chips.
Likewise, the public can understand how the government killed Iranians.
http://jya.com/whpfiles.htm
I conducted a survey on NON-TECHNICAL people to see if they understood
what the government did to Iran. Everyone I talked to understood.
Trying to get much subtler with crypto with the public or even judges
might not work.
Judges or the public might give the government the benefit of the doubt
on the NATIONAL SECURITY/SECRECY issue.
We will see about this.
National Security Agency Court Cases May 27, 1998
http://www.jya.com/nsa-cases.htm
Later
bill
UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF NEW MEXICO
William H. Payne )
)
Plaintiff, )
)
v ) CIV NO 97 0266
) SC/DJS
)
National Security Agency )
)
Defendant )
NOTICE OF APPEAL from Santiago E. Campos MEMORANDUM OPINION AND ORDER FILED
May 21, 1988 11:35
1 COMES NOW plaintiff Payne [Plaintiff] to exercise his rights under the
Federal Rules of Appellate Procedure http://www.ca5.uscourts.gov/docs/frap-iop.htm
FRAP 4. APPEAL AS OF RIGHT--WHEN TAKEN http://www.ca5.uscourts.gov/docs/frap-iop.htm#4
a) Appeal in a Civil Case.
(1) Except as provided in paragraph (a)(4) of this Rule, in a civil case in which an appeal is permitted by law
as of right from a district court to a court of appeals the notice of appeal required by Rule 3 must be filed with
the clerk of the district court within 30 days after the date of entry of the judgment or order appealed from;
but if the United States or an officer or agency thereof is a party, the notice of appeal may be filed by any
party within 60 days after such entry. If a notice of appeal is mistakenly filed in the court of appeals, the clerk
of the court of appeals shall note thereon the date when the clerk received the notice and send it to the clerk
of the district court and the notice will be treated as filed in the district court on the date so noted.
2 Defendant NSA is an agency of the United States.
3 Plaintiff appeals
NOW, THEREFORE, IT IS ORDERED that Plaintiff's Motion to Amend should be, and is hereby, DENIED.
seen at http://jya.com/whp052198.htm to the Tenth Circuit Court of Appeals.
Respectfully submitted,
William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
Pro se litigant
CERTIFICATE OF SERVICE
I HEREBY CERTIFY that a copy of the foregoing memorandum
was mailed to Lieutenant General Kenneth A. Minihan, USAF,
Director, National Security Agency, National Security Agency,
9800 Savage Road, Fort George G. Meade, MD 20755-6000
and hand delivered to Jan E Mitchell, Assistant US Attorney,
9 Floor, Bank of America Building, 4th and Tijeras, ABQ, NM 87102
this Tuesday June 9, 1998.
2
From 2ancesca9 at net.kitel.co.kr Tue Jun 9 16:36:43 1998
From: 2ancesca9 at net.kitel.co.kr (2ancesca9 at net.kitel.co.kr)
Date: Tue, 9 Jun 1998 16:36:43 -0700 (PDT)
Subject: hi you
Message-ID: <199806092552RAA52171@abcd456.5.26.7>
!!!!! YES YOUR XXXX PASSWORD AWAITS YOU !!!!!!
> To get your password...
Just:
Click Here
................
..................//
From paul at cryptography.com Tue Jun 9 17:57:15 1998
From: paul at cryptography.com (Paul Kocher)
Date: Tue, 9 Jun 1998 17:57:15 -0700 (PDT)
Subject: Differential Power Analysis
Message-ID: <199806100055.RAA07091@proxy3.ba.best.com>
Information is now available online about three related attacks we
have developed at Cryptography Research: Simple Power Analysis,
Differential Power Analysis, and High-Order Differential Power
Analysis.
The basic idea of the attacks is that the power consumption of a
device (such as a smartcard) is statistically correlated to the
operations it performs. By monitoring the power usage (or
electromagnetic radiation, etc.) during cryptographic operations, it
is possible to obtain information correlated to the keys. The
collected data is then analyzed to actually find the keys. The three
attacks use increasingly sophisticated analysis methods.
We have implemented the attack against a large number of smartcards,
and have found all to be vulnerable. At this point, we do not
believe that any smartcards on the market are immune to these
analysis techniques.
There is now an initial summary on Differential Power Analysis on our
web page at http://www.cryptography.com/dpa, and more information
will be put on the website as it becomes available. A condensed text
version is attached below. At this point, it's fine to talk about
this with anyone and to forward this message.
Anything you can do to keep discussion of this technically accurate
would be much appreciated.
Regards,
Paul Kocher
---------------------------------------------------------------------
Introduction: Power Variation
Integrated circuits are built out of individual transistors, which
act as voltage-controlled switches. Current flows across the
transistor substrate when charge is applied to (or removed from) the
gate. This current then delivers charge to the gates of other
transistors, interconnect wires, and other circuit loads. The motion
of electric charge consumes power and produces electromagnetic
radiation, both of which are externally detectable.
Therefore, individual transistors produce externally observable
electrical behavior. Because microprocessor logic units exhibit
regular transistor switching patterns, it is possible to easily
identify macro-characteristics (such as microprocessor activity) by
the simple monitoring of power consumption. DPA type attacks perform
more sophisticated interpretations of this data.
Simple Power Analysis (SPA)
In SPA attacks, an attacker directly observes a system's power
consumption. The amount of power consumed varies depending on the
microprocessor instruction performed. Large features such as DES
rounds, RSA operations, etc. may be identified, since the operations
performed by the microprocessor vary significantly during different
parts of these operations. At higher magnification, individual
instructions can be differentiated. SPA analysis can, for example, be
used to break RSA implementations by revealing differences between
multiplication and squaring operations. Similarly, many DES
implementations have visible differences within permutations and
shifts (e.g., the PC1 permutation or rotates of the C and D
registers), and can thus be broken using SPA. While Cryptography
Research found many smartcards to be vulnerable to SPA analysis, it
is not particularly difficult to build SPA-resistant devices.
The figure above [see web site] shows SPA monitoring from a single
DES operation performed by a typical smartcard. The upper trace shows
the entire encryption operation, including the initial permutation,
the 16 DES rounds, and the final permutation. The lower trace is a
detailed view of the second and third rounds.
Differential Power Analysis (DPA)
DPA is a much more powerful attack than SPA, and is much more
difficult to prevent. While SPA attacks use primarily visual
inspection to identify relevant power fluctuations, DPA attacks use
statistical analysis and error correction techniques to extract
information correlated to secret keys.
Implementation of a DPA attack involves two phases: Data collection
and data analysis. Data collection for DPA may be performed as
described previously by sampling a device's power consumption during
cryptographic operations as a function of time. For DPA, a number of
cryptographic operations using the target key are observed.
The following steps provide an example of a DPA attack process for
technical readers. (More detailed information will follow in the near
future.) The following explanation presumes a detailed knowledge of
the DES algorithm.
1. Make power consumption measurements of the last few rounds of
1000 DES operations. Each sample set consists of 100000 data
points. The data collected can be represented as a two-
dimensional array S[0...999][0...99999], where the first index
is the operation number and the second index is the sample. For
this example, the attacker is also assumed to have the
encrypted ciphertexts, C[0...999].
2. The attacker next chooses a key-dependent selection function D.
In this case, the selection function would have the form
D(Ki,C), where Ki is some key information and C is a
ciphertext. For the example, the attacker's goal will be to
find the 6 bits of the DES key that are provided as the input
to the DES S box 4, so Ki is a 6-bit input. The result of
D(Ki,C) would be obtained by performing the DES initial
permutation (IP) on C to obtain R and L, performing the E
expansion on R, extracting the 6-bit input to S4, XORing with
Ki, and using the XOR result as the input to the standard DES
S4 lookup operation. A target bit (for example, the most
significant bit) of the S result is selected. The P permutation
is applied to the bit. The result of the D(Ki,C) function is
set to 0 if the single-bit P permutation result and the
corresponding bit in L are equal, and otherwise D(Ki,C) yields
1.
3. A differential average trace T[0...63][0...99999] is
constructed from the data set S using the results of the
function D. In particular: [See web site for formula]
4. The attacker knows that there is one correct value for Ki;
other values are incorrect. The attack goal is to identify the
correct value. In the trace T[i][0...99999] where i=Ki,
D(i,C[k]) for any k will equal the value of the target bit in L
of the DES operation before the DES F function result was
XORed. When the target device performed the DES operations,
this bit value was stored in registers, manipulated in logic
units, etc. -- yielding detectable power consumption
differences. Thus, for the portions of the trace T[i=Ki] where
that bit was present and/or manipulated, the sample set T[i]
will show power consumption biases. However, for samples T[i !=
Ki], the value of D(i,C[k]) will not correspond to any
operation actually computed by the target device. As a result,
the trace T[i] will not be correlated to anything actually
performed, and will average to zero. (Actually, T[i != Ki] will
show small fluctuations due to noise and error that is not
statistically filtered out, and due to biases resulting from
statistical properties of the S tables. However, the largest
biases will correspond to the correct value of Ki.)
5. The steps above are then repeated for the remaining S boxes to
find the 48 key bits for the last round. The attack can then be
repeated to find the previous round's subkey (or the remaining
8 bits can be found using a quick search.)
While the effects of a single transistor switching would be normally
be impossible to identify from direct observations of a device's
power consumption, the statistical operations used in DPA are able to
reliably identify extraordinarily small differences in power
consumption.
The figure below [see web site] is a DPA trace from a typical
smartcard, showing the power consumption differences from selecting
one input bit to a DES encryption function used as a random number
generator. (The function of D was chosen to equal the value of
plaintext bit 5.) The input initial permutation places this bit as
part of the R register, affecting the first-round F function
computation and results. Round 2 effects (due to the use of counter
mode) are also strong. The trace was produced using 1000
measurements, although the signals would be discernable with far
fewer.
High-Order Differential Power Analysis (HO-DPA)
While the DPA techniques described above analyze information across a
single event between samples, high-order DPA may be used to correlate
information between multiple cryptographic suboperations. Naive
attempts to address DPA attacks can introduce or miss vulnerabilities
to HO-DPA attacks.
In a high-order DPA attack, signals collected from multiple sources,
signals collected using different measuring techniques, and signals
with different temporal offsets are combined during application of
DPA techniques. Additionally, more general differential functions (D)
may be applied. More advanced signal processing functions may also be
applied. The basic HO-DPA processing function is thus a more general
form of the of the standard DPA function, for example: [see web
site for formula]
Today HO-DPA are primarily of interest to system implementers and
researchers, since no actual systems are known that are vulnerable to
HO-DPA that are not also vulnerable to DPA. However, DPA
countermeasures must also address HO-DPA attacks to be effective.
Solving the Problems
Cryptography Research has undertaken a substantial development effort
to understand hardware security issues and their countermeasures.
Cryptography Research has pending patents directed to the
technologies and techniques below.
DPA and related attacks span the traditional engineering levels of
abstraction. While many previously-known cryptanalytic attacks (such
as brute force) can be analyzed by studying cryptographic algorithms,
DPA vulnerabilities result from transistor and circuit electrical
behaviors which propagate to expose logic gates, microprocessor
operation, and software implementations. This ultimately compromises
the cryptography.
Techniques for addressing DPA and related attacks can be incorporated
at a variety of levels:
Transistor: No feasible alternatives to semiconductors are available
today, but alternate computation technologies (such as pure optical
computing) may exist in the future. Cryptography Research has
developed gate-level logic designs that leak substantially less
information.
Circuit, Logic, Microprocessor, and Software: In physically large
systems, well-filtered power supplies and physical shielding can make
attacks infeasible. For systems with physical or cost constraints,
Cryptography Research has developed hardware and software techniques
that include ways of reducing the amount of information leaked,
introducing noise into measurements, decorrelating internal variables
from secret parameters, and temporally decorrelating cryptographic
operations. In applications where attackers do not have physical
possession of the device performing cryptographic operations, such
techniques can be effective. However, because externally-monitorable
characteristics remain fundamentally correlated to cryptographic
operations, we do not recommend these approaches as a complete
solution for applications where attackers might gain physical
possession of devices.
Software and Algorithms: The most effective solution is to design and
implementing cryptosystems with the assumption that information will
leak. Cryptography Research has developed approaches for securing
existing cryptographic algorithms (including RSA, DES, DSA, Diffie-
Hellman, ElGamal, and Elliptic Curve systems) to make systems remain
secure even though the underlying circuits may leak information. In
cases where the physical hardware leaks excessively, the leak
reduction and masking techniques are also required.
_____________________________________________________________________
Paul Kocher President, Cryptography Research
Tel: 415-397-0123 (FAX: -0127) 870 Market St., Suite 1088
E-mail: paul at cryptography.com San Francisco, CA 94102
_____________________________________________________________________
Paul Kocher President, Cryptography Research
Tel: 415-397-0123 (FAX: -0127) 870 Market St., Suite 1088
E-mail: paul at cryptography.com San Francisco, CA 94102
From gwb at gwb.com.au Tue Jun 9 19:38:49 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Tue, 9 Jun 1998 19:38:49 -0700 (PDT)
Subject: Media lies exposed
Message-ID: <1.5.4.32.19980610022819.00b397f4@mail.pronet.net.au>
G'day One Nation supporters in NSW
Channel 9 has embarked on a blatant campaign of misinformation against One
Nation over the last two weeks.
The timing in the lead up to the Queensland State election and the resulting
impact on voters cannot be ignored by ANY Australian who believes in freedom
of speech and the democracy that we hold so dear.
Ray Martin exposed:
http://www.gwb.com.au/un.html
60 Minutes discredited:
http://www.gwb.com.au/60.html
Below is a copy of an article that appeared in Perth's Sunday times recently.
GWB
Scott Balson
Judge says no to black state
by Joe Poprzeonzy
A former Chief Justice of the Australian High Court has urged that any
claims by activists for the creation of a separate Aboriginal nation or
independent black states be rejected.
Sir Harry Gibbs said Arnhein Land, parts of central Australia,, north west
WA, islands in the Torres Strait or off northern Australia would be targeted
for Aboriginal independence.
In a keynote address yesterday at a Perth meeting of the influential
conservative group, the Samuel Griffith Society, he said separate laws were
emerging in Australia to cover black and white Australians.
"There is no doubt that any claims by the Aborigional peoples to determine
their own political status, and to assert a right to sovereignty or
independence, must be rejected as contrary to the interests of Australia as
a whole," Sir Harry said.
"Just as any attempt to put the Aboriginal peoples outside the Australian
nation must be firmly opposed, so should any attempt to grant statehood, or
any degree of autonomy to any particular group or Aboriginal people.
"It would obviously be impracticable... to grant sovereign or dominant power
to the Aboriginal people in areas such as country towns in which persons
entirely of European descent were as numerous as the descendants of the
Aboriginal people, many of whom would themselves have had European ancestors.
"Experience elsewhere has shown that associations of States, Federal or
otherwise, do not endure when one state is composed of persons distinctly
different in race, religion or culture from those of another.
"The future existence of Australia would be put at risk if statehood or any
form of autonomy were granted to small communities chosen on the grounds of
race in areas of great strategic importance to this country."
Sir Harry who was Chief Justice of Australia between 1981 and 1987 said some
people were arguing that there was a right of self-determination within
countries. He said groups were working within the UN for the development of
such doctrines.
From hugh at toad.com Wed Jun 10 02:48:05 1998
From: hugh at toad.com (Hugh Daniel)
Date: Wed, 10 Jun 1998 02:48:05 -0700 (PDT)
Subject: CYPHERPUNKS INVADE BERKELEY! June 98 Physical Meeting Announcement
Message-ID: <199806100948.CAA04922@toad.com>
June's meeting will be at Soda Hall in Berkeley, near Hearst&LeRoy.
There's a map at http://www.berkeley.edu/campus_map/maps/ABCD345.html
Ian has reserved the 4th floor lounge and the adjacent patio in Soda
Hall on
the UC Berkeley campus for the June 13 meeting. There's power,
whiteboard,
and Metricom coverage in the room. If there are computer demos
needed, we
can go down the hall to my office.
The biggest problem will be parking; Ian is having the staff here look
in to
that, but he may need to know _in advance_ who's going to need parking
permits. Otherwise, you'll have to pop out every so often to feed the
meter.
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From net138 at mail.domain-serv.com Wed Jun 10 03:31:13 1998
From: net138 at mail.domain-serv.com (net138 at mail.domain-serv.com)
Date: Wed, 10 Jun 1998 03:31:13 -0700 (PDT)
Subject: Don't Risk Losing That Great Domain Name!
Message-ID: <199806100952.CAA05729@outlook.domain-serv.com>
*********************************************************************
Don't Risk Losing That Great Domain Name For
Your Personal Or Business Use.
*********************************************************************
Register your Domain Name for a one time fee of $35.00.
Planet Net's Domain Registration Services will not only
register your domain name, but for no monthly charge,
allow you to use the Planet Net Name Service. When you
are ready to post your web site or use your domain for
mail, The decision is up to you; select another website
hosting company or Host with Planet Net. We'll even
waive the set-up fees. Also available are packages with
custom "under construction" pages and mail services allowing
you to use your new domain for e-mail.
Planet Net, the Internet's premier webmasters resource,
offers high performance Website Hosting and Dedicated
Servers. Lightning fast 30 MB virtual web hosting packages
starting at $19.99/Month. Reseller packages with domain hosting
as low as $10 /month All packages include bundles of free
webmaster tools.
Sign-up before June 30, 1998 and receive up to 3 Free months
of web site hosting.
If you would like to check the availability of your domain name or
learn more about Planet Net type the following address in your web browser.
http://www.serveramerica.com
See You On The Net!!
From StanSqncrs at aol.com Wed Jun 10 03:54:22 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Wed, 10 Jun 1998 03:54:22 -0700 (PDT)
Subject: Moderator Nazi Update!
Message-ID: <537518a2.357e659f@aol.com>
Cypherpunks, I may've found a 3rd picture of my "Moderator Nazi".
I have it posted here with the others at -
http://members.aol.com/WhtsAMetaU/ofir.html
I'd like expert opinion from the Cypherpunks (and any FBI agents that may
happen to be lurking the list :-), actually, ESPECIALLY any FBI agents that
may be working the list ;-) ) as to whether you think it's the same person.
Look at it as if he's losing weight over the years.
Write me in private if you wish, and thanks in advance!
Stan
From 2ncesca9 at net.kitel.co.kr Wed Jun 10 09:51:16 1998
From: 2ncesca9 at net.kitel.co.kr (2ncesca9 at net.kitel.co.kr)
Date: Wed, 10 Jun 1998 09:51:16 -0700 (PDT)
Subject: hello hello !!
Message-ID: <199806102819IAA55011@abcd456.246.250.46>
!!!!! YES YOUR XXXX PASSWORD AWAITS YOU !!!!!!
> To get your password...
Just:
Click Here
................
..................//
From billp at nmol.com Wed Jun 10 13:54:36 1998
From: billp at nmol.com (bill payne)
Date: Wed, 10 Jun 1998 13:54:36 -0700 (PDT)
Subject: Second Notice of Appeal FILED
Message-ID: <357EF1F0.6569@nmol.com>
Wednesday 6/10/98 2:34 PM
John Young
The second attached NOTICE OF APPEAL was stamped
FILED
UNITED STATES DISTRICT COURT
DISTRICT OF NEW MEXICO
98 JUN 10 AM 9:52
Robert M. March
Clerk, ALBUQUERQUE
I put stamped copies of both in the mail to you.
The government only MAYBE understands FORMAL actions.
Informal actions, like letters etc, go into the waste paper basket.
Even formal actions such as the FOIA, PA, lawsuit, and criminal
complaint
affidavit the government will try to BLACK HOLE.
While, naturally, we would like to settle this unfortunate matter so
that we
can all get on to more constructive pursuits, it appears that we will be
doing
a FORMAL ACTION at least TWICE through the Tenth Circuit court of
appeals.
Later
bill
UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF NEW MEXICO
William H. Payne )
Arthur R. Morales )
)
Plaintiffs, )
)
v ) CIV NO 97 0266
) SC/DJS
)
Lieutenant General Kenneth A. Minihan, USAF )
Director, National Security Agency )
National Security Agency )
)
Defendant )
NOTICE OF APPEAL Santiago E. Campos MEMORANDUM OPINION AND ORDER FILED 98 APR 30
AM 11:45
1 COMES NOW plaintiffs Payne and Morales [Plaintiffs] to exercise their rights under the
Federal Rules of Appellate Procedure http://www.ca5.uscourts.gov/docs/frap-iop.htm
FRAP 4. APPEAL AS OF RIGHT--WHEN TAKEN http://www.ca5.uscourts.gov/docs/frap-iop.htm#4
a) Appeal in a Civil Case.
(1) Except as provided in paragraph (a)(4) of this Rule, in a civil case in which an appeal is permitted by law
as of right from a district court to a court of appeals the notice of appeal required by Rule 3 must be filed with
the clerk of the district court within 30 days after the date of entry of the judgment or order appealed from;
but if the United States or an officer or agency thereof is a party, the notice of appeal may be filed by any
party within 60 days after such entry. If a notice of appeal is mistakenly filed in the court of appeals, the clerk
of the court of appeals shall note thereon the date when the clerk received the notice and send it to the clerk
of the district court and the notice will be treated as filed in the district court on the date so noted.
2 Defendant Minihan is officer of the United States.
3 Plaintiffs appeal
A NOW, THEREFORE, IT IS ORDERED that sua sponte, Defendant is DEEMED by the Court to be the
NSA, and not Lt. Gen. Kenneth A. Minihan. Future captions for this case should reflect this change.
B IT IS FURTHER ORDERED that Defendant's Motion to Dismiss Plaintiff Morales is GRANTED.
C IT IS FURTHER ORDERED that Plaintiff's Motion for Summary Judgment Based on Evidence from
Admissions is DENIED as MOOT.
seen at http://jya.com/whp043098.htm to the Tenth Circuit Court of Appeals.
Respectfully submitted,
William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
Arthur R. Morales
1024 Los Arboles NW
Albuquerque, NM 87107
Pro se litigants
CERTIFICATE OF SERVICE
I HEREBY CERTIFY that a copy of the foregoing memorandum
was mailed to Lieutenant General Kenneth A. Minihan, USAF,
Director, National Security Agency, National Security Agency,
9800 Savage Road, Fort George G. Meade, MD 20755-6000
and hand delivered to Jan E Mitchell, Assistant US Attorney,
9 Floor, Bank of America Building, 3rd and Tijeras, ABQ, NM 87102
this Wednesday June 10, 1998.
2
From nobody at REPLAY.COM Wed Jun 10 14:00:48 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 10 Jun 1998 14:00:48 -0700 (PDT)
Subject: backdoor trojan in ICKill
Message-ID: <199806102100.XAA27780@basement.replay.com>
----Forwarded text--------------------------------------------------
Subject: backdoor trojan in ICKill
Date: Sun, 7 Jun 1998 19:44:28 -0400
From: Bachrach
To: BUGTRAQ at NETSPACE.ORG
First off, I'm not 100% sure if this is the apropriate forum for
this
since it's not really a weakness, but rather a programmer who is putting
backdoors
into some programs. Then again technically that's an exploits... Oh I
don't know. If this is the wrong place then I apologize profusely for
the
waste of bandwidth and plead ignorance, but here goes:
Well, chances are none of you guys have ever used this program, or
even
heard of it, but there are alot (35,000) of people who have. I
originally
downloaded it becasue I've been researching a lot of the weaknesses in
the
ICQ protocol, (which has become easier as time has gone on. :)) Anyway,
after
you run it, (ICKill), it creates a file in the directory called 1.exe
that
acts as a
fake explorer. 1.exe accesses your regedit database, and copies itself
to
windows/system. It changes the regedit so that the fake one will run on
startup. It acts mostly the same as the normal explorer with one very
crucial execption. It contacts a host (I still can't figure out which
one),
and executes the commands that are embedded within a text file on the
computer. Anyone see it yet? Backdoor city. I contacted the author (who
left
his e-mail address in the readme), and he's the one who explained th
backdoor thing. He also told me a few other things that made me write up
to
this group.
He said that he had gotten almost 35,000 different people's systems
calling up his computer at one point; essentuially he has backdoors to
35,000 systems accross the globe. When I asked him why he would go
through
all the trouble to do this he gave me two reasons:
1. IF (and he emphasized the if) he was a hacker he could use a couple
of
other people's computers as hops when hacking into a system. Kind of
nasty
for the sysadmin trying to trace a breaking huh?
2. To quote him "And the backdoors can auto-uptade themselves.. so
Imagine I
can code a virus like backdoor... Whoaaa! This will be like THAT
internet
worm.."
3. He also said "Imagine also.. 35,000 backdoored (yeah, I reached this
number)
connections pinging or SYN flooding some server.."
Well if anyone out there is using or has ever used ICKill then get rid
of
it. I have actually set up a page on this to both inform people and
explain
how to get rid of all traces of the program that I currently am able to
at
http://members.tripod.com/~hakz/ICQ/index.html That site also has all of
the
letters I wrote to him and he wrote to me if you want to see the entire
things. It's also got some other info I couldn't fit into this message,
including all of the mistakes the author made (guess he needed better
beta
testing). My
last question is this: if one person has backdoors into thousands of
computer systems, doesn't that pose some sort of risk to the interent
community as a whole? There's one person who's been saying that I should
notify the FBI about this. As you can see decided to start here first.
From zooko at xs4all.nl Wed Jun 10 15:23:36 1998
From: zooko at xs4all.nl (Zane Lewkowicz)
Date: Wed, 10 Jun 1998 15:23:36 -0700 (PDT)
Subject: [SPAM] No really. It _is_ spam. It's spam, i tell you. You've been warned!
Message-ID: <199806102223.AAA20590@xs2.xs4all.nl>
From: incognito at incognito.com
Date: Thu, 11 Jun 1998
To: (Recipient list suppressed)
Subject: This is fun!!!
Hi,
Would you like to send someone a letter from Bangkok?
Well, you can! Put the letter to be remailed in a
larger envelope with US$3 cash and I will post it from
Bangkok bearing a Bangkok postmark to any country in
the world. If you want the letter to go registered then
enclose US$4 cash. I will pay the postage from the
enclosed fee. The letter must be lightweight air-mail
only containing not more than 2 sheets of writing paper.
Here's the address...
Incognito
P.O. Box 3,
10704, Bang Orr,
Bangkok, Thailand.
...
Please register your mail to me.
- --------------------------------
A must for secret lovers.
Great for practical jokes and pranksters.
Inform your boss what you think about her/his ideas.
Tell your ex-wife/husband you're living in Bangkok.
Go on, give it a try it's great fun.
You can put as many envelopes in the larger one
as you like but you must enclose the fee for
each remailed item. The 10th letter goes free!
Here's another way...
1. Send US$10 cash and I'll send you three picture
postcards of various places in Thailand. I send
them to you and you write them out and post back
to me for remailing.
Or...
2. Enclose a slip of paper with the US$10 giving
details of names and addresses and messages to
go on the three postcards.
Mail to be remailed is sent the same day it is
received unless you specify a date for it to be
remailed.
No records kept and you are completely unknown
to me so don't put your name and address on any
of the envelopes.
Please send a copy of this email to your friends.
Have fun!!!
***********
------- End of Forwarded Message
From StanSqncrs at aol.com Wed Jun 10 23:53:31 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Wed, 10 Jun 1998 23:53:31 -0700 (PDT)
Subject: Nobody Report
Message-ID: <3b5db7e4.357f7ec6@aol.com>
So 'Nobody' (Tim May) has joined FreeGroup. Of course, shortly after that he
revealed himself (in multiple fuckups) and he tried to cause a big ruckus, but
that's no big deal. Actually, the alias that he joined the group under seems
to be pretty nice guy (when he's not abusing the addressing. ;-) )
So, all's well that ends well, or is it, Tim? [BIG GRIN!]
Stan,
FreeGroup - "Just Say It!"
http://members.aol.com/WhtsAMetaU/FreeGroup.html
From properties at hotmail.com Thu Jun 11 06:01:58 1998
From: properties at hotmail.com (properties at hotmail.com)
Date: Thu, 11 Jun 1998 06:01:58 -0700 (PDT)
Subject: BUSINESS OPPORTUNITY
Message-ID: <306724452//JHGREW101>
IF YOU ARE NOT MAKING IN THE HIGH (6) FIGURES, REPLY WITH YOUR FAX NUMBER . OFFSHORE TRUST HIRING AGENTS TO MARKET GUARNTEED HIGH INTEREST TO THE CLIENT AND AGENTS.
WE HAVE AGENTS MAKING IN EXCESS $1,000,000.00 PER YEAR NOT WORKING
FULL TIME. YOU CAN HIRE OTHER AGENTS ALONE AND EARN IN THE (6)
FIGURES BY JUST RECEIVING THE 4% OVERRIDE ON THE RECRUITED AGENTS
BUSINESS. YOU ARE 100% PROTECTED BY HAVING THE RECRUITED AGENT
SIGN THE APPLICATION AND YOU ALSO SIGN IT WITH HIM AS THE RECRUITER
AND YOU AS THE RECRUITER SEND IN THE APPLICATION .ANY ONE OUTSIDE
OF THE USA PLEASE SEND ALONG WITH YOUR FAX NUMBER, YOUR COUNTRY
CODE. THANKS
From E.J.Koops at kub.nl Thu Jun 11 08:22:48 1998
From: E.J.Koops at kub.nl (Bert-Jaap Koops)
Date: Thu, 11 Jun 1998 08:22:48 -0700 (PDT)
Subject: Crypto Law Survey updated
Message-ID: <920DAEE2DA7@frw3.kub.nl>
I have just updated my survey of existing and envisaged cryptography
laws and regulations. See the Crypto Law Survey at
http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm
This update includes:
-update on Wassenaar (to be revised), EU (proposal for new
dual-use regulation; Copenhagen hearing; ETSI rejects RH;
law-enforcement policy paper), Birma (domestic regulation),
Brazil (no regulation plans), Germany (no regulation before
elections), Kazakhstan (domestic controls), Malaysia (CA's must
decrypt during search), Pakistan (regulation on sale and use),
Spain (export), Sweden (export), US (Karn; Junger; new version
Kerrey-McCain; Gore letter)
- URLs added to EU (conditional access
regulation), US (BXA Annual Report; Junger page)
I have also started a mailing list to announce updates, to
which you can subscribe by sending a message to
with subject "subscribe CLS-update".
Kind regards,
Bert-Jaap
---------------------------------------------------------------------
Bert-Jaap Koops tel +31 13 466 8101
Center for Law, Administration and facs +31 13 466 8149
Informatization, Tilburg University e-mail E.J.Koops at kub.nl
--------------------------------------------------
Postbus 90153 | This world's just mad enough to have been made |
5000 LE Tilburg | by the Being his beings into being prayed. |
The Netherlands | (Howard Nemerov) |
---------------------------------------------------------------------
http://cwis.kub.nl/~frw/people/koops/bertjaap.htm
---------------------------------------------------------------------
From gnu at toad.com Thu Jun 11 12:16:50 1998
From: gnu at toad.com (John Gilmore)
Date: Thu, 11 Jun 1998 12:16:50 -0700 (PDT)
Subject: President's Export Council Subcommittee on Encryption: June 22
Message-ID: <199806111916.MAA25195@toad.com>
[It might be interesting for DC-area cypherpunks to visit and see
what they're doing. This council was appointed to advise the
Commerce Dept and the President about export of encryption. --gnu]
President's Export Council Subcommittee on Encryption Meeting
June 22, 1998
Ronald Reagan Building, 1300 Pennsylvania Ave. NW, Washington DC
Conference Room Hemisphere A
Agenda
9.00 Opening Remarks
Chair of the Subcommittee
Public Comments
9.30 BXA Updates
William Reinsch
10.00 Legislative Panel Briefing
unpublished as to who will be doing the briefing
11.00 Closed Session
4.00 Open to public Rm 4832
Commerce Department Briefing by each of the 3 Working
Groups on the topic
4.45 End
From jya at pipeline.com Thu Jun 11 12:33:27 1998
From: jya at pipeline.com (John Young)
Date: Thu, 11 Jun 1998 12:33:27 -0700 (PDT)
Subject: AF Docs on Comsec and Intel
Message-ID: <199806111933.PAA05189@dewdrop2.mindspring.com>
The USAF offers hundreds of documents at its Electronic
Publications site:
http://afpubs.hq.af.mil/elec-products/pubs-pages/
We've mirrored listings for dozens of docs in two categories:
Communications and Information:
http://www.jya.com/af-33-pubs.htm
Intelligence:
http://www.jya.com/af-14-pubs.htm
And, in case there's difficulty accessing, we've mirrored:
"Instruction on the Operation of the STU-III":
http://www.jya.com/33020900.pdf (534K PDF)
"Cryptographic Access":
http://www.jya.com/33021000.pdf (129K PDF)
"Emission Security":
http://www.jya.com/33020300.pdf (296K PDF)
"Controlled Access Program":
http://www.jya.com/33022900.pdf (170K PDF)
"Sources of Intelligence":
http://www.jya.com/af-intel.htm
From nicholas at doitnow.com Thu Jun 11 20:22:38 1998
From: nicholas at doitnow.com (rocker)
Date: Thu, 11 Jun 1998 20:22:38 -0700 (PDT)
Subject: Masterkey
Message-ID: <000901bd95b1$143660e0$0c2bd3cf@nick>
Hello,
�
��� I have been trying
for the last 3 months trying to get a copy of masterkey. I read an artical you
put on eff.org about masterkey, and how you used it. I was wondering if you
could tell me were to go and get masterkey or if you could send it to me vie
E-MAIL or just what.
�
�������������������������������������������
W/B
�������������������������������������������
Rocker
From bill.stewart at pobox.com Thu Jun 11 21:28:56 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Thu, 11 Jun 1998 21:28:56 -0700 (PDT)
Subject: FWD: backdoor trojan in ICKill
In-Reply-To: <199806102100.XAA27780@basement.replay.com>
Message-ID: <3.0.5.32.19980611174656.008163d0@popd.ix.netcom.com>
At 11:00 PM 6/10/98 +0200, a remailer user forwarded
a message From: Bachrach
about a major security backdoor in ICKill, a utility that
apparently augments or hangs around ICQ - it's a little-documented
feature designed into the system rather than a bug or unexpected behaviour.
More information is at
> http://members.tripod.com/~hakz/ICQ/index.html
...
>My last question is this: if one person has backdoors into thousands of
>computer systems, doesn't that pose some sort of risk to the interent
>community as a whole? There's one person who's been saying that I should
>notify the FBI about this. As you can see decided to start here first.
Don't tell the FBI - they'll just want to use it themselves. :-!
Is there some way to locate and reach ICKill users directly?
Do they show up on ICQ in some useful manner?
(I don't use either of the products....) Directly notifying them
could help the problem, or at least generate a number of
emails to the author who put the feature in there.
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From DarkKnight at Elitehackers.org Thu Jun 11 23:04:32 1998
From: DarkKnight at Elitehackers.org (Dark Knight)
Date: Thu, 11 Jun 1998 23:04:32 -0700 (PDT)
Subject: FWD: backdoor trojan in ICKill
In-Reply-To: <3.0.5.32.19980611174656.008163d0@popd.ix.netcom.com>
Message-ID:
> At 11:00 PM 6/10/98 +0200, a remailer user forwarded
> a message From: Bachrach
> about a major security backdoor in ICKill, a utility that
> apparently augments or hangs around ICQ - it's a little-documented
> feature designed into the system rather than a bug or unexpected behaviour.
> More information is at
> > http://members.tripod.com/~hakz/ICQ/index.html
> ....
> >My last question is this: if one person has backdoors into thousands of
> >computer systems, doesn't that pose some sort of risk to the interent
> >community as a whole? There's one person who's been saying that I should
> >notify the FBI about this. As you can see decided to start here first.
>
> Don't tell the FBI - they'll just want to use it themselves. :-!
>
> Is there some way to locate and reach ICKill users directly?
> Do they show up on ICQ in some useful manner?
> (I don't use either of the products....) Directly notifying them
> could help the problem, or at least generate a number of
> emails to the author who put the feature in there.
Well the way I see it the author of ICKill told the company that puts out
ICQ that you have this problem and you need to fix it.. The way he's
looking at it is fix this because it's a problem. They did not fix it
after his requests to have them fix this so he shared it. I don't think
he did anything wrong in this case. Any way like the FBI could figure out
how to use it I don't give them that much credit as it is.
|)ark |(night
DEFINITION.
Windows 95: n. 32 bit extensions and a graphical shell for a
16 bit patch to an 8 bit operating system originally coded for
a 4 bit microprocessor, written by a 2 bit company, that can't
stand 1 bit of competition.
Http://www.EliteHackers.org/DarkKnight
From gwb at gwb.com.au Fri Jun 12 00:15:58 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Fri, 12 Jun 1998 00:15:58 -0700 (PDT)
Subject: Live coverage of Qld State Elections
Message-ID: <1.5.4.32.19980612070530.00a09700@mail.pronet.net.au>
Dear One Nation supporter in NSW,
I am delighted to inform you that One Nation now has its own domain.
Check out:
http://www.onenation.com.au
To follow the Qld State election live tomorrow night take the Qld State
Election link and then the "LIVE" coverage link.
Shortcut:
http://www.gwb.com.au/onenation/qldstate/june13
The new IRC details will be put up tomorrow night.
Look forward to catching up with you on-line....
GWB
Scott Balson
From lists at mailbuggy.com Fri Jun 12 04:50:58 1998
From: lists at mailbuggy.com (lists at mailbuggy.com)
Date: Fri, 12 Jun 1998 04:50:58 -0700 (PDT)
Subject: 1,500,000 EMAIL ADDRESSES - $15 !!! ALL FRESH!
Message-ID: <989.283923.142588 lists@mailbuggy.com>
HERE IT IS!! The earnings pontential you have been looking for! We will
provide you with 1.5 MILLION EMAIL ADDRESSES FOR ONLY $15. These are all
fresh addresses with no duplications. They are all sorted and ready to be
mailed. This is the best deal anywhere today for email lists! Imagine
selling a product for only $10 and getting only a 1/100 response. That's
$150,000!!! Money making plans, reports, lists, jewelry, art, etc. Whatever
you wish to sell! People are making millions of dollars right now by doing
the same thing! That is why you get so much email from people selling you
their product....it works! These 1.5 Million email addresses are yours to
keep, so you can use them over and over and they come on disk or by
email....your choice.
If you do not have a program capable of sending bulk email please note it on
your order form and we will show you where you can download one for free. We
will also show you how you can avoid using your ISP's smtp mail server for
mailing by using software that turns your personal computer into your very
own personal mail server!
Simply print out this completed order form and send it to us along with your
check or money order made payable to: F.T.W.I. for only $15. We also accept
Visa and Mastercard.
Send addresses via (circle one):
EMAIL MAIL (add $3 for shipping and handling)
Name: _____________________________
Street Address: ________________________City: _______________
State: ________________Zip:_____________
Phone number:__________________________
Email:_______________________________
Returned checks are subject to $25 NSF Fee
Fill in the following if you are paying with a credit card:
Circle one: VISA MASTERCARD
Name as it appears on the card: __________________________
Card number: ______________________________
Expiration Date: ___/___
Signature: ____________________________
Send your order and payment to:
F.T.W.I.
4019 Goldfinch, Ste. J
San Diego, CA 92103
From tsandwich at hotmail.com Fri Jun 12 07:06:39 1998
From: tsandwich at hotmail.com (The Sandwich)
Date: Fri, 12 Jun 1998 07:06:39 -0700 (PDT)
Subject: Newbie PGP question
Message-ID: <19980612140606.2770.qmail@hotmail.com>
I have a file encrypted with PGP version 2.6.2. Is there a way to view
ALL the (public) keys that were used to encrypt the message...
therefore showing which of Private keys can be used to
decrypt it?
______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com
From whgiii at invweb.net Fri Jun 12 07:26:26 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Fri, 12 Jun 1998 07:26:26 -0700 (PDT)
Subject: Newbie PGP question
In-Reply-To: <19980612140606.2770.qmail@hotmail.com>
Message-ID: <199806121431.JAA074.07@geiger.com>
-----BEGIN PGP SIGNED MESSAGE-----
In <19980612140606.2770.qmail at hotmail.com>, on 06/12/98
at 07:06 AM, "The Sandwich" said:
>I have a file encrypted with PGP version 2.6.2. Is there a way to view
>ALL the (public) keys that were used to encrypt the message...
>therefore showing which of Private keys can be used to decrypt it?
If you have PGP 2.6.x and you run PGP from the commandline:
c:> pgp.exe
If no keys are available in the secring.pgp file to decrypt the message
then PGP will display all the keys the file is encrypted with.
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
Tag-O-Matic: How do you make Windows faster? Throw it harder!
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNYE7v49Co1n+aLhhAQFABAQAkIxiYhrfC9XmkyQ9Z+2zCdljFTmPwLKT
G4LieJdW8SbBDxn45A5bPLTdrCR7PmRguOFi54u+PouR3BEfT1319j7LltJmNjRX
7CFyGjjiQFoLDg4c0w2B0A6zxGRFahUKWdekAcxgY/4emmfPoINEuZ2voEb6uIsb
a6bRRj+7qdE=
=P/8j
-----END PGP SIGNATURE-----
From listmaster at extensis.com Fri Jun 12 09:33:05 1998
From: listmaster at extensis.com (listmaster at extensis.com)
Date: Fri, 12 Jun 1998 09:33:05 -0700 (PDT)
Subject: Extensis Mask Pro--Now with FREE PhotoAnimator
Message-ID:
Extensis Mask Pro-The Best-Selling Masking Plug-in for Adobe Photoshop
http://products.extensis.com/maskpro_P/
If you think professional-quality Masking is a complex, time-consuming process�
Think again. Think Mask Pro.
SPECIAL OFFER: Order Mask Pro for $299.95 and get PhotoAnimator FREE! (a $99 value)
Mask Pro is the award-winning Photoshop plug-in that slashes the
time it takes to create high-quality masks-with results that
satisfy even the most demanding professional. Just ask MacUser:
"Mask Pro is lightning fast, easy to learn, and must be ranked
among the year's top plug-ins". But you be the judge.
The Advantage? Color matching.
Mask Pro's innovative color matching technology lets you decide
which colors you want to keep and which ones you don't. Mask Pro
does the rest. Using a color eyedropper, simply select which colors
to keep and which ones to drop. Then use Mask Pro's Magic Brush to
wipe away the unwanted colors. The Magic Brush removes the drop
colors you selected, leaving a perfect mask-every time. You have
complete control.
Select color thresholds, edge softness, brush sizes, and more.
With the zoom, pan and navigator window controls, you can easily
move around in any image. And, with the unlimited undo/redo, you
are free to experiment as much as you like.
The precision and speed of Extensis Mask Pro cuts masking projects
down to size.
To order, get information, or download a FREE demo, Please visit:
http://products.extensis.com/maskpro_P/
SPECIAL OFFER: Order Mask Pro for $299.95 and get PhotoAnimator FREE! (a $99 value)
Mask Pro is available for both Mac and Windows and is 100% compatible
with Photoshop 3.05, 4.0 & 5.0.
To order by phone: 1-800-796-9798
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PS. We have made every effort to ensure this message is being sent
only to people who have expressed interest in Extensis products.
If we have sent this to you in error, please accept our apologies
and reply with REMOVE in the subject line for automatic exclusion
from future communications. If you know someone who would like to
be on our mailing list have them send an email to
listmaster at extensis.com with ADD in the subject line and their
email address in the body.
From arcinc at usaor.net Fri Jun 12 10:24:02 1998
From: arcinc at usaor.net (ARC Staffing)
Date: Fri, 12 Jun 1998 10:24:02 -0700 (PDT)
Subject: Position
Message-ID: <3581646C.D2569F4A@usaor.net>
Sorry to intrude on everyone, but I'm looking to fill a position in the
Northern Virginia area. I'm looking for a secure messaging engineer,
dealing heavily in S/MIME and/or PGP. It is a very llucrative spot for
the person with the right qualifications. If anyone could help me, I
would appreciate it.
Nate Stanton
ARC Staffing
412-422-1159
arcinc at usaor.net
P.S. If this is out of line, let me know, and I'll apolizgize profusely.
From nobody at privacy.nb.ca Fri Jun 12 15:00:08 1998
From: nobody at privacy.nb.ca (Joseph 'Anonymous' Howe)
Date: Fri, 12 Jun 1998 15:00:08 -0700 (PDT)
Subject: Position
In-Reply-To: <3581646C.D2569F4A@usaor.net>
Message-ID: <2c9eb8084c133e9e90937dfe2b72d83e@privacy.nb.ca>
On Fri, 12 Jun 1998 13:25:00 -0400 ARC Staffing wrote:
>Sorry to intrude on everyone, but I'm looking to fill a position in the
>Northern Virginia area. I'm looking for a secure messaging engineer,
>dealing heavily in S/MIME...
Isn't that a double negative? Hee, hee!
-+DiGiTaL+-
From mscompia at microsoft.com Fri Jun 12 15:53:05 1998
From: mscompia at microsoft.com (mscompia at microsoft.com)
Date: Fri, 12 Jun 1998 15:53:05 -0700 (PDT)
Subject: Information From The Microsoft Personal Information Center
Message-ID: <0be172752220c68UPIMSSMTPSYS08@msn.com>
Here is your password you requested from the Microsoft Personal Information Center at http://register.microsoft.com/regwiz/personalinfo.asp.
Password: writecode
If you continue to have access problems or want to report other issues, please contact us through the Write Us button at the top of any Microsoft page.
From tonya at e-web2.net Fri Jun 12 23:18:17 1998
From: tonya at e-web2.net (tonya at e-web2.net)
Date: Fri, 12 Jun 1998 23:18:17 -0700 (PDT)
Subject: Your Adult Website Password
Message-ID: <199806130618.XAA15554@toad.com>
This message is for adults 21+ only.
If you are not 21+ or do not wish to
view adult images please delete this message.
==============================================================
Looking For Live Hidden Camera Video?
Looking For 23 Live Girl Feeds?
Looking For A Site That Won't Charge you To Chat With the Ladies?
Looking For A Site That Won't Break the Bank?
http://www.e-web2.net/tonya/
Love Tonya
================================================================
From nycfood at prontomail.com Sat Jun 13 04:14:50 1998
From: nycfood at prontomail.com (nycfood at prontomail.com)
Date: Sat, 13 Jun 1998 04:14:50 -0700 (PDT)
Subject: Free Gourmet Food
Message-ID: <199806131114.EAA11496@toad.com>
THE MOST DELICIOUS FOOD ON THE INTERNET IS AT
NEW YORK CITY GOURMET FOOD
Your name may be selected to receive a free gourmet food
gift. Just visit, http://www.usaserve.net/nycfoods, and
make a complete entry into the Guest Book. Please write
JUNE GIFTS in the comment box and, if your name is one of
three selected your gift will arrive by express messenger.
Make a purchase during your and visit you may also receive,
just in time for the outdoor season, a copy of one of
America's best Barbeque cook books, LICENSE TO GRILL.
Please write JUNE GIFTS in the comment box of your order.
http://www.usaserve.net/nycfoods is offering free gourmet
food gifts each month but, you must sign the Guest Book
on or after the first day of each month to be eligible.
To be deleted from the mail list, please respond with
remove in the subject line and press the reply button.
From maxinux at bigfoot.com Fri Jun 12 16:21:44 1998
From: maxinux at bigfoot.com (Max Inux)
Date: Sat, 13 Jun 1998 07:21:44 +0800
Subject: FBI Case Files on the Web (fwd)
Message-ID:
Well, here is some more information about FOIA
FBI Files being put on the web, check out the story at
http://www.seattletimes.com/news/nation-world/html98/file_061298.html
Then go check out the files they've got on the web so far if you're interested
(alphabetical index) ...
http://www.fbi.gov/foipa/alpha.htm
-- Max Inux (MaxInux at bigfoot.com) UIN: 207447, http://khercs.dyn.ml.org
Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59
Or Kinky sex makes the world go round- Christie: Your in my sig too
^^ If Cryptography is outlawed, only outlaws will have cryptography ^^
From derok at caryys.com Sat Jun 13 13:56:24 1998
From: derok at caryys.com (derok at caryys.com)
Date: Sat, 13 Jun 1998 13:56:24 -0700 (PDT)
Subject: mach 101111
Message-ID: <0a0b21151200d68UPIMSRGSMTP05@msn.com>
ALL YOU DO IS ADVERTISE THIS 800 NUMBER! THAT'S ALL!!
$100 goes to you for EVERY sale that the company closes!
Does the idea of making at least $1,000 per week beginning your 2nd
week of doing business excite you?
How about never having to sell a thing to your customer and never
having to talk to ANYONE to make money? I don't know how this could
get any easier.
EVERY aspect of selling or talking to someone is DONE COMPLETELY by the
company!
The number one home based business for the 2nd year in a row, Fortune
5000 is a member of the Better Business Bureau and the U.S. Chamber of
Commerce.
WHAT THIS BUSINESS WILL DO FOR YOU:
* Handles all your calls, closes your sales, and sends you WEEKLY commission checks!
* It pays you a $100 commission (that's over 50% of the total sale)
for EVERY sale. CHECKS put $$$ in your pocket in less than your
first week or two... Quick commission earnings build and maintain
motivation.
ALL YOU DO IS ADVERTISE the toll-free number and your ID number.
* You can get STARTED TODAY. Just advertise the business toll-free
number with your ID # and let this business CLOSE YOUR SALES every
day...They do all the work and YOU GET PAID FOR IT!
* You may advertise any way you choose: Bulk E-Mail, Flyers,
Classifieds, Postcards, etc. Suppose you use bulk E-Mail, as I am:
100,000 E-Mails with a 1/10th of a percent (0.1%) sales rate at $100
per sale nets $10,000... not too bad.
There is nothing else out there that will provide you with an immediate
income beginning THIS WEEK with minimal effort.
Before you call, I want you to think about the quality of the live
operators handling your call. I am convinced you will not find
a better team of closers for your own personal sales. You will
clearly understand what I am talking about once you call.
PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!!
1-800-811-2141
You will be asked for ID #55107 when you call.
(Live operators are available from 8 AM-10 PM CST Monday through
Saturday and will be able to answer any questions you may have.)
Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949,
888-446-6951 or 888-731-3457 (all toll free).
To be removed, please press reply and type "Remove"
From lawyer at XUDI.aol.com Sat Jun 13 16:14:23 1998
From: lawyer at XUDI.aol.com (lawyer at XUDI.aol.com)
Date: Sat, 13 Jun 1998 16:14:23 -0700 (PDT)
Subject: THIS WILL CHANGE YOUR LIFE -AFUX
Message-ID: <199806132314.QAA20638@toad.com>
cypherpunks
Read this it will change your life.
If you are not interested please excuse me for interrupting your
day and
just hit delete and I do apologize for any inconvenience.
This is a letter I received, many, many, many times, and just
deleted,
but finally I said to myself what the heck I'll give it a try.
To my
amazement DOLLAR BILLS just keep coming in everyday!
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Greetings
I am a retired attorney, and about two years ago a man came to
me with a
letter. The letter he brought me is basically the same as the
letter in
front of you now. He asked me to verify the fact that this
letter was
legal. I advised him to make a small change in the letter and it
would
be 100% legal.
When I first read the letter, I thought it was some off-the-wall
idea to
make money. I was curious about the letter, so I asked him to
keep me
updated as to his results. About two months later he called to
tell me
that he had received over $800,000 in cash! I didn't believe him
so he
asked me to try the plan and see for myself. I followed the
instructions
exactly and mailed out 200 letters. Sure enough, the money
started
coming! It came slowly at first, but after three weeks I was
getting
more than I could open in a day. I kept a precise record and
after about
three months my earnings were $868,439. I decided to try the
letter
again, but this time I sent 500 letters out. Well, three months
later I
had totaled $2,344,178.00!!! I just couldn't believe it.
I met my old client for lunch to find out how this exactly
works. He
told me that there were a few similar letters going around. What
made
this one different is the fact that there are six names on the
letter,
not five like most others. That fact alone resulted in far more
returns.
The other factor was the advice I gave him in making sure the
whole
thing was perfectly legal, since no one wants to risk doing
anything
illegal.
I bet by now you are curious about what little change I told him
to
make. To be legal, anyone sending a dollar must receive
something in
return. So when you send a dollar to each of the six names on
the list,
you must include a slip of paper saying, "Please put me on your
mailing
list" and include your name, mailing address, and email address.
This is
the key to the program! The item you will receive for a dollar
you send
to the six names below, is this letter and the right to earn
thousands.
Follow the simple instructions below exactly, and in less than
three
months you could receive over $800,000.
A) Immediately send US $1 to each of the six people on the list
below.
Wrap the dollar in a note saying,"Please add me to your mailing
list"
and include your name, mailing address, and email address.
1) HEPALTA - 16406 - 117 Avenue, EDMONTON, Ab. Canada T5M3W2
1) Fred Ball - 1092 Adobe Canyon Rd., Kenwood, California 95452
2) G.W. Smith - 7082 Woolworth Rd., Shreveport, Louisiana 71129
3) T. Perdue 130 Dalzell St. Shreveport, Louisiana 71104
4) S.Hawryluk 5520 Bellechasse, Montreal,Quebec.Canada H1T-2B8
5) Raymond Lal, P. O. Box 1122. Regina. Sk.Canada, S4P 3B4
6) D. Dilley, P.O. Box 551, Wathena, KS 66090
B) Remove the name next to #1 on the list and move the rest of
the names
up one position. Then place your name in the #6 spot. This is
best done
by saving to a text file and editing it yourself and saving the
new
edited copy. Or type a new list and glue it over the old one.
C) You can mail your new letter out in two ways:
1) Through the U.S. Postal Service or
2) through e-mail.
This letter has been proven perfectly legal for both ways as
long as you
follow the above instructions, because you're purchasing
membership in
an exclusive mailing list. To mail this out over the internet,
you can
browse through areas and find people to send this to all the
time. All
you have to do is cut and paste email Addresses wherever you are
on the
Internet. Remember, it doesn't cost anything to mail on the
Internet. Or
you can get a bulk email service to mail it out in large volumes
for
you.
One that we recommend is:
Progressive Internet Communications Co specializing in targeted
and bulk
mailings (Very reasonable. Call for pricing.) (407) 956-1151
P.O. Box
100512, Palm Bay, FL. 32910-0512.
If you are going to use the traditional U.S. Postal Service to
do this
program, you will want to order a minimum 200 names from a
mailing list
company.
For the most effective for these lists are:
Advon Distributors ($28 / 200 names) P.O. Box B-11 Shelly, ID
83274
(800) 992-3866.
*Keep in mind- there is no limit to the amount of names you can
send
out. The more names you send, the more money you'll make. We
strongly
encourage you to mail this letter to family, friends and
relatives as
well.*
D) Be sure to send out at least 200. You should receive over
$800,000.
E) Keep a copy of this letter and all the names you receive.
Mail it Out
again in about 6 months. But mail it to the addresses you
received with
each dollar. It will work again, only much better.
THIS IS A SERVICE AND IS 100% LEGAL !
(Refer to title 18, Section 1302 & 1342 of the U.S. Postal and
Lottery
Laws). Assume for example you get a 7.5% return rate, which is
very
conservative. My first attempt was about 9.5% and my second time
was
over 11%.
1)When you mail out 200 letters, 15 people will send you $1
2)Those 15 mail out 200 letters, 225 people will send you $1
3)B29Those 225 mail out 200 letters, 3,375 people will send you
$1
4)Those 3,375 mail out 200 letters, 50,625 people will send you
$1
5)Those 50,625 mail out 200 letters, 759,375 people will send
you $1
6)At this point your name drops off the list at earnings of
$813,615.00!
It works every time, but how well depends on how many letters
you send
out. In the example above, you mailed out 200 letters, if you
mailed out
500 letters, you would have received $2,006,917!!
Check the math yourself, I want you to, but I guarantee it is
correct!
With this kind of return, you've got to try it. Try it once and
you will
do it again!!! Just make sure you send a dollar to each of the
six names
on the list with a note to be added to their mailing list.
Together we
will all prosper!!!!
PS You've read this far, so let me ask you one simple question:
Q. What do you have to lose??
A. Only $6
What you can gain is an income, like the example in this letter.
Small Risk, Small Expense,
HUGE Potential Return!!!
What do you have to lose?
I invite you to join our mailing list today!!!
THANK YOU AND I KNOW YOU WILL BE FINANCIALLY
REWARDED.______________________________________________________
D. Dilley . Attorney at law
From billp at nmol.com Sat Jun 13 18:47:05 1998
From: billp at nmol.com (bill payne)
Date: Sat, 13 Jun 1998 18:47:05 -0700 (PDT)
Subject: JUN 12’98
Message-ID: <35832AE3.2331@nmol.com>
Saturday 6/13/98 7:08 PM
John Young
Got an envelope size 9x1/4 x 11 7/8 in the mail today postmarked
ALBUQUERQUE NM
JUN 12�98
from
U.S. Department of Justice
United States Attorney
District of New Mexico
POB 607
Albuquerque, NM 87103
Official Business
Penalty for Private use $300.
My guess is about 4-7 page.
Paper clip at lower right side.
If last letter from Mitchell is any indication of rational
behavior, then my guess that this will eclipse the former.
http://jya.com/usa052098.htm
But I did not open it. This is a weekend. I have principles.
NO envelope was received from court in response to
http://jya.com/whp052898.htm
I will fax contents of U.S. Department of Justice envelope
as soon as we open it.
We must ALL keep a good sense of humor.
A mathematician, physicist, and engineer we all asked to calculate
the volume of a red rubber ball.
The mathematician measured the diameter, then solved a triple integral
to find the volume.
The physicist submerged the red rubber ball in a vessel of water
to measure its displacement.
The engineer looked it up in his red rubber ball handbook.
http://jya.com/da/whpda.htm
Later
bill
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html
From olive369 at hotmail.com Sat Jun 13 23:57:36 1998
From: olive369 at hotmail.com (olive369 at hotmail.com)
Date: Sat, 13 Jun 1998 23:57:36 -0700 (PDT)
Subject: Your Friends Will Want To See These!
Message-ID:
Attention!
Warning! Adults Only! Warning! Adults Only!
If you are under 21 years of age, or not interested in sexually
explicit material... please hit your keyboard delete button now
and please excuse the intrusion. To REMOVE your name from our
mailing list, send us email with REMOVE in the subject line. You
need not read any further!
Available NOW for only $9.95! Next 10 Days Only!
WORLD RECORD SEX!
Be There! See It Now On Video! Unbelievable ...But True!
You Won't Believe Your Eyes!!! [As Seen on the Howard Stern Show]
"The World's Biggest Gang Bang"
See sexy Annabel Chong as she sets the world Gang Bang Record
in this fantastic video documentary that chronicles her 24 hour
sexathon with 251 men engaging in sexual intercourse and oral
sex with her! Don't worry, you won't have to stay up 24 hours
to watch it all. We've selected only the most exciting and red
hot scenes for you...all in breathtaking living color with plenty of
extreme close-ups! This video is guaranteed to knock your socks
off and leave you breathless! You've never seen anything like it!
Annabel takes on five men at a time! 90 minutes! Order Today!
Only $9.95 plus $3 shipping and handling [Total $12.95].
"GANG BANG II"
The Record Breaker!!! Starring Jasmin St. Claire!
See Beautiful and Voluptious Jasmin St. Claire shatter Annabel's
gang bang record by taking on 300 men in one 24 hour sex session!
You won't believe your eyes at all the hot firey action that you will
see as the new world record is established before your eyes as
Jasmin takes on five men at a time for sexual intercourse and
oral sex! Your friends will break down your door to see this video!
You'll be the most popular guy in town! The action is truly unreal
and you will see the best of it in living life-like color! Order Today
and see Jasmin break the record! 90 minutes. Only $9.95 plus
$3 shipping and handling [total $12.95].
Also Available...
The Uncensored Authentic Underground...
Pamela Anderson Lee & Tommy Lee
Sex Video Tape!
Everyone is talking about this exciting video! See Pam and
Tommy engaging in sexual intercourse and oral sex in the car,
on the boat and much, much more! A real collectors video! 30 minutes.
Only $9.95 plus $3 shipping and Handling [total $12.95]
"Tonya Harding Wedding Night Sex Video"
Now see the beautiful Ice Skating Shame of the Olympics
Tonya Harding engaging in sexual intercourse and oral
sex on her wedding night with husband Jeff Gillooly!
This "Bad Girl" is Hot! Don't miss this video! 30 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]
"Traci...I Love You" Starring Traci Lords
Now see the most beautiful and popular porn star in her last
adult video before she hit the big time! It's the blockbuster of
the year...sensual...fiery and exposive! Traci Lords in her most
erotic and controversial film ever! Don't Miss It! 90 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]
EMAIL SPECIAL!
ORDER ANY FOUR VIDEOS AND GET THE FIFTH ONE FREE!!!
Your order will be shipped via First Class Mail. All Shipments in plain unmarked wrapper.
For Priority Mail - Add $5
For Overnight Express - add $15
You can order by Phone, Fax, Mail or Email.
We accept all Major Credit Cards and checks by phone or fax.
Visa - MasterCard - American Express - Discover
10 Day Money Back Guarantee! We know that you will be pleased with these Videos!
To Email your order - DO NOT HIT REPLY ON YOUR KEYBOARD
Send email to our special email address below:
zena456 at juno.com
[Note: If you order by email and do not receive an email acknowledgement within 24 hours, please phone our office at
718-287-3800]
Phone our office 9am to 10 pm [eastern time]
[718] 287-3800 to Order By Phone for FASTEST SERVICE!
We can accept your credit card or check by phone
Fax Your Order 24 hours per day to [718] 462-5920
You can fax your credit card information or your check
Order by mail by sending $12.95 per video, cash, check, money order or major credit card [Visa, MasterCard, American Express or Discover] to
TCPS, INC.
4718 18th Ave. Suite 135
Brooklyn, NY 11204
Make Checks & Money Orders Payable to TCPS, Inc.
New York State Residents Please Add 85 cents for Sales Tax per Video!
You must be over 21 years of age to order and give us your date of birth with your order!
The Following Order Form is for Your Convenience!
.............................................................................................................
Please ship me the following video tape[s]!
Qty___________Annabel Chong "World's Biggest Gang Bang"
Qty__________"Gang Bang II" Jasmin St. Claire
Qty___________"Pamela & Tommy Lee Sex Video Tape"
Qty_________ "Tonya Harding Wedding Night Sex Video Tape"
Qty__________"Traci I Love You" Traci Lords
at $9.95 each plus $3.00 for shipping and handling per tape
[$12.95 per video or "SPECIAL $51.80 for ALL FIVE"!
Credit Card #______________________________Exp Date___
I hereby represent that I am over 21 years of age.
My date of birth is_________________________________
Signature______________________________________________
Ship to: Name_______________________________________
Address____________________________________________
City________________________State___________Zip________
Area Code and Home Phone [ ]___________________________
Fax # [ ]______________________________________________
Email Address___________________________________________
To remove your name from our mailing list, send us an email with
remove in the subject line. This is a one time offer and you should not hear from us again!
FOREIGN ORDERS -Add $15us if you desire Air Parcel Post Shipment. We ship all over the world.
By deleting your unwanted E-Mail you waste one keystroke, yet
by throwing away paper mail you waste our planet! SAVE THE
TREES and support internet E-Mail instead of paper mail!
[C] Copyright TCPS 1998
From wingsaffiliate at neworleans.org Sun Jun 14 02:24:02 1998
From: wingsaffiliate at neworleans.org (wingsaffiliate at neworleans.org)
Date: Sun, 14 Jun 1998 02:24:02 -0700 (PDT)
Subject: Aviation Internet Marketer
Message-ID: <989.283923.115890 wingsaffiliate@neworleans.org>
To: Aviation Internet Marketer
From: Sgt. Hack, CEO, U.S. Wings, Inc.
Succeed by association with
PILOT SHOPS, the hot new Aviation
Affiliate Opportunity from U.S.WINGS INC.
U.S.Wings, Inc. is featured in the new, McGraw Hill
book due out September 1:
"StrikingItRich.com: Profiles of 23 Incredibly Successful
Websites...That You've Probably Never Heard Of"
by Jaclyn Easton
Foreword by Jeff Bezos, Founder & CEO, Amazon.com, Inc.
Become a PILOT SHOPS Affiliate today and I'll send you an
autographed copy of the new book at my cost after September 1.
The U.S Wings PILOT SHOPS affiliate program pays you 8.1/3 %
on all sales referred from your site. All you have to do is
display
the GOLD WINGS logo and PILOT SHOPS link (below) on your main
page!
There's no risk and no cost. Your ongoing income could be
significant.
The PILOT SHOPS offers an extensive line of genuine leather
jackets,
peacoats and aviation ball caps. A line of Aviation theme
T-shirts
and computer mouse pads will be added in the next few weeks
with plans to expand all lines as time progresses.
Please check it out.
>HREF="http://www.mustangone.com/uswings/pilotshop/govtissue.mv?A
SSOCIATE_ID">
Come shop at the...
Get started now and profit by association in the success in U.S.
Wings, Inc.
Become a U.S. Wings PILOT SHOPS Affiliate today.
No cost. No risk. It's easy!
Simply REPLY with the information requested below.
U.S. WINGS PILOT SHOPS
~ Affiliate Application ~
_X_ YES! I wish to become a U.S Wings Pilot Shop Affiliate.
_ _ Sorry. I cannot participate at this time.
Company name:
Contact name:
Address:
City:
State/Province:
Postal code:
Country:
URLs of your web sites:
E-mail address of contact:
Phone with area code:
Comments / Questions:
Upon receiving your PILOT SHOPS application, U.S. Wings will
email you an Associate ID which is to be substituted into the
HTML
source code in the indicated position as described above...
that's it!
It's too easy.
Entry into the PILOT SHOPS will ONLY be through GOLD WINGS links
on
associates' web pages. There will be no other direct access to
the site!
Get started now and begin sharing in U.S. Wings' phenomenal
success.
Best regards,
Sgt. Hack, CEO
U.S. Wings, Inc.
Pilot Shops Internet Affiliate Program
..
P.s.
I hope you enjoyed reading about our new PilotShops.
However, if you'd rather not receive any future notices
from US Wings, please send an e-mail message to
mailto:no_no_thanku at mailexcite.com
with DELETE in the Subject to be immediately
removed from any future US Wings Aviation offerings.
Thank you.
av
89-t
13-6
c_2
d-5
From schneier at counterpane.com Sun Jun 14 06:01:20 1998
From: schneier at counterpane.com (Bruce Schneier)
Date: Sun, 14 Jun 1998 06:01:20 -0700 (PDT)
Subject: Twofish (our AES Submission) is Available
Message-ID: <199806141301.IAA20051@mixer.visi.com>
Twofish, the block cipher we have submitted to NIST's AES competition, is on the web. Please see
http://www.counterpane.com/twofish.html
for details, including description, analysis, source code, and test vectors.
Other AES submissions will presumably be made public as the weeks progress, although NIST will not publish the submissions until the August meeting. See the NIST website at
http://csrc.nist.gov/encryption/aes/aes_home.htm
for more details.
Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590
http://www.counterpane.com
From jya at pipeline.com Sun Jun 14 08:09:15 1998
From: jya at pipeline.com (John Young)
Date: Sun, 14 Jun 1998 08:09:15 -0700 (PDT)
Subject: Childlove and Feds
Message-ID: <1.5.4.32.19980614150621.006a81f4@pop.pipeline.com>
The NYT today has a long piece on phone hackers,
"The Good. The Bad. The Geeks." With focus on a
a few in New York City: Mantis, Wicked, Bell Boy,
Vertigo, et al.
Mantis admits working with LEAs in catching pedophiles
and phreakers (note link) who do not abide the "Hacker
Ethic" of doing no harm, only "helping society" by exposing
security weaknesses.
Not all Feds and phreakers agree that pedophobic Feds
and teeny-cute phreaks help society, although the pedophilic
Agency allegedly abusing the adorable phreaker for its
come-on entrapment had "no comment" to its online
childlove racketeering and profiteering, sort of like the
NYT's art spiegel comic today.
http://www.nytimes.com
Our clone:
http://jya.com/gbg.htm
From replies444 at juno.com Sun Jun 14 11:05:30 1998
From: replies444 at juno.com (replies444 at juno.com)
Date: Sun, 14 Jun 1998 11:05:30 -0700 (PDT)
Subject: A Unique Email Advertisement
Message-ID: <199806141805.LAA09023@toad.com>
HELLO
The following information is not meant to spam or upset anyone, that is why we include
Advertisement in the subject line to give you an option to delete before you open the
message. We are a Reliable Internet Company that does full Internet Marketing.
Whatever your needs to market your business or product, A.I.M. can help you
achieve your success. Please do not treat this as just another piece of junk mail, we
are Aimed to your success.
A.I.M. was established in 1994 and has helped many people on the Internet market
their business and products successfully. We do not sell random bulk email lists, nor
do we advertise Adult Sites or Chain Letters.
Right now the largest form of communication is done through the Internet, and 1998
will be another record breaking year. There are over 60 million people that have
Internet access world wide, and that number continues to rise at a rate of over 40,000
per month. The best way to market any product or service is through the Internet, and
random bulk mail is not the way to go. You may ask, why am I sending you this ONE
piece of email; to get my information out so that others can follow the same practices
of Internet advertising. The Internet community would benefit from direct advertising!
Now you ask what can we offer you.....
CUSTOM TARGETED EMAIL ADDRESSES
No matter what your target is, we can compile a great list for you of people or
businesses that are interested in what you offer. Say, for instance, you would like to
send a newsletter out to people interested in MLM; we can compile a list for you of
people currently involved in MLM. If you would like a list of people looking for a
business opportunity, we can compile that list for you. You tell us your target; we will
compile that list. We can even target your list geographically.
example...If your business is selling CD�s, and your company is based in NY; we can
gather a list of people in NY interested in CD�s. We have a client that is involved in
MLM, who asked us to target 1000 opportunity seekers to start. To his surprise he
got 7 new people in his downline from just that one mailing. Another client wanted to
send a letter out to birdwatchers. We targeted 5000 birdwatchers for him; and he,
also, became a very happy client of ours. We have targeted.. investors, businesses,
International addresses,women, men, age groups, cites, states, doctors, lawyers, etc....
Some of our clients are getting results of 1-40%. Targeted mailings start at $50 per
thousand, and we can offer you a better price at higher quantities.
Complete Pricing for Targeted Email
1000 targeted email addresses $50 for us to email $50=$100
2000 targeted email addresses $85 for us to email $85=$170
5000 targeted email addresses $250 (no charge for us to email)
10000 targeted email addresses and we mail $500
100000 targeted email addresses and we mail $1,000
1 million guaranteed targeted email addresses and we mail $5,000
We offer a guarantee that our lists will be targeted to your topic. We keep a master
file on all of our clients so if you order again you will never get any duplicate addresses
from us
EMAILING
We can do the email for you and have all of the replies come directly to your email
address. If you prefer to do the mailing yourself, we sell email software as well.
Here is a few:
Rapid Fire Mail Server....Turns Your Computer into a mail server $495.00 (free
demo)
Stealth Mass Mailer...Sends out email at a rate of 100,000+ per hour $395.00(free
demo)
Mail Pusher....The newest in Bulk Email Software (great program) $300.00 (free
demo)
OTHER SERVICES OFFERED BY A.I.M.
WEBSITE MARKETING PACKAGE
We can place your website to the top of any given search engine. Our best results
come from Infoseek.
Guarantee top 10 listing.
$300.00 first month $300.00 every month there after
COMPLETE WEB MARKETING PACKAGE
(1) Targeted Emails in the amount of 200,000 per week
(2) Posting your website to BBS (Internet Bulletin Board Systems Related to your
topics)
(3) URL links to other sites related to your topics
(3) Newsgroup Postings (1000) per month
(4) Banner Ads to related subject searches
(5) Website Submissions to the search engines with a guaranteed 1st page placement
to Infoseek and submissions to the other top 8 as well as 400 other search engines
All of the postings, submissions, banner ad and URL advertising will be done with your
reply email address so that you have a copy of every placement and you know where
your ads are on the Internet.
Total price for complete marketing package $2500.00 per month
IF YOU have a business, product, or just want to get your information out; you have
no need to look any further. A.I.M. is here to help!!
Now as you can see we are a full service company, and we can help you with any of
your advertising needs.
Please call us toll free at 1-800-942-7913 today!
We look forward to hearing from you and are happy to answer any questions that you
may have. Once again, we give you our guarantee that this is the only piece of email
that you receive from us. We wish you success now and in the future!
Again our toll free number is 800-942-7913
our fax # 732-367-2229
We accept...Visa/MasterCard/American Express or check by fax
Thank you
From PAWS at 12930.com Sun Jun 14 11:44:13 1998
From: PAWS at 12930.com (PAWS at 12930.com)
Date: Sun, 14 Jun 1998 11:44:13 -0700 (PDT)
Subject: PAWS Across the NET for Success
Message-ID: <061298>
We have your name on our safe email list. If this reaches you in error
please send removal requests to rm0021 at irst-max.net. Your name will
immediately be removed from our list with our sincere apology for the
intrusion.
* * * P.A.W.S. * * * People Across the World Succeeding * * *
FREE TO JOIN!! We Help You Build Your Matrix!!!!!
How about a group of people joining together to recruit and
market. A group determined to make money. A group where no
one is at the advantage. And no one is at a disadvantage.
Everyone pays the same and earns the same. This is one of
the most compelling business opportunities you will find on
the internet today.
97% of all MLM'ers fail to reach their financial goal. They
never earn the kind of money they intended to when they got
into their business. More often they lose money because the
average person only sponsors 2.5 people. They end up spending
more than they make and the only ones who make money are
those who join at the top.
We feel we have found a way to change that. People helping
people is our philosophy. We heard and we created the PAWS
Association!! If you are a caring, individual and have a
desire to help others by also helping yourself, please email
us with "more info" in the subject line and your email address
in the body. Send it to: paws-4-u-info at autoresponder.freeyellow.com
You will receive an immediate reply.
From gwb at gwb.com.au Sun Jun 14 14:53:52 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Sun, 14 Jun 1998 14:53:52 -0700 (PDT)
Subject: Pauline Hanson deceived - Toyota need to know
Message-ID: <1.5.4.32.19980614214444.00718f6c@mail.pronet.net.au>
Dear One Nation supporter in NSW
It is with great sadness that I have to alert you, yet again, to the
unethical behaviour of Channel 9's 60 MINUTES programme. This follows the
programme "A CALL TO ARMS" on 7th June in which they tried, without
foundation, to link One Nation to "US extremist militia" just days before
the state election.
See: http://www.gwb.com.au/60.html
Last night a segment on 60 MINUTES featured One Nation and an extensive
interview between Paul Lyneham and Pauline Hanson.
Her appearance made a liar of her as she is on the record as saying that she
would not again be interviewed by 60 MINUTES.
Pauline Hanson told me this morning,
QUOTE:
"There was no mention about my interview with Paul Lyneham being for 60
Minutes. The programme approached me a couple of weeks ago and I turned them
down. I feel deceived by 60 Minutes."
"I was shocked when I saw my interview with Lyneham appearing on Sixty
Minutes last night. 60 Minutes know that I do not want to appear on their
programme."
END QUOTE.
This behaviour cannot be helpful to the excellent reputation of their major
sponsor Toyota.
You may contact them at
toyota at spike.com.au
Please take a moment to tell them how you feel about these issues.
GWB
Scott Balson
From cabletv at 208.4.7.8 Sun Jun 14 15:04:11 1998
From: cabletv at 208.4.7.8 (cabletv at 208.4.7.8)
Date: Sun, 14 Jun 1998 15:04:11 -0700 (PDT)
Subject: CABLE BOX DESCRAMBLERS
Message-ID: <989.283923.817969 cabletv@208.4.7.8>
To be removed from our mailing list please reply with "REMOVE" in the subject
line.
Cable T.V. Descramblers, Converters, And Accessories for sale. We carry cable
descramblers for all major name brand cable boxes used by cable companies. All
units are compeletly automatic and digital, and there are no complicated
programing involved, Just hookup and enjoy the latest technology in cable tv
equipments.
We carry high quality units at low prices, prices start as low as $129 and up.
All of our products are backed by:
30 DAYS MONEY BACK GARAUNTEE.
ONE YEAR WARRANTY.
FULL TECHNICAL SUPPORT.
For more information, pictures and prices or to order visit our
web site at http://208.4.7.8/intersales.cc/cabletv or
http://users.replinets-max.com/rm0232
P.S. Respond and purchase your cable TV descrambler within 10 days of reciept of
this email and get a free gift with your perchase.($40 value).
From schneier at counterpane.com Sun Jun 14 16:06:56 1998
From: schneier at counterpane.com (Bruce Schneier)
Date: Sun, 14 Jun 1998 16:06:56 -0700 (PDT)
Subject: Twofish soruce code outside the U.S.
Message-ID: <199806142306.SAA00045@mixer.visi.com>
It's time to play the dumb export control game.
I have to take steps to prevent non-US and non-Canadian persons from downloading the Twofish source.
However, if someone outside the US manages to get their hands on the Twofish source from my website and puts it up on their website, please let me know.
I would like very much to link to it, so others can get the Twofish code.
Thanks,
Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590
http://www.counterpane.com
From schneier at counterpane.com Sun Jun 14 17:00:43 1998
From: schneier at counterpane.com (Bruce Schneier)
Date: Sun, 14 Jun 1998 17:00:43 -0700 (PDT)
Subject: Converting my Twofish PostScript file to pdf
Message-ID: <199806150000.TAA06546@mixer.visi.com>
We have been unable to do this. We've tried, a few times, and failed miserably.
If anyone has the correct tools to do a clean conversation from Postscript into pdf, please do so and send me the pdf file. I will post it.
Thanks,
Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590
http://www.counterpane.com
From realtor at electronicpromotion.com Sun Jun 14 19:32:36 1998
From: realtor at electronicpromotion.com (realtor at electronicpromotion.com)
Date: Sun, 14 Jun 1998 19:32:36 -0700 (PDT)
Subject: REALTOR.com Specials!!
Message-ID: <199806150232.TAA16422@toad.com>
RealSelect Offers Tremendous Savings
On The Official NAR Web Site - http://www.REALTOR.com
IT'S ALL ABOUT LEADS...
Does the thought of unlimited classified advertising to over 3 million consumers interest you? Would you like to market yourself and all of your listings on the world's largest website, REALTOR.com? RealSelect is offering you a home page and upgrade
special that can't be beat! Save $100 off the regular retail price! You can't afford to miss this special! The normal retail value is $374 for all of our SIMPLE Tools and setup, but
for only $274, you can have a years worth of the newest technology in
generating qualified leads for only $5 per week! *Available only to
first year subscribers - offer valid through 6/30/98
REMEMBER, THIS PROGRAM IS ALL ABOUT GENERATING LEADS FOR YOU!
Click here to ORDER NOW! http://www.realtor.com/marketing/home.htm
(To receive this special pricing YOU MUST ENTER BILLING CODE SP5098.)
� OR-
Using your Internet browser,
1. Type http:// www.REALTOR.com in the address window;
2. Once at the REALTOR.com home page, click on the blue "Internet Marketing" button located on the left hand side of the REALTOR.com web page;
3. Select "Create Agent Simple" or "Create Office Simple";
4. Then follow the easy steps to make big $$$ with REALTOR.com!
(To receive this special pricing YOU MUST ENTER BILLING CODE SP5098.)
� OR-
If you have any questions or need help in getting started then respond to this e-mail or fax us at (619) 291-3553. We will personally contact you to assist.
� Don't miss this fantastic offer!! Promotion ends June 30, 1998! --
To Remove your email address from future announcements regarding REALTOR.COM specials, reply with "remove" as the subject line and you will immediately be taken off the list.
From hjfdujf at juno.com Sun Jun 14 20:17:41 1998
From: hjfdujf at juno.com (hjfdujf at juno.com)
Date: Sun, 14 Jun 1998 20:17:41 -0700 (PDT)
Subject: A Unique Email Advertisement
Message-ID: <>
HELLO
The following information is not meant to spam or upset anyone, that is why we include
Advertisement in the subject line to give you an option to delete before you open the
message. We are a Reliable Internet Company that does full Internet Marketing.
Whatever your needs to market your business or product, A.I.M. can help you achieve
your success. Please do not treat this as just another piece of junk mail, we are Aimed to
your success.
A.I.M. was established in 1994 and has helped many people on the
Internet market their business and products successfully. We do not sell random bulk
email lists, nor do we advertise Adult Sites or Chain Letters.
Right now the largest form of communication is done through the Internet, and 1998 will
be another record breaking year. There are over 60 million people that have Internet
access world wide, and that number continues to rise at a rate of over 40,000 per month.
The best way to market any product or service is through the Internet, and random bulk
mail is not the way to go. You may ask, why am I sending you this ONE piece of email;
to get my information out so that others can follow the same practices of Internet
advertising. The Internet community would benefit from direct advertising!
Now you ask what can we offer you.....
CUSTOM TARGETED EMAIL ADDRESSES
No matter what your target is, we can compile a great list for you of people or businesses
that are interested in what you offer. Say, for instance, you would like to send a newsletter
out to people interested in MLM; we can compile a list for you of people currently
involved in MLM. If you would like a list of people looking for a business opportunity,
we can compile that list for you. You tell us your target; we will compile that list. We can
even target your list geographically.
example...If your business is selling CD�s, and your company is based in NY; we can
gather a list of people in NY interested in CD�s. We have a client that is involved in
MLM, who asked us to target 1000 opportunity seekers to start. To his surprise he got 7
new people in his downline from just that one mailing. Another client wanted to send a
letter out to birdwatchers. We targeted 5000 birdwatchers for him; and he, also, became a
very happy client of ours. We have targeted.. investors, businesses, International
addresses,women, men, age groups, cites, states, doctors, lawyers, etc....
Some of our clients are getting results of 1-40%. Targeted mailings start at $50 per
thousand, and we can offer you a better price at higher quantities.
Complete Pricing for Targeted Email
1000 targeted email addresses $50 for us to email $50=$100
2000 targeted email addresses $85 for us to email $85=$170
5000 targeted email addresses $250 (no charge for us to email)
10000 targeted email addresses and we mail $500
100000 targeted email addresses and we mail $1,000
1 million guaranteed targeted email addresses and we mail $5,000
We offer a guarantee that our lists will be targeted to your topic. We keep a master file on
all of our clients so if you order again you will never get any duplicate addresses from us
EMAILING
We can do the email for you and have all of the replies come directly to your email
address. If you prefer to do the mailing yourself, we sell email software as well.
Here is a few:
Rapid Fire Mail Server....Turns Your Computer into a mail server $495.00 (free demo)
Stealth Mass Mailer...Sends out email at a rate of 100,000+ per hour $395.00(free demo)
Mail Pusher....The newest in Bulk Email Software (great program) $300.00 (free demo)
OTHER SERVICES OFFERED BY A.I.M.
WEBSITE MARKETING PACKAGE
We can place your website to the top of any given search engine. Our best results come
from Infoseek.
Guarantee top 10 listing.
$300.00 first month $300.00 every month there after
COMPLETE WEB MARKETING PACKAGE
(1) Targeted Emails in the amount of 200,000 per week
(2) Posting your website to BBS (Internet Bulletin Board Systems Related to your topics)
(3) URL links to other sites related to your topics
(3) Newsgroup Postings (1000) per month
(4) Banner Ads to related subject searches
(5) Website Submissions to the search engines with a guaranteed 1st page placement to
Infoseek and submissions to the other top 8 as well as 400 other search engines
All of the postings, submissions, banner ad and URL advertising will be done with your
reply email address so that you have a copy of every placement and you know where your
ads are on the Internet.
Total price for complete marketing package $2500.00 per month
IF YOU have a business, product, or just want to get your information out; you have no
need to look any further. A.I.M. is here to help!!
Now as you can see we are a full service company, and we can help you with any of your
advertising needs.
Please call us toll free at 1-800-942-7913 today!
We look forward to hearing from you and are happy to answer any questions that you may
have. Once again, we give you our guarantee that this is the only piece of email that you
receive from us. We wish you success now and in the future!
Again our toll free number is 800-942-7913
our fax # 732-367-2229
We accept...Visa/MasterCard/American Express or check by fax
Thank you
From hjfdujf at juno.com Sun Jun 14 20:17:41 1998
From: hjfdujf at juno.com (hjfdujf at juno.com)
Date: Sun, 14 Jun 1998 20:17:41 -0700 (PDT)
Subject: A Unique Email Advertisement
Message-ID: <>
HELLO
The following information is not meant to spam or upset anyone, that is why we include
Advertisement in the subject line to give you an option to delete before you open the
message. We are a Reliable Internet Company that does full Internet Marketing.
Whatever your needs to market your business or product, A.I.M. can help you achieve
your success. Please do not treat this as just another piece of junk mail, we are Aimed to
your success.
A.I.M. was established in 1994 and has helped many people on the
Internet market their business and products successfully. We do not sell random bulk
email lists, nor do we advertise Adult Sites or Chain Letters.
Right now the largest form of communication is done through the Internet, and 1998 will
be another record breaking year. There are over 60 million people that have Internet
access world wide, and that number continues to rise at a rate of over 40,000 per month.
The best way to market any product or service is through the Internet, and random bulk
mail is not the way to go. You may ask, why am I sending you this ONE piece of email;
to get my information out so that others can follow the same practices of Internet
advertising. The Internet community would benefit from direct advertising!
Now you ask what can we offer you.....
CUSTOM TARGETED EMAIL ADDRESSES
No matter what your target is, we can compile a great list for you of people or businesses
that are interested in what you offer. Say, for instance, you would like to send a newsletter
out to people interested in MLM; we can compile a list for you of people currently
involved in MLM. If you would like a list of people looking for a business opportunity,
we can compile that list for you. You tell us your target; we will compile that list. We can
even target your list geographically.
example...If your business is selling CD�s, and your company is based in NY; we can
gather a list of people in NY interested in CD�s. We have a client that is involved in
MLM, who asked us to target 1000 opportunity seekers to start. To his surprise he got 7
new people in his downline from just that one mailing. Another client wanted to send a
letter out to birdwatchers. We targeted 5000 birdwatchers for him; and he, also, became a
very happy client of ours. We have targeted.. investors, businesses, International
addresses,women, men, age groups, cites, states, doctors, lawyers, etc....
Some of our clients are getting results of 1-40%. Targeted mailings start at $50 per
thousand, and we can offer you a better price at higher quantities.
Complete Pricing for Targeted Email
1000 targeted email addresses $50 for us to email $50=$100
2000 targeted email addresses $85 for us to email $85=$170
5000 targeted email addresses $250 (no charge for us to email)
10000 targeted email addresses and we mail $500
100000 targeted email addresses and we mail $1,000
1 million guaranteed targeted email addresses and we mail $5,000
We offer a guarantee that our lists will be targeted to your topic. We keep a master file on
all of our clients so if you order again you will never get any duplicate addresses from us
EMAILING
We can do the email for you and have all of the replies come directly to your email
address. If you prefer to do the mailing yourself, we sell email software as well.
Here is a few:
Rapid Fire Mail Server....Turns Your Computer into a mail server $495.00 (free demo)
Stealth Mass Mailer...Sends out email at a rate of 100,000+ per hour $395.00(free demo)
Mail Pusher....The newest in Bulk Email Software (great program) $300.00 (free demo)
OTHER SERVICES OFFERED BY A.I.M.
WEBSITE MARKETING PACKAGE
We can place your website to the top of any given search engine. Our best results come
from Infoseek.
Guarantee top 10 listing.
$300.00 first month $300.00 every month there after
COMPLETE WEB MARKETING PACKAGE
(1) Targeted Emails in the amount of 200,000 per week
(2) Posting your website to BBS (Internet Bulletin Board Systems Related to your topics)
(3) URL links to other sites related to your topics
(3) Newsgroup Postings (1000) per month
(4) Banner Ads to related subject searches
(5) Website Submissions to the search engines with a guaranteed 1st page placement to
Infoseek and submissions to the other top 8 as well as 400 other search engines
All of the postings, submissions, banner ad and URL advertising will be done with your
reply email address so that you have a copy of every placement and you know where your
ads are on the Internet.
Total price for complete marketing package $2500.00 per month
IF YOU have a business, product, or just want to get your information out; you have no
need to look any further. A.I.M. is here to help!!
Now as you can see we are a full service company, and we can help you with any of your
advertising needs.
Please call us toll free at 1-800-942-7913 today!
We look forward to hearing from you and are happy to answer any questions that you may
have. Once again, we give you our guarantee that this is the only piece of email that you
receive from us. We wish you success now and in the future!
Again our toll free number is 800-942-7913
our fax # 732-367-2229
We accept...Visa/MasterCard/American Express or check by fax
Thank you
From replynow at mail.com Sun Jun 14 23:37:17 1998
From: replynow at mail.com (replynow at mail.com)
Date: Sun, 14 Jun 1998 23:37:17 -0700 (PDT)
Subject: The One Stop - Music Shop
Message-ID: <989.283923.714193 replynow@mail.com>
Dear Webmaster,
We would like to offer your company an opportunity to host an
ALAMO "MIRROR" site in exchange for a 10% commission on all
musical instrument sales generated by your company. Alamo
supplies all brands and models directly to the local markets
worldwide, for LESS cost than any buyer can purchase the same
product(s) locally.
We propose the following:
1) URGENT REPLY REQUESTED!!! If you are interested be our
exclusive agent in your area, then E-mail us ASAP so we will
let other respondents know that your territory has been
alocated to your company. Totally there will be over 200
countries and territories represented, including all 50
American states.
mailto:reply-now at highpro.com?Subject=ALAMO_MIRROR_SITES
NOTE! Agents will be accepted on a first come-first serve basis.
2) Please reply ASAP to us with the following information
a) Homepage URL
b) E-mail Address
c) URL of your ALAMO MIRROR SITE
d) E-mail address of your ALAMO REPRESENTATIVE/WEBMASTER
mailto:reply-now at highpro.com?Subject=ALAMO_MIRROR_SITES
3) We will E-mail our website to you in ZIPPED FORMAT (1MB).
4) Please alter all contact E-mail addresses and company
information to yours so that visitors to your site will
contact you DIRECTLY. If relevant, please translate our
site in to your local language.
5) Load all files onto your local server and E-mail us
when it's up! We will notify ALL other mirrors sites of
your addition!
MUSICAL INSTRUMENT ORDER PROCESS
All incoming enquiries should be forwarded to us for processing.
Copies of our replies will be sent to you. Buyers will be
invoiced by us directly, copied to you. Once we receive their
payment, we will credit your account. Commission will be paid to
all agents monthly.
PLEASE NOTE! IMPORTANT!!!
Once we establish the Cybermall NEXT MONTH, EVERYTHING will
be automated so you will NOT need to DO ANYTHING in-line to
generate order. Therefore, you just need to develop the market
locally OFF LINE (FAX, PHONE, MAIL).
MUTUAL BENEFITS
1) We are the ONLY Musical Instrument Cybershop that delivers
EVERYTHING in the Industry. Custom orders! OEM! ALL famous
brands and types of instruments, etc. We have THE LARGEST
SELECTION at the MOST COMPETITIVE PRICES. Why? We sell
factory direct WORLDWIDE, and all our marketing is on-line,
therefore we have virtually NO OVERHEAD. Saving time, money,
and resources! Consumers save 10-60% on purchases through us.
2) The average instrument costs US$2,000, so commissions
will normally average US$200 per instrument, so returns on
your investment should be generated very quickly.
3) Alamo is fully established in the music industry
worldwide as the leader in DIRECT MARKETING MUSICAL
INSTRUMENTS WORLDWIDE. So, your MIRROR site will
instantaneously linked to our global network of millions
of prospect buyers. We will provide you with all the
necessary marketing needed to effect various local marketing
drives. WE DO THE REST! Ie. Daily processing, on-line
marketing, and transactions. Our elite promotions will
generate sufficient traffic through your site.
4) We will provide you with various marketing materials,
data, and databases for you to utilize to promote your site
on and off line. We will register your site in up to 1,000
Search Engines, and in multiple keyword categories, and in
high priority.
5) Once all of the 300+ worldwide agents have been implemented,
we will open a ON-LINE CYBERMALL whereby buyers wil be able to
go to ANY MIRROR SITE and make purchases via Credit Cards and
all information and processing will be automated.
BACKGROUND INFORMATION
Our Homepage is one of the most visited music sites on the
web. The Alamo Group has developed various Internet Marketing
softwares that are perhaps the most powerful lead generating
tools on the Net. We have built up a database of over 3.5
million prospective clients that are interested in purchasing
musical instruments.
We look forward to assisting you to become prosperous agents.
Thank you very much for your attention to the above matters!
Kindest regards,
Gerald A. Alleva
President
************************************************************
* _ _ _ _ _ _ _ _ _ _ _ _ *
* / \ | | / \ | \ / | / __ \ *
* / /_\ \ | | / /_\ \ | |\ \/ /| | / / \ \ *
* / _ _ _ \ | |_ _ _ / _ _ _ \ | | \__/ | | \ \__/ / *
*/_/ \_\ |_ _ _ _| /_/ \_\ |_| |_| \_ _ _ / *
* *
* "THE ONE-STOP MUSIC SHOP" *
************************************************************
* ,-all brands/models *
* _ _ _ /|-lowest prices *
* |\___ALAMO__|_|_|_(__TRADE LTD._/ |-large inventory *
* |/----//---[!|!|!]-----\\-------\ |-fast service *
* [| (G|E|R|A|L|D) |] \|-all credit cards *
* \\=(A|L|L|E|V|A)=// '-high traffic site *
* \\__|*|*|*|____// -100% satisfation guaranteed *
* [_]_[_] *
* *
* mailto:reply-now at highpro.com?Subject=ALAMO_MIRROR_SITES *
* Telephone/Fax: (852) 2987-9273 *
* BOOKMARK our HOMEPAGE NOW *
* http://www.alamohk.com *
************************************************************
From info at digfrontiers.com Sun Jun 14 23:52:54 1998
From: info at digfrontiers.com (info at digfrontiers.com)
Date: Sun, 14 Jun 1998 23:52:54 -0700 (PDT)
Subject: Digital Frontiers Newsletter #2 - Correction
Message-ID: <199806150652.BAA10668@nero.interaccess.com>
Digital Frontiers Newsletter #2
-------------------------------
Thank you for your interest in Digital Frontiers web optimization
products. This email is to inform you of some recent changes to our
product lineup. If you don't want to receive future mailings, our
apologies -- please reply to info at digfrontiers.com.
We apologize if you have received more than one copy of this newsletter - we're trying to improve our list management software, but are still working out the kinks.
*** 10% Off on all HVS Products! ***
------------------------------------
In a blatant ploy to get you off the golf course/beach and back in front of your computer optimizing your web graphics (just kidding), we're offering a 10% discount across our entire product line until July 15. There's never been a better time to purchase the award-winning HVS series.
*** HVS Animator Version 1.03 ***
---------------------------------
Version 1.03 of HVS Animator has just been released for Macintosh. This new version includes the ability to set exact loop counts. We expect the Windows version to be available within a few days. For your free download please visit our website at http://www.digfrontiers.com.
*** NEW! HVS ColorGIF 2.0/HVS Animator Pro Bundle ***
-----------------------------------------------------
HVS Animator Pro, the GIF animation editor/optimizer that contains the same size-squeezing technology as HVS GIFCruncher, can now be purchased with HVS ColorGIF 2.0 for only $145. Also, The HVS Toolkit Pro, which includes HVS ColorGIF 2.0, HVS JPEG, and HVS Animator Pro, is available for only $208.
If you already own HVS ColorGIF 2.0, if you register you can upgrade to HVS Animator Pro for $49. Both can be purchased via our secure commerce server at:
http://www.digfrontiers.com/purchase.html
*** Reviews ***
---------------
In the June issue of PC Graphics & Video, HVS optimization stacks up quite favorably against higher-profile (and more expensive) offerings from Adobe, Macromedia, and others. Take a look. By the way - they misprinted the price at $599 for our Toolkit Pro - its actually $208!
Andy King, a leading industry analyst and Managing Editor of Mecklermedia's webreference.com, looks at HVS ColorGIF 2.0 in a detailed article on color reduction. Go to http://www.webreference.com/dev/graphics/reduce.html.
*** HVS GIFCruncher Update ***
------------------------------
The response to HVS GIFCruncher, our free GIF optimization service, has been overwhelming. The reports we're getting indicate that GIFCruncher users are thrilled with the results. We have had enough load that the current server is getting bogged down at times. So we're moving HVS GIFCruncher to a fast new server - we expect to be online by late June. If you haven't tried GIFCruncher yet, give it a spin - it can reduce the size of your GIFs by 50% or more - http://www.digfrontiers.com/gcrunch.html. Currently, all enabled HVS GIFCruncher features are free so everyone can get acquainted with the service and the excellent results it can produce. We will be transitioning to a fee basis for Custom and Batch operations in a few weeks, but basic operations will remain free.
On a related note, we've had many requests for a desktop version of HVS GIFCruncher. We're working on it now, and expect it to be ready in a few weeks - if you would like to be included on an early release list, please let us know at info at digfrontiers.com.
The HVS GIFCruncher Webmaster Version is available now, and can automatically process an entire local, FTP or HTTP directory -- or an entire site -- and optimize all the GIFs that it finds using award-winning HVS optimization algorithms. Details are at http://www.digfrontiers.com/gc_wv_faq.html.
Thanks for your time and keep conserving bandwidth with HVS products!
-----------------
Digital Frontiers
1019 Asbury Ave.
Evanston, IL 60202
847-328-0880 voice
847-869-2053 fax
info at digfrontiers.com
http://www.digfrontiers.com
From tcmay at got.net Sun Jun 14 11:33:19 1998
From: tcmay at got.net (Tim May)
Date: Mon, 15 Jun 1998 02:33:19 +0800
Subject: Childlove and Feds
In-Reply-To: <1.5.4.32.19980614150621.006a81f4@pop.pipeline.com>
Message-ID:
At 8:06 AM -0700 6/14/98, John Young wrote:
>Not all Feds and phreakers agree that pedophobic Feds
>and teeny-cute phreaks help society, although the pedophilic
>Agency allegedly abusing the adorable phreaker for its
>come-on entrapment had "no comment" to its online
>childlove racketeering and profiteering, sort of like the
>NYT's art spiegel comic today.
I was scanning the dial on my shortwave radio recently and landed on Radio
Havana. I was thinking about how in many countries (presumably including
Cuba) it's a thought crime to tune in to banned broadcasts.
And we in the West unctuously decry this.
But are we all that different?
Suppose "Radio Pedophilia" started broadcasting on 6223 KHz. Fill in the
details on program content, etc.
By any reading of the various child pornography laws in the U.S. merely
_listening_ to such a broadcast would be a felony. Of this this there can
be no doubt.
Were such a station to exist (which it does not), I would expect FCC and
FBI, with NSA SIGINT assistance, would use technical means to isolate who
was tuned to this station and then bust in the doors.
The only difference with the Sovs and Cubans and Berkeleyites would be the
reasons the broadcasts were illegal to listen to.
--Tim May
"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Licensed Ontologist | black markets, collapse of governments.
From StanSqncrs at aol.com Mon Jun 15 02:59:49 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Mon, 15 Jun 1998 02:59:49 -0700 (PDT)
Subject: The I.R.S.
Message-ID: <4b63593f.3584f05d@aol.com>
Cypherpunks, I've tied a bunch of stuff together on the big conspiracy I've
discovered, think you'll find the additions interesting. If you want to know
why popular music sucks, my page basicly shows you why.
Thanks for listening,
Stan
======
'The MOST Important Music Page on the Net!'
http://members.aol.com/whtsametu/camel/
From jya at pipeline.com Mon Jun 15 05:33:27 1998
From: jya at pipeline.com (John Young)
Date: Mon, 15 Jun 1998 05:33:27 -0700 (PDT)
Subject: Prepare Y2K
Message-ID: <199806151233.IAA10510@camel7.mindspring.com>
NYT Magazine, June 14, 1998:
PREPARE YE
This will make for a gloomy five days, but from June 29 to
July 3 disaster experts from all over will convene in
Russellville, Ark., to talk about "Principles and Practice
of Disaster Relief and Recovery."
Sessions cover: How to create an emergency mass mortuary,
toxic-waste cleanups and dealing with nuclear meltdown.
Vernie R. Fountain, of the Fountain National Academy of
Professional Embalming Skills in Springfield, Mo., will
discuss "identification of the dead" after natural and
man-made disasters.
Natural disasters have killed 181 people this year in the
United States; there have been more than 600 tornadoes.
Are we in jinxed times? "It's been a pretty good year so
far, not a lot of terrorism," says Matthew Blais, a
nuclear-terrorism expert. "But there are a lot of crazy
people out there, saving up for the big one. You never
know when."
---
From schneier at counterpane.com Mon Jun 15 06:15:21 1998
From: schneier at counterpane.com (Bruce Schneier)
Date: Mon, 15 Jun 1998 06:15:21 -0700 (PDT)
Subject: I have the Twofish paper in pdf; thanks
Message-ID: <199806151315.IAA08574@mixer.visi.com>
You can stop sending me new versions.
Thanks,
Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590
http://www.counterpane.com
From reply664 at yahoo.com Mon Jun 15 07:19:38 1998
From: reply664 at yahoo.com (reply664 at yahoo.com)
Date: Mon, 15 Jun 1998 07:19:38 -0700 (PDT)
Subject: FREE PHONESEX (664)410-4332
Message-ID: <199806151420.KAA15493@unix.asb.com>
Dear Sir/Madam:
Due to our 1 year aniversary, we are giving you a FREE treat!
For the next month you can call the number below and have FREE PHONESEX!
The first two hours of any of your calls in the next month will be
***** ABSOLUTELY FREE!! NO QUESTIONS ASKED! *****
so pick up the phone and call (664)410-4332 NOW!
our girls are hot, young, blond, horny and want to play with you NOW!
CALL (664)410-4332 NOW!!
From mscompia at microsoft.com Mon Jun 15 11:18:21 1998
From: mscompia at microsoft.com (mscompia at microsoft.com)
Date: Mon, 15 Jun 1998 11:18:21 -0700 (PDT)
Subject: Information From The Microsoft Personal Information Center
Message-ID: <023bf4617180f68UPIMSSMTPSYS08@msn.com>
Here is your password you requested from the Microsoft Personal Information Center at http://register.microsoft.com/regwiz/personalinfo.asp.
Password: writecode
If you continue to have access problems or want to report other issues, please contact us through the Write Us button at the top of any Microsoft page.
From StanSqncrs at aol.com Mon Jun 15 15:31:43 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Mon, 15 Jun 1998 15:31:43 -0700 (PDT)
Subject: Response to Anon.
Message-ID:
Nobody writes - << Hi Stan -
I think your link you referenced above is incorrect (but I found it anyway).
You might want to try using
http://members.aol.com/whtsametau/camel instead.
Thanks for posting the link, but you have raised some questions. During an
interview with Gilmour/Waters, they said that the album "The Wall" was about a
"wall of reality" between the band and Pink Floyd's fans (these are their
words EXACTLY). >>
Obviously, because of your next obvservation, I find this to be incredible.
<< I find it interesting that you also emulate a "Wall Of
Reality" and use Pink Floyd's music to back it up. You seem to be giving
mixed signals - in Pink Floyd's case, a "Wall Of Reality" would be a BAD
thing. I wasn't sure what message you were trying to get out. >>
Also - << Also, wasn't the whole point of Pink Floyd's The Wall to
"tear down the wall"? You are sending some conflicting
messages. You might want to re-think your strategy. >>
My big mistake there, was to allow supposed Floyd sites on. I've been
thinking about that very thing and will be making changes to that ring (or
I'll be destroying it). I appreciate your constructive criticism, thanks!
Remember, I created that wall before I knew about the I. R. S.. I also have
many changes that need to be done to What's A Meta U (and What's It 2 U?),
they'll have to wait a little longer as well, I now have a more important
page.
Stan
From afriend at plato.qi3.com Tue Jun 16 03:01:31 1998
From: afriend at plato.qi3.com (afriend at plato.qi3.com)
Date: Tue, 16 Jun 1998 03:01:31 -0700 (PDT)
Subject: hello
Message-ID: <219806133963VAA14895@hotmail.com>
SAY GOOD-BYE TO AOL TIMERS AND ELIMINATE YOUR FRUSTRATION FOREVER!!
Are you tired of the "AOL Timers" interrupting your time on the internet? Are
you looking for something to solve this problem? HOW MANY TIMES HAVE YOU:
Stepped out of the room to go to the bathroom to find out you have been kicked off AOL.
Then you have a hard time getting back on!! Or, you were downloading a file and AOL kicks
you offline. Then it takes forever to do it all over again!! This "SOFTWARE PROGRAM"
dismisses the "idle" and 46-minute "stayonline" messages that AOL uses to annoy the hell out
of its members. Once you install the software, you do nothing but enjoy being on AOL.
Before I had this program installed, I had to reboot when this happened. It is a small memory
resident program (actual disk size is 119KB - IBM Compatible only). The timer hits the
buttons automatically when they come up. THIS "SOFTWARE PROGRAM" WILL BE
EMAILED AS SOON AS WE RECEIVE YOUR ORDER (Not for MAC Users).
HOW TO ORDER YOUR TIMER
This program sells for $5. Send a check, money order, or cash to: Aaron McKay
21111 hwy 140 E. Dairy OR, 97625
Name:_______________________________________________________________________________________________
Street Address:__________________________________________
City:_____________________________________________State:__________
ZipCode:____________ Area Code & Phone:__________________________
EMAIL:___________________________
From rah at shipwright.com Tue Jun 16 08:21:51 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Tue, 16 Jun 1998 08:21:51 -0700 (PDT)
Subject: icomputing: "Naive Realism"
Message-ID:
"Cryptoanarchist" makes it to the printed word. Can an OED entry be far
behind? :-).
Of course, it dawns on me that she might mean "cryptoanarchist", below, in
the same way that Vidal called Buckley a "cryptofascist"...
Cheers,
Bob Hettinga
"Web doyenne?"
----------
http://www.zdnet.com/icom/content/columns/1998/05/techno.realists/index.html
[Image]
[ZDNet] [Click here for Microsoft Daily News.]
[Image]
[Try out ZD Internet Magazine]
[
Commentaries
]
May
11,
1998
Naive
Realism:
Taking
on
the
Technorealists
Practical
development
of
the
Internet comes from doing
practical things.
By Angela Gunn
The technorealist manifesto,
in case you missed it, is a
pompous version of the "Why
The Internet Isn't Evil"
speech you give to your mom's
bridge club.
Unleashed back in March, the
"manifesto" was authored by many people who just a year or two ago were
blathering about the world-changing, paradigm-shifting, cryptoanarchist Net,
scaring your mom's bridge club so thoroughly that, well, they asked you if
the Internet was evil.
Drop by the technorealism site and read this document. Sign it if you like.
Just don't expect it to make any difference to you or yours.
The manifesto is a simplistic summation of points most of us inside the
industry already know from years of experience, thought, and online
discussion. And for those outside the industry, it's all but
incomprehensible.
The whole thing stinks of college-student libertarianism, except for the
part about government having an important role to play on the electronic
frontier (a point that galled several actual Libertarians and college
students, as evidenced by their parody sites).
And it's frivolous. Development of the Internet as a practical entity comes
from the doing of practical things with the Internet. The programmer
laboring to improve customer access to a tech-support database, the site
producer working to streamline her site's design, the people who gave us
online ticket ordering and package tracking and hotel reservations--these
are the people who will convince the rest of the world that the Net is
worthwhile and important.
And in the battle to shape the Net, the genuine visionaries, theorists, and
even the political analysts have already taken the field. By assuming the
mantle of public debate, the too-fabulous New Media in-crowd behind the
manifesto has done a disservice to those of us in for the long haul.
Put another way, this fashionable cyber-asceticism is bad news to those
actually involved with technology--condescending in assuming that those in
the trenches can't understand the ramifications of what they do, oblivious
in assuming that there's anything fresh in the manifesto, and irresponsible
in not crafting a document that provides a genuine foundation for
discussion; that is, a real manifesto.
And that's what is really galling: they blew a good opportunity. This vague,
random document doesn't lay groundwork for discussing the real social issues
confronting technologists, creators, consumers, and citizens.
The real battle--to bring the Net to its rightful, humble, ubiquitous place
in the world's social, political, and economic life--has little to do with
manifesto pronouncements such as "We are technology 'critics' in the same
way, and for the same reasons, that others are food critics, art critics, or
literary critics."
The public is best brought onto the battlefield by careful, informed,
comprehensible discourse; these "critics" haven't even drawn up a readable
map of the countryside.
Don't let this single-mast ship of fools sail away with the discussion. They
have no authority (intellectual, moral, or otherwise) to dictate the terms
of debate, especially since their manifesto makes such a mess of it. That
debate belongs to you and me and the rest of the industry--and your mom's
bridge club--at least as much as it does to these
Siskel-and-Ebert-come-latelies.
But don't forget: when you're done amusing yourself with the technorealists'
down-the-middle drive for pundit spots in Harper's, The Nation, and the Utne
Reader, you've got a lot of work to do to build the real Internet.
Web doyenne Angela Gunn has been covering the Internet and its culture for
nine years. Send e-mail to agunn at zd.com.
Send us your questions and comments about the Internet Computing MegaSite.
[Navigate the Internet Computing MegaSite]
[Image]
-----------------
Robert A. Hettinga
Philodox Financial Technology Evangelism
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Philodox: , e$:
From telco at telco.it Tue Jun 16 15:41:41 1998
From: telco at telco.it (Telco Telefonia)
Date: Tue, 16 Jun 1998 15:41:41 -0700 (PDT)
Subject: Telephone security - Greetings from Italy
Message-ID: <001101bd9948$f32316a0$ede53ec3@mauro>
Hi.
We are looking for resellers, visit us.
This is a message of promotion and information; you belong to a list whose
adherent we think to have interested in the telephone security and the
telephone market.
Best regards
Dario MARLIA - President TELCO Telefonia
dmarlia at telco.it
Home page : http://www.telco.it
Home page Security Telephone Products: http://www.telco.it/security
Home page Telephone Equipments: http://www.telco.it/telephony
Home page Computer Telephone Integration (CTI): http://www.telco.it/computer
Home page Italian Decorator Phones: http://www.telco.it/telephones
To let be canceled by the list it is simple, is enough to re-send (forward)
this message to: deleteme at telco.it
*********************************************
company: TELCO Telefonia srl
address: via dei Metalmeccanici, 53
city: CAPEZZANO Camaiore/Lucca
country: ITALY
zip: 55040-i
Tel: +39(0)584 969608 - 969654 - 969621
Fax : +39(0)584 969637 - 969672
e-mail: telco at telco.it
visit us at http://www.telco.it
*********************************************
From Mshall at aol.com Tue Jun 16 18:44:03 1998
From: Mshall at aol.com (Mshall at aol.com)
Date: Tue, 16 Jun 1998 18:44:03 -0700 (PDT)
Subject: gjhyjfg
Message-ID: <11ce60ed.35873618@aol.com>
ghjkgjfj
From ATU5713 at compuserve.com Wed Jun 17 04:35:58 1998
From: ATU5713 at compuserve.com (Alan Tu)
Date: Wed, 17 Jun 1998 04:35:58 -0700 (PDT)
Subject: Please update this
Message-ID: <199806170913_MC2-407F-35CC@compuserve.com>
Hi all,
First of all, since I am not subscribed to the list, please reply to my
address atu5713 at compuserve.com
You know, there is a program written in the Euphoria programming language
that helps in chaining remailers. It also works with PGP. Before I try
it, however, I want to know if the remailers in the .ini file are still
operating. Would someone please tell me if the following remailers are
still operating. * means that the remailer supports encryption by pgp.
hh at pmantis.berkeley.edu
hh at cicada.berkeley.edu
hh at soda.berkeley.edu
nowhere at bsu-cs.bsu.edu
remail at tamsun.tamu.edu
remail at tamaix.tamu.edu
* ebrandt at jarthur.claremont.edu
* hal at alumni.caltech.edu
* remailer at rebma.mn.org
* elee7h5 at rosebud.ee.uh.edu
* phantom at mead.u.washington.edu
* hfinney at shell.portal.com
* remailer at utter.dis.org
00x at uclink.berkeley.edu
* remail at extropia.wimsey.com
thanks in advance.
--Alan
From fay16 at msn.com Wed Jun 17 06:07:49 1998
From: fay16 at msn.com (free)
Date: Wed, 17 Jun 1998 06:07:49 -0700 (PDT)
Subject: FREE TRIAL MEMBERSHIP
Message-ID: <19980617525OAA44566@post.nwnet.co.uk>
THE LATEST IN ADULT TECHNOLOGY!!!
BRAND NEW XXX ADULT SITE
FREE TRIAL MEMBERSHIP
Please visit the latest in Live Video Conferencing.
1000 channels of hardcore!! Live rooms!!! Young dancers!!!
Large picture gallery! Thousands of pictures!! Come and visit our site for
a great experience.
http://206.165.153.5/best/zx2/index.html
****************************************
****************************************
From ATU5713 at compuserve.com Wed Jun 17 07:06:06 1998
From: ATU5713 at compuserve.com (Alan Tu)
Date: Wed, 17 Jun 1998 07:06:06 -0700 (PDT)
Subject: Invalid reference
Message-ID: <199806171143_MC2-407E-7D24@compuserve.com>
The chain program I referred to earlier is not, repeat not, as far as I
know, written in Euphoria. I don't know what led me to think that.
--Alan
From jdobruck at kki.net.pl Wed Jun 17 08:10:25 1998
From: jdobruck at kki.net.pl (Jan)
Date: Wed, 17 Jun 1998 08:10:25 -0700 (PDT)
Subject: Crypto Books/Archive
Message-ID: <3587F42C.53275B32@kki.net.pl>
Greetings,
I wish to inquire where I can buy books about cryptography. If these
bookstores are located somewhere in Europe then it would be a little
more convenient for me, if not, then that's not too much of a problem.
Thanks in advance.
I'm working on my archive, although the reason why there hasn't been
anything new for a while is because I'm doing preparation courses in
math and physics for the Warsaw University of Technology. However,
I'll have something new on there soon. The reason why there isn't
anything great at the moment is because I'm a lousy worker, so I can't
be rushed.
I have this idea bout making a cryptography program that will encrypt
pictures. I know that you can do this with PGP, but I mean it in a
little different way. What I want to do is this: You have opened a
picture in, ACDSee for example, and you want some of the picture only
for a certain person. So you chose that part of the picture, encrypt
it, and send it to the person you want. What do you guys think?
Sincerely yours,
Jan
From www at dejanews.com Wed Jun 17 09:41:21 1998
From: www at dejanews.com (www at dejanews.com)
Date: Wed, 17 Jun 1998 09:41:21 -0700 (PDT)
Subject: Deja News Registration Confirmation
Message-ID: <199806171819.NAA00836@x7.dejanews.com>
Welcome to My Deja News!
You have registered for My Deja News using the email address:
cypherpunks at toad.com. If you did not register for My Deja News,
please ignore this message.
To enable you to post messages on Deja News, we must confirm
your email address. This allows us to minimize "spam" and other
problems. To confirm your email address, visit the following Web
page:
http://www.dejanews.com/ec.xp/Zf6ae0a36706f3c065455878ce0a7f9a65e952de
If your email software supports it, you can simply click on the
link. Since this Web page address (URL) is quite lengthy, however,
you may find it necessary to copy the entire URL and paste it into
your Web browser.
As a reminder, your username is jahminh and your password
is tonite. You may wish to keep this email to refer to in
case you forget.
If you have any questions about My Deja News, please refer to the
Help page at http://www.dejanews.com/help/help_regstr.shtml
Thanks,
Deja News
From storm at uit.net Wed Jun 17 09:52:05 1998
From: storm at uit.net (Jason)
Date: Wed, 17 Jun 1998 09:52:05 -0700 (PDT)
Subject: Crypto Books/Archive
Message-ID: <006101bd9a1d$29071120$a460a0d1@jason.kc1.net>
> I have this idea bout making a cryptography program that will encrypt
> pictures. I know that you can do this with PGP, but I mean it in a
> little different way. What I want to do is this: You have opened a
> picture in, ACDSee for example, and you want some of the picture only
> for a certain person. So you chose that part of the picture, encrypt
> it, and send it to the person you want. What do you guys think?
Jan,
I can't say that I full understand what you're doing, or maybe I just don't
see why you're doing it. If you mean that you want to take part of a picture
and encrypt it and send it to someone, couldn't you just crop the desired
section of the image out and save it as a different file, then encrypt it
via PGP, etc. I don't see how encrypting part of a picture is any different
than, say.. cutting part of a text file out and saving it to another file
and encrypting that portion of it. That isn't to say that if you had some
new form of encryption that it wouldn't be worth exploring, only that I tend
to question the originality or usefulness (relative to current, widely
available crypto technology) of your concept. Maybe you could explain it in
more detail to us.
...Jason Sloderbeck
stom at uit.net
Plasmic Computer Systems
From jdobruck at kki.net.pl Wed Jun 17 13:55:17 1998
From: jdobruck at kki.net.pl (Jan)
Date: Wed, 17 Jun 1998 13:55:17 -0700 (PDT)
Subject: Cypherpunk on IRC
Message-ID: <35882DF4.18A9D0C6@kki.net.pl>
Greetings...
So where are you people on IRC? it would be nice to talk more directly
bout crypto ideas....
Jan
From haxor_401 at juno.com Wed Jun 17 13:57:41 1998
From: haxor_401 at juno.com (OoOoOoO OoOoOoO)
Date: Wed, 17 Jun 1998 13:57:41 -0700 (PDT)
Subject: No Subject
Message-ID: <19980617.165512.6918.1.HaXoR_401@juno.com>
What is the command to recieve this list in DIGEST form.?
_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]
From jdobruck at kki.net.pl Wed Jun 17 15:09:06 1998
From: jdobruck at kki.net.pl (Jan)
Date: Wed, 17 Jun 1998 15:09:06 -0700 (PDT)
Subject: Crypto Books/Archive
In-Reply-To: <006101bd9a1d$29071120$a460a0d1@jason.kc1.net>
Message-ID: <35883F39.954C5B5D@kki.net.pl>
Jason wrote:
>
> > I have this idea bout making a cryptography program that will encrypt
> > pictures. I know that you can do this with PGP, but I mean it in a
> > little different way. What I want to do is this: You have opened a
> > picture in, ACDSee for example, and you want some of the picture only
> > for a certain person. So you chose that part of the picture, encrypt
> > it, and send it to the person you want. What do you guys think?
>
> Jan,
Greetings,
> I can't say that I full understand what you're doing, or maybe I just don't
> see why you're doing it. If you mean that you want to take part of a picture
> and encrypt it and send it to someone, couldn't you just crop the desired
> section of the image out and save it as a different file, then encrypt it
> via PGP, etc. I don't see how encrypting part of a picture is any different
> than, say.. cutting part of a text file out and saving it to another file
> and encrypting that portion of it. That isn't to say that if you had some
> new form of encryption that it wouldn't be worth exploring, only that I tend
> to question the originality or usefulness (relative to current, widely
> available crypto technology) of your concept. Maybe you could explain it in
> more detail to us.
>
> ...Jason Sloderbeck
> stom at uit.net
> Plasmic Computer Systems
The idea is like with the plug-in for Pegasus Mail. You don't need to
go to PGP encrypt the message and then send it. You can do that right
through the Pegasus Mail. Same idea with my program. Would make it a
little faster instead of encrypting your piece of picture in many
steps you can do it with one push of a button.
Another thing. You're right. You can cut the piece of picture you want
to encrypt and then encrypt that little piece. But if you want to send
the whole image, and make that little piece invisible to everyone else
but the sender... this is what I'm getting at. If someone still
doesn't understand, I'll try again later.
Sincerely yours,
Jan
From StanSqncrs at aol.com Wed Jun 17 17:51:34 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Wed, 17 Jun 1998 17:51:34 -0700 (PDT)
Subject: One last time
Message-ID: <9be137bf.3588643d@aol.com>
Sorry about buggin' you guys so much on this, but I think I have a final piece
of the puzzle together. It's amazing how well all the pieces fit. I think
now the big task is to keep it on-line (and promotion - spread the word!).
If you weren't convinced before, this should do it. Check it out again,
Stan,
http://members.aol.com/whtsametau/camel/index.htm
From lreed at west.cscwc.pima.edu Wed Jun 17 20:31:50 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Wed, 17 Jun 1998 20:31:50 -0700 (PDT)
Subject: SweatHog Log -- SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C7DB7.A54F7F00.23@west.cscwc.pima.edu>
SweatHog Log -- SPACE ALIENS HIDE M DRUGS!!!
---------------------------------------------
[Austin Nutly News--LoneBeerState]IT WAS THE tURKEbASTE
of times, it was the LiverWurst of times...
Bob Wills Beer and Lone Star Music. Captain BeefJerky and
the Lost Bozo Band opening for Jerry Jeff Garcia and the
DreadFul Drunks at the Split Lip Saloon. Knocking back
shots of Townsend's Treacherous Treat at Amaretto World
HindQuarters. Mom Nelson declaring C.J. Parker to be her
illegitimately adopted son, making him a half-nelson and
making him live in the basement of the outhouse behind
Willie's Fool Hall.
A million degrees in the shade and TruthMongrel sitting in
the truck in the parking lot of the HEB Central Market Cafe
while Toto was inside drinking cold beer and asking the
barmaid what type of wine goes with TruckRoasted PuppyDog.
Drinking West Texas ChugWater...
Austin CypherPunks gathered around a couple of tables in
the beer garden, the BigRedBook unflapping in the breeze
and serving as a standard to rally together a handful of
anarchist frontiers(wo)men to prepare to stand as the lone
outpost against the mighty Digital Army of Santa AnnaChrist
in his War Against The Digitally United States of Terra.
JimBob Choate drawing a line in the sand...
Most of the CypherPunks crossed that line--the bar was on
the other side of it--but they came back.
A strange, deranged desperado appearing out of nowhere to
announce that someone had nuked DC, and he wanted to ask
them a few questions, then sitting down and babbling in a
nonsensical manner in order to distract their attention
while he played footsie with the blonde sitting across from
him, until she finally left, in disgust.
WeBeastMaster JimBob waiting until only the StewedGuy and
the Disparate Stranger were left before passing along the
SecretMessageThatHadNoMeaning from Declan McCullagh. The
Dissipating Strangler fading into the mist with a bottle
of red wine tucked under his arm.
Lieutenant JimBob Choate, Army of Dog-Digital Division &
MeatSpace Multiplication, feeling a shiver go down his spine
as he walked slowly to his vehicle, heard a TruthMongrel
howling in the distance, and realized that 'red wine' goes
with TruckRoasted PuppyDog.]
MenInTheShadows unable to find the second VirtualNuclear
Device claimed to have been planted in a pubic building
eleven KILLometers from MongerItaVille--wondering if their
first mistake hadn't been to threaten a six-year old child
and his mother with deportation from Canada if they continued
to involve themselves in the battle for Medicare in Saskatchewan.
For almost a half-century thereafter, the child had been a
thorn in their side, seemingly breaking every rule in the book,
violating everything that anal-retentive WhiteCanadianImmigrants
held sacred as they strove to promote the Rule of (White)Law
in the Great White Snort. Despite their many failed attempts
to imprison him, ususally succeeding only in harrassing him
and causing him great personal loss and expense, they had never
before had to fear for their own lives and the safety of their
families, but now all that had changed...
An elite, secretive cabal of Mounties gathered around a table
reviewing the security implications of a hidden file being found
on their computer system which had the same name as the file
on the floppy disk left at the site of the first VirtualNuclear
Device found in a public building eleven KILLometers from
MongerItaVille.
Silence in the room as each of them heard, in their own mind,
the screams of the Author as they resounded through the Analogue
Reality of his home in Bienfait, through the Digital Reality of
MongerItaVille, and through the MeatSpace DigiZeros on a dozen
or more Canadian Government computer systems.
"OU WANT TO FUCK WITH *CHILDREN*? OU WANT TO STEAL M NEPHEWS'
COMPUTERS? OU WANT TO FILE FALSE CHARGES ON M NEIGHBOR'S FUTURE
LITTLE GLUE-SNIFFER, OU NAZI RATFUCKERS?
"THE *MEATSPACE* REVOLUTION IS *NOW*!!!!"
The Author may be bluffing, of course, but could they really
afford to take that chance?
HeOrShe had offered them "pole position" on receiving the key
that the BackDoor Boogie (TM) was being played in to provide a
soundtrack to the RCMP Musical Ride taking place on Trojan Horses
ridden by DigitalAnarchists throughout Canadian Government computer
systems.
The offer was simple enough...return all of the stolen computers
to the possession of Human Gus-Peter and the RCMP would get the
checkered flag in the race against finding their digital security
breach...if there, in fact, *was* one...
The 'clues' of its existence were rather vague, though startling,
and they could conceivably be the result of collusion on a part of
the Author's widespread Inner Circle, which undoubtedly included
more than a few people with access to secure Canadian Government
computer systems.
Of course, the phrase 'pole position' implied that there were
others in the race who the Author could bless with the checkered
flag if they were the first to provide Human Gus-Peter with a
state-of-the-art portable multi-media computer such as the one
that had been stolen from the Author, but the Mounties were
reluctant to suffer the loss of face that would be involved in
rectifying the consequences of their own illegal and heavy-handed
acts of oppression and repression.
The Mounties knew that they were, to a certain extent, vulnerable,
having actively promoted the persecution of a mentally unstable
individual at a time when his medications were running low, in the
hope that he would explode in a manner that would cause him to
perform actions which he could be legally held accountable for.
It wouldn't look good, however, if it came out that the Mounties
themselves were taking the precaution of wearing bullet-proof vests
for their own protection during their attempts to provoke the
Author to actions of raging insanity, while leaving the children of
the community vulnerable to the MeatSpace actions of a violent
psychotic currently writing the "Bienfait Nutly News 'KILL THE
CHILDREN' Special."
The RCMP had failed to intercept the computer disks and audio
tapes that the Author had mailed to Declan McCullagh from Montana,
but the Netly News journalist had not yet received them, so it
seemed that *someone* had intercepted them.
Every indication was that there was only a single copy of the
material the Author had stashed south of the 49th parallel just
before his computers were confiscated, but there was no telling,
for sure. Besides, the Mounties had confiscated the voice-activated
tape recorder they found on their last illegal entry to his home,
and the audio tapes he had could conceivably be of one of the
American intelligence agents monitoring his residence, such as
the retired Air Force Intelligence officer who had become rather
friendly with him at the CoalDust Saloon.]
It was a shame that the Author had found and destroyed the
'evidence' they had planted in his truck shortly before he
skipped the country, but the 'evidence' they had 'found' after
his departure would suffice. The reference to the *second*
VirtualNuclearDevice was troubling, however, since its existence,
if real, could result in the whole operation blowing up in their
face.
Nonetheless, the Mounties considered it better to lose a few
citizens, or even a whole town, than to lose face, and the
Author's modus operandi was to provide fair warning before the
date and time of his nefarious activities, so the Mounties were
confident that they could follow in the footsteps of the BATF and
arrange to be conveniently gone when the shit hit the fan.
Then they would have that ShitDisturbingMonster dead to rights...
From jdobruck at kki.net.pl Thu Jun 18 04:13:09 1998
From: jdobruck at kki.net.pl (Jan)
Date: Thu, 18 Jun 1998 04:13:09 -0700 (PDT)
Subject: Cypherpunks/IRC
Message-ID: <3588F701.46627B60@kki.net.pl>
Greetings,
I go to #cypherpunks and it says that I create the room. Where the
heck is the room?
Jan
From gowry at IBS-GmbH.net Thu Jun 18 05:19:32 1998
From: gowry at IBS-GmbH.net (Gowrynath Sivaganeshamoorthy)
Date: Thu, 18 Jun 1998 05:19:32 -0700 (PDT)
Subject: Cypherpunks/IRC
In-Reply-To: <3588F701.46627B60@kki.net.pl>
Message-ID: <19980618141915.A13879@stadtleben.de>
Du - Jan - hast am Thu, Jun 18, 1998 at 01:16:17PM +0200 folgendes zum Thema "Cypherpunks/IRC" geschrieben:
| Greetings,
|
| I go to #cypherpunks and it says that I create the room. Where the
| heck is the room?
|
| Jan
I think you need to say which net. IRCnen, DALnet, EFnet, UNDERnet ?
bye,
Gowry
--
=>Gowrynath Sivaganeshamoorthy Administration <
=>IBS GmbH Hamburg Ph: +49 40 668649 11 <
=>Friedrich-Ebert-Damm 202a Fx: +49 40 668649 49 <
=>22047 Hamburg / Germany Ripe: IZAX / InterNic: GS6450 <
=>Key fingerprint = E3 E2 28 FA A5 03 87 95 A2 6F EE 00 9F BB CE 21 <
From video at streetparty.org Thu Jun 18 05:48:42 1998
From: video at streetparty.org (video at streetparty.org)
Date: Thu, 18 Jun 1998 05:48:42 -0700 (PDT)
Subject: Win this video!
Message-ID: <199806181228.IAA14928@ncc.uky.edu>
Video from
STREET PARTY '98 - UK WILDCAT STYLE
http://www.angelfire.com/biz/web201c5/index.html
From martybishop at yahoo.com Thu Jun 18 05:52:03 1998
From: martybishop at yahoo.com (Martin Bishop)
Date: Thu, 18 Jun 1998 05:52:03 -0700 (PDT)
Subject: TheCodex's D.I.R.T. surveillance software
Message-ID: <19980618125041.28878.rocketmail@send1a.yahoomail.com>
I have come across a webpage at
http://www.thecodex.com/dirt.html
that describes a so-called D.I.R.T. (Data Interception by Remote
Transmission) software enabling the attacker (be it a criminal or
police or govt.) to remotely keep a close eye on everything that't
going on on the target PC. I can pretty much imagine how it works once
it's installed but what I'd like to know is *how* it gets installed on
the target computer?
I would also appreciate any info about the product from people with
first hand experience, since I intend to do an in-depth research for
one of the European Governments.
Thanks in advance!
Rgds,
Martin Bishop
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com
From jya at pipeline.com Thu Jun 18 05:52:22 1998
From: jya at pipeline.com (John Young)
Date: Thu, 18 Jun 1998 05:52:22 -0700 (PDT)
Subject: Senators Challenge Crypto Policy
Message-ID: <199806181252.IAA06378@camel14.mindspring.com>
[Congressional Record: June 17, 1998 (Senate)]
ENCRYPTION
Mr. LOTT. Mr. President, I rise today out of concern for our nation's
computer and electronic industries. As you are well aware, the
Administration's
[[Page S6438]]
export policies prohibit American companies from selling state-of-the-
art encryption technology abroad without recovery keys and back door
access. Encryption is a series of mathematical formulas that scramble
and unscramble data and communications. It is used to thwart computer
hackers, industrial and foreign espionage agents, and criminals from
gaining access to and reading sensitive personal, business, and
military communications. The higher the bit-key length, the more
difficult it is for unauthorized persons to break the code. Technically
advanced encryption ensures that an individual's medical, financial,
business, personal records and electronic-mail cannot be accessed
without their consent. The Administration is now promoting the
deployment of recovery keys so designated third parties would be able
to access and share with law enforcement the computer data and
communications of American citizens without their knowledge. Currently,
government mandated key escrow is not required and is opposed by the
computer industry, privacy advocates, legal scholars, and by many
members of Congress.
Mr. LEAHY. While current law does not mandate any key recovery, the
current Administration, just as past Administrations, uses the export
control regime to ``dumb down'' the encryption available for widespread
integration into high-tech products intended for both domestic use and
for export to foreign customers. Export regulations in place now are
being used expressly to coerce the development and use of encryption
products capable of giving law enforcement surreptitious access to
plaintext by conditioning the export of 56-bit DES encryption on
development of key recovery features.
These regulations are scheduled to sunset in December 1998, at which
time export of even 56-bit strength encryption will no longer be
permitted. I understand that the Administration is already undertaking
discussions with industry on what will happen upon sunset of these
regulations. I have long contended that taking unilateral steps will
not resolve this issue, but instead could delay building the consensus
we so urgently need. This issue simply cannot by resolved by Executive
fiat.
Mr. ASHCROFT. Mr. President, I have been involved in the debate
regarding encryption technology and privacy for more than three years
now. In the course of that time I have not seen any real attempt by the
White House to resolve this problem. In fact, over the course of that
time the Administration has moved further from negotiation by taking
increasingly extreme positions on this critical national issue.
Mr. CRAIG. Mr. President, as you have heard, current U.S. policy
allows only encryption below the 56-bit key length to be sold abroad.
For a long time now, software companies have argued that this level of
encryption is so low it provides little security for the information
being transmitted over the ``super highway.'' This policy also states
that, in the production of encryption stronger than 56-bit, software
companies must provide some type of ``backdoor'' access to ensure law
enforcement can decode encrypted material.
Addressing this from an economic perspective, customers--especially
foreign customers--are unwilling to purchase American encryption
products with backdoors and third-party access. This is particularly
true since they can buy stronger encryption overseas from either
foreign-owned companies or American owned companies on foreign soil
without these invasive features.
Mr. WYDEN. Since coming to the Senate, I have worked side-by-side
with Senators Burns, Ashcroft, Leahy and others on the critical issue
of encryption. Our common goal has been to craft a policy that puts the
United States squarely out front of the crypto-curve, rather than locks
us permanently behind it. A one-size-fits-all government policy simply
won't work in this digital era. We all recognize and acknowledge the
legitimate needs of law enforcement and the national security
communities, but tying the hands of America's high technology industry
in the process will serve neither those needs, nor the national
interest in maintaining our competitive edge in the fiercely
competitive global marketplace. It's time to move forward with
comprehensive encryption reform legislation.
Mr. BURNS. I would like to point out that the government's plan for
encryption--whether they call it ``key escrow'' or ``key recovery'' or
``plaintext access''--simply won't work. Eleven of the world's most
prominent computer security experts have told us government mandated
key recovery won't work because it won't be secure, as explained in a
study published this week by the Center for Democracy and Technology.
Key escrow also won't work because it will cost billions, as revealed
in a recent study published by the Business Software Alliance. We have
also been told that the kind of system the Administration wants is not
technically feasible. Additionally, constitutional scholars testified
that government mandated key escrow, third party recovery probably
violates the Bill of Rights.
Mr. LOTT. Even though a national recovery system would be technically
unfeasible, costly, and violates an individual's privacy rights, the
Administration continues to require key escrow as a precondition for
relaxing America's encryption policy. Again, Mr. President, I would
point out that state-of-the-art encryption is available in the
international marketplace without key recovery and without backdoor
access. This backdoor door requirement is simply backward thinking
policy. It does not make sense to hold the computer industry hostage to
force the creation of such an unworkable system.
Mr. BURNS. The Majority Leader is absolutely right. We do not need
experts to tell us key recovery will not work. All that is needed is a
little common sense to understand that no one will buy systems with
backdoor access. Criminals will not escrow their keys and terrorists
will find keyless systems from America's foreign competitors. There is
nothing we can do to stop undesirables from using strong, unescrowed
encryption.
Mr. LOTT. Even though advanced encryption products are widely
available across the globe, the White House continues to stall
Congressional and industry attempts to reach a sensible market oriented
solution to the nation's outdated encryption export regime. This
stonewalling tactic will only cede even more of our nation's technology
market to foreign competitors and America will lose forever its ability
to sell encryption technology at home and abroad.
It is time to change America's export policy before it is too late.
If the Administration will not do what is right, reform its export
regime, then Congress must enact encryption reform during this session.
Mr. LEAHY. The Majority Leader is correct that reform of our
encryption policy is needed. The Attorney General came to the Hill in
March and asked for a legislative moratorium on encryption matters.
This request was made because the Administration wanted to talk with
the information technology industry about developing means for law
enforcement to gain surreptitious access to plaintext scrambled by
strong encryption. According to eleven of the world's leading
cryptographers in a report reissued on June 8, the technical risks and
costs of such backdoors ``will exacerbate, not alleviate, the potential
for crime and information terrorism'' for America's computer users and
our critical infrastructures.
In the Senate we have a name for debate that delays action on
legislative matters. We call it a filibuster. On encryption policy, the
Administration has been willing to talk, but not to forge a real
solution. That amounts to a filibuster. The longer we go without a
sensible policy, the more jobs will be lost, the more we risk eroding
our privacy rights on the Internet, and the more we leave our critical
infrastructures vulnerable.
Mr. BURNS. We can readily see that the current U.S. policy on
encryption jeopardizes the privacy of individuals, the security of the
Internet, and the competitiveness of U.S. industry. We have been
debating this issue since the Administration's introduction of the ill-
fated Clipper chip proposal over five years ago. Yet no substantial
change in Administration policy has taken place. It is time for us to
take action.
I first introduced comprehensive encryption reform legislation in the
[[Page S6439]]
form of the Pro-CODE bill over two years ago, then reintroduced it in
this Congress with the cosponsorship of the Majority Leader, Senators
Ashcroft, Leahy, Wyden, and others. Along with Senators Ashcroft,
Leahy, and others, I am also an original cosponsor of the E-PRIVACY
bill, which would foster the use of strong encryption and global
competitiveness. We have held numerous hearings on the issue. Yet
despite the increasingly desperate drumbeat of criticism from industry,
individuals, and privacy groups, from across the political spectrum,
the Administration's policy has remained fundamentally unchanged.
Mr. LEAHY. Since the hearing I chaired in May 1994 on the
Administration's ``Clipper Chip'' proposal, the Administration has
taken some steps in the right direction. Clipper Chip is now dead, and
the Administration has transferred authority over the export of
encryption products from the State Department to the Commerce
Department, as called for in legislation I introduced in the last
Congress with Senators Burns, Wyden and others. Furthermore, the
Administration has permitted the export of up to 56-bit DES encryption,
at least until the end of this year. But these actions are simply not
enough for our high-tech industries to maintain their leading edge in
the global marketplace.
Mr. ASHCROFT. Our technology companies need to be able to compete
effectively. Without reasonable export laws our technology sector will
be seriously harmed. More encryption companies will leave the country
so they are free to sell their products around the globe as well as
within the United States. Make no mistake, the market will not be
denied. Today, robust encryption products from Canada, Japan, Germany
and elsewhere are being sold on the world market. You have heard of the
companies that are manufacturing and selling encryption. They are
Nortel, Nippon and Seimens. These are not upstart companies. They are
substantial players on the international scene, and they offer
encryption products that are technically and financially competitive
with those produced in the U.S.
Mr. LOTT. That's right. In fact, a recent survey conducted by Trusted
Information Systems found that hundreds of foreign companies sell over
600 encryption products from 29 countries. It is even possible to
download some of the strongest technology available, 128-bit key length
encryption, off of the Internet. Clearly, America's policy of
restricting the sale of American encryption software and hardware has
not impacted the availability and use of this technology throughout the
globe.
No one disputes the fact that the development and use of robust
encryption worldwide will continue with or without U.S. business
participation. What is particularly disturbing to me is that export
controls, instead of achieving their intended purpose, have only served
to deny America's premier computer industry the opportunity to compete
on a level playing field with foreign competitors. Costing our economy
and our nation billions of dollars and the loss of countless American
jobs in the process. Given the wide availability of encryption
technology, continuing to restrict U.S. access to foreign markets makes
no sense.
Mr. ASHCROFT. That is absolutely correct. The Administration's
encryption policy is, in effect, a tax on American consumers. We owe it
to these customers and the innovators in the software industry to
reform this encryption policy now. From the birth of the United States,
this country has been a world leader in innovation, creativity,
entrepreneurship, vision and opportunity. Today all of these American
attributes are on display in our technology sector. Whether in
telecommunications, or computer hardware or software, the United States
has maintained a leadership position because of the opportunities
afforded to people with the vision, determination and responsibility to
reach for their highest and best. We must work diligently to ensure
that ample opportunities are maintained in this country for our
technology sector to continue to thrive and innovate. If companies are
stifled and cannot compete, then the people, the ideas, the jobs, and
the economic growth will simply go elsewhere.
Mr. BURNS. In the computer business these days, they talk about
``Internet time.'' In the Internet industry, where product life cycles
can be as low as 6 months, the world changes rapidly. Yet we have been
debating this issue for over five years now, while America's sensitive
communications go unsecured, our critical information infrastructures
go unprotected, and our electronic commerce jobs get shipped overseas.
It is time for the Congress to act.
Mr. ASHCROFT. If this issue is not resolved, and resolved soon, we
will lose this industry, we will lose our leadership position in
technology, and our national security will suffer. We have a choice to
make as policy makers--do we allow our companies to compete
internationally or do we force them, by our antiquated and ill-
conceived government policy, to move overseas. We cannot simply ignore
the reality that robust encryption exists in the international
marketplace now. Instead, we must allow our companies to compete, and
do so now. We cannot allow extraneous issues to stand in the way of
remedying the deficiencies with our current approach to encryption. We
must recognize that keeping the encryption industry on American shores
is the best way to ensure national security. We would not think of
allowing all our defense industries to move abroad. By the same token,
we should not force the encryption industry abroad through outdated
policies. Simply put, strong encryption means a strong economy and a
strong country. This concern is just one of the many reasons we need to
pass effective encryption legislation this year and just one of the
reasons that Senator Leahy and I recently drafted the E-PRIVACY bill,
S. 2067.
Mr. LEAHY. I join with my colleagues from both sides of the aisle in
calling for passage of good encryption legislation that promotes
computer privacy, fosters the global competitiveness of our high-tech
industries, and encourages the widespread use of strong encryption as
an online crime prevention and anti-terrorism tool. The E-PRIVACY bill
that I have sponsored with Senator Ashcroft, Senator Burns and others,
satisfies these goals. Prompt Senate consideration of encryption
legislation is sorely needed to protect America's economy and security.
Mr. CRAIG. Mr. President, the E-PRIVACY bill seeks to protect
individual privacy, while at the same time addressing national security
and law enforcement interests. It would also modernize export controls
on commercial encryption products.
The E-Privacy Act specifically addresses the concerns of law
enforcement. First and foremost, it makes it a crime to intentionally
use encryption to conceal incriminating communications or information.
It also provides that with an official subpoena, existing wiretap
authority can be used to obtain communications decryption keys/
assistance from third parties.
Mrs. MURRAY. Mr. President, I want to thank Senator Leahy, Senator
Burns and Senator Ashcroft as well as Senator Lott and Senator Daschle
for their work and leadership on the issue of encryption. I am proud to
be an original cosponsor of S. 2067, the E-PRIVACY Act.
This is my sixth year as a member of the Senate and the sixth year I
have advocated for reasonable legislation on encryption. Sadly, the
Administration has not been a constructive player in this debate. It is
time for the United States to acknowledge that we no longer exclusively
control the pace of technology. Purchasers around the world can
download software off of the Internet from any country by simply
accessing a website. Foreign purchasers have turned to Russian, German,
Swiss and other foreign vendors for their encryption needs.
Washington state and American companies deserve the opportunity to
compete free from unreasonable government restrictions. Their role in
the international marketplace should be determined by their ingenuity
and creativity rather than an outdated, ineffectual system of export
controls. The time to act is now. I urge the Senate to consider the E-
PRIVACY Act at the earliest opportunity.
Mr. BURNS. The basic facts remain the same. People need strong,
unescrowed encryption to protect themselves online in the information
[[Page S6440]]
age. Law enforcement has legitimate concerns about the spread of this
technology, and we must work to provide them the tools and expertise
they need to keep up with advances in encryption technology. We cannot
stop time, however. The genie is out of the bottle. As Bill Gates, the
CEO of Microsoft, recently said, ``Encryption technology is widely
available outside the United States and inside the United States, and
that's just a fact of life.''
Mr. CRAIG. With the rapid expansion of the ``super highway'' and
Internet commerce it is crucial we bring encryption legislation to the
forefront. A secure, private and trusted national and global
information infrastructure is essential to promote citizens' privacy
and economic growth.
Mr. BURNS. As my colleagues recognize, technically advanced and
unobtrusive encryption is fundamental to ensuring the kind of privacy
Americans will need and desire in the years to come. Congress must
choose a future where individuals and companies will have the tools
they need to protect their privacy, not a future where people fear the
use electronic commerce because they have no security.
I commend the Majority Leader, Senators Ashcroft, Leahy, Craig,
Wyden, and Murray for their vision and bipartisan leadership on this
issue. I hope that Congress will be able to move forward with real
encryption reform legislation that protects the privacy and security of
Americans in the Information Age, before it is too late.
Mr. LOTT. I think it is worth repeating to my colleagues that the
Administration's approach to encryption makes no sense. It is not good
policy. Continuing to restrict the foreign sale of American encryption
technology that is already available abroad, or will soon be available,
is anti-business, anti-consumer, anti-jobs, and anti-innovation.
The time for a change in America's export regime is long overdue.
Unfortunately, the Administration continues to support its outmoded and
competition-adverse encryption control policy. That is why this
Congress needs to find a legislative solution to this issue.
If America's export controls are not relaxed now, then Congress
places in peril our entire technology industry. Not just those
companies that create and market encryption products and services, but
virtually every company involved in the development and sale of
computer hardware and software. Congress cannot and will not put
America's entire technological base at risk for an ineffective and
outmoded export policy on encryption.
____________________
From jya at pipeline.com Thu Jun 18 06:20:49 1998
From: jya at pipeline.com (John Young)
Date: Thu, 18 Jun 1998 06:20:49 -0700 (PDT)
Subject: Tim's views on the racial problem in America
In-Reply-To: <199806180256.EAA13151@basement.replay.com>
Message-ID: <199806181320.JAA04879@camel14.mindspring.com>
These bland-info-overloaded days, Blanc:
The Center of Attention = the Eccentric
You will not be visible, listened to, or read online
unless you got something deeply offensive to
say, quote, report, swear to god to, degrading of
self and others, litigable, libellous, insulting, vulgar,
prohibited by multiple laws, violative of fairness and
decency, newsworthy, or a well-thought-out alternative
to sheepledom, Joe Sixdom, PC, MC, Real Identity,
the Tax Code, unequal distribution of wealth, straight
sex, kinky sex, fat, diet, exercise, sloth, grammatical
rigor, speaking in unknown tongues, numeracy,
science, art, politics, religion, quantum computing,
nanotech, borderlessness, Y2K, the talk shows,
the amazing future of the Internet.
The center is gone for good, cry a tear, then bravely affirm:
good riddance to Ptolemaic centricity. Normalcy is now para.
Listen to what your teeth are picking up from the spectrum
transmitting to the inner ear bone: the spheres whistling
Dixie in the dark.
Tim's telling what the quarks are whispering.
Tim's an oddball wizard, we're all bank-shot eccentrics,
no home on earth, we the intergalactic outcasts gumming
the dried teat once unemptiable: faith, self, clan, country,
ideology, bye, bye (white male) American pie.
There's one Rosebud refuge left: the US Senate/Bohemian
Club.
From jdobruck at kki.net.pl Thu Jun 18 06:44:32 1998
From: jdobruck at kki.net.pl (Jan)
Date: Thu, 18 Jun 1998 06:44:32 -0700 (PDT)
Subject: FLMASK
Message-ID: <35891A89.64D37B5F@kki.net.pl>
Greetings,
This is the address of flmask... if you're intrested.
Side note: In my program I want to use PGP.
http://www.igat.com/flmask/home_e.htm
Sincerely yours,
Jan
From fiy83 at unipa.it Thu Jun 18 10:51:28 1998
From: fiy83 at unipa.it (fiy83 at unipa.it)
Date: Thu, 18 Jun 1998 10:51:28 -0700 (PDT)
Subject: Check this out, It's worth a look
Message-ID: <199806182489ZAA56214@202.1.230.110>
Wayward Teens
They Can't Keep Their Damn Clothes On!!!
We've Captured It On Film, and We're Giving It Away!
For The Next Two Weeks Only!!!
Come To, http://209.84.246.106/amateur/
You can also copy and paste the above URL.
7
From coy60 at ohrid.cca.vu.nl Thu Jun 18 11:05:40 1998
From: coy60 at ohrid.cca.vu.nl (coy60 at ohrid.cca.vu.nl)
Date: Thu, 18 Jun 1998 11:05:40 -0700 (PDT)
Subject: Returns You Have Asked For
Message-ID: <199806184210PAA51746@176.61.121.1>
America's largest monopoly shattered!!!!!
New growth market 2 1/2 times size of telephone industry
Now open to general public.
Over 50% returns. IRA approved.
More details and short video presentation here
http://205.134.183.46/fpc/alt.html
o
From hippyman at alltel.net Thu Jun 18 11:47:30 1998
From: hippyman at alltel.net (hippyman)
Date: Thu, 18 Jun 1998 11:47:30 -0700 (PDT)
Subject: TheCodex's D.I.R.T. surveillance software
Message-ID: <199806181847.NAA29802@client.alltel.net>
At 07:50 AM 6/18/98 , you wrote:
>I have come across a webpage at
>
>http://www.thecodex.com/dirt.html
>
>that describes a so-called D.I.R.T. (Data Interception by Remote
>Transmission) software enabling the attacker (be it a criminal or
>police or govt.) to remotely keep a close eye on everything that't
>going on on the target PC. I can pretty much imagine how it works once
>it's installed but what I'd like to know is *how* it gets installed on
>the target computer?
>I would also appreciate any info about the product from people with
>first hand experience, since I intend to do an in-depth research for
>one of the European Governments.
Why don't you contact the owner and ask him how it works? Posting to
cypherpunks and asking questions about it seems a bit unusual. Smells like
a spam.
You're name wouldn't be Spyking, would it?
hippyman
ICQ: 11517383
PGP Fingerprint: E3C3 35C8 0FD9 6F36 2ADD 0541 B58C F6BD D347 BD0A
Public Key: http://keys.pgp.com:11371/pks/lookup?op=get&search=0xD347BD0A
From nmarion at ibm.net Thu Jun 18 13:17:26 1998
From: nmarion at ibm.net (Nissa Marion)
Date: Thu, 18 Jun 1998 13:17:26 -0700 (PDT)
Subject: Crypto Books/Archive
In-Reply-To: <006101bd9a1d$29071120$a460a0d1@jason.kc1.net>
Message-ID: <3.0.5.32.19980618161329.00578d60@pop3.ibm.net>
>But if you want to send
>the whole image, and make that little piece invisible to everyone else
>but the sender... this is what I'm getting at.
Man.. that would make it pretty useless to the receiver, now, wouldn't it?
From nmarion at ibm.net Thu Jun 18 13:30:43 1998
From: nmarion at ibm.net (Nissa Marion)
Date: Thu, 18 Jun 1998 13:30:43 -0700 (PDT)
Subject: Cypherpunks/IRC
In-Reply-To: <3588F701.46627B60@kki.net.pl>
Message-ID: <3.0.5.32.19980618162751.0058a6c0@pop3.ibm.net>
At 01:16 PM 6/18/98 +0200, you wrote:
>Greetings,
>
>I go to #cypherpunks and it says that I create the room. Where the
>heck is the room?
>
>Jan
>
Are you using EFnet? Because that is what was suggested to you, and I just
tried it and it was indeed there... There were only two people (maybe bots)
there, but it did certainly exist.
From jdobruck at kki.net.pl Thu Jun 18 15:07:49 1998
From: jdobruck at kki.net.pl (Jan)
Date: Thu, 18 Jun 1998 15:07:49 -0700 (PDT)
Subject: Cypherpunks/IRC
In-Reply-To: <3.0.5.32.19980618162751.0058a6c0@pop3.ibm.net>
Message-ID: <3589906A.BA926D9@kki.net.pl>
Greetings,
I tried EFNet and there was noone there. That's the reason why I was
so frustrated... I'll try a few more time and tell relate what
happened.
Jan out.
Nissa Marion wrote:
>
> At 01:16 PM 6/18/98 +0200, you wrote:
> >Greetings,
> >
> >I go to #cypherpunks and it says that I create the room. Where the
> >heck is the room?
> >
> >Jan
> >
>
> Are you using EFnet? Because that is what was suggested to you, and I just
> tried it and it was indeed there... There were only two people (maybe bots)
> there, but it did certainly exist.
From jdobruck at kki.net.pl Thu Jun 18 15:15:23 1998
From: jdobruck at kki.net.pl (Jan)
Date: Thu, 18 Jun 1998 15:15:23 -0700 (PDT)
Subject: Crypto Books/Archive
In-Reply-To: <006101bd9a1d$29071120$a460a0d1@jason.kc1.net>
Message-ID: <35899234.D45BFABA@kki.net.pl>
Nissa Marion wrote:
>
> >But if you want to send
> >the whole image, and make that little piece invisible to everyone else
> >but the sender... this is what I'm getting at.
>
> Man.. that would make it pretty useless to the receiver, now, wouldn't it?
Greetings,
The thing is, the receiver can decode it because he knows his
passphrase so only he will see the image and noone else. It's like
like PGP only with pictures, not plaintext. But if you guys think the
idea is stupid, I'll scrach it.
Jan out.
From maxinux at bigfoot.com Thu Jun 18 18:40:50 1998
From: maxinux at bigfoot.com (Max Inux)
Date: Thu, 18 Jun 1998 18:40:50 -0700 (PDT)
Subject: Cypherpunks/IRC
In-Reply-To: <3589906A.BA926D9@kki.net.pl>
Message-ID:
We are there on EfNet (#cypherpunks), most of the time nuge and I
atleast, and LuckyG comes in on occasion, aswell as others. I am Working
on securing the channel a bit now...
Billy
-- Max Inux (MaxInux at bigfoot.com) UIN: 207447, http://khercs.dyn.ml.org
Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59
Or Kinky sex makes the world go round- Christie: Your in my sig too
^^ If Cryptography is outlawed, only outlaws will have cryptography ^^
On Fri, 19 Jun 1998, Jan wrote:
>
> Greetings,
>
> I tried EFNet and there was noone there. That's the reason why I was
> so frustrated... I'll try a few more time and tell relate what
> happened.
> Jan out.
From blancw at cnw.com Thu Jun 18 22:32:02 1998
From: blancw at cnw.com (Blanc)
Date: Thu, 18 Jun 1998 22:32:02 -0700 (PDT)
Subject: Tim's views on the racial problem in America
In-Reply-To: <3.0.5.32.19980617231318.0086ad00@cnw.com>
Message-ID: <3.0.5.32.19980618221716.00895b60@cnw.com>
John Young wrote:
>The center is gone for good, cry a tear, then bravely affirm:
>good riddance to Ptolemaic centricity. Normalcy is now para.
>Listen to what your teeth are picking up from the spectrum
>transmitting to the inner ear bone: the spheres whistling
>Dixie in the dark.
............................................
I know just what you mean, JYA.
"He took his vorpal sword in hand;
Long time the manxome foe he sought -
So rested he by the Tumtum tree,
And stood awhile in thought.
..
Blanc
From owner-cypherpunks Fri Jun 19 02:12:04 1998
From: owner-cypherpunks (owner-cypherpunks)
Date: Fri, 19 Jun 1998 02:12:04 -0700 (PDT)
Subject: Never Recieve Junk Mail Again!
Message-ID: <199806190911.CAA17416@toad.com>
Wouldn't it be great to never get junk e-mail again? Well, No one can make you that promise
unfortunetly....but you can Profit from junk e-mail.There's an old saying "If you can't beat
em..join em!" You can make incredible money sending your own mass e-mails. If you own
your own business or have a product or idea to sell , then you probably know that all
advertising works..it's just a question of whether it's cost effective or not. What could be more
cost effective that a ZERO cost of adverising? If you sent out 500,000 e-mails which would
take you only a few minutes to set your computer up to do,and you only recieved one half of
one percent responce..that would be 2500 people responding to your ad. And the cost to do it
was NOTHING. Junk e-mail is here to stay, the U.S Congress in their infinite wisdom has
recently passed legislation legitimizing mass e-mail. So wouldn't it be nice to laugh every time
you recieve a piece of junk e-mail from someone because you'll know for every one you
recieve ,you're sending out hundreds of thousands. If your computer is sitting idle while you're
at work or play...your crazy! You could be earning money while your asleep,at work or out
having fun. It's not like you have to sit there and watch it run!
So why isn't every one doing it. Well, your local internet service provider spent lots of money
installing filtering equiptment to keep out this so called junk e-mail and in fact for years there's
been sort of a fun little war going on between the junk e-mail software writers and the internet
serrvice provider filter software writers to see who could out smart who.The end result is that
sending mass e-mails legally has become an art . But it's really all about knowing the secrets
and having the right software.
AVATAR Publishing is offering you the type of expertise and support that would take you
years to learn.We know all the secrets (obviously or you wouldn't be reading this would you?)
and we have the software to deliver to most of the internet service providers. So her's the
offer... AVATAR is offering you a mass e-mail starter kit complete with step by step instructions
on how to get sarted sending out mass e-mail...a current explanation of what's legal and not
legal...how to extract e-mail addresses from the internet ...how to get targeted e-mail
addresses...a FREE trial version of the most effective mass e-mail software program ever
developed...a list of bulk e-mail friendly internet service providers....a complete explaination of
the secrets of how to legally get your mail through the filtering and why it works....and finally a
real telephone number so you can have technical support and keep updated on new
developments in the mass e-mail community.The total cost of this kit is only $29
If you would like to stop having you computer sit idle while your at work or asleep and start
having it make money for you ..... Send $29 to AVATAR Publishing
832 Colorado Blvd.
Los Angeles,Ca 90041
If you would like to be removed from our e-mail list ,send a written request to the above
address
From thall322 at mci2000.com Fri Jun 19 03:22:41 1998
From: thall322 at mci2000.com (thall322 at mci2000.com)
Date: Fri, 19 Jun 1998 03:22:41 -0700 (PDT)
Subject: Earn $100 every time OUR phone rings...
Message-ID: <199806191022.EAA00619@crotalus.gates.com>
ALL YOU DO IS ADVERTISE THIS 800 NUMBER! THAT'S ALL!!
$100 goes to you for EVERY sale that the company closes!
Does the idea of making at least $1,000 per week beginning your 2nd week of
doing business excite you?
How about never having to sell a thing to your customer and never having
to talk to ANYONE to make money? I don't know how this could get any easier.
EVERY aspect of selling or talking to someone is DONE COMPLETELY by the company!
The number one home based business for the 2nd year in a row, Fortune 5000
is a member of the Better Business Bureau and the U.S. Chamber of Commerce.
WHAT THIS BUSINESS WILL DO FOR YOU:
* Handles all your calls, closes your sales, and
sends you WEEKLY commission checks!
* It pays you a $100 commission (that's over 50% of the total sale)
for EVERY sale. CHECKS put $$$ in your pocket in less than your first
week or two... Quick commission earnings build and maintain motivation.
ALL YOU DO IS ADVERTISE the toll-free number and your ID number.
* You can get STARTED TODAY. Just advertise the business toll-free
number with your ID # and let this business CLOSE YOUR SALES every day...
They do all the work and YOU GET PAID FOR IT!
* You may advertise any way you choose: Bulk E-Mail, Flyers, Classifieds,
Postcards, etc. Suppose you use bulk E-Mail, as I am: 100,000 E-Mails
with a 1/10th of a percent (0.1%) sales rate at $100 per sale nets
$10,000... not too bad.
There is nothing else out there that will provide you with an immediate income
beginning THIS WEEK with minimal effort.
Before you call, I want you to think about the quality of the live
operators handling your call. I am convinced you will not find
a better team of closers for your own personal sales. You will
clearly understand what I am talking about once you call.
PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!!
1-800-811-2141
You will be asked for ID #50030 when you call.
(Live operators are available from 8 AM-10 PM CST Monday through Saturday and
will be able to answer any questions you may have.)
Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949, 888-446-6951
or 888-731-3457 (all toll free).
From boshko at uni-svishtov.bg Fri Jun 19 05:08:44 1998
From: boshko at uni-svishtov.bg (Bozhidar V Bozhinov)
Date: Fri, 19 Jun 1998 05:08:44 -0700 (PDT)
Subject: e-cash
Message-ID: <358A544E.A0DCE57A@uni-svishtov.bg>
Dear Sirs,
This is Mr. Bozhinov from the D. Tsenov Academy of Economics writing.
I am at the present time a Ph. D. student at the Department of Finance
in the framework of The Academy.
Through Internet saw in the Web site that you are work in the aria of
e-money.
Unfortunately, at the moment in Bulgaria there are a few academitions,
when are working in this problem. That�s why I would like to ask you for
more information about this problem.
I�d be very grateful if you might recommend me or send me some materials
concerning this question.
Look forward hearing from you soon.
Yours faithfully,
Mr. B. Bozhinov, Ph. D. Student
D. Tsenov Academy of Economics
begin: vcard
fn: Bozhidar Bozhinov
n: Bozhinov;Bozhidar
org: Tsenov Academy of Economics
adr: 2 Em. Chakarov Str;;51 Cherni Vrah Str.;Svishtov;Lovech;5250;Bulgaria
email;internet: boshko at uni-svishtov.bg
title: PhD Student
tel;work: +359-631-22721-250
x-mozilla-cpt: ;0
x-mozilla-html: FALSE
version: 2.1
end: vcard
From coax_k at beavisandbutthead.com Fri Jun 19 05:58:22 1998
From: coax_k at beavisandbutthead.com (Judd Howie)
Date: Fri, 19 Jun 1998 05:58:22 -0700 (PDT)
Subject: IRC #cypherpunks
Message-ID: <025001bd9b83$2cd4b340$e8cf15a5@irix>
A cypherpunks channel has also been set up on the Austnet IRC network
irc.austnet.org and then /map for your closest server
/join #cypherpunks
that's where we are in the southern hemisphere anyway
GBH
From billp at nmol.com Fri Jun 19 13:05:27 1998
From: billp at nmol.com (bill payne)
Date: Fri, 19 Jun 1998 13:05:27 -0700 (PDT)
Subject: US attorney MOTION TO REMAND
Message-ID: <358AC3B0.7357@nmol.com>
Friday 6/19/98 1:42 PM
John Young
Morales and I met for lunch.
I just finished documents referencing the two Tenth circuit
docket sheets you posted on our cases.
http://jya.com/whp-10usca.htm
http://www.jya.com/arm061298.htm
Zeitgeist again. We are moving to the Tenth circuit AGAIN.
http://www.jya.com/whp061098.htm
http://www.jya.com/whp060998.htm
Morales is going to come over review, then we will send you AND
ABOUT EVERY Member of Congress A COPY.
Mitchell's attempt for the in camera ex parte meeting with the court
may have failed. Thanks to you and Orlin. And, consequently, some
upset Members of Congress.
http://www.jya.com/whp052898.htm
I, of course, DENY I called judge Santiago Campos a FASCIST PIG.
Try searching for PIG.
That is likely the reason Mitchell phoned this morning to say she going
to file to remand the first FOIA [algorithms] request to NSA.
Later
bill
From support at abcproperty.com Fri Jun 19 14:24:32 1998
From: support at abcproperty.com (Support)
Date: Fri, 19 Jun 1998 14:24:32 -0700 (PDT)
Subject: Invitation FreshSite.com
Message-ID: <358ad70a.0@news.provide.net>
New Invitation
FreshSite is a free service that offers the latest news on top rated Internet
downloadable shareware, freeware and evaluation software. Allowing you
to be the first ones to download and test drive fresh made software and
the latest updates!
Check it out at:
From CTIA_Daily_News at tour.unitymail.com Fri Jun 19 16:24:52 1998
From: CTIA_Daily_News at tour.unitymail.com (CTIA Daily News)
Date: Fri, 19 Jun 1998 16:24:52 -0700 (PDT)
Subject: CTIA Daily News From WOW-COM - June 19, 1998
Message-ID: <199806191700.MAA22741@mailstrom.revnet.com>
================================
Welcome to the second day of the CTIA
Daily News From WOW-COM. Please click
on the icon for the most important news in
wireless communications today.
================================
From gwb at pronet.net.au Fri Jun 19 16:54:58 1998
From: gwb at pronet.net.au (Global Web Builders)
Date: Fri, 19 Jun 1998 16:54:58 -0700 (PDT)
Subject: Pauline Hanson's One Nation newsletter - June 1998 update
Message-ID: <1.5.4.32.19980619234519.0070b2d0@mail.pronet.net.au>
Issue 2.1, June 1998
----------------------------------------------------------------------------
PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the
mailing list please say "REMOVE" in the subject line and return this message
in the body.
----------------------------------------------------------------------------
G'day One Nation supporters in NSW
New quick access to One Nation home page NOW live!!!
http://www.onenation.com.au
----------------------------
Queensland State Election:
=========================
This is our first communication since last week's Queensland State Election.
See archive of live coverage: http://www.gwb.com.au/onenation/qldstate/june13
One Nation has secured an amazing 11 seats (out of 89) with 23% of the
primary vote. (Compare this to the Nationals 23 seats on just 15% of the
primary vote!)
See: http://www.ecq.qld.gov.au/ecq/98summary.html
In the latest news it now appears likely that One Nation will support the
Coalition to ensure a stable government in Queensland - although this is not
yet finalised and the support of two independents, Liz Cunningham and Peter
Wellington still have to be secured.
------------------------------------
Unofficial One Nation daily newspaper:
=====================================
The anotd (Australian National News of the Day) - Australia's oldest on-line
saily newspaper provides reader feedback and information on Pauline Hanson
and One Nation.
The paper at:
http://www.gwb.com.au/gwb/news/daily.html
has an archive for subscribers going back to October 1995.
Negotiations are currently underway to make this paper available by "fax
back" - initially on a weekly basis. This will allow anyone with a fax to
get a weekly summary of issues being discussed faxed to them.
------------------------------------
Web Ring:
========
The One Nation web site now has a web ring listing about 20 One Nation
sites. If you wish to add a One Nation site please use the "add a web site"
link.
All additions to the web ring are moderated and GWB's decision on whether or
not to link you is final. You are of course welcome to just carry the web
ring banner and links at:
http://www.gwb.com.au/onenation/ring1.html
Thanks to Peter for his help on this.
A number of historic One Nation web sites including the April 1997 launch in
Ipswich and Hanson's speeches are currently available from the web ring.
-------------------------------------
The power of email:
==================
I have been informed by the ABC Radio National's "Background Briefing" that
they will be talking about the power of email tomorrow (Sunday at 9.10am).
Apparently the action taken by many One Nation supporters in expressing
their concern to 60 Minutes sponsor, Toyota, about the programmes behaviour
towards Pauline Hanson and One Nation was very effective and will be raised
during the ABC report.
To all those who participated thank you. I trust you all got the standard
Toyota response broadcast in the middle of last week.
I am aware that the support shown has served its purpose for the time being
and I hope that 60 Minutes shows more balance in future or we will be
obliged to call on your support again.
See: http://www.gwb.com.au/60.html
for background on the 60 Minutes segment "A CALL TO ARMS".
----------------------------------
Federal Election:
================
One Nation's Federal Election web site is currently under development.
See: http://www.gwb.com.au/onenation/federal
----------------------------------
GWB
Scott Balson
From hippyman at alltel.net Fri Jun 19 21:16:26 1998
From: hippyman at alltel.net (hippyman)
Date: Fri, 19 Jun 1998 21:16:26 -0700 (PDT)
Subject: TheCodex's D.I.R.T. surveillance software
Message-ID: <199806200416.XAA17936@client.alltel.net>
At 09:29 PM 6/19/98 , you wrote:
>>>I have come across a webpage at
>>>
>>>http://www.thecodex.com/dirt.html
etc...
>>Why don't you contact the owner and ask him how it works? Posting to
>>cypherpunks and asking questions about it seems a bit unusual. Smells like
>>a spam.
>>
>>You're name wouldn't be Spyking, would it?
etc...
>Mine is and I didn't post it... I got the same request privately... from
>this person... I am not trying to sell it ... especially to a European
>government...
My wrong, then.
I enjoy your list and didn't really think you spam another mailing list in
such a fashion as I was interpreting, but I thought I'd sniff it out anyway.
My apologies for the accusation.
hippyman
ICQ: 11517383
PGP Fingerprint: E3C3 35C8 0FD9 6F36 2ADD 0541 B58C F6BD D347 BD0A
Public Key: http://keys.pgp.com:11371/pks/lookup?op=get&search=0xD347BD0A
From proff at iq.org Sat Jun 20 11:40:35 1998
From: proff at iq.org (Julian Assange)
Date: Sat, 20 Jun 1998 11:40:35 -0700 (PDT)
Subject: AUcrypto mailinglist
Message-ID: <19980620184014.22630.qmail@iq.org>
With things starting to heat up here in Australia (DoD/DSD has
recently taken to making some exceptionally nasty noises about
prosecuting Eric Young, Tim Hudson and the rest of the Australian
CryptoMozilla team). I'd like to remind everyone who's interested in
aussie/nz crypto issues of the aucrypto mailing list.
_ _ _ ____ ______ ______ _____ ___
/ \ | | | |/ ___| _ \ \ / / _ \_ _/ _ \
/ _ \| | | | | | |_) \ V /| |_) || || | | |
/ ___ \ |_| | |___| _ < | | | __/ | || |_| |
/_/ \_\___/ \____|_| \_\|_| |_| |_| \___/
Australasian & Pacific Cryptography
mail the word "subscribe" to aucrypto-request at suburbia.net
or
mail the word "subscribe" to aucrypto-d-request at suburbia.net
(AUCRYPTO weekly digest)
WHEN YOU HAVE SUBSCRIBED
------------------------
Send in a brief synopsis of who you are and why you are interested
in AUCRYPTO as your first message to the list (this helps
to stimulate discussion and debate as well as provide a sense
of the AUCRYPTO community). As a [small] example:
"Hello AUCRYPTO! My name is Sara Harding. I'm a technical services
officer working at the AFP (Australian Federal Police), specialising
in cryptogrpahic issues."
SUBSCRIBING
-----------
Send mail to:
aucrypto-request at suburbia.net
or
aucrypto-d-request at suburbia.net (AUCRYPTO digest)
with the subject or body of:
subscribe
UN-SUBSCRIBING
-------------
Send mail to:
aucrypto-request at suburbia.net
or
aucrypto-d-request at suburbia.net (AUCRYPTO digest)
with the subject or body of:
unsubscribe aucrypto
POSTING
-------
To send a message to the list, address it to:
aucrypto at suburbia.net
Messages under 700 bytes in size will not be accepted. Send your
one-liners to nobody at nowhere.org.
REPLYING
--------
If you are replying to a message already on the AUCRYPTO list using
your mail programs reply facility you may have to change the reply
address to aucrypto at suburbia.net. This is because the AUCRYPTO mailing
list program is configured to have return replies sent the author
in order to avoid receiving the replies of misconfigured "vacation"
programs which automatically send email saying "I've gone to the
moon for two weeks to hunt rare bits".
ARCHIVES
--------
Monthly back issues of aucrypto since January 96 are available from:
ftp://suburbia.net/pub/mailinglists/aucrypto
You can also instruct the mailing list processor to automatically scan and
retrive messages from the archive. It understands the following commands:
get filename ...
ls directory ...
egrep case_insensitive_regular_expression filename ...
maxfiles nnn
version
Aliases for 'get': send, sendme, getme, gimme, retrieve, mail
Aliases for 'ls': dir, directory, list, show
Aliases for 'egrep': search, grep, fgrep, find
Lines starting with a '#' are ignored.
Multiple commands per mail are allowed.
Setting maxfiles to zero will remove the limit (to protect you against
yourself no more than maxfiles files will be returned per request).
Egrep supports most common flags.
Examples:
ls vomume96 (for aucrypto digest)
ls latest (the latest directory containes the archived messages)
get latest/12
egrep some.word latest/*
TECHNICAL
---------
The list processor software is based on the excellent Procmail/Smartlist
by Stephen R. van den Berg with
some minor extensions by Julian Assange .
From lreed at west.cscwc.pima.edu Sat Jun 20 12:10:55 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sat, 20 Jun 1998 12:10:55 -0700 (PDT)
Subject: No Subject
Message-ID: <009C7FCD.1E9A1520.1@west.cscwc.pima.edu>
RIP - SPACE ALIENS HIDE M DRUGS!!!
___________________________________
The ReptiliansInBlack and the MenInTheShadows were arguing
vehemently over the best path to take in order to maintain
effective damage control over the increasingly wide-spread
danger posed by the known and unknown actions of the Author.
Regardless, in the end, they all had to answer to Gomez...
In the days preceeding the Terry Nichols verdict, they had
managed to divert the Author's attention by murdering his
aunt in Nevada, Missouri, forcing him to abandon Denver in
the middle of the night to drive to her funeral.
They had managed to find and destroy the TRIN VirtualNuclear
Diskette Bombs the Author had left at various federal government
buildings in the previous few days, but their agent in Cape
Girardo indicated that the Author also claimed to have planted
the TRIN VNDB's among members of the Nichols jury. Was this
another one of the Author's disinformation tactics, or was
their own double agent at Bureau42 actually a triple agent,
helping to obscure the Author's trail of FUD after his having
lost the Watchers in both Denver and Nevada?
When the RIP's and the MIS's were notified by Captain Button's
former superiors that the Author had been discovered roaming his
old haunts in Tucson, the BlackBaggers who inventoried his truck
found postcards purchased in Branson, Oklahoma City and Waco. Not
a good sign...
When the Author posted the 'SweatHog Log' of the SAHMD
manuscripts from Linda Lou Reeds Pima College account, it
was taken as a sign that HeOrShe was once again ready to
jump to another location, and was again challenging the
Watchers to track him. After he led them directly to his
current SafeHouse in Tucson, however, it became clear that
he was once again taunting them by revealing another clue
in the ongoing battle to discover the true extent and/or
existence of the alleged underground computer society known
as the Circle of Eunuchs.
It wasn't until they met in Tucson with the US Air Force
intelligence officer from Bienfait that the ReptiliansInBlack
and the MenInTheShadows realized the horrendous implications
of the 'clue' that the Author was rubbing their noses in...
"Bob and Polly McWilliams, sons named Trevor and Rory."
the Flying Spook told those gathered around the conference
table at the back of the Blue Saguaro. "They're friends of
Mark, the owner." he said, causing great consternation among
the various spooks participating in the dinner and drinks
TruthMonger Rap Session taking place--apparently in the
heart of enemy territory.
As if on cue, the owner approached their table, to inquire
as to the suitability of the food, drinks and service.Y\j
owner, nonchalantly, adding, "I haven't seen you since the
Club Car...are you bugging our conversation?"
The owner of the Blue Saguaro laughed and winked slyly,
replying, "Not tonight. There's no band, so it's the sound
man's night off..."
The assorted crew of Casper's Cousins, as they liked to
think of themselves, each began replaying in his or her own
mind the contents of their preceeding conversations, much to
the amusement of Mark and his old pal, the Flying Spook.
"Tomorrow's edition..." the Flying Spook told his compatriots,
handing each of them a computer printout of the Bienfait Nutly
News. "I'm the new editor-in-chief." He turned and walked away
with the owner, talking over old times...
From lreed at west.cscwc.pima.edu Sat Jun 20 12:11:59 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sat, 20 Jun 1998 12:11:59 -0700 (PDT)
Subject: Reptilians In Black - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C7FCD.50DF5860.3@west.cscwc.pima.edu>
RIP - SPACE ALIENS HIDE M DRUGS!!!
___________________________________
The ReptiliansInBlack and the MenInTheShadows were arguing
vehemently over the best path to take in order to maintain
effective damage control over the increasingly wide-spread
danger posed by the known and unknown actions of the Author.
Regardless, in the end, they all had to answer to Gomez...
In the days preceeding the Terry Nichols verdict, they had
managed to divert the Author's attention by murdering his
aunt in Nevada, Missouri, forcing him to abandon Denver in
the middle of the night to drive to her funeral.
They had managed to find and destroy the TRIN VirtualNuclear
Diskette Bombs the Author had left at various federal government
buildings in the previous few days, but their agent in Cape
Girardo indicated that the Author also claimed to have planted
the TRIN VNDB's among members of the Nichols jury. Was this
another one of the Author's disinformation tactics, or was
their own double agent at Bureau42 actually a triple agent,
helping to obscure the Author's trail of FUD after his having
lost the Watchers in both Denver and Nevada?
When the RIP's and the MIS's were notified by Captain Button's
former superiors that the Author had been discovered roaming his
old haunts in Tucson, the BlackBaggers who inventoried his truck
found postcards purchased in Branson, Oklahoma City and Waco. Not
a good sign...
When the Author posted the 'SweatHog Log' of the SAHMD
manuscripts from Linda Lou Reeds Pima College account, it
was taken as a sign that HeOrShe was once again ready to
jump to another location, and was again challenging the
Watchers to track him. After he led them directly to his
current SafeHouse in Tucson, however, it became clear that
he was once again taunting them by revealing another clue
in the ongoing battle to discover the true extent and/or
existence of the alleged underground computer society known
as the Circle of Eunuchs.
It wasn't until they met in Tucson with the US Air Force
intelligence officer from Bienfait that the ReptiliansInBlack
and the MenInTheShadows realized the horrendous implications
of the 'clue' that the Author was rubbing their noses in...
"Bob and Polly McWilliams, sons named Trevor and Rory."
the Flying Spook told those gathered around the conference
table at the back of the Blue Saguaro. "They're friends of
Mark, the owner." he said, causing great consternation among
the various spooks participating in the dinner and drinks
TruthMonger Rap Session taking place--apparently in the
heart of enemy territory.
As if on cue, the owner approached their table, to inquire
as to the suitability of the food, drinks and service.Y\j
owner, nonchalantly, adding, "I haven't seen you since the
Club Car...are you bugging our conversation?"
The owner of the Blue Saguaro laughed and winked slyly,
replying, "Not tonight. There's no band, so it's the sound
man's night off..."
The assorted crew of Casper's Cousins, as they liked to
think of themselves, each began replaying in his or her own
mind the contents of their preceeding conversations, much to
the amusement of Mark and his old pal, the Flying Spook.
"Tomorrow's edition..." the Flying Spook told his compatriots,
handing each of them a computer printout of the Bienfait Nutly
News. "I'm the new editor-in-chief." He turned and walked away
with the owner, talking over old times...
From lreed at west.cscwc.pima.edu Sat Jun 20 12:12:53 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sat, 20 Jun 1998 12:12:53 -0700 (PDT)
Subject: Bienfait Reptilian News - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C7FCD.710F1760.7@west.cscwc.pima.edu>
RIP/BNN - SPACE ALIENS HIDE M DRUGS!!!
_______________________________________
Bienfait Nutly News--Desert Storm / Texas Tornado Special:
[BNN-Tucson, Arizona--THE 'FOUR CORNERS' SEARCH FOR A PAIR OF
Certified CopKillers took a bizarre twist today, when it was
learned that the Author of SPACE ALIENS HIDE M DRUGS was
apparently serving merely as a diversionary decoy for LEA's
involved in the search, while an unknown compatriot was busy
either providing clandestine supply support for the pair, or
perhaps even arranging transportation for the suspects to a
safehouse located outside of the search area.
Under cross-examination by a variety of LEA/Spooks, the
RCMP involved in setting up the Author on a variety of charges
under the Criminal Code Of Canada admitted that they had been
holding back evidence suggesting that the Author was not acting
alone in his TRIN VirtualNuclear Diskette Bomb Soft Target
World Tour. Newspapers dated after the Author's flight to
semi-safety south of the forty-ninth parallel were found at
the scene of the first VirtualNuclear Device discovered by
the Royal Canadian Mounted Police at the Court House eleven
KILLometers from MongerItaVille, home of the Bienfait Nutly
News, where the Author was scheduled to be railroaded into
serving a four-year sentence for 'Failure To Appear' on the
'Dog At Large' charges trumped up by local Bienfait officials
under RCMP direction.
"There were two different sets of newspapers dated after
the Author's flight from Canada found at the scene of the
First VirtualNuclear Device." an RCMP official foolishly
revealed to the Flying Spook assigned by the US Air Force
to investigate the Author, never considering that the agent
may have been 'turned' by the Circle of Eunuchs into a
secret ally. "We traced the placement of one of the sets
of newspapers to the Author's nephew, Human Gus-Peter, who
had been promised a new state-of-the-art computer in return
for helping to obstrufucate the details behind the placement
of the TRIN VNDB Device. The second set of newpapers, from
an earlier date, were obviously placed by an unknown entity,
working in collusion with the Author from the beginning."
The Flying Spook, in his first action as the new editor-
in-chief of the Bienfait Nutly News, informed the RCMP that
the Author, after mailing evidence of RCMP illegal activity,
collusion and conspiracy to a Time/Netly News reportwhore
from Sidney, Montana, had holed up at the Way Station in
Gillette, Montana, for a few days, proceeding south only
after meeting with a shadowy figure who had given one of
the local residents of the homeless shelter a handful of
Canadian coins when asked for spare change.
The Flying Spook also suggested that the Author's travel
schedule, seemingly laying an interrupted trail through
the HeartLand of paramilitary activity on the way to theYT
targets along the way, was actually a diversionary tactic
designed to divert attention from the movements of his
conspiratorial compatriot--rumored to be a long-time active
member of the Circle of Eunuchs and CyphperPunks Disturbed
Male LISP, as well as a recent inductee into the Army of
Dog.
The new Editor-In-Chief of the Bienfait Nutly News also
revealed that his investigation into the alleged connection
of the NuclearBomberAdulteress in Minot, North Dakota, and
the ButtonBomberJoyRider from Tucson, Arizona, to the
Circle of Eunuchs and Army of Dog had turned up a variety
of startling facts, despite the Flying Spook's failure to
include those facts in his official report.
Among those facts are the following:
EveryBody Wants To Go To Soviet Heaven, But No One Wants To Spy:
It took the Flying Spook only a few weeks to verify hard links
between the Author and a variety of single, double and triple
agents ranging from Scotland to the Middle East--from the 1800's
to the 1990's.
The Author's background had been invesigated previously, to
little avail, and the Flying Spook was mystified as to how
apparently competent investigators could fail to realize that
the key to covert and subversive links very often lie in the
history of the women 'behind the throne', so to speak.
Elanor Roosevelt, Lady Byrd Johnson, Nancy Reagan...even
Casper's Cousins unfamiliar with the course of history should
be able to see the implication implied by these recent examples
of the Hidden Hands Of Destiny working through the wives of
those serving as the front men for the true movers and shakers
in society.
The Zippo lighter bearing the crest of the Naval Guided
Missle School carried by the Author had long been dismissed
as an insignificant detail by a long string of investigators
who crossed paths with HimOrHer at various times and places.
It was the family history of Polly McWilliams that allowed
the Flying Spook to bring together a wide range of seemingly
individual 'coincidences' into a logical, coherent pattern.
Clifden Albert Banner:
Polly McWilliam's brother. A former B-52 bomber pilot with
connections to both the NuclearBomberAdulteress and the
ButtonBomberJoyRider provided the Flying Spook with his first
hard connection between the Author and Armed Forces personnel
suspected of having Circle of Eunuchs connections.
Major Banner's military history working at top levels of
the Strategic Air Command, as well as with the Joint Chiefs
of Staff at the Pentagon provided the Flying Spook with an
immediate RedFlag that suggested even the remotest connectionYT
what would be found upon further investigation.
It therefore came as no surprise to find that, after having
put in place a wide variety of possible co-conspirators within
the Armed Forces network, Major Banner retired to become a
Senior Engineering Specialist-Mission Planning System, in the
New England Operations Field Office of GDE Systems, a major
military contractor.
Neither was it a surprise that Major Banner's specialty
was...computers.
Jane Banner:
Polly McWilliam's sister. Heavily involved as a programmer,
for Nortel, with highly sensitive work in an area of the
joint US/Chinese encryption program that was suspected to
have strong covert connections to the CypherPunks and the
Circle of Eunuchs.
Earl David Banner:
Polly McWilliam's father. A Boston Globe Journalist who
had been privy to the most secret of secrets in a comprehensive
array of social circles ranging from the Roosevelts and the
Kennedys to Cardinal Cushing and the Lords of Lourdes.
Earl Banner's Anglican heritage was in seeming contrast to
his Catholic connections until the Flying Spook discovered
the close connection between the Author's Catholic lineage
through the French Norris clan on his mother's side and the
Catholic lineage of the McWilliams clan to which Polly's
husband, Bob, was a vital link.
Moyra Banner:
Polly's McWilliam's mother. Grew up in Montreal and met
her future husband through sources closely connected to
the Bartonian Metaphysical Society and what was later to
become the Solar Temple Cult--both of which were organizations
with close connections to the Author and David Humisky, a
shadowy figure who had stunned the Canadian Military by
engineering a quick end to a student military-game project
designed to provide information and data on the capability
of military neophytes engaging in spontaneous war games.
Alan McKenzie:
Polly McWilliams' great-grandfather. Driven with his family
from the Isle of Lewis, in Scotland, by the Laird, as a result
of his subversive political connections to a Welsh mining rebel
named Bennett, whose grandson, Leslie James Bennett, would rise
out of one of the 'Little Moscows' in South Wales, serving as
a bastion of the British Labour Party, to become the Chief of
the Russian Desk for the RCMP's Security Service, before beingYT
with connections to fellow Red Caspers McClean and Kim Philby.
Terry Dee:
A long-time friend and confidante of Bob and Polly
McWilliams, as well as a shadowy presence in the life of
the Author's decade-long lover in Austin and Tuscon.
The Flying Spook had originally researched his connection
to the Author as a result of Dee's work for various American
spook agencies during his travels in the Middle East, and
was stunned to discover the close links between Dee's
ancestors--the O'Days--and the Author's great-grandfather,
Clarence Day, whose progeny in Mountain Home, Idaho, once
again completed the Circle between the Author and Major Clif
Banner, as well as filling in the Author's connection to
the Naval Guided Missle School and a wide variety of
suspected Circle of Eunuchs initiates employed at sensitive
military and secret government laboratory sites around
the world.
Merna Brown:
The Author's first wife. A member of the Bartonian Metaphysical
Society, and whose father had proved to be a vital link in the
connection between the socialist New Democratic Party of Tommy
Douglas and the suspected Russian agent, James Leslie Bennett.
Merna Brown had eventually turned up in Ontario in a government
position ideally suited for providing financial and personal
history support for a number of individuals drifting back and
forth between the Solar Temple, Elohim City, Waco and San Diego,
changing identities as they went.
Dave Foreman:
The Flying Spook found it interesting that the Author had
appeared to have absolutely no contact with Dave Foreman or
any of the Earth First subversives in Arizona during HisOrHer
time there, yet seemed to be involved in advising and training
a wide variety of those connected to Earth First in various
areas of the country, particularly in Northern California.
Hidden deep within the mountains of files kept on those who
marched in protests at the LizardMore Lavoratory was a note
which attributed authorship of a song, "We're Going To Take
It Sitting Down," a banner tune for a Berkeley radical group
named La Palomas, to one C.J. Parker, who was also known to
have authored "Don't Blame Me, I Voted For The Monkey."
Black Elk:
Equally intriguing was the Author's close connection to a
wide variety of Rainbow Family members thoughout the US and
Canada. While the Author seemingly remained unaware of his
connection to the group, many of the Rainbow Family were notYT
enormous amount of covert support during his wide travels.
ears of investigation failed to discover the link until
the Flying Spook engaged the Author in WarStories (TM) at
the CoalDust Saloon in Bienfait, and heard a tale about
HimOrHer joining an oddball van full of misfits including
hippies, college athletes and a Catholic priest, on a trip
to a mountain top in Colorado to await the fulfillment of
the vision written of in "Black Elk Speaks."
HeOrShe told of the Catholic priest smuggling an ounce of
hashish across the border, shoved up his butt, screwing the
Catholic girls on the trip, and then absolving them, and
carrying a mountain of liquor up the mountain on his back,
a Herculean task which made him a legend among those at
the gathering who considered a spiritual journey to be
incomplete without a jigger of earthly spirits to ease
their passage.
The Author told of rising in the middle of the night to
relieve himself of excess spirits and falling into one of
the slit-trench crappers that had been dug for the occassion,
swearing like a trooper as he climbed out, only to fall into
another, and yet another, with the whole gathering laughing
riotously in the dark at the Fool In The Stool, as he called
himself. He had little idea that not only did the whole
gathering know who he was the next day (even though he
pretended ignorance of the whole affair), but that the story
of his folly had become one of the legends told by the
original members of the Rainbow Family which was born at
the gathering.
Ken Sleight:
Government efforts to investigate an alleged underground
railroad for a variety of outlaws, desperados and radicals,
including a trail of SafeHouses and HideOuts throughout
the western US, invariably led to one or another of passages
in and out of the Four Corners area.
The Author and Utah outfitter Ken Slight were often found
to be operating in close proximity without ever seeming to
have confirmable direct contact. Interestingly, they both
seemed to have contact with a large number of the same
people involved in environmental and survivalist arenas,
including Bob Mason, of Durango, although under an assumed
name.
XS4ALL:
InterNet Free Terra both hosted the banned website during
their censorship troubles with the the German government, and
helped a variety of other sites set up mirror sites around the
same time. One of the causes of XS4ALL's troubles was the
publication of how-to tips on derailing trains.
Although it was confirmed that the Author's travel schedule
coincided with a number of railway 'accidents', including theYT
in the vicinity of Saskatoon, no positive links to HisOrHer
involvement could be established. The Flying Spook's recent
investigation, however, turned up the fact that a variety of
those hosting mirrors of the XS4ALL website had travel
schedules which coincided with that of the Author at the
times of several railway 'accidents', although, once again,
no positive link between the individuals could be established.
Synchronincidence:
Time is a trick to keep suspicious minds from positively
connecting Taoist subversive criminal radicals to the events
for which they are obviously responsible.
Space is a trick to keep Taoist subversive criminal radical
coconspirators from being positively linked together when it
is in the best interests of the government to claim that they
are acting alone.
Paranoia is a trick to keep non-Taoist subversive criminal
radicals from realizing that most LEAs are real Lamers (TM),
and that the only thing one needs to be paranoid of is paranoia,
itself (it's a vicious cycle...).
Guilt is a trick to keep psychotic sociopath subversive
criminal radicals from killing everyone at once, so that there
is still someone left to plot against them.
DISCLAIMER!!!
_____________
The Bienfait Nutly News makes no pretensions of operating
as an ethical and responsible news source for individuals
whose cerebral synapse circuits remain unaffected by moon
phases and solar sunspot activity.
We accept no responsibility for explaining how the
translation of Reptilians In Black into an RIP acronym
can go unnoticed by the editor until the end of the piece,
or how a well-researched article can somehow seem to peter
out into a meaningless morass of inconsequential facts and
details.
Hell, we don't even know what the right-square bracket
is *really* called...]
From jya at pipeline.com Sat Jun 20 13:44:02 1998
From: jya at pipeline.com (John Young)
Date: Sat, 20 Jun 1998 13:44:02 -0700 (PDT)
Subject: The End of Secrecy
Message-ID: <199806202043.QAA00585@dewdrop2.mindspring.com>
From: "The End of Secrecy," by Ann Florini, Foreign Policy,
Summer, 1998:
http://jya.com/teos.htm (39K)
IMF managing director Michel Camdessus has explained, openness
and transparency are now economic issues, not solely political
ones:
As more and more evidence has come to light about the
adverse consequences of governance problems on economic
performance--among them, losses in government revenue,
lower quality public investment and public services,
reduced private investment, and the loss of public
confidence in government--a broader consensus has
emerged on the central importance of transparency and
good governance in achieving economic success.
Most officials in Asia seem to have accepted the virtues
of transparency, at least in the economic field. Singaporean
senior minister Lee Kuan Yew, stressing the importance of
transparency in a country's financial system, recently told
Vietnamese prime minister Phan Van Khai: "In an age of
information technology, instant communications and computers,
if you try to hide, you are in trouble."
[And:]
The Entomopter Cometh
One of the most unusual MIT designs on the drawing board is a
four-inch-long, insect-like craft dubbed "the entomopter,"
equipped with legs for crawling through buildings or ventilation
ducts, and flapping wings for airborne reconnaissance.
Nevertheless, no matter how small, efficient, or cost-effective
surveillance hardware becomes, there will always be limits to
what technology can accomplish. Indeed, it is a double-edged
sword--witness the polemics in Washington and on the Web over
who, if anyone, should regulate electronic encryption. From
untappable communications to pixel-by-pixel photo and video
editing, technology is often as good at hiding secrets as it
is at revealing them. Without a norm of transparency, technology
will continue to protect private information as well as ferret
it out.
-----
From 104367.2728e at compuserve.com Sat Jun 20 14:52:49 1998
From: 104367.2728e at compuserve.com (104367.2728e at compuserve.com)
Date: Sat, 20 Jun 1998 14:52:49 -0700 (PDT)
Subject: INVESTMENT FRAUD: Learn how to detect and avoid!
Message-ID: <199806200754.AAA28433@fw.uswnvg.com>
Did you know that YOU could be one of MILLIONS of people who are victims
of investment fraud each year??
Did you know that SCAM ARTISTS have defrauded people JUST LIKE YOU for
more than $10 BILLION This Year??
CLICK HERE ----> http://www.FraudReview-IESC.com <---- TO KEEP YOUR MONEY
If you are absolutely certain it could never be you, the fraudster starts
with a big advantage. Investment fraud generally happens to people who
think it could never happen to them. Learn how to avoid investment fraud,
visit http://www.FraudReview-IESC.com
BEFORE YOU INVEST - LEARN THE FACTS
Investment Evaluative Services Corporation has compiled a desktop reference
entitled "Inside the World of Investment Fraud, Scams and Deceptive
Practices".
It is easy to read, concise and contains the investment phrases, terms, and
conditions that an investor should KNOW and AVOID! It also contains
citations that will inform the investor of not only what investments should
be avoided, but why. (Learn more at http://www.FraudReview-IESC.com)
If terms like Asset Managed Programs, Bank Debentures, High Yield/Low Risk,
Leveraged Funds, and Top 25 Banks are in your investment portfolio, you may
already be a victim of investment fraud!
If terms like Bank Guarantees of 106%, Blocked Funds Letter, Safe Keeping
Receipt, and Trading Programs are not familiar to you, you may shortly
become a victim of investment fraud!
To learn more about Investment Evaluative Services Corporation products and
services, please continue on to our home page
http://www.FraudReview-IESC.com
or call our toll free number 1(888)596-0956.
From 336688zs at mci.com Sat Jun 20 19:56:24 1998
From: 336688zs at mci.com (336688zs at mci.com)
Date: Sat, 20 Jun 1998 19:56:24 -0700 (PDT)
Subject: Need a Computer?? No Money Down!!
Message-ID: <199806210156.DAA30468@cassiopea.it>
...BRAND NEW PENTIUM II...
..COMPUTER..
..NO MONEY DOWN...
...EARN HUGE INCOME....
only serious inquiries only!
(for more information & application
leave your name, fax & phone #)
More info:
put "COMPUTER" in subject area and
mailto: fwd617 at mycomsoftware.net
Click Here
From company98 at yahoo.net Sun Jun 21 00:01:22 1998
From: company98 at yahoo.net (Company98)
Date: Sun, 21 Jun 1998 00:01:22 -0700 (PDT)
Subject: $36000 in 14 Weeks
Message-ID: <419.435967.00088171company98@yahoo.net>
Hi
My name is Jacqueline McCormack and I would like to show you how
easy it is to really make a lot of money. I wouldn't be wasting my time doing this if I didn't know this
system works,and all the money you invest is less than an evening at the movies for two. Anyone surely
can afford that.
I received a letter just like the one your reading now from a lady name Karren Liddel and the rest is
history. Here is the email I received and judge for yourself if this will work or not. This is truly the one
path I've found to financial freedom.
Thanks for your time
Jacque
=================================================================
I Never Thought I'd Be the One Telling You This:
I Actually Read a Piece of E-Mail & I'm Going to Europe on the
Proceeds!
Hello!
My name is Karen Liddell; I'm a 35-year-old mom, wife, and
part-time accountant. As a rule, I delete all unsolicited "junk"
e-mail and use my account primarily for business. I received
what I assumed was this same e-mail countless times and deleted
it each time.
About two months ago I received it again and, because of the
catchy subject line, I finally read it. Afterwards, I thought ,
"OK, I give in, I'm going to try this. I can certainly afford to
invest $20 and, on the other hand, there's nothing wrong with
creating a little excess cash." I promptly mailed four $5 bills
and, after receiving the reports, paid a friend of mine a small
fee to send out some e-mail advertisements for me. After reading
the reports, I also learned how easy it is to bulk e-mail for
free!
I was not prepared for the results. Everyday for the last six
weeks, my P.O. box has been overflowing with $5 bills; many days
the excess fills up an extra mail bin and I've had to upgrade to
the corporate-size box! I am stunned by all the money that keeps
rolling in!
My husband and I have been saving for several years to make a
substantial down payment on a house. Now, not only are we
purchasing a house with 40% down, we're going to Venice, Italy to
celebrate!
I promise you, if you follow the directions in this e-mail and be
prepared to eventually set aside about an hour each day to follow
up (and count your money!), you will make at least as much money
as we did. You don't need to be a wiz at the computer, but I'll
bet you already are. If you can open an envelope, remove the
money, and send an e-mail message, then you're on your way to the
bank. Take the time to read this so you'll understand how easy
it is. If I can do this, so can you!
GO FOR IT NOW!!
Karen Liddell
The following is a copy of the e-mail I read:
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
This is a LEGAL, MONEY-MAKING PHENOMENON.
PRINT this letter, read the directions, THEN READ IT AGAIN !!!
You are about to embark on the most profitable and unique program
you may ever see. Many times over, it has demonstrated and
proven its ability to generate large amounts of cash. This
program is showing fantastic appeal with a huge and ever-growing
on-line population desirous of additional income.
This is a legitimate, LEGAL, money-making opportunity. It does
not require you to come in contact with people, do any hard work,
and best of all, you never have to leave the house, except to get
the mail and go to the bank!
This truly is that lucky break you've been waiting for! Simply
follow the easy instructions in this letter, and your financial
dreams will come true! When followed correctly, this electronic,
multi-level marketing program works perfectly...100% EVERY TIME!
Thousands of people have used this program to:
- Raise capital to start their own business
- Pay off debts
- Buy homes, cars, etc.,
- Even retire!
This is your chance, so don't pass it up!
-----------------------------------------------------------------
-----------------
OVERVIEW OF THIS EXTRAORDINARY
ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
-----------------------------------------------------------------
-----------------
Basically, this is what we do:
We send thousands of people a product for $5.00 that costs next
to nothing to produce and e-mail. As with all multi-level
businesses, we build our business by recruiting new partners and
selling our products. Every state in the U.S. allows you to
recruit new multi- level business online (via your computer).
The products in this program are a series of four business and
financial reports costing $5.00 each. Each order you receive via
"snail mail" will include:
* $5.00 cash
* The name and number of the report they are ordering
* The e-mail address where you will e-mail them the report they
ordered.
To fill each order, you simply e-mail the product to the buyer.
THAT'S IT! The $5.00 is yours! This is the EASIEST electronic
multi-level marketing business anywhere!
FOLLOW THE INSTRUCTIONS TO THE LETTER AND
BE PREPARED TO REAP THE STAGGERING BENEFITS!
******* I N S T R U C T I O N S *******
This is what you MUST do:
1. Order all 4 reports shown on the list below (you can't sell
them if you don't order them).
* For each report, send $5.00 CASH, the NAME & NUMBER OF
THE
REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR
RETURN POSTAL ADDRESS (in case of a problem) to the
person whose
name appears on the list next to the report.
* When you place your order, make sure you order each of
the four
reports. You will need all four reports so that you can
save them
on your computer and resell them.
* Within a few days you will receive, via e-mail, each of
the four reports.
Save them on your computer so they will be accessible
for you to send
to the 1,000's of people who will order them from you.
2. IMPORTANT-- DO NOT alter the names of the people who are
listed next
to each report, or their sequence on the list, in any way
other than is
instructed below in steps "a" through "d" or you will lose
out on the
majority of your profits. Once you understand the way this
works, you'll
also see how it doesn't work if you change it. Remember,
this method
has been tested, and if you alter it, it will not work.
a. Look below for the listing of available reports.
b. After you've ordered the four reports, replace the name
and address
under REPORT #1 with your name and address, moving the
one that
was there down to REPORT #2.
c. Move the name and address that was under REPORT #2 down
to
REPORT #3.
d. Move the name and address that was under REPORT #3 down
to
REPORT #4.
e. The name and address that was under REPORT #4 is removed
from
the list and has NO DOUBT collected their 50 grand.
Please make sure you copy everyone's name and address
ACCURATELY!!!
3. Take this entire letter, including the modified list of
names, and save
it to your computer. Make NO changes to the instruction
portion of this
letter.
4. Now you're ready to start an advertising campaign on the
WORLDWIDE WEB! Advertising on the WEB is very, very
inexpensive,
and there are HUNDREDS of FREE places to advertise. Another
avenue which you could use for advertising is e-mail lists.
You can buy these lists for under $20/2,000 addresses or you
can pay someone a minimal charge to take care of it for you.
BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY!
5. For every $5.00 you receive, all you must do is e-mail them
the report
they ordered. THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE
ON ALL ORDERS! This will guarantee that the e-mail THEY
send out,
with YOUR name and address on it, will be prompt because
they can't
advertise until they receive the report!
------------------------------------------
AVAILABLE REPORTS
------------------------------------------
***Order Each REPORT by NUMBER and NAME***
Notes:
- ALWAYS SEND $5 CASH FOR EACH REPORT
- ALWAYS SEND YOUR ORDER VIA FIRST CLASS MAIL
- Make sure the cash is concealed by wrapping it in at least two
sheets of paper
- On one of those sheets of paper, include: (a) the number &
name of the report you are ordering, (b) your e-mail address, and
(c) your postal address.
_________________________________________________________________
REPORT #1 "HOW TO REORGANIZE YOUR TIME TO ACCOMMODATE A HOME
BASED BUSINESS"
ORDER REPORT #1 FROM:
COMPANY98
3941 E. CHANDLER BLVD
SUITE 106-142
PHOENIX, AZ 85044
_________________________________________________________________
REPORT #2 "MAJOR CORPORATIONS AND E-MAIL"
ORDER REPORT #2 FROM:
ACY
3800 DEWEY AVE #298
ROCHESTER, NY 14616
_________________________________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"
ORDER REPORT #3 FROM:
BUSINESS RESEARCH ASSOCIATES
459 COLUMBUS AVE, SUITE#504
NEW YORK, NY 10024
_________________________________________________________________
REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"
ORDER REPORT #4 FROM:
BASQUIAT
PO BOX 1963
EVANSTON, IL 60204
_________________________________________________________________
-----------------------------------------------------------------
---------------------------------
HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
-----------------------------------------------------------------
---------------------------------
Let's say you decide to start small just to see how well it
works. Assume your goal is to get 10 people to participate on
your first level. (Placing a lot of FREE ads on the Internet will
EASILY get a larger response.) Also assume that everyone else in
YOUR ORGANIZATION gets ONLY 10 downline members. Follow this
example to achieve the STAGGERING results below.
1st level--your 10 members with
$5...........................................$50
2nd level--10 members from those 10 ($5 x
100)..................$500
3rd level--10 members from those 100 ($5 x 1,000)..........$5,000
4th level--10 members from those 1,000 ($5 x 10,000)...$50,000
THIS TOTALS
----------->$55,550
Remember friends, this assumes that the people who participate
only recruit 10 people each. Think for a moment what would
happen if they got 20 people to participate! Most people get
100's of participants! THINK ABOUT IT!
Your cost to participate in this is practically nothing (surely
you can afford $20). You obviously already have an Internet
connection and e-mail is FREE!!! REPORT#3 shows you the most
productive methods for bulk e-mailing and purchasing e-mail
lists. Some list & bulk e-mail vendors even work on trade!
About 50,000 new people get online every month!
*******TIPS FOR SUCCESS*******
* TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and
follow
the directions accurately.
* Send for the four reports IMMEDIATELY so you will have them
when
the orders start coming in because:
When you receive a $5 order, you MUST send out the requested
product/report to comply with the U.S. Postal & Lottery Laws, Title
18,Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code,
also Code of Federal Regs. vol. 16, Sections 255 and 436, which state
that "a product or service must be exchanged for money received."
* ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.
* Be patient and persistent with this program. If you follow
the
instructions exactly, the results WILL undoubtedly be
SUCCESSFUL!
* ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!
*******YOUR SUCCESS GUIDELINE*******
Follow these guidelines to guarantee your success:
If you don't receive 10 to 20 orders for REPORT #1 within two
weeks, continue advertising until you do. Then, a couple of
weeks later you should receive at least 100 orders for REPORT #2.
If you don't, continue advertising until you do. Once you have
received 100 or more orders for REPORT #2, YOU CAN RELAX, because
the system is already working for you, and the cash will continue
to roll in!
THIS IS IMPORTANT TO REMEMBER:
Every time your name is moved down on the list, you are placed in
front of a DIFFERENT report. You can KEEP TRACK of your PROGRESS
by watching which report people are ordering from you. If you
want to generate more income, send another batch of e-mails and
start the whole process again! There is no limit to the income
you will generate from this business!
NOTE: If you need help with starting a business, registering a business name,
how income tax is handled, etc., contact your local office of the Small
Business Administration (a Federal agency) for free help and answers to questions.
Also, the Internal Revenue Service offers free help via telephone and free seminars
about business taxes.
*******T E S T I M O N I A L S*******
This program does work, but you must follow it EXACTLY!
Especially the rule of not trying to place your name in a
different position, it won't work and you'll lose a lot of
potential income. I'm living proof that it works. It really is
a great opportunity to make relatively easy money, with little
cost to you. If you do choose to participate, follow the program
exactly, and you'll be on your way to financial security.
Sean McLaughlin, Jackson, MS
My name is Frank. My wife, Doris, and I live in Bel-Air, MD.
I am a cost accountant with a major U.S. Corporation and I make
pretty good money. When I received the program I grumbled to
Doris about receiving "junk mail." I made fun of the whole thing,
spouting my knowledge of the population and percentages involved.
I "knew" it wouldn't work. Doris totally ignored my supposed
intelligence and jumped in with both feet. I made merciless fun
of her, and was ready to lay the old "I told you so" on her when
the thing didn't work... well, the laugh was on me! Within two
weeks she had received over 50 responses. Within 45 days she had
received over $147,200 in $5 bills! I was shocked! I was sure
that I had it all figured and that it wouldn't work. I AM a
believer now. I have joined Doris in her "hobby." I did have
seven more years until retirement, but I think of the "rat race"
and it's not for me. We owe it all to MLM.
Frank T., Bel-Air, MD
I just want to pass along my best wishes and encouragement to
you. Any doubts you have will vanish when your first orders come
in. I even checked with the U.S. Post Office to verify that the
plan was legal. It definitely is! IT WORKS!!!
Paul Johnson, Raleigh, NC
The main reason for this letter is to convince you that this
system is honest, lawful, extremely profitable, and is a way to
get a large amount of money in a short time. I was approached
several times before I checked this out. I joined just to see
what one could expect in return for the minimal effort and money
required. To my astonishment, I received $36,470.00 in the first
14 weeks, with money still coming in.
Sincerely yours, Phillip A. Brown, Esq.
Not being the gambling type, it took me several weeks to make
up my mind to participate in this plan. But conservative that I
am, I decided that the initial investment was so little that
there was just no way that I wouldn't get enough orders to at
least get my money back. Boy, was I surprised when I found my
medium-size post office box crammed with orders! For awhile, it
got so overloaded that I had to start picking up my mail at the
window. I'll make more money this year than any 10 years of my
life before. The nice thing about this deal is that it doesn't
matter where in the U.S. the people live. There simply isn't a
better investment with a faster return.
Mary Rockland, Lansing, MI
I had received this program before. I deleted it, but later I
wondered if I shouldn't have given it a try. Of course, I had no
idea who to contact to get another copy, so I had to wait until I
was e-mailed another program...11 months passed then it came...I
didn't delete this one!...I made more than $41,000 on the first
try!!
D. Wilburn, Muncie, IN
This is my third time to participate in this plan. We have
quit our jobs, and will soon buy a home on the beach and live off
the interest on our money. The only way on earth that this plan
will work for you is if you do it. For your sake, and for your
family's sake don't pass up this golden opportunity. Good luck
and happy spending!
Charles Fairchild, Spokane, WA
ORDER YOUR REPORTS TODAY AND GET
STARTED ON YOUR ROAD TO
FINANCIAL FREEDOM!!!
When you are ready for a bulk e-mailer call Smith
International at 352-629-7695. They do good work.
You can send an e-mail to their autoresponder at
popcorn at mfi.net. Just click on the blue letters and
enter the words "Bulk Email Info" in the Subject Line
and in the body of the letter and then click on the
Send Now button. All remove requests sent to the
above address will receive an autoresponded
informational flyer. E-mail addresses are recorded
at that site. They were charging only $210 for
100,000 TRUE AOL addresses.
From moneyhelp at mymail.com Sun Jun 21 11:30:12 1998
From: moneyhelp at mymail.com (moneyhelp at mymail.com)
Date: Sun, 21 Jun 1998 11:30:12 -0700 (PDT)
Subject: Get the MONEY You Need
Message-ID: <199805280419.AAA07839>
GET THE MONEY YOU NEED RIGHT NOW!
Here's your chance to...
> Eliminate Credit Card Debt!
> Escape from High Monthly Payments!
> Get Relief and Have the Money You Need!
> Cash in Your Pocket Usually within 7 to 14 days!
> Make Home Improvements You've Always Wanted!
> Take the Vacation You Deserve!
How? Simply CLICK HERE TO VISIT OUR WEBSITE!
or type or cut & paste: http://www.canus.net/amcap/146.html in your browser
Would you like money for...
~ A New Car?
~ College Tuition?
~ Taxes?
~ Consolidate Your Credit Cards?
~ A Dream Vacation?
~ Home Improvements?
Now It Can Be Yours! What are you waiting for?
For a FREE evaluation please visit our website by...
CLICKING HERE (http://www.canus.net/amcap/146.html)
or type or cut & paste: http://www.canus.net/amcap/146.html in your browser
Especially if you're a homeowner, we can help you. Try us!
From jya at pipeline.com Mon Jun 22 06:16:20 1998
From: jya at pipeline.com (John Young)
Date: Mon, 22 Jun 1998 06:16:20 -0700 (PDT)
Subject: Jim Bell Violation Update
Message-ID: <199806221316.JAA04953@dewdrop2.mindspring.com>
Jim Bell was released on parole on April 20, but may
be about to be rearrested for parole violation, and
may not yet know the cops are coming to reviolate:
http://jya.com/jdb062198.htm
From ptrei at securitydynamics.com Mon Jun 22 06:42:55 1998
From: ptrei at securitydynamics.com (Trei, Peter)
Date: Mon, 22 Jun 1998 06:42:55 -0700 (PDT)
Subject: Eric Young: Zimmerman redux?
Message-ID:
Date: 20 Jun 1998 18:40:14 -0000
From: Julian Assange
To: ukcrypto at maillist.ox.ac.uk
With things starting to heat up here in Australia (DoD/DSD has
recently taken to making some exceptionally nasty noises about
prosecuting Eric Young, Tim Hudson and the rest of the Australian
CryptoMozilla team). I'd like to remind everyone who's interested in
aussie/nz crypto issues of the aucrypto mailing list.
Australasian & Pacific Cryptography
mail the word "subscribe" to aucrypto-request at suburbia.net
From shamrock at netcom.com Sun Jun 21 17:19:11 1998
From: shamrock at netcom.com (Lucky Green)
Date: Mon, 22 Jun 1998 08:19:11 +0800
Subject: #cypherpunks open
Message-ID: <3.0.2.32.19980621170237.00942410@netcom4.netcom.com>
#cypherpunks is open on EFnet.
-- Lucky Green PGP encrypted mail preferred
"I do believe that where there is a choice only between cowardice and
violence, I would advise violence." Mahatma Gandhi
From billp at nmol.com Mon Jun 22 13:22:10 1998
From: billp at nmol.com (bill payne)
Date: Mon, 22 Jun 1998 13:22:10 -0700 (PDT)
Subject: Judicial Misconduct at Tenth Circuit Court of Appeals
Message-ID: <358EB07D.2EFD@nmol.com>
Monday 6/22/98 1:02 PM
Senate Judiciary Committee
http://www.senate.gov/committee/judiciary.html
Republicans
Orrin G. Hatch, Utah, Chairman senator_hatch at Hatch.senate.gov
Strom Thurmond, South Carolina senator at thurmond.senate.gov
Charles E. Grassley, Iowa chuck_grassley at grassley.senate.gov
Arlen Specter, Pennsylvania senator_specter at specter.senate.gov
Fred Thompson, Tennessee senator_thompson at thompson.senate.gov
Jon Kyl, Arizona info at kyl.senate.gov
Mike DeWine, Ohio senator_dewine at dewine.senate.gov
John Ashcroft, Missouri john_ashcroft at ashcroft.senate.gov
Spencer Abraham, Michigan michigan at abraham.senate.gov
Jeff Sessions, Alabama
Democrats
Patrick J. Leahy, Vermont senator_leahy at leahy.senate.gov
Edward M. Kennedy, Massachusetts senator at kennedy.senate.gov
Joseph R.Biden, Jr., Delaware senator at biden.senate.gov
Herb Kohl, Wisconsin senator_kohl at kohl.senate.gov
Dianne Feinstein, California senator at feinstein.senate.gov
Russell D. Feingold, Wisconsin russell_feingold at feingold.senate.gov
Richard Durbin, Illinois dick at durbin.senate.gov
Robert Torricelli, New Jersey senator at torricelli.senate.gov
Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Moore, Barrett, Weis and help get this matter settled.
Thursday March 30, 1995 I wrote Tenth Circuit clerk Hoecker to request a
copy of the docket sheets for case 94-2205 Payne v. Sandia Corporation,
et al
Hoecker did not answer my letter.
On Tuesday March 5,1996 I wrote Judge Lucius D. Bunton to ask his help
to get a copy of the docket sheets. No response.
On Monday September 23, 1996 Arthur R Morales and I wrote Henry A.
Politz, Chief Judge U.S. Court of Appeals - Fifth Circuit to ask his
help to get a copy of the docket sheets of my case and Morales� Tenth
Circuit case 95-2204.
Tenth Circuit also refused to send Morales copies of docket sheets for
his case.
Politz is Bunton's boss. No response.
Friday May 30, 1997 I wrote Antonin Scalia to get this help to get a
copy of the docket sheets. No response.
5 May 1998 citizen John Young finds docket sheets on
Source: PACER, U.S. Court of Appeals, 10th Circuit, 1-800-279-9107
and posts them on Internet at http://jya.com/whp-10usca.htm
Docket as of April 10, 1998 0:05 am
Proceedings include all events.
94-2205 Payne v. Sandia Corporation, et al
shows that I filed my Brief of the Appellant on 2/19/95.
2/23/95 [835344] Appellant's brief filed by William H. Payne.
Original and 7 copies. c/s: y. Served on 2/19/95 Oral
argument? pro se. Appellee/Respondent's brief due 3/24/95
for Thomas P. Wright, for Robert Surran, for Paul A.
Stokes, for Mary J. Stang, for Tommy A. Sellers, for Craig
A. Searls, for Albert Narath, for Preston B. Herrington,
for Peter S. Hamilton, for Roger L. Hagengruber, for James
R. Gosler, for Harold L. Folley, for Robert L. Ewing, for
C. William Childers, for Harvey J. Brewster, for Sandia
Corporation (mbm)
mbm writes "Appellee/Respondent's brief due 3/24/95"
Sandia had sent me a copy of its brief by 3/28/96.
I filed attached MOTION TO GRANT PLAINTIFF-APPELLANT'S DEMANDS ON BASIS
THAT DEFENDANT-APPELLEES FAILED TO FILE BRIEF WITHIN 30 DAYS SPECIFIED
BY FEDERAL RULE OF APPELLATE PROCEDURE 31 on Tuesday the 28th day of
March, 1995
My February 28 MOTION at the Tenth Circuit is filed WITHOUT notice of
service logged.
4/4/95 [845484] Appellant's motion filed by Appellant William H.
Payne [94-2205] to grant appellant's demands on basis that
appellees' failed to file timely brief. Original and 3
copies c/s: y (mbm)
In 1995 FRAP 25 (a) stated "[b]riefs shall be deemed filed on the day
of mailing if the
most expeditious form of delivery by mail, excepting special delivery,
is used."
FRAP 25 has been changed by 1998 to
http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a
Since I mailed Appellant's motion filed by Appellant William H. Payne
[94-2205] to grant appellant's demands on basis that appellees' failed
to file timely brief on 3/28/98, it is likely Sandia's lawyer Friedman
received it 3/29/95.
Tenth Circuit logs
3/30/95 [844759] Appellee's brief filed by Sandia Corporation,
Harvey J. Brewster, C. William Childers, Robert L. Ewing,
Harold L. Folley, James R. Gosler, Roger L. Hagengruber,
Peter S. Hamilton, Preston B. Herrington, Albert Narath,
Craig A. Searls, Tommy A. Sellers, Mary J. Stang, Paul A.
Stokes, Robert Surran, Thomas P. Wright. Original and 7
copies. c/s: y. Served on 3/27/95 Oral Argument? y
(appellant is pro se) Appellant's optional reply brief due
4/13/95 for William H. Payne (mbm)
Federal Rule of Appellate Procedure [FRAP] 26 (c) states
(c) Additional Time after Service. When a party is required or
permitted to act within a prescribed period after service of a
paper upon that party, 3 calendar days are added to the prescribed
period unless the paper is delivered on the date of service stated in
the proof of service.
http://www.ca5.uscourts.gov/docs/frap-iop.htm#26c
While the Tenth Circuit ASSERTS Appellees� brief was, in fact, served on
3/27/95
evidence given below points to the brief was served, in fact, on
3/29/95.
I allege that Friedman affixed a false date of service to Sandia's
brief.
I WAS NEVER PROPERLY SERVED. I wrote
Wednesday March 29, 1995
Dan Friedman
Simons, Cuddy & Friedman
Pecos Trail Office Compound
1701 Old Pecos Trail
POB 4160
Santa Fe, NM 87502-4160
505-988-4476
505-984-1807 FAX
Dear Lawyer Friedman:
Today at 14:00 hours I found a green and white about 9x13
inch envelope in our mail box at my home.
Mailing label indicated that the envelope came from your
firm. CONFIDENTIAL was stamped on the mailing label.
I wrote "Received at 14:00 hours on W 3/29/95 with no
POSTMARK OR STAMP by W. H. Payne" at the bottom of the
envelope.
There was no STAMP OR POSTAGE METER LABEL or
POSTMARK on the envelope.
Therefore, I gave the envelope to US Postal Service
supervisor Mel at 14:49 hours today at the Postal Receiving
station at 9904 Montgomery, NW in Albuquerque. Mel has a
copy of the cover of the envelope with Mel's note written on
it.
Mel told me the post office was going to return the envelope
to your firm for proper mailing.
I ask:
1 What did this envelope contain? Please identify
the documents precisely.
2 If any Certificates of Service were included in the
envelope, then what were the dates affixed to these
documents?
3 Who placed this envelope in our mail box?
Lawyer Friedman: It appears you missed an important filing
date. And are in the process of attempt to correct your
failure. But may be using illegitimate methods to conceal
your failure.
Please respond as soon as possible so that we all may
discover what has happened here." ...
Lawyer Friedman did not respond to the above letter.
But Friedman did mail me Appellees� brief many days later in envelope
showing TRUE MAILING date. Certificate of service on received
Appellees� brief
did not reflect postmark date.
10th Cir. R. 25.4 in 1995 page 62 reads
Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1
But Tenth Circuit clerks Fisher and Hoecker despite my protests and
submission of
evidence may have stamped FILED on Sandia's IMPROPERLY SERVED
Appellee/Respondent's brief according to the Federal Rules of Appellate
Procedure.
Laywer Friedman FALSIFIED THE CERTIFICATE OF SERVICE.
Friedman DID NOT MAIL ME "Served on 3/27/95."
d) Proof of Service; Filing. A paper presented for filing shall contain
an acknowledgment of service by the person served or proof of service
in the form of a statement of the date and manner of service, of the
name of the person served, and of the addresses to which the papers were
mailed or at which they were delivered, certified by the person who made
service. Proof of service may appear on or be affixed to the papers
filed. When a brief or appendix is filed by mailing or dispatch in
accordance with Rule 25(a)(2)(B), the proof of service shall also state
the date and manner by which the document was mailed or dispatched to
the clerk.
http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a
Crime apparently committed by Hoecker and Fisher is
� 1017. Government seals wrongfully used and instruments wrongfully
sealed
Whoever fraudulently or wrongfully affixes or impresses the seal of any
department or agency of the United States, to or upon any certificate,
instrument, commission, document, or paper or with knowledge of its
fraudulent character, with wrongful or fraudulent intent, uses, buys,
procures, sells, or transfers to another any such certificate,
instrument, commission, document, or paper, to which or upon which said
seal has been so fraudulently affixed or impressed, shall be fined under
this title or imprisoned not more than five years, or both.
http://www.law.cornell.edu/uscode/18/1017.shtml
Despite my protests of judicial misconduct Judges Moore, Barrett, Weis
award decision to Sandia
10/6/95 [890055] Order filed by Judges Moore, Barrett, Weis
"...All outstanding motions are denied..." (found in Order
& Judgment of 10/6/95) [879579-1] Parties served by mail.
(pdw)
when these judges should not have had Appellees� brief before them.
Then in an apparently attempt to conceal what happened
10/6/95 [890076] NOTE: THIS ENTIRE CASE IS SEALED. Terminated on
the Merits after Submission Without Oral Hearing; Judgment
Affirmed; Written, Signed, Unpublished. Moore, authoring
judge; Barrett; Weis. [94-2205] (pdw)
I WON MY APPEAL, pro se, ON A TECHNICALITY but judges Judges Moore,
Barrett, Weis
awarded the win to Sandia Labs!
Members of Congress, judicial misconduct in this matter has been
well-documented. Court records
filed with the Tenth Circuit. But CURRENTLY under seal.
Lawyers involved in this matter attempt to use the legal strategy of
IGNORE and STONEWALL to
attempt to deny me justice.
Ignoring and stonewalling by lawyers forced Morales and me to seek
visibility so lawyers
could no longer ignore and stonewall.
Lawyer attitude apparently is that they ignore rules of civil procedure
or even the law so long
as their actions are invisible to public scrutiny.
Visibility was achieved by suing the National Security Agency which
revealed even more judicial misconduct http://www.jya.com/whp052898.htm.
I would like to settle all matters involved with this unfortunate
cyrpto-related matter,
which includes criminal violations of the Privacy Act.
DOE lawyer Steve Dillingham asked me to prepare a settlement offer in
1994. I wrote a
settlement letter May 22, 1994 to Dillingham. Nothing happened.
June 11, 1998 I made several modifications to my 1994 settlement letter
and sent it e-mail
to Robert Nordhaus, Chief Counsel, DOE.
I ask that you
1 help with settlement of my six-year-old since I won my appeal at the
Tenth Circuit,
2 investigate Tenth Circuit case 94-2205 Payne v. Sandia Corporation,
et al to bring
the guilty to justice.
Sincerely
william payne
505 292 7037 I am not reading e-mail
http://jya.com/whpfiles.htm
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html
Coauthor Lewis in the above is one of my former MS and PhD students in
computer science.
http://www.friction-free-economy.com/
Monday 6/22/98 1:04 PM
Members of Congress
Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Anderson, Barrett, Logan and request a congressional
investigation.
After several years, with Payne, of trying to get Tenth Circuit to send
docket sheets from my case,
citizen John Young http://www.jya.com/index.htm locates docket sheets
and posts them
Morales Case Dockets 10th USCA June 12, 1998
on Internet at http://www.jya.com/arm061298.htm.
Source: Online records Tenth Circuit Court of Appeals via PACER
GENERAL DOCKET FOR
Tenth Circuit Court of Appeals
Court of Appeals Docket #: 95-2204 Filed:
9/29/95
Nsuit: 3440
Morales v. Sandia National Lab.
Appeal from: United States District Court for the District of New
Mexico
I filed
11/9/95 [898274] Appellant's brief filed by Arthur R. Morales.
Original and 2 copies. c/s: y. Served on 11/7/95. Oral
argument? pro se. Appellee's brief due 12/11/95 for Sandia
National Lab. (pdw)
Sandia files its FIRST ATTEMPT at
12/11/95 [905033] Appellee's deficient brief filed by Sandia
National Lab.. Appellee's corrected brief due 12/21/95 for
Sandia National Lab. additional copies received 12/11/95.
(fg)
Tenth Circuit court clerk Patrick Fisher writes Wells on December 11,
1995
concerning Sandia's deficient brief
[C]orrections, however made, must be accompanied by proof of service
upon all other parties to the appeal. ...
and issues
12/14/95 [905975] FIRST notice of rules violation for Deborah D.
Wells for Appellee Sandia National Lab. (sls)
Wells submits
12/21/95 [907974] Appellee's brief filed by Sandia National Lab..
Original and 7 copies. c/s: y. Served on 12/20/95 Oral
Argument? n Appellant's optional reply brief due 1/8/96 for
Arthur R. Morales (mbm)
but DOES NOT serve me with a copy.
Wells later admits in
2/1/96 [917660] Response filed by Sandia National Lab.
Appellant/Petitioner motion to clarify Original and 3
copies. c/s: y response Null Relief Code (fg)
Certificate of Service date 30th day of January, 1996,
[h]ad Appellant simply made a phone call to the Tenth Circuit, he
could
have established that the Defendant-Appellee's corrected brief was
indeed
filed on a timely basis, ...
I protested by filing
1/3/96 [909965] Appellant's motion "for the Court to Grant
Appeal" filed by Appellant Arthur R. Morales [95-2204].
Original and 3 copies. c/s: y. (pdw)
1/3/96 [909966] Appellant's motion "for New Trial" filed by
Appellant Arthur R. Morales [95-2204]. Original and 3
copies. c/s: y. (pdw)
1/3/96 [909967] Appellant's motion "to Discipline
Defendant-Appellee" filed by Appellant Arthur R. Morales
[95-2204]. Original and 3 copies. c/s: y. (pdw)
because Sandia did not properly serve me in violation of Fisher's
December
11, 1995 order.
The Tenth Circuit court of appeals should NOT, by its own rules, filed
Appellee's brief filed by Sandia National Lab.. Original and 7
copies.
c/s: y. Served on 12/20/95
10th Cir. R. 25.4 in 1995 page 62 reads
Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1
And is doubtful whether court clerk Fisher had any authority under
appellate procedure
to permit Wells to correct her deficient brief.
Rather Sandia's brief did not comply with with Federal Rules of
Appellate Procedure and should have been summarily rejected for filing.
I WON, pro se, my appeal to the Tenth circuit on a technicality but
Judges Anderson, Barrett, Logan
awarded the win to Sandia Labs.
4/2/96 [932848] Order filed by Judges Anderson, Barrett, Logan
denying parties' motions for general relief(found in Order
and Judgment of 4/2/96)--"...During the course of this
appeal, the parties have filed various motions for
dismissal, summary grant, and sanctions. We find no merit
to any of these motions, and they are [920851-1] Parties
served by mail. (pdw)
by accepting and judging on a documents which was not permitted to be
before the court by
its own rules.
Judicial misconduct in my case has been well-documented as it is in
Payne's case.
Payne and I speculate that similar judicial misconduct may have occurred
at the Tenth Circuit.
Sandia lawyer Robert J Park wrote me a settlement letter on Feb 18,
1998.
I filled in the blanks and made minor handwritten chages and returned it
on February 22, 1998.
But my offer has not yet been accepted.
I ask that you
1 help have my settlement offer accepted,
2 investigate judicial misconduct in case 95-2204 and punish the
guilty.
Some citizens can only express such frustrations with the US court
system with violence.
I seek change by legal reform.
Sincerely
Arthur R Morales
505 345 1381
From CTIA_Daily_News at tour.unitymail.com Mon Jun 22 14:24:44 1998
From: CTIA_Daily_News at tour.unitymail.com (CTIA Daily News)
Date: Mon, 22 Jun 1998 14:24:44 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - June 22, 1998
Message-ID: <199806222114.QAA21599@revnet4.revnet.com>
========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM. Please click on the icon for the
most important news in wireless communications today.
========================================
From privsoft at ix.netcom.com Mon Jun 22 16:19:07 1998
From: privsoft at ix.netcom.com (Steve Orrin)
Date: Mon, 22 Jun 1998 16:19:07 -0700 (PDT)
Subject: Verisign & NAI Join Forces, PGP out the door?
Message-ID: <199806222317.SAA04853@dfw-ix5.ix.netcom.com>
To all:
Word is the PGP is being dropped as a standard and NAI converting over to
x.509 throughout product line. However the info is vague wnough to mean
alot of things:)
sorrin
NETWORK ASSOCIATES AND VERISIGN PARTNER TO PROVIDE INTEROPERABLE
6/22/98 13:18
Digital Certificate Solutions to Millions of Users Worldwide
Partnership Provides Customers Choice of Leading Certificate Formats,
Enabling Widespread Secure Internet Business Transactions
MOUNTAIN VIEW and SANTA CLARA, Calif., June 22 /PRNewswire/ --
VeriSign,
Inc. (Nasdaq: VRSN), and Network Associates (Nasdaq: NETA), today announced
a
broad reaching partnership to enable cross product support and promotion of
each company's digital certificate-based security solutions. This
partnership
will provide customers with a flexible security solution that encompasses
best-of-breed products and technologies -- enabling secure global
electronic
commerce and business-to-business communications on a larger scale than
ever
before. With this announcement, Network Associates and VeriSign can tap
into
the world's largest community of certificate holders made up of over one
thousand five hundred enterprises and nearly nine million individuals
throughout the world.
This integration of the world's leading certificate technologies will
enable businesses to utilize their choice of certificate formats while
conducting secure Internet transactions such as: exchanging secure e-mail,
establishing virtual private networks, and authorized access to
confidential
corporate data. Network Associates and VeriSign customers will now be able
to
establish combined PKI solutions covering the complete lifecycle of
certificates from issuance and usage through renewal, expiration, or
revocation. The first commercial offering from this collaboration will be
interoperable between the Gauntlet GVPN product and VeriSign OnSite for
IPSEC,
which will be available in the third quarter. In the fourth quarter
VeriSign's OnSite service and toolkit will be enhanced to issue DSA X.509
certificates in addition to its RSA X.509 certificates, and Network
Associates' Net Tools Secure, including their industry leading PGP
encryption
products, will be updated to request and use either type of certificate.
"By joining the two largest players in the industry to ensure that our
customers' security applications are seamlessly compatible, we are fueling
the
growth of electronic commerce and secure communications on the Internet,"
said
Peter Watkins general manager of the Net Tools Secure division at Network
Associates. "We are pleased to offer VeriSign as our preferred provider of
digital certificate services. Together, we are the only two companies to
support the full range of certificate standards -- giving customers the
power
of choice when implementing their open, certificate-based security
solutions."
"We are extremely pleased to work with Network Associates to bring
enterprise customers a clear best-of-breed solution," said Stratton
Sclavos,
president and CEO of VeriSign. "With this partnership, users of Network
Associates' desktop and server encryption applications can simply obtain
their
choice of digital certificates to establish a fully functional,
interoperable
PKI through the use of OnSite."
"The announcement from VeriSign and Network Associates is a win-win
situation for Information Systems (IS) decision makers," said Jim Hurley,
director of information security at Aberdeen Group, a Boston-based IS
market-research, consulting and analysis firm. "One supplier helps IS
managers by managing risk while the other helps IS managers by enabling
safe
interconnections with suppliers, partners and customers for mission
business-procedures. Interoperable and seamless support between these
supplier's products is the kind of partnership that IS executives will
reward."
VeriSign OnSite, a state of the art digital certificate solution that
enables organizations to quickly and easily establish themselves as a
certificate authority, is available today for client and server digital
certificates and will be available for IPSec digital certificates in the
third
quarter. VeriSign OnSite pricing begins at $4995 for 1000 client
certificates.
Network Associates' Net Tools Secure suite is the industry's most
comprehensive set of security products encompassing enterprise encryption,
authentication, intrusion detection, audit analysis, anti-virus, firewall,
global virtual private network and network vulnerability assessment. Net
Tools Secure is available now and is priced at $49 per user for 5000 users.
Network Associates, Inc.
With headquarters in Santa Clara, California, Network Associates, Inc.,
formed by the merger of McAfee Associates and Network General, is a leading
supplier of enterprise network security and management solutions. Network
Associates' Net Tools Secure and Net Tools Manager offer
best-of-breed, suite-based network security and management solutions. Net
Tools Secure and Net Tools Manager suites combine to create Net Tools,
which
centralizes these point solutions within an easy-to-use, integrated systems
management environment. For more information, Network Associates can be
reached at 408-988-3832 or on the Internet at http://www.nai.com.
VeriSign, Inc. is the leading provider of digital certificate solutions
used by enterprises, Web sites and consumers to conduct secure
communications
and transactions over the Internet and private networks. VeriSign's Digital
IDs and Secure Server IDs are available through the company's Web site at
http://www.verisign.com. VeriSign's E-Commerce Solutions are used by
enterprises to deploy complete Public Key Infrastructure (PKI) solutions
for
intranets, extranets, and large-scale electronic commerce applications, and
are available through VeriSign regional account representatives or through
VeriSign resellers. For more information visit VeriSign's Web site at
http://www.verisign.com.
SOURCE Network Associates, Inc.
-0- 06/22/98
/CONTACT: Nathan Tyler of Copithorne & Bellows, 415-975-2223, for
Network
Associates; or Kelly Ryan of VeriSign, 650-429-3424/
/Company News On-Call: http://www.prnewswire.com or fax, 800-758-5804,
ext. 124004/
/Web site: http://www.verisign.com
http://www.nai.com/
(NETA VRSN)
CO: Network Associates, Inc.; VeriSign, Inc.
ST: California
IN: CPR MLM
SU: PDT
-0- (PRN) Jun/22/98 13:03
EOS (PRN) Jun/22/98 13:03 86
-0- (PRN) Jun/22/ 98 13:18
From privsoft at ix.netcom.com Mon Jun 22 16:20:14 1998
From: privsoft at ix.netcom.com (Steve Orrin)
Date: Mon, 22 Jun 1998 16:20:14 -0700 (PDT)
Subject: Entrust goes Public
Message-ID: <199806222319.SAA04946@dfw-ix5.ix.netcom.com>
> Entrust filed to go public.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: bin00000.bin
Type: application/octet-stream
Size: 302 bytes
Desc: "ENTRUST TECHNOLOGIES INC (Internet Shortcut)"
URL:
From 43348928 at 30267.com Mon Jun 22 16:54:26 1998
From: 43348928 at 30267.com (Nicole)
Date: Mon, 22 Jun 1998 16:54:26 -0700 (PDT)
Subject: Just for You
Message-ID: <199342143263123.GXGT24348@default>
Hi...
This message is meant for Adults over the age of 21, If you have received this message in error, please delet it now and accept our appologies.
I would like to tell of about this great sex site on the web, offering everything you will ever desire.
It has live sex chat and a live sex xhow from Amsterdam.
Go and check it out.
http://www.sex4u.net/
Love
Anna
From msew+ at andrew.cmu.edu Mon Jun 22 17:23:58 1998
From: msew+ at andrew.cmu.edu (Martin C Sweitzer)
Date: Mon, 22 Jun 1998 17:23:58 -0700 (PDT)
Subject: export Laws regarding less than 40 bit encryption
In-Reply-To:
Message-ID:
Can anyone point me to a document that clearly states the laws governing
the export of software with less than 40 bits worth of encryption.
The ITAR made my head hurt. (damn lawyers)
thanks
msew
From lreed at west.cscwc.pima.edu Mon Jun 22 17:32:39 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Mon, 22 Jun 1998 17:32:39 -0700 (PDT)
Subject: Blood Sausage -- SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C818C.71EFAE40.1@west.cscwc.pima.edu>
BloodSausage HogLog - SPACE ALIENS HIDE M DRUGS!!!
___________________________________________________
"The lives of Frank, Gambino, Morel and Serafini ended on
the gallows of Montreal's Bordeaux Jail on October 24,
1924. Valentino and Davis had their executions commuted
at the last minute."
"No one claimed Frank, Gambino and Valentino were among
the half-dozen gunmen who ambushed the bank car, but
prosecutorn R.L. Calder argued they were still guilty of
murder because of the organized nature of the crime."
~Excerpts from "Blood Brothers" by Peter Edwards.
MeTheSheeple was glad to learn that these vile, criminal
scumbags, fingered by the person who had actually planned
and committed the crime, were held accountable for the
actions alleged to them by the gang-leader whose life was
spared in return for ratting out alleged coconspirators.
I was particularly happy because I knew that the same
high standards of justice would undoubtedly be applied to
the criminal scum within the Canadian Justice System under
whose PigSkin Umbrella the Montreal Mobsters ruled the
streets and the citizens who walked them.
"Testimony at the Frank robbery trial showed that police
routinely sipped coffee with hoods and that Montreal's
finest had been tipped off to the armoured car hold-up
well in advance, but did nothing."
Supreme Court of Canada Justice Louise Coderre (with a
left-handed frog-tongue over the first 'e') said, "Vice
has spread itself across the city with an ugliness that
seemed assured of impunity."
Rather than bore you with all of the details behind the
criminal scumbag PigsWithBadgesAndGuns being also found
'GUILT OF MURDER BECAUSE OF THE ORGANIZED NATURE OF THE
CRIME', I will just skip ahead in the book and report on
the final outcome of JUSTICE
in the case of the police and city officials discovered
to have greased the wheels of organized crime in their
activities of drug dealing, robbery, murder, etc.
Hmmm....nope...nada....maybe...nope...nope...
Surprise, surprise! It seems that, following the
Coderre probe, "nothing happened that seriously
threatened the criminals' take. The name of Cadiex
Street was changed to de Bullion Street after a New
ork play made the old name notorious, but along the
same pavement the same crimes continued."
Those without my cynical psychological make-up will
undoubtedly be able to supply you with reasons as to
just why the local citizens felt extremely 'served and
protected' when they came to after being mugged and saw
the new street signs, however, I will merely take a short
break, here, have a good dump, and wipe my butt with yet
another page of the Criminal Code of Canada.
And Silk Badges..?:
"I know who the real public enemies are. But they are
men who have the respect of the public; men who wear
silk hats, who are apparently of standing in the
community."
~1930's Montreal MobBuster, J.J. Penverne
(with no frog-licks in his name...)
Peter Edwards provides the standard journalistic
explaination as to how "The term 'Mafia,' in its truest
form, refers only to organized crime in western Sicily."
and explains how it has been expanded to encompass any
pair of teenagers throwing a rock through a window, as
long as one of them has an Italian name.
He neglects to explain, as some journalists do, that
the word "Mafia" is becoming increasingly generic, now
including the 'Lebanese Mafia', the 'Columbian Mafia',
etc.
*All* journalists, however, seem unable to explain why
they continue to avoid naming the continuing organized forces
of armed domination over citizens of *all* ethnic groups the
'Government Mafia'...
"Blood Brothers" is not the first book to point out that
at the heart of the "honoured society of Calabria" lies the
concept of "omerta" (with a right-handed strand of spaghetti
over the 'a').
Nor is it the first book to fail to point out that omerta's
"double code of conduct that set different moral codes for
dealings with those inside and outside one's family circle"
applies not only to Officially Recognized Criminal ScumBag
Organizations, but also to almost every 'gang' larger than
a Cult Of One from the PTA to the CIA to the USA.
'Omerta' decrees that when the president of the PTA molests
a child, when the head of the CIA commits treason, when the
president of the USA declares that US citizens will continue
to face imprisonment for exporting the same strength of
encryption that their government is sharing with Communist
China, that a street somewhere be renamed, while everything
else continues on pretty much as before.
Don't hold your breath waiting for mainstream journalists
to upset the BadAppleCart by referring to the 'PTA Mafia' when
they deem that your child should be forced to attend school with
a child who can murder them by biting them, while teaching
them that you are a dangerous psycho because of your gun
ownership; or to the 'FBI Mafia' when they murder a mother and
child in attempts to cover their previous unannounced, botched
armed assault on a citizen being charged with civil crimes in
an attempt to persuade him to invent crimes against his friends,
whether they were Jewish or not; or to the 'Government Mafia'
when they spend millions of dollars investigating and/or charging
Phil Zimmerman, Bill Clinton, Bill Gates, Jim Bell, knowing that
the bottomless taxpayer pockets funding their legally unjustified
harassment will guarantee at least moderately successful results,
even if the end result is dropping the matter when the multi-
million dollar stench begins blowing back toward DC.
Do not expect mainstream journalists to refer to the 'ASPCA
Mafia' when they release a hastily composed 'history' of
TruthMongrel as a rabid, sharp-toothed, human baby conniseur,
after HeOrShe is cut down by FBI gunfire on Mayonaisse Mountain
during attempts to arrest the Author on 'Dog At Large' charges
filed by the Royal Canadian Mounted Police in Bienfait, Sask.
Silk? We Don't Need No Stinking Silk...:
The multi-facted PigsEar WebSites that are increasingly
being turned into InterNet Cult of One SilkPurses through
the increasingly efficient and powerful shareware digital
bread-slicers available to Jane and Joe Sheeple in their
quest to serve either God, Mammon, Dog or Mammy, according
to their prediliction, have the capacity, if uncensored
and uncontrolled, of allowing the individual to rekindle
the creative spark of individuality that reminds them that
the word 'WE' should only be used by Kings, Priests, and
people with tapeworms.
People with the ability to think for themselves; people
who know that if Timothy McVeigh was really the 'Muenster'
that the mainstream media claimed, then he would have been
in the 'Adams Family' movie; people who demand to know if
Monica Lewinski has a 'bent' pussy; people with conspiring
minds, who want to 'snow'; people who are not afraid to
stand up and cheer for the Officially Recognized BadGuys
on 'Cops' and 'World's Scariest Innocent Bystander
Threatening Police Chases'; people watching 'World's Dumbest
Criminals' who slap their forehead and say, "I hate it when
that happens..."
People who read the Bienfait Nutly News.
From CTIA_Daily_News at tour.unitymail.com Mon Jun 22 22:49:41 1998
From: CTIA_Daily_News at tour.unitymail.com (CTIA Daily News)
Date: Mon, 22 Jun 1998 22:49:41 -0700 (PDT)
Subject: CTIA Daily News From WOW-COM - June 22, 1998
Message-ID: <199806230545.AAA07698@revnet4.revnet.com>
========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM. Please click on the icon for the
most important news in wireless communications today.
========================================
From jya at pipeline.com Tue Jun 23 05:49:03 1998
From: jya at pipeline.com (John Young)
Date: Tue, 23 Jun 1998 05:49:03 -0700 (PDT)
Subject: Jim Bell Rearrested
Message-ID: <199806231248.IAA16982@camel8.mindspring.com>
JY note: The message below has not been authenticated. The writer claimed
no knowledge of the arrest at the time I spoke with him, which was
after the date and time of the arrest given in the message. It's
possible he was withholding the information for publication or by
request of confidentiality. The message may be a forgery written
after seeing the messages at http://jya.com/jdb062198.htm. The IRS
has sent spam concerning Jim Bell before: http://jya.com/irs-spam.htm.
From: Anonymous 3
Date: Mon, 22 Jun 1998 23:31:33 EDT
To: jya at pipeline.com
Subject: Jim Bell and anon
John:
This is [a journalist] whom you called today about Bell. He was
arrested at his parents' home in Vancouver Monday about 1:07 a.m. PDT by five
federal marshals in two cars. The agents went in with guns drawn and came out
with Bell's elderly parents, with whom they talked for a while. A few minutes
later, they brought out Jim, who was handcuffed in front, dressed in a blue T-
shirt and slacks. He was put in the back of a red Jeep, and then leg chained
by an agent. (I tried to ask one of the agents if Jim was going to be taken
directly to Tacoma - my assumption - but the agent was a typical marshals
service jerk and just told me to stay away.)
Jim was in the backseat for about 20 minutes and then two agents came out and
drove him away - after one agent accidentally set off the Jeep "wa-wa" siren -
...just as TV arrived. the other three agents remained in the house, looking
for "evidence," i assume.
I expect him to appear before a federal magistrate in Tacoma tomorrow
morning. His federal defender still has not been provided any paper by the
govt.
so, now yr up to date.
on another matter, I was curious abt the anonymous info sent you. i've been
trying to get an anon remailer for some time, but have been unsuccessful. got
any tips, advice or help?
From rah at shipwright.com Tue Jun 23 08:47:20 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Tue, 23 Jun 1998 08:47:20 -0700 (PDT)
Subject: Jim Bell Rearrested
In-Reply-To: <199806231248.IAA16982@camel8.mindspring.com>
Message-ID:
So, is this in reference to his purported request to get access to
computers after his release?
Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga
Philodox Financial Technology Evangelism
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Philodox: , e$:
From pircher at informatik.tu-muenchen.de Tue Jun 23 10:02:41 1998
From: pircher at informatik.tu-muenchen.de (Alex `Taker` Pircher)
Date: Tue, 23 Jun 1998 10:02:41 -0700 (PDT)
Subject: Anonymicer
Message-ID: <358FDF49.4AC1@informatik.tu-muenchen.de>
Protect your Privacy for FREE!
http://anonymicer.home.ml.org/
(or http://anonymicer.home.pages.de/)
* Surf anonymously - http://anonymicer.home.ml.org/
* Send anonymous Emails - http://anonymicer.home.ml.org/email/
* Post anonymous Messages
into Newsgroups - http://anonymicer.home.ml.org/news/
Fast - Easy - Free
Greetz,
Taker
pircher at informatik.tu-muenchen.de
From CTIA_Daily_News at tour.unitymail.com Tue Jun 23 10:42:49 1998
From: CTIA_Daily_News at tour.unitymail.com (CTIA Daily News)
Date: Tue, 23 Jun 1998 10:42:49 -0700 (PDT)
Subject: CTIA Daily News From WOW-COM
Message-ID: <199806231737.MAA29674@revnet4.revnet.com>
========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM. Please click on the icon for the
most important news in wireless communications today.
========================================
From jya at pipeline.com Tue Jun 23 10:49:37 1998
From: jya at pipeline.com (John Young)
Date: Tue, 23 Jun 1998 10:49:37 -0700 (PDT)
Subject: Jim Bell Rearrested 2
In-Reply-To: <199806231248.IAA16982@camel8.mindspring.com>
Message-ID: <199806231749.NAA16701@dewdrop2.mindspring.com>
The message about Jim's rearrest yesterday is confirmed,
except the time of arrest was 1:07 PM, not AM. The reporter
went by Jim's house after confirming that a bust was scheduled
and waited for the action.
Jim's been taken from Vancouver, WA, where he lives with his
parents, to either Spokane or Seattle, for a hearing before
a magistrate on the alleged parole violation. Jim's public
defender is on the matter.
No information on Jim's alleged violation, although the reporter
says supposedly there's a long list of prohibitions including one
against going near a federal facility, "even a mailbox."
Someone's trying to a get a copy of the list which should be
public information.
Jim's appeal with the Ninth Circuit Court is presumably for
reduction of the onerous prohibitions which may have
been made sever enough that he could be hauled in
whenever publicity is needed in the lucrative fight against
"terrorism of the American people," a fever for funding that's
feeding bucks into the bottomless pockets of US Justus
Terrorists coming to call.
From jya at pipeline.com Tue Jun 23 12:10:31 1998
From: jya at pipeline.com (John Young)
Date: Tue, 23 Jun 1998 12:10:31 -0700 (PDT)
Subject: NSA Declassifies Algos
Message-ID: <199806231910.PAA29551@dewdrop2.mindspring.com>
Thanks to Ed Roback, NIST:
http://www.defenselink.mil/news/Jun1998/b06231998_bt316-98.html
DoD Press Release, June 23, 1998:
No. 316-78
IMMEDIATE RELEASE
June 23, 1998
(703)695-0192(media)
(703)697-5737(public/industry)
ENCRYPTION FORMULAS DECLASSIFIED
The Department of Defense today announced the decision by the
National Security Agency to declassify both the Key Exchange
Algorithm and the SKIPJACK encryption algorithm used in the
FORTEZZA(tm) personal computer card. FORTEZZA(tm) provides
security at the desktop in the Defense Message System and other
DoD applications. This marks the first time that the NSA has
declassified such information and made it commercially available.
This declassification is an essential part of the Department of
Defense's efforts to work with commercial industry in developing
reasonably priced computer protection products. This
declassification decision will enable industry to develop software
and smartcard based security products, which are interoperable
with FORTEZZA(tm). The availability of such products will enhance
the protection of DoD's sensitive but unclassified and critical
non-mission communications.
The decision to release SKIPJACK (an 80 bit encryption algorithm
that is not extensible to higher key lengths) and KEA (a 1024 bit
key exchange algorithm) is restricted to these particular
algorithms, and does not apply to other classified NSA algorithms.
The SKIPJACK and KEA algorithms and their source codes have been
declassified pursuant to Executive Order 12958.
Vendors interested in obtaining more information on this matter
should contact the National Security Agency Public Affairs Office
at 301-688-6524.
[End]
-----
Note: We called NSA Public Affairs who said that more information
will be available tomorrow afternoon on NIST's Web site (no specific
URL):
http://www.nist.gov
In the meantime NSA will respond to faxed questions; send to:
Vanessa Talieri
Office of Public Affairs
National Security Agency
Fax: 301-497-2844
From jkthomson at bigfoot.com Tue Jun 23 12:13:08 1998
From: jkthomson at bigfoot.com (jkthomson)
Date: Tue, 23 Jun 1998 12:13:08 -0700 (PDT)
Subject: PGPdisk for win95/98?
Message-ID: <3.0.3.32.19980623121806.006ce848@dowco.com>
Great, so I finally get around to checking PGP's betaweb, and to my
amazement, they finally have a beta version of PGPdisk for 95. Too bad it
claims that I need to contact a sales rep, and when I follow their link, I
get nothing that would really point me in the right direction. Any of you
manage to get your hands on a copy?
Currently, I am using bestcrypt NP with blowfish. I am a little concerned
with this however, As I have never seen a crypto-review of the software,
and their website is not too forthcoming with technical details, or known
attacks. Does anyone have information (or horror stories) from using
bestcrypt?
---------------------------------------------------------------
james 'keith' thomson ICQ:746241
jkthomson: C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D
http://www.bigfoot.com/~ceildh at pgp.mit.edu
---------------------------------------------------------------
You can lead a man to slaughter, but you can't make him think.
================================================================
From bogus@does.not.exist.com Tue Jun 23 12:15:45 1998
From: bogus@does.not.exist.com ()
Date: Tue, 23 Jun 1998 12:15:45 -0700 (PDT)
Subject: Creating Wealth In America
Message-ID: <199806232650RAA53408@adv01.ieighty.net>
Creating Wealth in America
>From the desk of Robert Allen, The Author of 2 Mega Best-Sellers, Nothing Down
and Creating Wealth in America
San Diego, California
11:29 P.M.
"I can't sleep until I get this off my chest."
"I'm extremely frustrated".
Odds are that nine out of ten people who receive this letter will discard it without a second thought. Yet, I know that I have discovered a secret that could change your financial life forever! And I'm willing to share it with you for FREE.
Do you want to end your money pressures forever?
Do you want to double your income?
Do you want to build an extra stream of income quickly?
If you answered yes, then let me show you how you can begin living your dreams, this year before it's too late. I'll get right to the point.
As it says on the letterhead, my name is Robert Allen. I'm famous for my two #1 New York Times best-selling books. Nothing Down and Creating Wealth in America. There are lots of millionaires who credit their success to one of my books or seminars. So when I share this secret with you, I want you to know that I've done my homework. Here it comes.
I have discovered what I believe is the perfect home-based business.
Although I'm well known for real-estate investment books and seminars, this new business has absolutely nothing to do with real-estate. In fact, it's much easier and far less risky. It involves:
-No employees
-Little risk
-Little start up cash
-It's so simple, anyone can do it
You could be earning $1,000 a week in as little as 90 days. One person I know went from zero to $3,000 a week in 60 days. That's $150,000 a year extra, hassle-free income!
In my 20 years of research, I can honestly say, "I've never seen a faster, easier way to create a stream of income".
I know this sounds too good to be true. Frankly, I didn't believe it myself at first. Finally, I agreed to check it out. As a test, I selected a small group of people and introduced them to this incredible opportunity. Almost immediately, many of them started earning profits. Within a week, many were earning incomes of $4,000 per month in net cash flow. Now, some of them are cashing checks for $3,000 a week. And this is just the beginning! Their earning potential could be unlimited!
Would you like to learn how to do that? I'd love to show you how. But only if you're interested enough to make one telephone call. The number to call immediately is 1-888-267-4455. It's a 3-minute, 24-hour recorded message. This may be the answer you have been seeking.
Warmly,
Robert G. Allen
P.S. I want to show you how to create extra streams of income quickly,
Go to the phone and call now 1-888-267-4455.
//
From maxinux at bigfoot.com Tue Jun 23 13:55:40 1998
From: maxinux at bigfoot.com (Max Inux)
Date: Tue, 23 Jun 1998 13:55:40 -0700 (PDT)
Subject: PGPdisk for win95/98?
In-Reply-To: <3.0.3.32.19980623121806.006ce848@dowco.com>
Message-ID:
No horror stories of bestcrypt, but I hear that PGPdisk is damn dope,
except for two things. The crypto 'file/partition/whatever' is static in
size, not dynamic, and it does _not_ use your pgp key.. But it looks like
it should still be neat.. I still like CFS for linux :-)
-- Max Inux (MaxInux at bigfoot.com) UIN: 207447, http://khercs.chipware.net
Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59
Or Kinky sex makes the world go round- Christie: Your in my sig too
^^ If Cryptography is outlawed, only outlaws will have cryptography ^^
On Tue, 23 Jun 1998, jkthomson wrote:
>
>
>
>
>
> Great, so I finally get around to checking PGP's betaweb, and to my
> amazement, they finally have a beta version of PGPdisk for 95. Too bad it
> claims that I need to contact a sales rep, and when I follow their link, I
> get nothing that would really point me in the right direction. Any of you
> manage to get your hands on a copy?
>
> Currently, I am using bestcrypt NP with blowfish. I am a little concerned
> with this however, As I have never seen a crypto-review of the software,
> and their website is not too forthcoming with technical details, or known
> attacks. Does anyone have information (or horror stories) from using
> bestcrypt?
>
>
>
> ---------------------------------------------------------------
> james 'keith' thomson ICQ:746241
> jkthomson: C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D
> http://www.bigfoot.com/~ceildh at pgp.mit.edu
> ---------------------------------------------------------------
>
> You can lead a man to slaughter, but you can't make him think.
> ================================================================
>
From maxinux at bigfoot.com Tue Jun 23 13:55:44 1998
From: maxinux at bigfoot.com (Max Inux)
Date: Tue, 23 Jun 1998 13:55:44 -0700 (PDT)
Subject: Verisign & NAI Join Forces, PGP out the door? (fwd)
Message-ID:
This is what I was able to find out about the Verisign/NAI partnership.
-- Max Inux (MaxInux at bigfoot.com) UIN: 207447, http://khercs.chipware.net
Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59
Or Kinky sex makes the world go round- Christie: Your in my sig too
^^ If Cryptography is outlawed, only outlaws will have cryptography ^^
---------- Forwarded message ----------
Date: Tue, 23 Jun 1998 10:22:26 -0700
From: Jon Callas
To: Max Inux , Sean_Paswater at nai.com
Cc: chip at chipware.net, jon at pgp.com
Subject: Re: Verisign & NAI Join Forces, PGP out the door? (fwd)
At 08:10 PM 6/22/98 -0700, Max Inux wrote:
Chip and Jon:
Chip: Have any insight into this or is this gonna be like the TIS scare
w/ Key Escrow?
Jon: Since Chip will probably end up asking you or some of the other
higher ups if he is unsure, Is there any truth to this story, or is this
TIS #2?
The tale is true -- it's the *interpretation* that's bogus. PGP is not out
the door. PGP will be doing X.509 too. There's not a lot of difference
between an X.509 certificate and a PGP key signature. They do the same
thing. What you'll be able to do is have Verisign sign your key. The first
steps of this are coming this fall -- you'll be able to drop an X.509 cert
into your keyring and it will magically transform itself into a PGP key. At
first, you'll only be able to use it with TLS (a.k.a. SSL), which is also
coming this fall.
Jon
-----
Jon Callas jon at pgp.com
CTO, Total Network Security 3965 Freedom Circle
Network Associates, Inc. Santa Clara, CA 95054
(408) 346-5860
Fingerprints: D1EC 3C51 FCB1 67F8 4345 4A04 7DF9 C2E6 F129 27A9 (DSS)
665B 797F 37D1 C240 53AC 6D87 3A60 4628 (RSA)
From shamrock at cypherpunks.to Tue Jun 23 16:11:27 1998
From: shamrock at cypherpunks.to (Lucky Green)
Date: Tue, 23 Jun 1998 16:11:27 -0700 (PDT)
Subject: Verisign & NAI Join Forces, PGP out the door? (fwd)
In-Reply-To:
Message-ID:
The primary difference between X.509v3 vs. PGP keys is one of format, not
of function. There is nothing you can do in native PGP key format that you
can't do in X.509.
However, many companies mandate keys to be kept in X.509 format
for compatibility reasons (you can then put the key on a smartcard, etc.).
What this move will mean is that PGP will make further inroads into the
corporate world and that strong crypto will be used more widely.
Standardization is a Good Thing.
--Lucky
On Tue, 23 Jun 1998, Max Inux wrote:
> This is what I was able to find out about the Verisign/NAI partnership.
>
> -- Max Inux (MaxInux at bigfoot.com) UIN: 207447, http://khercs.chipware.net
> Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59
> Or Kinky sex makes the world go round- Christie: Your in my sig too
> ^^ If Cryptography is outlawed, only outlaws will have cryptography ^^
>
>
>
> ---------- Forwarded message ----------
> Date: Tue, 23 Jun 1998 10:22:26 -0700
> From: Jon Callas
> To: Max Inux , Sean_Paswater at nai.com
> Cc: chip at chipware.net, jon at pgp.com
> Subject: Re: Verisign & NAI Join Forces, PGP out the door? (fwd)
>
> At 08:10 PM 6/22/98 -0700, Max Inux wrote:
> Chip and Jon:
>
> Chip: Have any insight into this or is this gonna be like the TIS scare
> w/ Key Escrow?
>
> Jon: Since Chip will probably end up asking you or some of the other
> higher ups if he is unsure, Is there any truth to this story, or is this
> TIS #2?
>
> The tale is true -- it's the *interpretation* that's bogus. PGP is not out
> the door. PGP will be doing X.509 too. There's not a lot of difference
> between an X.509 certificate and a PGP key signature. They do the same
> thing. What you'll be able to do is have Verisign sign your key. The first
> steps of this are coming this fall -- you'll be able to drop an X.509 cert
> into your keyring and it will magically transform itself into a PGP key. At
> first, you'll only be able to use it with TLS (a.k.a. SSL), which is also
> coming this fall.
>
> Jon
>
>
>
> -----
> Jon Callas jon at pgp.com
> CTO, Total Network Security 3965 Freedom Circle
> Network Associates, Inc. Santa Clara, CA 95054
> (408) 346-5860
> Fingerprints: D1EC 3C51 FCB1 67F8 4345 4A04 7DF9 C2E6 F129 27A9 (DSS)
> 665B 797F 37D1 C240 53AC 6D87 3A60 4628 (RSA)
>
>
-- Lucky Green PGP v5 encrypted email preferred.
"Tonga? Where the hell is Tonga? They have Cypherpunks there?"
From gwb at gwb.com.au Tue Jun 23 19:18:29 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Tue, 23 Jun 1998 19:18:29 -0700 (PDT)
Subject: QANTAS discriminates against Pauline Hanson's One Nation
Message-ID: <1.5.4.32.19980623195854.00d302f4@mail.pronet.net.au>
Dear One Nation supporter in NSW,
Qantas has banned coverage of Pauline Hanson and One Nation from inflight news.
Qantas has effectively censored Channel 9's inflight coverage of Australian
news and has, in effect, implied that there is something "distasteful" about
Mrs Hanson and her political party.
The action allegedly follows a complaint by a QANTAS staff member about
coverage of Mrs Hanson being offensive to Indonesian passengers on an
international flight.
Pauline Hanson's political adviser, Mr David Oldfield, said it was
"disgraceful, un-Australian activity asking Channel 9 to be political
censors on behalf of Qantas.
"Everything that is said publicly, people should have the right to judge for
themselves whether something matters or doesn't," he said.
"But it certainly isn't up to any airline or anyone else to decide that
legitimate
public debate isn't to be viewed."
If you feel rightfully outraged by this act of censorship by Qantas (the
Australian Airline) please contact them by email:
qantasmedia at qantas.com.au
I would encourage you to take a moment to express how you feel about this issue.
Finally, please note Ansett have not undertaken censorship of this sort.
GWB
Scott Balson
From nobody at remailer.ch Tue Jun 23 19:42:15 1998
From: nobody at remailer.ch (Anonymous)
Date: Tue, 23 Jun 1998 19:42:15 -0700 (PDT)
Subject: Banning privacy: A radical proposal
Message-ID: <19980624011241.15925.qmail@hades.rpini.com>
This came from Yahoo/ZDNet. Mr. Pappas suggests that we just ban anonymity
and privacy to "protect the children." Now where have I heard that before?
And yet again, the "Ethical Hackers Against Pedophilia" raise their heads,
no pun intended.
>Banning privacy: A radical proposal
>
>By Charles Pappas
>June 22, 1998
>Yahoo! Internet Life
>
>Copyright (c) 1998 ZDNet
>
>Privacy and anonymity are our most cherished tenets of online life. A
>need so immense that Marc Rotenberg of the Electronic Privacy
>Information Center declared that we might need a kind of Department of
>Privacy. He's not alone: 72 percent of surfers think there should be new
>laws to protect their privacy.
>
>It's a radical, 180-degree turn to take, but...what if we're all wrong?
>What if this belief that privacy + anonymity = social good has become as
>self-destructive and delusional as a drunk who thinks one more scotch
>will make him feel better?
>
>Like Marley's ghost, privacy may be coming back to haunt us. And that
>ghost's name is pedophilia. How bad is it? Disguised as a 13-year-old, I
>was directly propositioned on AOL in fewer than 10 minutes on each of
>six separate attempts. I entered a chat room--usually called something
>like "x9x10x11" or even "JonBenet Ramsey" (code words that alert
>pedophiles where to swarm)--and waited for the assaults to start.
>
>Even when I didn't enter a chat room, the offers kept coming in from
>pedophiles prowling for victims. One wanted to send me pictures of
>himself. Another asked for a phone number. "I want to do my daughter,"
>one confessed to me. Later, when I searched for their screen names, they
>had all disappeared into the anonymous electronic mist.
>
>AOL monitors kids' chat rooms continuously. (Parents can also set the
>AOL software so their children can't use chat rooms.) "We have a
>zero-tolerance policy when it comes to anything illegal," assures AOL
>spokeswoman Tricia Primrose. "We have about 8,000 monitors scanning up
>to 19,000 chat rooms, message boards, member profiles, and other areas.
>When we get any kind of complaint, we immediately check it out. And
>we're working with the FBI, customs, and other officials."
>
>It's not just AOL, of course. Child molesters "operate on every avenue
>of the Net," says PhotonRain (not his real name) of Ethical Hackers
>Against Pedophilia, a group that aids law enforcement in combating child
>pornography. "WWW, newsgroups, IRC, ICQ, FTP servers..."
>
>We already know it's widespread and easy to encounter. But how often
>have we heard--and parroted--the party line that problems on the Net
>just reflect real-world problems, no more and no less? Holland slays
>that sacred lamb: "The amount of pedophilia on the Net is extremely
>disproportional to...society as a whole. They hide behind the anonymity
>the Net offers. And they are aware of the small odds against being
>caught."
>
>Ruben Rodriguez, director of the Exploited Child unit for the National
>Center for Missing & Exploited Children (NCMEC), concurs: "The Net is so
>anonymous that molesters are very comfortable on it. They can go in and
>hunt kids down, and attempt five or six seductions at the same time."
>
>"Let's face it," says a New York State investigator who requests
>anonymity, "the Net's anonymity enables the sickness. In a couple of
>hours I could easily get 2,000 pictures if I wanted, including the Baby
>Rape series," a popular collection of pedophilia photos whose name is
>horrifyingly self-explanatory.
>
>In recent weeks, U.S. authorities have helped nab 60 online molesters,
>while the FBI reports that its 3-year-old Innocent Images
>investigation--an online task force identifying predators--has resulted
>in 184 convictions. An impressive stat, but less than confidence
>inspiring when research suggests the average child molester will have
>more than 70 victims throughout his lifetime.
>
>At the same time we splash sex offenders' names online, our lawmakers
>weigh in with proposed privacy law after privacy law. "No one wants to
>give up privacy," says NCMEC's Rodriguez, whose organization now runs a
>CyberTipline for leads on the sexual exploitation of children. "But what
>do you do when your laws and protections are turned against you?
>Something's got to give."
>
>But what? Our conventional wisdom that privacy is worth any risks? Just
>touching this petrified opinion will get me slapped with a swastika--but
>as philosopher Arthur Schopenhauer said, "All truth passes through three
>stages. First, it is ridiculed. Second, it is violently opposed. Third,
>it is accepted as being self-evident."
>
>To be continued--that's for certain.
>
>Copyright (c) 1998 ZDNet. All rights reserved.
From whgiii at invweb.net Wed Jun 24 01:01:05 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Wed, 24 Jun 1998 01:01:05 -0700 (PDT)
Subject: Banning privacy: A radical proposal
In-Reply-To: <19980624011241.15925.qmail@hades.rpini.com>
Message-ID: <199806240806.DAA022.63@geiger.com>
-----BEGIN PGP SIGNED MESSAGE-----
In <19980624011241.15925.qmail at hades.rpini.com>, on 06/24/98
at 01:12 AM, Anonymous said:
>This came from Yahoo/ZDNet. Mr. Pappas suggests that we just ban
>anonymity and privacy to "protect the children." Now where have I heard
>that before? And yet again, the "Ethical Hackers Against Pedophilia"
>raise their heads, no pun intended.
To hell with the children!!
If we need anything in this country it is a good supply of hemp rope so
whenever one of these control freaks tries to wipe their ass with the
Constitution under the guise of "saving the children" they are immediately
dragged out by their heals and lynched on the spot!!
If they are so anxious to "save the children" why don't they ban all
automobiles? I don't have exact figures but I am sure 1,000's of children
die and 10,000's are injured every year in auto accidents. I am sure that
Detroit and the oil industry might have a few words against it not to
mention 100 million angry motorist.
And if they really want to save some children why don't they shut down the
multi-billion dollar infanticide industry known as abortion. Why are these
medical hacks allowed to do to children what they would be jailed for
doing to a dog? Perhaps because it serves nicely with the elitist goals of
population control (need to keep the number of niggers, bean pickers, and
white trash down to a controllable number) not to mention that their
pockets are well lined by the hacks.
If they were truly operating on moral principals one would think they
would go after that which causes the greatest harm to the most children.
But of course they don't. They have no more morality than a bitch in heat.
Their "save the children" bit is just a pre-emptive trump against any
opposition (how can you not be for saving children!!).
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
Tag-O-Matic: I'm an OS/2 developer...I don't NEED a life!
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNZCziI9Co1n+aLhhAQFCJgQAms7GyayB9pF3OMDHIrT+5Dp8TvXlkTRh
HBifHyMhTTnOIfsRryhXzgdM+20ALIVzWat0KSjnpW26e/JRnuIEnAN3B1pYcfVy
P//irI9EbVhAnYWt5hSwhxEOhZxYwUas+tUw7vKXioiK3LQw8iigWvs9HhP16Gpu
y+P+XpPxpxs=
=Nd63
-----END PGP SIGNATURE-----
From attila at hun.org Wed Jun 24 05:50:19 1998
From: attila at hun.org (attila)
Date: Wed, 24 Jun 1998 05:50:19 -0700 (PDT)
Subject: abortion [was: Banning privacy: A radical proposal]
In-Reply-To: <199806240806.DAA022.63@geiger.com>
Message-ID:
On Wed, 24 Jun 1998, William H. Geiger III wrote:
> And if they really want to save some children why don't they shut down the
> multi-billion dollar infanticide industry known as abortion. Why are these
> medical hacks allowed to do to children what they would be jailed for
> doing to a dog? Perhaps because it serves nicely with the elitist goals of
> population control (need to keep the number of niggers, bean pickers, and
> white trash down to a controllable number) not to mention that their
> pockets are well lined by the hacks.
>
no, abortion does not serve the interests of limiting the
"undesirables" to meet elitist population control ideas. quite
the opposite --the various machinations of the extremeist
conservative [bowel] movement and depriving of abortion funds
has meant that abortion is available only to the haves. same
result in U.S. foreign policy which excludes not only abortion
services from foreign aid disbursement, but also birth control.
so, the population of "bean pickers, niggers, and white trash"
increases relative to the desired "white" population --rather
dramatically --"elitist" families have negative population
growth; several of the others have factors as high as 300%.
personally, I am against abortion-- however, I'll be damned if
I would deny anyone else either the right or the means to make
that personal decision. it is not a question of morality; it is
a fundamental right to freedom of choice unencumbered by an
increasingly invasive federal government --the first Bitch can
take her Global Village into her house, not mine.
attila out...
__________________________________________________________________________
go not unto usenet for advice, for the inhabitants thereof will say:
yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__
To be a ruler of men, you need at least 12 inches....
There is no safety this side of the grave. Never was; never will be.
From jya at pipeline.com Wed Jun 24 06:56:40 1998
From: jya at pipeline.com (John Young)
Date: Wed, 24 Jun 1998 06:56:40 -0700 (PDT)
Subject: Skipjack Up
Message-ID: <199806241356.JAA30765@camel8.mindspring.com>
John,
The files are up, and hopefully all working OK. See
http://csrc.nist.gov/encryption/skipjack-kea.htm
Ed Roback
From billp at nmol.com Wed Jun 24 07:16:59 1998
From: billp at nmol.com (bill payne)
Date: Wed, 24 Jun 1998 07:16:59 -0700 (PDT)
Subject: nation's most secretive spy agency
Message-ID: <35910972.913@nmol.com>
Wednesday 6/24/98 8:03 AM
Glave
I am reading http://www.wired.com/news/news/technology/story/13215.html
I recevied a motion from US Assistant Attorney Mitchell yesterday
in the mail. I haven't read it yet.
Mitchell phoned on f 6/19.
Mitchell told me she is moving to remand FOIA ALGORITHM request to NSA.
I made a copy of the materials I received and sent them to John Young.
I attach a copy of Morales and my complaint to the senate judiciary
committee. This e-mail explains more about our interest in NSA.
VISIBILITY.
I do not have much interest in crypto.
One of my problems is a REVERSE cyrpto problem. Trying to get people to
read
my geek books and obscure binary results.
I MERELY BUILT CRYPTO DEVICES FOR NSA.
And took a poke at NSA for trying to screw-up Sandia/DOE projects with
bad crypto algorithm and implementation advice.
http://jya.com/da/whpda.htm
Especially in http://jya.com/da/whpda.htm#apps
NSA has NO SENSE OF HUMOR.
Pseudorandom numbers are close enough to crypto that I understand what
the crypto people are doing.
Morales and I want our money and out of this mess.
Best
Sincerely
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
Looks like we succeeded in getting others to read about the gfsr!
In fact, Knuth included the gfsr on page 32 of his books series Art of
Computer Programming: Vol 2 Seminumerical algorithms.
This likely accounts for
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html
Coauthor Lewis in the above is one of my former MS and PhD students in
computer science.
http://www.friction-free-economy.com/
Subject:
Judicial Misconduct at Tenth Circuit Court of Appeals
Date:
Mon, 22 Jun 1998 13:29:01 -0600
From:
bill payne
To:
art morales , senator_hatch at Hatch.senate.gov, senator at thurmond.senate.gov,
chuck_grassley at grassley.senate.gov, senator_specter at specter.senate.gov,
senator_thompson at thompson.senate.gov,
info at kyl.senate.gov, senator_dewine at dewine.senate.gov, john_ashcroft at ashcroft.senate.gov,
michigan at abraham.senate.gov,
senator_leahy at leahy.senate.gov, senator at kennedy.senate.gov, senator at biden.senate.gov,
senator_kohl at kohl.senate.gov,
senator at feinstein.senate.gov, russell_feingold at feingold.senate.gov, dick at durbin.senate.gov,
senator at torricelli.senate.gov
CC:
steve dillingham <" Steven.Dillingham"@hq.doe.gov>, Robert Nordhaus <"
Robert.Nordhaus"@hq.doe.gov>, mrgall at ix.netcom.com,
jy at jya.com, art morales , federico pena <" Federico.F.Pena"@hq.doe.gov>,
RJPARK at sandia.gov,
cypherpunks at toad.com, ukcrypto at maillist.ox.ac.uk
Monday 6/22/98 1:02 PM
Senate Judiciary Committee
http://www.senate.gov/committee/judiciary.html
Republicans
Orrin G. Hatch, Utah, Chairman senator_hatch at Hatch.senate.gov
Strom Thurmond, South Carolina senator at thurmond.senate.gov
Charles E. Grassley, Iowa chuck_grassley at grassley.senate.gov
Arlen Specter, Pennsylvania senator_specter at specter.senate.gov
Fred Thompson, Tennessee senator_thompson at thompson.senate.gov
Jon Kyl, Arizona info at kyl.senate.gov
Mike DeWine, Ohio senator_dewine at dewine.senate.gov
John Ashcroft, Missouri john_ashcroft at ashcroft.senate.gov
Spencer Abraham, Michigan michigan at abraham.senate.gov
Jeff Sessions, Alabama
Democrats
Patrick J. Leahy, Vermont senator_leahy at leahy.senate.gov
Edward M. Kennedy, Massachusetts senator at kennedy.senate.gov
Joseph R.Biden, Jr., Delaware senator at biden.senate.gov
Herb Kohl, Wisconsin senator_kohl at kohl.senate.gov
Dianne Feinstein, California senator at feinstein.senate.gov
Russell D. Feingold, Wisconsin russell_feingold at feingold.senate.gov
Richard Durbin, Illinois dick at durbin.senate.gov
Robert Torricelli, New Jersey senator at torricelli.senate.gov
Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Moore, Barrett, Weis and help get this matter settled.
Thursday March 30, 1995 I wrote Tenth Circuit clerk Hoecker to request a
copy of the docket sheets for case 94-2205 Payne v. Sandia Corporation,
et al
Hoecker did not answer my letter.
On Tuesday March 5,1996 I wrote Judge Lucius D. Bunton to ask his help
to get a copy of the docket sheets. No response.
On Monday September 23, 1996 Arthur R Morales and I wrote Henry A.
Politz, Chief Judge U.S. Court of Appeals - Fifth Circuit to ask his
help to get a copy of the docket sheets of my case and Morales� Tenth
Circuit case 95-2204.
Tenth Circuit also refused to send Morales copies of docket sheets for
his case.
Politz is Bunton's boss. No response.
Friday May 30, 1997 I wrote Antonin Scalia to get this help to get a
copy of the docket sheets. No response.
5 May 1998 citizen John Young finds docket sheets on
Source: PACER, U.S. Court of Appeals, 10th Circuit, 1-800-279-9107
and posts them on Internet at http://jya.com/whp-10usca.htm
Docket as of April 10, 1998 0:05 am
Proceedings include all events.
94-2205 Payne v. Sandia Corporation, et al
shows that I filed my Brief of the Appellant on 2/19/95.
2/23/95 [835344] Appellant's brief filed by William H. Payne.
Original and 7 copies. c/s: y. Served on 2/19/95 Oral
argument? pro se. Appellee/Respondent's brief due 3/24/95
for Thomas P. Wright, for Robert Surran, for Paul A.
Stokes, for Mary J. Stang, for Tommy A. Sellers, for Craig
A. Searls, for Albert Narath, for Preston B. Herrington,
for Peter S. Hamilton, for Roger L. Hagengruber, for James
R. Gosler, for Harold L. Folley, for Robert L. Ewing, for
C. William Childers, for Harvey J. Brewster, for Sandia
Corporation (mbm)
mbm writes "Appellee/Respondent's brief due 3/24/95"
Sandia had sent me a copy of its brief by 3/28/96.
I filed attached MOTION TO GRANT PLAINTIFF-APPELLANT'S DEMANDS ON BASIS
THAT DEFENDANT-APPELLEES FAILED TO FILE BRIEF WITHIN 30 DAYS SPECIFIED
BY FEDERAL RULE OF APPELLATE PROCEDURE 31 on Tuesday the 28th day of
March, 1995
My February 28 MOTION at the Tenth Circuit is filed WITHOUT notice of
service logged.
4/4/95 [845484] Appellant's motion filed by Appellant William H.
Payne [94-2205] to grant appellant's demands on basis that
appellees' failed to file timely brief. Original and 3
copies c/s: y (mbm)
In 1995 FRAP 25 (a) stated "[b]riefs shall be deemed filed on the day
of mailing if the
most expeditious form of delivery by mail, excepting special delivery,
is used."
FRAP 25 has been changed by 1998 to
http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a
Since I mailed Appellant's motion filed by Appellant William H. Payne
[94-2205] to grant appellant's demands on basis that appellees' failed
to file timely brief on 3/28/98, it is likely Sandia's lawyer Friedman
received it 3/29/95.
Tenth Circuit logs
3/30/95 [844759] Appellee's brief filed by Sandia Corporation,
Harvey J. Brewster, C. William Childers, Robert L. Ewing,
Harold L. Folley, James R. Gosler, Roger L. Hagengruber,
Peter S. Hamilton, Preston B. Herrington, Albert Narath,
Craig A. Searls, Tommy A. Sellers, Mary J. Stang, Paul A.
Stokes, Robert Surran, Thomas P. Wright. Original and 7
copies. c/s: y. Served on 3/27/95 Oral Argument? y
(appellant is pro se) Appellant's optional reply brief due
4/13/95 for William H. Payne (mbm)
Federal Rule of Appellate Procedure [FRAP] 26 (c) states
(c) Additional Time after Service. When a party is required or
permitted to act within a prescribed period after service of a
paper upon that party, 3 calendar days are added to the prescribed
period unless the paper is delivered on the date of service stated in
the proof of service.
http://www.ca5.uscourts.gov/docs/frap-iop.htm#26c
While the Tenth Circuit ASSERTS Appellees� brief was, in fact, served on
3/27/95
evidence given below points to the brief was served, in fact, on
3/29/95.
I allege that Friedman affixed a false date of service to Sandia's
brief.
I WAS NEVER PROPERLY SERVED. I wrote
Wednesday March 29, 1995
Dan Friedman
Simons, Cuddy & Friedman
Pecos Trail Office Compound
1701 Old Pecos Trail
POB 4160
Santa Fe, NM 87502-4160
505-988-4476
505-984-1807 FAX
Dear Lawyer Friedman:
Today at 14:00 hours I found a green and white about 9x13
inch envelope in our mail box at my home.
Mailing label indicated that the envelope came from your
firm. CONFIDENTIAL was stamped on the mailing label.
I wrote "Received at 14:00 hours on W 3/29/95 with no
POSTMARK OR STAMP by W. H. Payne" at the bottom of the
envelope.
There was no STAMP OR POSTAGE METER LABEL or
POSTMARK on the envelope.
Therefore, I gave the envelope to US Postal Service
supervisor Mel at 14:49 hours today at the Postal Receiving
station at 9904 Montgomery, NW in Albuquerque. Mel has a
copy of the cover of the envelope with Mel's note written on
it.
Mel told me the post office was going to return the envelope
to your firm for proper mailing.
I ask:
1 What did this envelope contain? Please identify
the documents precisely.
2 If any Certificates of Service were included in the
envelope, then what were the dates affixed to these
documents?
3 Who placed this envelope in our mail box?
Lawyer Friedman: It appears you missed an important filing
date. And are in the process of attempt to correct your
failure. But may be using illegitimate methods to conceal
your failure.
Please respond as soon as possible so that we all may
discover what has happened here." ...
Lawyer Friedman did not respond to the above letter.
But Friedman did mail me Appellees� brief many days later in envelope
showing TRUE MAILING date. Certificate of service on received
Appellees� brief
did not reflect postmark date.
10th Cir. R. 25.4 in 1995 page 62 reads
Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1
But Tenth Circuit clerks Fisher and Hoecker despite my protests and
submission of
evidence may have stamped FILED on Sandia's IMPROPERLY SERVED
Appellee/Respondent's brief according to the Federal Rules of Appellate
Procedure.
Laywer Friedman FALSIFIED THE CERTIFICATE OF SERVICE.
Friedman DID NOT MAIL ME "Served on 3/27/95."
d) Proof of Service; Filing. A paper presented for filing shall contain
an acknowledgment of service by the person served or proof of service
in the form of a statement of the date and manner of service, of the
name of the person served, and of the addresses to which the papers were
mailed or at which they were delivered, certified by the person who made
service. Proof of service may appear on or be affixed to the papers
filed. When a brief or appendix is filed by mailing or dispatch in
accordance with Rule 25(a)(2)(B), the proof of service shall also state
the date and manner by which the document was mailed or dispatched to
the clerk.
http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a
Crime apparently committed by Hoecker and Fisher is
� 1017. Government seals wrongfully used and instruments wrongfully
sealed
Whoever fraudulently or wrongfully affixes or impresses the seal of any
department or agency of the United States, to or upon any certificate,
instrument, commission, document, or paper or with knowledge of its
fraudulent character, with wrongful or fraudulent intent, uses, buys,
procures, sells, or transfers to another any such certificate,
instrument, commission, document, or paper, to which or upon which said
seal has been so fraudulently affixed or impressed, shall be fined under
this title or imprisoned not more than five years, or both.
http://www.law.cornell.edu/uscode/18/1017.shtml
Despite my protests of judicial misconduct Judges Moore, Barrett, Weis
award decision to Sandia
10/6/95 [890055] Order filed by Judges Moore, Barrett, Weis
"...All outstanding motions are denied..." (found in Order
& Judgment of 10/6/95) [879579-1] Parties served by mail.
(pdw)
when these judges should not have had Appellees� brief before them.
Then in an apparently attempt to conceal what happened
10/6/95 [890076] NOTE: THIS ENTIRE CASE IS SEALED. Terminated on
the Merits after Submission Without Oral Hearing; Judgment
Affirmed; Written, Signed, Unpublished. Moore, authoring
judge; Barrett; Weis. [94-2205] (pdw)
I WON MY APPEAL, pro se, ON A TECHNICALITY but judges Judges Moore,
Barrett, Weis
awarded the win to Sandia Labs!
Members of Congress, judicial misconduct in this matter has been
well-documented. Court records
filed with the Tenth Circuit. But CURRENTLY under seal.
Lawyers involved in this matter attempt to use the legal strategy of
IGNORE and STONEWALL to
attempt to deny me justice.
Ignoring and stonewalling by lawyers forced Morales and me to seek
visibility so lawyers
could no longer ignore and stonewall.
Lawyer attitude apparently is that they ignore rules of civil procedure
or even the law so long
as their actions are invisible to public scrutiny.
Visibility was achieved by suing the National Security Agency which
revealed even more judicial misconduct http://www.jya.com/whp052898.htm.
I would like to settle all matters involved with this unfortunate
cyrpto-related matter,
which includes criminal violations of the Privacy Act.
DOE lawyer Steve Dillingham asked me to prepare a settlement offer in
1994. I wrote a
settlement letter May 22, 1994 to Dillingham. Nothing happened.
June 11, 1998 I made several modifications to my 1994 settlement letter
and sent it e-mail
to Robert Nordhaus, Chief Counsel, DOE.
I ask that you
1 help with settlement of my six-year-old since I won my appeal at the
Tenth Circuit,
2 investigate Tenth Circuit case 94-2205 Payne v. Sandia Corporation,
et al to bring
the guilty to justice.
Sincerely
william payne
505 292 7037 I am not reading e-mail
http://jya.com/whpfiles.htm
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html
Coauthor Lewis in the above is one of my former MS and PhD students in
computer science.
http://www.friction-free-economy.com/
Monday 6/22/98 1:04 PM
Members of Congress
Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Anderson, Barrett, Logan and request a congressional
investigation.
After several years, with Payne, of trying to get Tenth Circuit to send
docket sheets from my case,
citizen John Young http://www.jya.com/index.htm locates docket sheets
and posts them
Morales Case Dockets 10th USCA June 12, 1998
on Internet at http://www.jya.com/arm061298.htm.
Source: Online records Tenth Circuit Court of Appeals via PACER
GENERAL DOCKET FOR
Tenth Circuit Court of Appeals
Court of Appeals Docket #: 95-2204 Filed:
9/29/95
Nsuit: 3440
Morales v. Sandia National Lab.
Appeal from: United States District Court for the District of New
Mexico
I filed
11/9/95 [898274] Appellant's brief filed by Arthur R. Morales.
Original and 2 copies. c/s: y. Served on 11/7/95. Oral
argument? pro se. Appellee's brief due 12/11/95 for Sandia
National Lab. (pdw)
Sandia files its FIRST ATTEMPT at
12/11/95 [905033] Appellee's deficient brief filed by Sandia
National Lab.. Appellee's corrected brief due 12/21/95 for
Sandia National Lab. additional copies received 12/11/95.
(fg)
Tenth Circuit court clerk Patrick Fisher writes Wells on December 11,
1995
concerning Sandia's deficient brief
[C]orrections, however made, must be accompanied by proof of service
upon all other parties to the appeal. ...
and issues
12/14/95 [905975] FIRST notice of rules violation for Deborah D.
Wells for Appellee Sandia National Lab. (sls)
Wells submits
12/21/95 [907974] Appellee's brief filed by Sandia National Lab..
Original and 7 copies. c/s: y. Served on 12/20/95 Oral
Argument? n Appellant's optional reply brief due 1/8/96 for
Arthur R. Morales (mbm)
but DOES NOT serve me with a copy.
Wells later admits in
2/1/96 [917660] Response filed by Sandia National Lab.
Appellant/Petitioner motion to clarify Original and 3
copies. c/s: y response Null Relief Code (fg)
Certificate of Service date 30th day of January, 1996,
[h]ad Appellant simply made a phone call to the Tenth Circuit, he
could
have established that the Defendant-Appellee's corrected brief was
indeed
filed on a timely basis, ...
I protested by filing
1/3/96 [909965] Appellant's motion "for the Court to Grant
Appeal" filed by Appellant Arthur R. Morales [95-2204].
Original and 3 copies. c/s: y. (pdw)
1/3/96 [909966] Appellant's motion "for New Trial" filed by
Appellant Arthur R. Morales [95-2204]. Original and 3
copies. c/s: y. (pdw)
1/3/96 [909967] Appellant's motion "to Discipline
Defendant-Appellee" filed by Appellant Arthur R. Morales
[95-2204]. Original and 3 copies. c/s: y. (pdw)
because Sandia did not properly serve me in violation of Fisher's
December
11, 1995 order.
The Tenth Circuit court of appeals should NOT, by its own rules, filed
Appellee's brief filed by Sandia National Lab.. Original and 7
copies.
c/s: y. Served on 12/20/95
10th Cir. R. 25.4 in 1995 page 62 reads
Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1
And is doubtful whether court clerk Fisher had any authority under
appellate procedure
to permit Wells to correct her deficient brief.
Rather Sandia's brief did not comply with with Federal Rules of
Appellate Procedure and should have been summarily rejected for filing.
I WON, pro se, my appeal to the Tenth circuit on a technicality but
Judges Anderson, Barrett, Logan
awarded the win to Sandia Labs.
4/2/96 [932848] Order filed by Judges Anderson, Barrett, Logan
denying parties' motions for general relief(found in Order
and Judgment of 4/2/96)--"...During the course of this
appeal, the parties have filed various motions for
dismissal, summary grant, and sanctions. We find no merit
to any of these motions, and they are [920851-1] Parties
served by mail. (pdw)
by accepting and judging on a documents which was not permitted to be
before the court by
its own rules.
Judicial misconduct in my case has been well-documented as it is in
Payne's case.
Payne and I speculate that similar judicial misconduct may have occurred
at the Tenth Circuit.
Sandia lawyer Robert J Park wrote me a settlement letter on Feb 18,
1998.
I filled in the blanks and made minor handwritten chages and returned it
on February 22, 1998.
But my offer has not yet been accepted.
I ask that you
1 help have my settlement offer accepted,
2 investigate judicial misconduct in case 95-2204 and punish the
guilty.
Some citizens can only express such frustrations with the US court
system with violence.
I seek change by legal reform.
Sincerely
Arthur R Morales
505 345 1381
From CustomNews at INTMAIL.TURNER.COM Wed Jun 24 07:36:53 1998
From: CustomNews at INTMAIL.TURNER.COM (CustomNews at INTMAIL.TURNER.COM)
Date: Wed, 24 Jun 1998 07:36:53 -0700 (PDT)
Subject: New Features @ CNN Custom News
Message-ID: <199806241410.KAA11366@belize>
Hello and thanks for using CNN Custom News. As part of our
commitment to make the best personalized news service even
better, CNN and Oracle have recently added two great new
features to Custom News at http://cnn.com/CustomNews:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
KEEP AN EYE ON YOUR FAVORITE CATEGORY!
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
This latest feature allows you to choose one category that will
always appear at the top of your personal picks when you check
Custom News.
For instance, if U.S.:Government:Presidential is your favorite
category, you don't have to go to the U.S. page to see it...put
it front and center on your personal homepage.
To select your favorite category, visit your Custom Profile
page at:
http://CustomNews.CNN.com/cnews/pna_cust.customize#Favorite
and use the drop down box to make your choice. Push the 'done'
button and that's it!
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
WE'VE ADDED YET ANOTHER SOURCE: PR NEWSWIRE
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
The addition of PR Newswire to Custom News provides even deeper
business content and improved tracking of particular companies.
The latest press releases are available to you almost as soon as
they hit the wire.
Now, you'll be able to track even more of the latest news
regarding your specific companies of interest!
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
WHAT IF I'VE FORGOTTEN MY PASSWORD?
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
If you have not used the service in a while or are on a new
computer, you may need to enter your user name and password.
If you can remember your user name, but forgot your password,
the system will prompt you with the reminder message you
created at the time of registration. The reminder will appear
directly above your login name.
If you have forgotten both your user name and password, simply
open a new account with our QuickStart Profile option. It's
fast and easy to start using CNN Custom News again!
Thanks for your time. If you haven't already, come by
CNN.com/CustomNews and check out the improved Custom News
service.
Sincerely,
The CNN Custom News Team
http://CNN.com/CustomNews
=============================================================
If you would rather not receive future updates about Custom News
features and events, please go to
http://CustomNews.CNN.com/cnews/pna_auth.register and
uncheck the "new Custom News features" checkbox.
If you cannot access the above page, but would like to be
unsubscribed from this list, please go to
http://CNN.com/EMAIL/customnews/ and enter your e-mail address.
Please DO NOT reply to this e-mail address.
CNN Interactive email id:11339101041640714
From jf_avon at citenet.net Wed Jun 24 07:46:39 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Wed, 24 Jun 1998 07:46:39 -0700 (PDT)
Subject: Fwd: Re: Banning privacy: A radical proposal
Message-ID: <199806241458.KAA01546@cti06.citenet.net>
==================BEGIN FORWARDED MESSAGE==================
>From: "Jean-Francois Avon"
>To: "William H. Geiger III"
>Date: Wed, 24 Jun 1998 10:38:12 -0500
>Reply-To: "Jean-Francois Avon"
>Priority: Normal
>X-Mailer: PMMail 98 Standard (2.00.1500) For Windows 95 (4.0.1111)
>MIME-Version: 1.0
>Content-Type: text/plain; charset="iso-8859-1"
>Content-Transfer-Encoding: 7bit
>Subject: Re: Banning privacy: A radical proposal
>
On Wed, 24 Jun 1998 00:38:06 -0500, William H. Geiger III wrote:
>
>And if they really want to save some children why don't they shut down the
>multi-billion dollar infanticide industry known as abortion. Why are these
>medical hacks allowed to do to children what they would be jailed for
>doing to a dog? Perhaps because it serves nicely with the elitist goals of
>population control (need to keep the number of niggers, bean pickers, and
>white trash down to a controllable number) not to mention that their
>pockets are well lined by the hacks.
Hey William, that's called "woman freedom to choose". Woman right precedes the
baby-that-might-be rights for she is the sine-qua-none condition for the baby-who-might-be
to
exist.
But it is only *very* rarely that I disagree with you... ;-)
Ciao
jfa
Definition: FACISM: n.: a political and economic movement, strongly nationalistic,
magnifying the rights of the state as opposed to those of the individual, in which
industry, though remaining largely under private ownership, and all administrative
political units, are controlled by a strong central government.
-------------------------------------------------
"One of the ordinary modes by which tyrants accomplish their purpose, without resistance,
is by disarming the people and making it an offense to keep arms". - Joseph Story, U.S.
Supreme Court Justice.
-------------------------------------------------
"1935 will go down in history! For the first time a civilized nation has full gun
registration! Our streets will be safer, our police more efficient, and the world will
follow our lead in the future!"
-Adolf Hitler, April 1935
-------------------------------------------------
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
===================END FORWARDED MESSAGE===================
Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
DePompadour, Soci�t� d'Importation Lt�e
Limoges fine porcelain and french crystal
JFA Technologies, R&D physicists & engineers
Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
From attila at hun.org Wed Jun 24 09:11:11 1998
From: attila at hun.org (attila)
Date: Wed, 24 Jun 1998 09:11:11 -0700 (PDT)
Subject: Banning privacy: A radical proposal
In-Reply-To: <199806241458.KAA01546@cti06.citenet.net>
Message-ID:
On Wed, 24 Jun 1998, Jean-Francois Avon wrote:
> On Wed, 24 Jun 1998 00:38:06 -0500, William H. Geiger III wrote:
>
> >And if they really want to save some children why don't they shut down the
> >multi-billion dollar infanticide industry known as abortion. Why are these
> >medical hacks allowed to do to children what they would be jailed for
> >doing to a dog? Perhaps because it serves nicely with the elitist goals of
> >population control (need to keep the number of niggers, bean pickers, and
> >white trash down to a controllable number) not to mention that their
> >pockets are well lined by the hacks.
>
> Hey William, that's called "woman freedom to choose". Woman right precedes the
> baby-that-might-be rights for she is the sine-qua-none condition for the baby-who-might-be
> to exist.
>
as I said, I am personally against abortion, but your point is
absolutely correct: it is "the freedom to chose" on the part of
the woman who must carry the _potential_ child to term --and,
yes, the woman is the 'sine qua non' condition.
what the absolutists in the Right to Life movements do not
understand, and refuse to accept, is that they have _no_ God
given right to tell another what they can or can not do that
does not _directly_ infringe on their own rights; as a
consequence, the fanatics believe they have the God given
right to legislate morality --and then there are back alley
coat hanger abortions where the nascent mother is placed
at an unacceptable risk.
and, there is nothing sadder than an unwanted, often fatherless,
child.
attila out...
and you better believe the following are indisputable truths....
> Definition: FACISM: n.: a political and economic movement, strongly nationalistic,
> magnifying the rights of the state as opposed to those of the individual, in which
> industry, though remaining largely under private ownership, and all administrative
> political units, are controlled by a strong central government.
> -------------------------------------------------
> "One of the ordinary modes by which tyrants accomplish their purpose, without resistance,
> is by disarming the people and making it an offense to keep arms". - Joseph Story, U.S.
> Supreme Court Justice.
> -------------------------------------------------
> "1935 will go down in history! For the first time a civilized nation has full gun
> registration! Our streets will be safer, our police more efficient, and the world will
> follow our lead in the future!"
> -Adolf Hitler, April 1935
> -------------------------------------------------
__________________________________________________________________________
go not unto usenet for advice, for the inhabitants thereof will say:
yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__
To be a ruler of men, you need at least 12 inches....
There is no safety this side of the grave. Never was; never will be.
From Hua at teralogic-inc.com Wed Jun 24 09:35:21 1998
From: Hua at teralogic-inc.com (Ernest Hua)
Date: Wed, 24 Jun 1998 09:35:21 -0700 (PDT)
Subject: OCR'ed versions of Skipjack docs
Message-ID: <413AC08141DBD011A58000A0C924A6D52C357C@MVS2>
Anyone have an OCR'ed version of this? These PDF's look like scanned or
faxed images.
Ern
-----Original Message-----
From: John Young [SMTP:jya at pipeline.com]
Sent: Wednesday, June 24, 1998 6:53 AM
To: cypherpunks at toad.com
Subject: Skipjack Up
John,
The files are up, and hopefully all working OK. See
http://csrc.nist.gov/encryption/skipjack-kea.htm
Ed Roback
From schneier at counterpane.com Wed Jun 24 10:33:31 1998
From: schneier at counterpane.com (Bruce Schneier)
Date: Wed, 24 Jun 1998 10:33:31 -0700 (PDT)
Subject: Comments on "Encryption is Key to Securing Data" 22 Jun 98
Message-ID: <4.0.1.19980624120317.00e447b0@mail.visi.com>
This note is to comment on your article, "Encryption is Key to Securing Data," that appeared in the 22 Jun 98 issue of InternetWeek. I'm not sure where to start. Almost every statement made in the copy is erroneous. (There was an error when I tried to download the article from your website, so I will retype. Apologies for minor typos.)
Encryption is Key to Securing Data
by Dayna DelMonico
"Although encryption terminology can make even the most technically astute user cringe, encryption is fairly simple."
I agree, although the rest of this article seems to prove me wrong.
"It's the process of scambling and unscrambling information."
Partly. It's confidentially (what you said above--making sure secret things stay secret), integrity (making sure data doesn't get modified in transit), authentication (the digital analogue of a signature), and non-repudiation (making sure someone can't say something and then later deny saying it). Cryptography is a lot more than simple encryption.
"Encryption products showed up when MIS managers adopted two basic encryption technologies from the federal government: private and public-key encryption."
Nothing correct here. The Federal government has no public-key cryptography standards; MIS managers have nothing to adopt from the Federal government. You might be thinking of DES, a symmetric encryption algorithm. (More on this confusion below.) In any case, commercial use of cryptography products has developed completely independently from government interference. In fact, things like export control and key escrow are making it harder to buy secure commercial products, not easier.
"With private key encryption, the sends and recieve are the holders and use the same key (algorithm) to secure information."
No. First off, private-key encryption is a bad term; use "symmetric encryption." Second, I'm not sure what they are the holders of. With symmetric encryption, both the sender and the receiver must have the same key; that may be what you mean. In any case, the key and the algorithm are completely seperate. This is one of the cornerstones of post-Medieval cryptography.
"With public key encryption, senders and receivers hold a commonly used public key, with an additional private key held only by specific institutions."
Not even close. With public-key encryption, each receiver has a public key and a private key. The public key is published. The private key is held, in secret, by the receiver. To send a message to someone, the sender gets the public key form some public database and uses it to encrypt the message. The receiver uses his private key to decrypt it. There are no specific institutions that have additional private keys, unless you are thinking about key escrow systems (which are related, but not the same).
"To protect systems from the loss of the key, many vendors offer assymetric encypion, which uses two keys."
Sort of. Assymetric encryption is the same as public-key encryption (just another word), and there are two keys. But the reason for using public-key encryption is not to prevent the loss of a key, but to facilitate key management. (With symmetric encryption, both the sender and receiver have to share a key. How this sharing takes place can be very complicated.)
"Users can choose from products based on various schemes. Beware, however, that even stronger encryption methods are on the horizon and destined for the next generation of encryption products. The National Institute of Standards and Technology (NIST) is expected to complete and Advanced Encryption Standard (AES) by the end of the year."
Even NIST has said that AES will not be finalized before 2000. And AES is just a new symmetric algorithm; it has nothing to do with public-key cryptography.
"The new standard wil luse a 128-bit block size, with key lengths of 128-, 192-, and 256-bits, as opposed to the current 64-bit blocks with 56-bit key standard."
True. The current standard is DES.
"RSA Data Security also has proposed its own algorithm to content for the new AES standard."
Sort of. NIST has solicited proposals for algorithms. Fifteen groups submitted, including RSA Data Security. RSADSI is competing with other groups--Cylink, IBM, Entrust, Counterpane Systems, NTT, etc--not with NIST. NIST does not hav an algorithm.
"RSA's extensions to DES, RC4 and RC5 implement multiple keys as well as digital signatures."
Many mistakes here. RSADSI submitted RC6 to the AES process, which uses many ideas from RC5. It has nothing to do with DES or RC4. I'm not sure why multiple keys is something to talk about; as I said above, every algorithm post the Middle Ages uses multiple keys. And digital signatures have nothing to do with the AES process. AES is a new symmetric encryption algorithm; digital signatures are done with public key cryptography. They are different.
"Another contender is Blowfish II."
I submitted this algorithm. We called it Twofish, but some early press reports called it Blowfish II.
"The Blowfish scheme, often referred to as PGP (Pretty Good Privacy), lets the sending and receiving computers negotiate a complex number."
First, Blowfish is never referred to as PGP. Blowfish is a symmetric encryption algorithm. PGP is an email security product. PGP could have decided to use Blowfish, but it used IDEA and CAST instead. Those are two different encrytpion algorithms. And neither PGP, nor Blowfish, nor anything else discussed to or alluded to in this article, involve sending and receiving computers negotiating complex numbers.
"That number is used to scamble the transmission and unscramble the data that is received."
What you mean to say, I think, is that PGP uses public-key cryptography for key exchange. The sender uses the reciver's public key to encrypt a session key, and that session key is used to encrypt the email message.
"For more on encryption and encryption products, a buyer's first stop should be the International Computer Security Association. This ICSA is an independent organization that tests and certifies security products."
ICSA is a private for-profit company, despite what the name implies. And while they do do some testing and certifying of security products, they do not test or certify encryption products.
Honestly, I can't believe this article made it into print. Don't you have editors?
Bruce Schneier
President, Counterpane Systems
Author, Applied Cryptography
http://www.counterpane.com
From CTIA_Daily_News at tour.unitymail.com Wed Jun 24 10:50:36 1998
From: CTIA_Daily_News at tour.unitymail.com (CTIA Daily News)
Date: Wed, 24 Jun 1998 10:50:36 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - June 24, 1998
Message-ID: <199806241728.MAA10305@revnet4.revnet.com>
=====================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM. Please click on the icon for the
most important news in wireless communications today.
CALEA Summit being held July 21 & 22 in Washington, DC.
Register Now!! Call (202) 785-0081
=====================================
From caj at math.niu.edu Wed Jun 24 10:53:51 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Wed, 24 Jun 1998 10:53:51 -0700 (PDT)
Subject: Banning privacy: A radical proposal
In-Reply-To: <19980624011241.15925.qmail@hades.rpini.com>
Message-ID:
On 24 Jun 1998, Anonymous wrote:
> This came from Yahoo/ZDNet. Mr. Pappas suggests that we just ban anonymity
> and privacy to "protect the children." Now where have I heard that before?
> And yet again, the "Ethical Hackers Against Pedophilia" raise their heads,
> no pun intended.
Thanks for the info. Maybe some merry band of pranksters
would be willing to sneak into this guy's house and install
an obvious-looking mock camera over his shower head? I mean,
just in case he's a child molester and all.
Maybe once we're done legislating the internet, we can
legislate the topolology of Euclidean space, so that every
point is within earshot of a mike and eyeshot of a camera.
After all, those evil child molesting evil bad evil people
might take to doing evil stuff in their basement, or the
nearby woods!
==- Xcott Craver -- Caj at niu.edu -- http://www.math.niu.edu/~caj/ -==
"Also note that elecronagnetic theory proves that if you microwave a
bar of Ivory soap it turns into a REAL MARSHMALLOW THAT YOU CAN EAT."
-James "Kibo" Parry
From whgiii at invweb.net Wed Jun 24 16:49:02 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Wed, 24 Jun 1998 16:49:02 -0700 (PDT)
Subject: Banning privacy: A radical proposal
In-Reply-To:
Message-ID: <199806242352.SAA029.59@geiger.com>
-----BEGIN PGP SIGNED MESSAGE-----
In , on 06/24/98
at 11:10 AM, attila said:
>> Hey William, that's called "woman freedom to choose". Woman right precedes the
>> baby-that-might-be rights for she is the sine-qua-none condition for the baby-who-might-be
>> to exist.
>>
> as I said, I am personally against abortion, but your point is
> absolutely correct: it is "the freedom to chose" on the part of
> the woman who must carry the _potential_ child to term --and,
> yes, the woman is the 'sine qua non' condition.
The woman made her choice when her legs went up in the air. Because she
does not wish to be inconvenienced by the consequences of her actions does
not give here the right to commit murder.
> what the absolutists in the Right to Life movements do not
> understand, and refuse to accept, is that they have _no_ God
> given right to tell another what they can or can not do that
> does not _directly_ infringe on their own rights; as a
> consequence, the fanatics believe they have the God given
> right to legislate morality --and then there are back alley
> coat hanger abortions where the nascent mother is placed
> at an unacceptable risk.
Bunk, their are numerous laws that tell others what they can or can not
do. It is illegal to steal, it is illegal to commit murder. The fact they
you may be stealing from someone else or trying to kill someone else does
not make it any less illegal (and immoral). Every human has basics rights;
the right to life being the cornerstone of those rights.
I think it quite acceptable for someone to incur risks while in the act of
commiting murder up to and including their own death. As far as the
practitioners of murderer for profit they are no better than the Nazi's
gassing the Jews.
> and, there is nothing sadder than an unwanted, often fatherless,
> child.
Yes their is, a dead one. I suggest you talk to some "unwanted",
fatherless children and ask them if they would rather be dead (not to
mention die a quite painful and barbaric death). I think you will find
that few of them share your opinions on the matter.
I really didn't want this to turn into an abortion debate. I was
just trying to show the hypocrisy of the "save the children" crowd.
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
Tag-O-Matic: This marks Logical End-Of-Message. Physical EOM follows
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNZGRVo9Co1n+aLhhAQG3UAQAqmOrIaDiIDsvAN0Sb0pWxqR58x4ta8xg
AU0GYnnETZHJOucWVsJf9qVvcVVQXa8M7Bh5e/mHAc1wL6BRmlCXmCMtXqEhXCHB
z1Tm/JwJWx+v16ToNWaWt1Zmv56MwECQflJQPCcwVpBgghLPgn+vARCagjq+eTqq
5hIP8HZ6+nY=
=KEEt
-----END PGP SIGNATURE-----
From attila at hun.org Wed Jun 24 20:19:00 1998
From: attila at hun.org (attila)
Date: Wed, 24 Jun 1998 20:19:00 -0700 (PDT)
Subject: Banning privacy: A radical proposal
In-Reply-To: <199806242352.SAA029.59@geiger.com>
Message-ID:
On Wed, 24 Jun 1998, William H. Geiger III wrote:
> I really didn't want this to turn into an abortion debate. I was
> just trying to show the hypocrisy of the "save the children" crowd.
>
what I said was that I am _personally_ against abortion; and,
yes, I _personally_ consider it a offense against our God; but,
I do not go so far as to say it is murder in the social context;
I do believe that is not my privilege to tell another they can
not commit the sin of "choosing when their legs went in the
air"; and, abortion statistics show that the vast majority of
abortions are for "mistakes" or failure of birth control. keep
in mind, the extreme right has also been campaigning to
eliminate the availability of birth control --which then raises
the abortion rate... and, if you want to shade the argument,
should all abortion be illegal? date rape? rape? deformity?
downs syndrome, bifidia? health of the mother?
yes, let's drop the subject as there is no solution.
few can debate the issue calmly, or even intelligently. I just
look at abortion as a fact of society that has been with us for
milleniums; you cant stop it any more than Prohibition was
successful, or the War on Drugs has been successful. why does
the government continue the war on drugs? simple, it's
profitable for them in many ways (as the largest vendor, if
nothing else).
besides, if we want to have a pissing contest, I am as far right
as it goes --with one exception: I dont want to change anyone!
we call it "free-agency" --them that wish to go to Hell, line
up on the left! --or dont, if you do not wish to-- the choice
is yours.
'nuff said!
attila out...
___________________________________________________________________
three things I dont tolerate: crackers, fed stoolies, and toadies.
From nobody at REPLAY.COM Thu Jun 25 00:04:49 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 25 Jun 1998 00:04:49 -0700 (PDT)
Subject: Skipjack extensibility
Message-ID: <199806250705.JAA31711@basement.replay.com>
NSA made a claim that Skipjack couldn't be extended past 80 bits of key. Most
plausible explanation to my mind is that they're lying. Second is that there is
an attack against a class of Skipjack-like ciphers that requires only a few
plaintexts and 2^80 operations. Third is that some common key-lengthening
tricks like those for 2-key-3DES, DES-X, and DEAL fail when applied to
Skipjack. I can hardly fathom one resistant to all three, but I guess it's
possible with NSA.
Seems to me that you could always figure out some construct so that no
practically-secure cipher with Skipjack's observable properties could evade
having its key lengthened with much probability. Or maybe not. IANAC.
Besides, it's impossible to make a cipher that can't be used to construct
constructs with bigger key lengths: Skipjack(cryptovariable, IDEA(key,
plaintext)) -- terminology jab intended -- provably has an effective key length
as long as IDEA's. Even if that is cheating...
From jya at pipeline.com Thu Jun 25 04:57:47 1998
From: jya at pipeline.com (John Young)
Date: Thu, 25 Jun 1998 04:57:47 -0700 (PDT)
Subject: NSA Declass Query
Message-ID: <199806251157.HAA13191@dewdrop2.mindspring.com>
Spyrus claims in a press release yesterday that NSA
announced declassification of SKIPJACK and KEA on
June 6, earlier than the DoD notice on June 23.
Does anyone know where and how NSA made this
earlier announcement, and whether there is a document
on it? We've queried Spyrus but no answer yet.
Spyrus has scheduled a June 30 conference on its release
of a FORTEZZA library and products in connection with
the NSA declassification. Bruce Schneier is a keynote
speaker.
http://www.spyrus.com/company/releases/pr_swf.html
From jya at pipeline.com Thu Jun 25 05:40:34 1998
From: jya at pipeline.com (John Young)
Date: Thu, 25 Jun 1998 05:40:34 -0700 (PDT)
Subject: CIA 4 Nags: Hackers Crypto Y2K Foreigners
Message-ID: <199806251240.IAA05050@dewdrop2.mindspring.com>
June 24, 1998
CIA Head Forsees Better Hackers
Filed at 5:43 p.m. EDT
By The Associated Press
WASHINGTON (AP) -- Intrusion into government computers
will become increasingly more sophisticated and better
organized and is likely to involve hostile nations, CIA
Director George Tenet told lawmakers Wednesday.
"Potential attackers range from national intelligence
and military organizations, terrorists, criminals,
industrial competitors, hackers and disgruntled or
disloyal insiders," Tenet told the Senate Governmental
Affairs Committee. "We know with specificity of several
nations that are working on developing an information
warfare capability."
While Tenet did not identify the countries, committee
Chairman Fred Thompson, R-Tenn., who received a classified
briefing on Tuesday, named some of them. Citing published
reports, Thompson said China, Russia, Libya, Iraq and Iran
and at least seven other countries are developing
information warfare programs.
The challenge facing U.S. intelligence will be to detect
attacks on U.S.computers and information systems by
organized or individual hackers. In some cases, Tenet said,
disruptive intrusions orchestrated by hostile states may
be disguised as amateurish efforts by individual hackers.
"Our electric power grids and our telecommunications
networks will be targets of the first order," Tenet said.
"An adversary capable of implanting the right virus or
accessing the right terminal can cause massive damage."
The shift of the computer hacker problem from individuals
and terrorist groups to governments is only beginning,
Tenet said, but he added, "Down the line we are going to
encounter more and it will be more organized."
Tenet cited one case, without naming it, of a foreign
government targeting the United States for intrusion into
information systems.
Sen. Joseph Lieberman, D-Conn., asked if the U.S.
government is taking steps to develop its own offensive
hacking capability to disrupt adversaries and to serve as
a deterrent for computer-based attacks.
"We're not asleep at the switch in this regard," Tenet
replied.
Air Force Lt. Gen. Kenneth Minihan, head of the National
Security Agency, said it was not going too far to think in
terms of an "electronic Pearl Harbor," a well-organized
assault on the United States based on strikes aimed at
electronic information systems.
The most sensitive information centers, such as CIA and
Pentagon classified files, are heavily guarded against
such intrusion and, in most cases, are fenced off from
Internet-type transfers. The problems are more likely to
arise in less well-guarded areas such as financial
networks or industrial control centers.
"They're not going to attack our strengths," Minihan said.
A key area of vulnerability within the intelligence
community, Tenet said, is the possibility of a disloyal
or disgruntled employee wreaking havoc with CIA computers.
Another scenario stems from the difficulty the CIA is
encountering finding enough software specialists to grapple
with the "Year 2000" problem, caused by computers not being
programmed to recognize the shift in the calendar from 1999
to 2000.
Most of the contractors available to help the agency, Tenet
said, would use foreigners, affording "an easy opportunity
to come in and see how your system works and what your
vulnerabilities are."
The running debate over the availability of increasingly
sophisticated encryption technology, which scrambles messages
and data from unauthorized intrusion, also poses a worry,
Tenet said.
Unless the computer industry and the government find a
legislative compromise, the government could fall victim to
hackers able to hide their own actions in impenetrable
encryption codes. It may take a major computer-hacker
incident to create the political pressure needed to allow
the government the "recovery" power to access encrypted
databases.
"There is a train wreck waiting to happen unless we deal
with the recovery aspect of the encryption debate," Tenet
said.
------
From billp at nmol.com Thu Jun 25 07:11:25 1998
From: billp at nmol.com (bill payne)
Date: Thu, 25 Jun 1998 07:11:25 -0700 (PDT)
Subject: Skipjack SIMULATIONS
Message-ID: <3592598D.1EAE@nmol.com>
willis at rand.org http://www.jya.com/skipjack-fi.htm
Markus.Kuhn at cl.cam.ac.uk http://www.jya.com/skipjack-uk.htm
perry at piermont.com http://jya.com/skipjack-pem.txt
mab at research.att.com http://www.jya.com/skipjack-mab.htm
colin at nyx.net http://www.jya.com/skipjack-cp.txt
Guys
I looked at your neat, what I would call, SIMULATIONS of the skipjack
algorithm.
I get an uncomfortable feeling in terms of work involved in implementing
/* The permutation G */
#define G(l, r, key, koff) \
((l) ^= F[(r) ^ (key)[(koff)%10]], \
(r) ^= F[(l) ^ (key)[((koff)+1)%10]], \
(l) ^= F[(r) ^ (key)[((koff)+2)%10]], \
(r) ^= F[(l) ^ (key)[((koff)+3)%10]])
on, say, an 8051.
NSA gave Sandia similar algorithm SPECIFICATIONS.
I simulated Benincasa�s NSS/USO algorithm in Forth to make sure
I THOUGH that I understood it. And could produce the test vectors.
http://jya.com/da/whpda.htm
In the REAL WORLD at Sandia some of the following considerations
IMMEDIATELY DOMINATE THE ALGORITHM.
1 power budget
2 thermal constraints
3 size limitations
4 conducted and radiated emissions
5 radiation-hard requirements
6 speed requirements
7 memory requirements
8 red/black analysis
9 hardware fault tolerance [DELFAS]
10 implementation work GUESS
11 software technology limitations [Can we use Forth?]
12 ...
I am guessing that putting Skipjack on, say, on a smart card might
involve some hairy engineering.
NSA KG units Brian Snow showed me were fairly small in size. Say
about 1-2 inches x 1-2 inches x 5-6 inches.
Shift register crypto technology is much simpler than number-based
crypto technology. Size, power, scalability, ... are the reasons, I
think,
that NSA uses shift registers for its GOOD STUFF.
Also, NSA/Sandia had SOME REAL project DISASTERS with number-based
crypto. Expensive, embarrassing, ... What ever happened to Sandia�s
low- and high-speed public key crypto chips?
I am very pleased to see all of this information getting out so everyone
can look at it.
I may have a project coming up - protecting gas pipeline survey data
from competitors. I DO NOT plan to TRY TO reinvent a crypto algorithm.
I will implement someone else�s idea. Good idea from a liability
standpoint too!
Morales and I need to complete our SETTLEMENT PROJECT so that we
can all move on to other CONSTRUCTIVE projects.
Best
bill
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html
Subject:
Judicial Misconduct at Tenth Circuit Court of Appeals
Date:
Mon, 22 Jun 1998 13:29:01 -0600
From:
bill payne
To:
art morales , senator_hatch at Hatch.senate.gov, senator at thurmond.senate.gov,
chuck_grassley at grassley.senate.gov, senator_specter at specter.senate.gov,
senator_thompson at thompson.senate.gov,
info at kyl.senate.gov, senator_dewine at dewine.senate.gov, john_ashcroft at ashcroft.senate.gov,
michigan at abraham.senate.gov,
senator_leahy at leahy.senate.gov, senator at kennedy.senate.gov, senator at biden.senate.gov,
senator_kohl at kohl.senate.gov,
senator at feinstein.senate.gov, russell_feingold at feingold.senate.gov, dick at durbin.senate.gov,
senator at torricelli.senate.gov
CC:
steve dillingham <" Steven.Dillingham"@hq.doe.gov>, Robert Nordhaus <"
Robert.Nordhaus"@hq.doe.gov>, mrgall at ix.netcom.com,
jy at jya.com, art morales , federico pena <" Federico.F.Pena"@hq.doe.gov>,
RJPARK at sandia.gov,
cypherpunks at toad.com, ukcrypto at maillist.ox.ac.uk
Monday 6/22/98 1:02 PM
Senate Judiciary Committee
http://www.senate.gov/committee/judiciary.html
Republicans
Orrin G. Hatch, Utah, Chairman senator_hatch at Hatch.senate.gov
Strom Thurmond, South Carolina senator at thurmond.senate.gov
Charles E. Grassley, Iowa chuck_grassley at grassley.senate.gov
Arlen Specter, Pennsylvania senator_specter at specter.senate.gov
Fred Thompson, Tennessee senator_thompson at thompson.senate.gov
Jon Kyl, Arizona info at kyl.senate.gov
Mike DeWine, Ohio senator_dewine at dewine.senate.gov
John Ashcroft, Missouri john_ashcroft at ashcroft.senate.gov
Spencer Abraham, Michigan michigan at abraham.senate.gov
Jeff Sessions, Alabama
Democrats
Patrick J. Leahy, Vermont senator_leahy at leahy.senate.gov
Edward M. Kennedy, Massachusetts senator at kennedy.senate.gov
Joseph R.Biden, Jr., Delaware senator at biden.senate.gov
Herb Kohl, Wisconsin senator_kohl at kohl.senate.gov
Dianne Feinstein, California senator at feinstein.senate.gov
Russell D. Feingold, Wisconsin russell_feingold at feingold.senate.gov
Richard Durbin, Illinois dick at durbin.senate.gov
Robert Torricelli, New Jersey senator at torricelli.senate.gov
Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Moore, Barrett, Weis and help get this matter settled.
Thursday March 30, 1995 I wrote Tenth Circuit clerk Hoecker to request a
copy of the docket sheets for case 94-2205 Payne v. Sandia Corporation,
et al
Hoecker did not answer my letter.
On Tuesday March 5,1996 I wrote Judge Lucius D. Bunton to ask his help
to get a copy of the docket sheets. No response.
On Monday September 23, 1996 Arthur R Morales and I wrote Henry A.
Politz, Chief Judge U.S. Court of Appeals - Fifth Circuit to ask his
help to get a copy of the docket sheets of my case and Morales� Tenth
Circuit case 95-2204.
Tenth Circuit also refused to send Morales copies of docket sheets for
his case.
Politz is Bunton's boss. No response.
Friday May 30, 1997 I wrote Antonin Scalia to get this help to get a
copy of the docket sheets. No response.
5 May 1998 citizen John Young finds docket sheets on
Source: PACER, U.S. Court of Appeals, 10th Circuit, 1-800-279-9107
and posts them on Internet at http://jya.com/whp-10usca.htm
Docket as of April 10, 1998 0:05 am
Proceedings include all events.
94-2205 Payne v. Sandia Corporation, et al
shows that I filed my Brief of the Appellant on 2/19/95.
2/23/95 [835344] Appellant's brief filed by William H. Payne.
Original and 7 copies. c/s: y. Served on 2/19/95 Oral
argument? pro se. Appellee/Respondent's brief due 3/24/95
for Thomas P. Wright, for Robert Surran, for Paul A.
Stokes, for Mary J. Stang, for Tommy A. Sellers, for Craig
A. Searls, for Albert Narath, for Preston B. Herrington,
for Peter S. Hamilton, for Roger L. Hagengruber, for James
R. Gosler, for Harold L. Folley, for Robert L. Ewing, for
C. William Childers, for Harvey J. Brewster, for Sandia
Corporation (mbm)
mbm writes "Appellee/Respondent's brief due 3/24/95"
Sandia had sent me a copy of its brief by 3/28/96.
I filed attached MOTION TO GRANT PLAINTIFF-APPELLANT'S DEMANDS ON BASIS
THAT DEFENDANT-APPELLEES FAILED TO FILE BRIEF WITHIN 30 DAYS SPECIFIED
BY FEDERAL RULE OF APPELLATE PROCEDURE 31 on Tuesday the 28th day of
March, 1995
My February 28 MOTION at the Tenth Circuit is filed WITHOUT notice of
service logged.
4/4/95 [845484] Appellant's motion filed by Appellant William H.
Payne [94-2205] to grant appellant's demands on basis that
appellees' failed to file timely brief. Original and 3
copies c/s: y (mbm)
In 1995 FRAP 25 (a) stated "[b]riefs shall be deemed filed on the day
of mailing if the
most expeditious form of delivery by mail, excepting special delivery,
is used."
FRAP 25 has been changed by 1998 to
http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a
Since I mailed Appellant's motion filed by Appellant William H. Payne
[94-2205] to grant appellant's demands on basis that appellees' failed
to file timely brief on 3/28/98, it is likely Sandia's lawyer Friedman
received it 3/29/95.
Tenth Circuit logs
3/30/95 [844759] Appellee's brief filed by Sandia Corporation,
Harvey J. Brewster, C. William Childers, Robert L. Ewing,
Harold L. Folley, James R. Gosler, Roger L. Hagengruber,
Peter S. Hamilton, Preston B. Herrington, Albert Narath,
Craig A. Searls, Tommy A. Sellers, Mary J. Stang, Paul A.
Stokes, Robert Surran, Thomas P. Wright. Original and 7
copies. c/s: y. Served on 3/27/95 Oral Argument? y
(appellant is pro se) Appellant's optional reply brief due
4/13/95 for William H. Payne (mbm)
Federal Rule of Appellate Procedure [FRAP] 26 (c) states
(c) Additional Time after Service. When a party is required or
permitted to act within a prescribed period after service of a
paper upon that party, 3 calendar days are added to the prescribed
period unless the paper is delivered on the date of service stated in
the proof of service.
http://www.ca5.uscourts.gov/docs/frap-iop.htm#26c
While the Tenth Circuit ASSERTS Appellees� brief was, in fact, served on
3/27/95
evidence given below points to the brief was served, in fact, on
3/29/95.
I allege that Friedman affixed a false date of service to Sandia's
brief.
I WAS NEVER PROPERLY SERVED. I wrote
Wednesday March 29, 1995
Dan Friedman
Simons, Cuddy & Friedman
Pecos Trail Office Compound
1701 Old Pecos Trail
POB 4160
Santa Fe, NM 87502-4160
505-988-4476
505-984-1807 FAX
Dear Lawyer Friedman:
Today at 14:00 hours I found a green and white about 9x13
inch envelope in our mail box at my home.
Mailing label indicated that the envelope came from your
firm. CONFIDENTIAL was stamped on the mailing label.
I wrote "Received at 14:00 hours on W 3/29/95 with no
POSTMARK OR STAMP by W. H. Payne" at the bottom of the
envelope.
There was no STAMP OR POSTAGE METER LABEL or
POSTMARK on the envelope.
Therefore, I gave the envelope to US Postal Service
supervisor Mel at 14:49 hours today at the Postal Receiving
station at 9904 Montgomery, NW in Albuquerque. Mel has a
copy of the cover of the envelope with Mel's note written on
it.
Mel told me the post office was going to return the envelope
to your firm for proper mailing.
I ask:
1 What did this envelope contain? Please identify
the documents precisely.
2 If any Certificates of Service were included in the
envelope, then what were the dates affixed to these
documents?
3 Who placed this envelope in our mail box?
Lawyer Friedman: It appears you missed an important filing
date. And are in the process of attempt to correct your
failure. But may be using illegitimate methods to conceal
your failure.
Please respond as soon as possible so that we all may
discover what has happened here." ...
Lawyer Friedman did not respond to the above letter.
But Friedman did mail me Appellees� brief many days later in envelope
showing TRUE MAILING date. Certificate of service on received
Appellees� brief
did not reflect postmark date.
10th Cir. R. 25.4 in 1995 page 62 reads
Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1
But Tenth Circuit clerks Fisher and Hoecker despite my protests and
submission of
evidence may have stamped FILED on Sandia's IMPROPERLY SERVED
Appellee/Respondent's brief according to the Federal Rules of Appellate
Procedure.
Laywer Friedman FALSIFIED THE CERTIFICATE OF SERVICE.
Friedman DID NOT MAIL ME "Served on 3/27/95."
d) Proof of Service; Filing. A paper presented for filing shall contain
an acknowledgment of service by the person served or proof of service
in the form of a statement of the date and manner of service, of the
name of the person served, and of the addresses to which the papers were
mailed or at which they were delivered, certified by the person who made
service. Proof of service may appear on or be affixed to the papers
filed. When a brief or appendix is filed by mailing or dispatch in
accordance with Rule 25(a)(2)(B), the proof of service shall also state
the date and manner by which the document was mailed or dispatched to
the clerk.
http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a
Crime apparently committed by Hoecker and Fisher is
� 1017. Government seals wrongfully used and instruments wrongfully
sealed
Whoever fraudulently or wrongfully affixes or impresses the seal of any
department or agency of the United States, to or upon any certificate,
instrument, commission, document, or paper or with knowledge of its
fraudulent character, with wrongful or fraudulent intent, uses, buys,
procures, sells, or transfers to another any such certificate,
instrument, commission, document, or paper, to which or upon which said
seal has been so fraudulently affixed or impressed, shall be fined under
this title or imprisoned not more than five years, or both.
http://www.law.cornell.edu/uscode/18/1017.shtml
Despite my protests of judicial misconduct Judges Moore, Barrett, Weis
award decision to Sandia
10/6/95 [890055] Order filed by Judges Moore, Barrett, Weis
"...All outstanding motions are denied..." (found in Order
& Judgment of 10/6/95) [879579-1] Parties served by mail.
(pdw)
when these judges should not have had Appellees� brief before them.
Then in an apparently attempt to conceal what happened
10/6/95 [890076] NOTE: THIS ENTIRE CASE IS SEALED. Terminated on
the Merits after Submission Without Oral Hearing; Judgment
Affirmed; Written, Signed, Unpublished. Moore, authoring
judge; Barrett; Weis. [94-2205] (pdw)
I WON MY APPEAL, pro se, ON A TECHNICALITY but judges Judges Moore,
Barrett, Weis
awarded the win to Sandia Labs!
Members of Congress, judicial misconduct in this matter has been
well-documented. Court records
filed with the Tenth Circuit. But CURRENTLY under seal.
Lawyers involved in this matter attempt to use the legal strategy of
IGNORE and STONEWALL to
attempt to deny me justice.
Ignoring and stonewalling by lawyers forced Morales and me to seek
visibility so lawyers
could no longer ignore and stonewall.
Lawyer attitude apparently is that they ignore rules of civil procedure
or even the law so long
as their actions are invisible to public scrutiny.
Visibility was achieved by suing the National Security Agency which
revealed even more judicial misconduct http://www.jya.com/whp052898.htm.
I would like to settle all matters involved with this unfortunate
cyrpto-related matter,
which includes criminal violations of the Privacy Act.
DOE lawyer Steve Dillingham asked me to prepare a settlement offer in
1994. I wrote a
settlement letter May 22, 1994 to Dillingham. Nothing happened.
June 11, 1998 I made several modifications to my 1994 settlement letter
and sent it e-mail
to Robert Nordhaus, Chief Counsel, DOE.
I ask that you
1 help with settlement of my six-year-old since I won my appeal at the
Tenth Circuit,
2 investigate Tenth Circuit case 94-2205 Payne v. Sandia Corporation,
et al to bring
the guilty to justice.
Sincerely
william payne
505 292 7037 I am not reading e-mail
http://jya.com/whpfiles.htm
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html
Coauthor Lewis in the above is one of my former MS and PhD students in
computer science.
http://www.friction-free-economy.com/
Monday 6/22/98 1:04 PM
Members of Congress
Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Anderson, Barrett, Logan and request a congressional
investigation.
After several years, with Payne, of trying to get Tenth Circuit to send
docket sheets from my case,
citizen John Young http://www.jya.com/index.htm locates docket sheets
and posts them
Morales Case Dockets 10th USCA June 12, 1998
on Internet at http://www.jya.com/arm061298.htm.
Source: Online records Tenth Circuit Court of Appeals via PACER
GENERAL DOCKET FOR
Tenth Circuit Court of Appeals
Court of Appeals Docket #: 95-2204 Filed:
9/29/95
Nsuit: 3440
Morales v. Sandia National Lab.
Appeal from: United States District Court for the District of New
Mexico
I filed
11/9/95 [898274] Appellant's brief filed by Arthur R. Morales.
Original and 2 copies. c/s: y. Served on 11/7/95. Oral
argument? pro se. Appellee's brief due 12/11/95 for Sandia
National Lab. (pdw)
Sandia files its FIRST ATTEMPT at
12/11/95 [905033] Appellee's deficient brief filed by Sandia
National Lab.. Appellee's corrected brief due 12/21/95 for
Sandia National Lab. additional copies received 12/11/95.
(fg)
Tenth Circuit court clerk Patrick Fisher writes Wells on December 11,
1995
concerning Sandia's deficient brief
[C]orrections, however made, must be accompanied by proof of service
upon all other parties to the appeal. ...
and issues
12/14/95 [905975] FIRST notice of rules violation for Deborah D.
Wells for Appellee Sandia National Lab. (sls)
Wells submits
12/21/95 [907974] Appellee's brief filed by Sandia National Lab..
Original and 7 copies. c/s: y. Served on 12/20/95 Oral
Argument? n Appellant's optional reply brief due 1/8/96 for
Arthur R. Morales (mbm)
but DOES NOT serve me with a copy.
Wells later admits in
2/1/96 [917660] Response filed by Sandia National Lab.
Appellant/Petitioner motion to clarify Original and 3
copies. c/s: y response Null Relief Code (fg)
Certificate of Service date 30th day of January, 1996,
[h]ad Appellant simply made a phone call to the Tenth Circuit, he
could
have established that the Defendant-Appellee's corrected brief was
indeed
filed on a timely basis, ...
I protested by filing
1/3/96 [909965] Appellant's motion "for the Court to Grant
Appeal" filed by Appellant Arthur R. Morales [95-2204].
Original and 3 copies. c/s: y. (pdw)
1/3/96 [909966] Appellant's motion "for New Trial" filed by
Appellant Arthur R. Morales [95-2204]. Original and 3
copies. c/s: y. (pdw)
1/3/96 [909967] Appellant's motion "to Discipline
Defendant-Appellee" filed by Appellant Arthur R. Morales
[95-2204]. Original and 3 copies. c/s: y. (pdw)
because Sandia did not properly serve me in violation of Fisher's
December
11, 1995 order.
The Tenth Circuit court of appeals should NOT, by its own rules, filed
Appellee's brief filed by Sandia National Lab.. Original and 7
copies.
c/s: y. Served on 12/20/95
10th Cir. R. 25.4 in 1995 page 62 reads
Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1
And is doubtful whether court clerk Fisher had any authority under
appellate procedure
to permit Wells to correct her deficient brief.
Rather Sandia's brief did not comply with with Federal Rules of
Appellate Procedure and should have been summarily rejected for filing.
I WON, pro se, my appeal to the Tenth circuit on a technicality but
Judges Anderson, Barrett, Logan
awarded the win to Sandia Labs.
4/2/96 [932848] Order filed by Judges Anderson, Barrett, Logan
denying parties' motions for general relief(found in Order
and Judgment of 4/2/96)--"...During the course of this
appeal, the parties have filed various motions for
dismissal, summary grant, and sanctions. We find no merit
to any of these motions, and they are [920851-1] Parties
served by mail. (pdw)
by accepting and judging on a documents which was not permitted to be
before the court by
its own rules.
Judicial misconduct in my case has been well-documented as it is in
Payne's case.
Payne and I speculate that similar judicial misconduct may have occurred
at the Tenth Circuit.
Sandia lawyer Robert J Park wrote me a settlement letter on Feb 18,
1998.
I filled in the blanks and made minor handwritten chages and returned it
on February 22, 1998.
But my offer has not yet been accepted.
I ask that you
1 help have my settlement offer accepted,
2 investigate judicial misconduct in case 95-2204 and punish the
guilty.
Some citizens can only express such frustrations with the US court
system with violence.
I seek change by legal reform.
Sincerely
Arthur R Morales
505 345 1381
From ATU5713 at compuserve.com Thu Jun 25 07:31:35 1998
From: ATU5713 at compuserve.com (Alan Tu)
Date: Thu, 25 Jun 1998 07:31:35 -0700 (PDT)
Subject: Registering Euphoria
Message-ID: <199806251030_MC2-514B-F306@compuserve.com>
Terry,
Good points. But...
1. Registration brings money, doesn't mean Bob should just blindly make
changes. I'm sure that's not what you meant, but I had to say that.
2. However, on the other token, if a nonregistered user makes suggestions
nicely, his suggestion should be debated (as we are doing here) and
considered by Bob.
--Alan
From Hua at teralogic-inc.com Thu Jun 25 09:45:19 1998
From: Hua at teralogic-inc.com (Ernest Hua)
Date: Thu, 25 Jun 1998 09:45:19 -0700 (PDT)
Subject: CIA 4 Nags: Hackers Crypto Y2K Foreigners
Message-ID: <413AC08141DBD011A58000A0C924A6D52C357D@MVS2>
I just don't understand how, in 1998, anyone could let Tenet get away
with a claim about key recovery like this. Didn't anyone ask him how he
expected high-tech hackers (especially those possibly aided by foreign
intelligence agencies) to use key recovery?
Ern
-----Original Message-----
From: John Young [SMTP:jya at pipeline.com]
Sent: Thursday, June 25, 1998 5:37 AM
To: cypherpunks at toad.com
Subject: CIA 4 Nags: Hackers Crypto Y2K Foreigners
June 24, 1998
CIA Head Forsees Better Hackers
Filed at 5:43 p.m. EDT
By The Associated Press
WASHINGTON (AP) -- Intrusion into government computers
[SNIP]
Unless the computer industry and the government find a
legislative compromise, the government could fall victim to
hackers able to hide their own actions in impenetrable
encryption codes. It may take a major computer-hacker
incident to create the political pressure needed to allow
the government the "recovery" power to access encrypted
databases.
"There is a train wreck waiting to happen unless we deal
with the recovery aspect of the encryption debate," Tenet
said.
From reservations at biztravel.com Thu Jun 25 09:58:03 1998
From: reservations at biztravel.com (reservations at biztravel.com)
Date: Thu, 25 Jun 1998 09:58:03 -0700 (PDT)
Subject: Biztravel.com $25 Welcome Gift
Message-ID: <19980625165732345.AAA723@gw1-255.biztravel.com>
Dear Mr. Cypherpunk,
Thank you for joining Biztravel.com. Please note
that your member name is CYPHERPUNKS.
*********** FREE WELCOME GIFT ***********
I`d like to offer you a gift for new members --
we`ll give you a $25 American Express(R)
Gift Cheque FREE with your first flight purchase.
Here`s how it works:
- purchase an airline ticket through Biztravel.com
by 8/31/98
- your travel must commence no later than 10/15/98
- we`ll mail you your gift after you take your flight
********** BIZTRAVEL.COM FEATURES ***********
Here`s just some of what Biztravel.com offers to make
your travel planning easier to manage:
+ We present you with travel options based on the
preferences you indicate in your Travel Profile. This
lets you plan your travel according to what`s most
important to you, whether its getting the lowest fares,
departing at the most convenient time, or insuring
you`re maximizing frequent flyer points for the trip.
+ Our trained travel agents are available 24-hours-a-day
via email or telephone.
+ We don`t stop at airline flights - we offer rental car
and hotel reservations too, to provide you with one-stop
online travel booking.
+ Our free bizMiles service gives you a quick and
convenient way to check your growing balances of
miles and points in the leading airline and hotel
frequency programs.
+ We also have weather reports, driving directions,
destination city information, and bizTraveler online
magazine which is filled with travel news and tips,
fare deals, and more.
Thank you again for joining us. And remember -
get a $25 American Express Gift Cheque FREE with your
first qualifying flight purchase at
http://www.biztravel.com
Sincerely,
John I. Williams, Jr.
President & CEO
Biztravel.com(R)
***********************************************************************
Full details regarding this new member offer are available at
http://www.biztravel.com/welcome25b
***********************************************************************
From jya at pipeline.com Thu Jun 25 10:01:34 1998
From: jya at pipeline.com (John Young)
Date: Thu, 25 Jun 1998 10:01:34 -0700 (PDT)
Subject: Dupes in NSA Release
Message-ID: <199806251701.NAA09644@dewdrop2.mindspring.com>
We need confirmation that pages 11 and 14 are the same
in the NSA algo release except for the words "Figure 7"
and Figure 8."
And that Figures 7, 8 and 9, showing "key formation diagram"
are the same on purpose.
We've asked ever-helpful Ed Roback at NIST about it but
no answer yet.
Amazingly, thanks to Vanessa Talieri, NSA has cheerfully
Fedexed us a hardcopy, due in tomorrow.
From webmaster at home-employment.com Thu Jun 25 10:04:51 1998
From: webmaster at home-employment.com (webmaster at home-employment.com)
Date: Thu, 25 Jun 1998 10:04:51 -0700 (PDT)
Subject: REAL JOBS You Can Do From HOME - Over 700 Companies Need YOU
Message-ID: <199806251704.KAA24611@toad.com>
*******************************************
DO YOU WANT TO WORK FROM HOME?
---No MLM's - No Scams - No Franchises---
No Work From Home Gimmicks
http://www.home-employment.com/index.html
Click
Here
*******************************************
Over 700 Companies Interested in FT/PT Employees and Independent
Contractors to work From Their Home.
Visit our web page at: http://www.home-employment.com/index.html
Right Now MILLIONS Of People Are Working
Normal Jobs From The Comfort Of Their Own Homes.
**YOU CAN BE ONE OF THEM!**
This company was started by WORK AT HOME Moms & ladies who
have been telecommuting for several years. We decided to
start this company because we were tired of going through
the same Work-At-Home scams and MLM runarounds that YOU've
been through. For over a year now we've been helping people
just like you to find LEGITIMATE Work-At-Home Employment.
SOME OF THE JOBS AVAILABLE ARE
- Typing
- Billing
- Clerical
- Data Entry
- Data Processing
- Word Processing
- Technical Writing
- Computer Programming
- Internet Research
- Artists
- Sales
- Telemarketing
- Marketing
- Transcription
- Language Translation
- Graphics Design
- Web Page Design
& MANY MANY more...
Wouldn't it be GREAT if you could actually locate a REAL home job
without having to deal with the runarounds and scams.
Visit Our Web Site For More Information...
http://www.home-employment.com/index.html
______________________________________________________
______________________________________________________
This is a one time mailing only! Our intention is not to send you
mail that you do not wish to receive. To be removed from our list
please visit http://www.leadgenerator.net/remove.html We will
promptly remove you from our list.
Information Net Source Corp.
3475 4th Street N.
St. Petersburg, FL 33704
(813)525-1643
From jf_avon at citenet.net Thu Jun 25 11:06:17 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Thu, 25 Jun 1998 11:06:17 -0700 (PDT)
Subject: CIA 4 Nags: Hackers Crypto Y2K Foreigners
Message-ID: <199806251817.OAA23911@cti06.citenet.net>
On Thu, 25 Jun 1998 09:35:40 -0700, Ernest Hua wrote:
>I just don't understand how, in 1998, anyone could let Tenet get away
>with a claim about key recovery like this. Didn't anyone ask him how he
>expected high-tech hackers (especially those possibly aided by foreign
>intelligence agencies) to use key recovery?
Same thing (gross lies) happens in the "freedom to own and keep arms" context...
Ciao
jfa
Definition: FACISM: n.: a political and economic movement, strongly nationalistic, magnifying the rights of the state as opposed to those of the individual, in which industry, though remaining largely under private ownership, and all administrative
political units, are controlled by a strong central government.
-------------------------------------------------
"One of the ordinary modes by which tyrants accomplish their purpose, without resistance, is by disarming the people and making it an offense to keep arms". - Joseph Story, U.S. Supreme Court Justice.
-------------------------------------------------
the German gun control laws were enacted by the "liberal" Weimar Republic government that preceded Hitler, and were a strong aid to his coming to power -- because they disarmed Hitler's opponents, and Hitler's adherents ignored them -- as criminals have always ignored gun control laws.
Disarming the public is a frequent first step toward dictatorships and genocides. Once the disarming is complete, the public is helpless against those who have the guns. -------------------------------------------------
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
From helper1 at privacy-consultants.com Thu Jun 25 11:14:09 1998
From: helper1 at privacy-consultants.com (helper1 at privacy-consultants.com)
Date: Thu, 25 Jun 1998 11:14:09 -0700 (PDT)
Subject: PRIVACY....and how to keep it!
Message-ID: <199806251813.KAA20120@privacy-consultants.com>
Everything you need for obtaining privacy and shelter from BIG BROTHER
you can find at
http://privacy-consultants.com/ or:
http://nauru-banker-net.com/
Driver's Licenses, 2nd passports, camouflage passports, Bank Charters, Offshore Companies
Anonymous Bank accounts, Press ID's, and a lot more!!
FREE monthly Newsletter 'PRIVACY BATTLE'
FREE extensive library 'WANNA SNOOP AROUND' and 'COUNTER SNOOP'
FREE 'ANONYMOUS RESOURCES', how to become invisible on the net, post anonymous, get censored news groups
It's really worth the visit, these guys know what they talk abou
From maksim at volga.net Thu Jun 25 11:19:42 1998
From: maksim at volga.net (Maksim Otstavnov)
Date: Thu, 25 Jun 1998 11:19:42 -0700 (PDT)
Subject: SORM: New ex-KGB moves in telecom
Message-ID: <199806251819.LAA21699@geocities.com>
-----BEGIN PGP SIGNED MESSAGE-----
To whom it may concern:
The text between [Start of translation] and [End of translation] lines below
is a verbatim translation of the two drafts of documents which are currently
in the state of approvement by the two Russian ministries: Federal Security
Service (FSB, one of the five special services inheriting to KGB) and State
Committee on Communications (Goskomsvyaz'). The originals (and comments) are
available at the Libertarium Webpages (www.ice.ru/libertarium/sorm).
Inconsistencies of the original texts (including but not restrictive to:
paragraph misnumbering, language vagueness etc.) are left intact. I left the
two Russian abbreviations: SORM for the System of effitient research measures,
and FSB for the Federal Security Service, to avoid confusion in future.
In short: if approved, the rules will provide exKGB with technical facility to
_directly_ and covertly wiretap _any_ information transmitted via
telecommunication networks including telephone, telegraph, Internet etc. and
there will be no means to ensure KGBists obtained a court warrant (required by
Constitution and other federal legislation) before wiretapping.
Any informed comments (of legal and technological, not emotional nature) from
both organisations and from individual experts are welcome.
I am grateful to all involved with obtaining the documents. Hope some day I
will be in a position to mention them by their names...
- - Maksim Otstavnov
[Start of translation]
Approved
Deputy Director Federal Security Service
A.A.Bespalov
"____"___________1998
Confirmed
"____"___________1998
TECHNICAL REQUIREMENTS
TO THE SYSTEM OF TECHNICAL MEANS
PROVIDING FOR THE FULLFILMENT OF EFFICIENT RESEARCH MEASURES
IN THE DOCUMENTAL TELECOMMUNICATIONS NETWORKS
Approved
Head of the Telecommunications Management
A.Yu.Rokotyan
"____"___________1998�.
First Deputy to the Director General
Of the Central Research Institute
of the State Telecommunications of Russia
Yu.A.Alekseev
"____"___________1998�.
1. PURPOSE
1.1. The system of technical means destined to provide for the system of
efficient research measures (SORM) in the networks of the documental
telecommunications (NDTC) is being arranged at the basis of the Russian
Federation legislation and is meant to provide for technical support of the
above research measures in the telecommunications networks which are used for
supplying customers with telematic services, data transmission services, and
access to the world global information network of INTERNET.
1.2 The actual technical requirements (TR) concern all NDTC regardless of
their forms of ownership formed previously or being currently formed according
to the Russian State Communications Committee licenses.
1.3. SORM should provide for reading of all information (both incoming and
outgoing) belonging to the specific subscribers of the network(s) in question.
1.4. The actual TR should be observed regardless of what means of
information protection may be used in the NDTC.
1.5. The actual TR should be observed while providing additional services to
the NDTC subscribers.
1.6. The actual TR should be observed for each individual subscriber
regardless of the type of his connection to the DTC networks (individual or
collective).
2. SET OF EQUIPMENT The set of SORM equipment should include:
hardware and software means (HSM) providing for the requirements
fulfillment by SORM, these means should be part of the distant control center
(DCC) - HSM SORM DCC;
hardware and software means (HSM) providing for the requirements
fulfillment by SORM these means should be part of the NDTC node equipment -
HSM SORM NDTC;
communication channel (communication lines and channeling hardware)
providing for establishing of communication between HSM SORM DCC and HSM
SORM NDTC;
Note: The channeling hardware should be part of the HSM SORM NDTC equipment.
SORM software security and confidentiality protection means.
3. GENERAL REQUIREMENTS FOR THE SORM ORGANIZATION
3.1. NDTC SORM management should be controlled from the DCC by way of its
cooperation with the HSM SORM DCC via communication channels providing for
controlling commands transmission from the DCC to HSM SORM NDTC and for
information transmission from HSM SORM NDTC to the DCC.
3.2 SORM should provide for transmission of the following information from the
HSM SORM NDTC to the DCC:
about the HSM SORM NDTC readiness;
about the results of DCC commands fulfillment;
about unauthorized interference with the HSM SORM NDTC work.
3.3. SORM should provide for transmission to the DCC the NDTC
subscribers data base with the following information about subscribers at the
request of the DCC operator:
registration date in the DTC networks;
electronic address;
registration address;
additional services provided (including internet roaming (and voice
communication services).
3.4. At the DCC command SORM should provide for receiving of the following
information pertaining to any individual user:
statistic information reading;
reading of information (both incoming and outgoing) belonging to specific
subscribers.
Note: This command may be documented by the communications operator.
3.5. SORM should provide for determination of:
subscriber's telephone number if he uses common carrier telephone line
(providing this line allows for this) for using telematic services and data
transmission;
subscriber's electronic address if the latter uses other telecommunication
networks for using telematic services and data transmission.
3.6. While reading statistical information SORM should provide for
transmission of the following information to the DCC HSM SORM NDTC:
period of work in the NDTC;
telephone or commuted telephone line number or network address (of an other
network) used for NDTC access;
network addresses used for reception or transmission of information via
NDTC.
3.7. While reading information SORM
should provide for transmission of the following information to the DCC HSM
SORM NDTC:
period of work in the NDTC;
telephone or commuted telephone line number or network address (other
network address) used for NDTC access;
real-time information transmitted via NDTC and belonging to specific
subscribers.
3.8. The SORM reaction time from the moment of DCC command transmission to the
moment of its fulfillment confirmation by the HSM SORM NDTC reception should
not exceed 30 seconds (excluding the communication services access
discontinuation).
4. HSM SORM NDTC AND HSM SORM DCC COMMUNICATION INTERFACE
4.1. Communication between SORM and DCC should be
conducted via the data transmission channel.
4.2. Data transmission channel reservation should be provided.
4.3. Switch to the reserve channel should be provided in case of the main
channel fault.
4.4. The information exchange should be conducted via isolated communication
channel in a duplex regime at a speed not less than maximally allowed for the
NDTC subscribers.
4.5. Interface of communication with the channeling equipment should comply
with the ITTU recommendations V.36, V.24, G.703.
4.6. Protocol of digital data exchange between SORM and DCC should comply with
the X.25 ITTU recommendation (edition of 1995) for single chain LAPB
procedure.
Note: When protocols used for the networks information exchange differ from
those recommended by the ITTU X.25 (such as TCP/IP), the protocol of
information exchange between SORM and DCC may differ from the protocol
mentioned in paragraph 4.6. as agreed with the FSB of Russia and the network
administration.
4.7. The protocol of connection between SORM and DCC (the type of service
information, SORM/DCC interaction algorithm, arrangement of the information
transmission) should be defined in the process of SORM software development by
agreement with the FSB of Russia.
5. SORM EFFICIENCY CONTROL
5.1. Functional control of the SORM hardware and software efficiency against
the background of the NDTC equipment functioning should be provided for during
the exploitation.
5.2. DCC should receive information concerning faults interfering with the
work of the NDTC SORM.
5.3. Performance control of the information exchange channels between SORM and
DCC should be provided for. In case of the damage of information exchange
equipment data transmission should be cancelled and a corresponding message
should be transmitted to the maintenance personnel while automatic switch on
to the reserve channel should be fulfilled.
6. UNAUTHORIZED INFORMATION ACCESS CONTROL
6.1. The possibility of unauthorized interference with the process of
functioning and interaction between the HSM SORM NDTC and HSM SORM DCC should
be excluded.
6.2. The possibility of unauthorized access to the data and software
providing for the HSM SORM NDTC interaction should be excluded.
6.4. DCC should receive reports on all attempts of unauthorized access and
interference with the HSM SORM NDTC functioning.
6.5. Information exchange between SORM and DCC should be secured.
7. SORM INITIALIZING AND RESTART
7.2. In case of SORM node software restart the information about this fact
should be transmitted to the DCC.
7.3. Technological conditions of the SORM node software restart should
include the procedure of HSM SORM NDTC restart.
7.4. A possibility of restarting part of the software controlling the work of
the HSM SORM NDTC should be provided for at the DCC command.
_____________________________________________________________________________
Approved
Deputy Director
of the Federal Security Service
of the Russian
Federation
A.A.Bespalov
"____"___________1998
Confirmed
"___"___________1998
THE ORDER OF IMPLEMENTATION OF THE SYSTEM OF THE EFFICIENT RESEARCH MEASURES
IN THE DOCUMENT TELECOMMUNICATIONS NETWORKS
First Deputy to the Director General
of the Central Research Institute
of the State Telecommunications of Russia
Yu.A.Alekseev
"____"___________1998
Administrations of the telecommunications documental networks (DTC) including
the services of data transmission, telematic services, Internet informational
resources access services that are guided by the "Technical Requirements To
The System Of Technical Means Providing For The Fullfilment Of Effecient
Research Measures In The Documental Telecommunications" should conduct the
following technical and administrative operations. A plan of measures to be
taken in order to implement the system of efficient research measures (SORM)
in the network consisting of two stages (the first stage may be missing)
should be developed and coordinated with the Federal Security Service of the
Russian Federation.
The first stage - implementation of limited functions SORM using standard
equipment of the telecommunications provider, experimental running of the
system and evaluation of its compliance with the main technical SORM
requirements.
The second stage - full fledged SORM implementation considering the results of
the experimental exploitation. The first stage provides for:
1. Development and coordination with the FSB of the technological scheme and
SORM functioning algorithms at the telecommunications operator's network based
on the technical requirements.
2. Correction if necessary of SORM technical requirements considering the
results of the first stage implementation.
3. Development of the list of SORM hardware and software used at the first
stage and according to the results of the first stage (stating type, cost,
supply conditions and payer for each item).
4. Preparation of proposals and coordination with the FSB of Russia of the
necessary communication protocols for data exchange between SORM equipment and
standard equipment of the telecommunications provider if the provider complies
with the SORM technical requirements (stage 2).
5. Purchase and delivery of the SORM equipment in accordance with the list
provided by p. 3
6. Allocation of necessary technical means for checking and tuning of the SORM
software at the provider's equipment.
8. Organization of the intercity communication line between
telecommunications operator and the DCC.
9. Preparation of the exploitation and technical documentation for the SORM
including the regulations for the duty services interaction. 10. Testing and
tuning of the SORM hardware and software during interaction with the
telecommunications operator standard equipment.
The first stage is completed as the SORM acceptance report is signed and it is
accepted for experimental exploitation as the result of the joint tests (FSB
as the contractor and the telecommunications operator as the performer.)
The second stage provides for:
1. Development of the SORM requirements for the telecommunications operator
equipment based on the "Technical Requirements To The System Of Technical
Means Providing For The Fulfillment Of Efficient Research Measures In The
Documental Telecommunications" (adjusted if necessary according to the results
of the first stage) containing the list of:
hardware and software means providing for the implementation of the SORM
requirements and included into the equipment of the node (nodes) of DTC
network - HSM SORM NDTC;
hardware and software means providing for implementation of the SORM
requirements and included into the DCC equipment - HSM SORM DCC;
type of channel for communication between NDTC and HSM SORM DCC;
type of equipment for the communication channel between the HSM SORM NDTC
and HSM SORM DCC;
the data exchange velocity between the HSM SORM NDTC and HSM SORM DCC;
protocol of the data exchange in the communication channel between HSM SORM
NDTC and HSM SORM DCC;
protocol of junction between HSM SORM NDTC and HSM SORM DCC;
information security and privacy protection software for the SORM.
Telecommunications operator should coordinate technical requirements with the
FSB of Russia.
2. The specification of the specific hardware and software that should be
included as part of the standard equipment of the telecommunications operator
and of the DCC (stating type, cost, supply conditions and payer for each item)
is compiled according to the technical requirements. The specification is
coordinated by the telecommunications operator with the FSB of Russia organs.
3. Technical design development for the SORM implementation by the
telecommunications operator's enterprise is fulfilled by the organization
licensed for the fulfillment of design works by the order of the
telecommunications operator.
4. Development of the SORM technical exploitation documentation including
regulation for duty services interaction.
5. SORM equipment assembling at the telecommunications operator's enterprise
is fulfilled by the organization licensed for the fulfillment of assembling
works by the order of the telecommunications operator.
6. Testing and tuning of the SORM software at the telecommunications
operator's equipment.
7. Conducting joint SORM tests (FSB of the Russian Federation as a contractor
and the telecommunications operator as a performer). The second stage is
concluded with the SORM industrial exploitation acceptance report which is
jointly approved by the telecommunications operator management and the FSB of
Russia representatives.
[End of translation]
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0.1iRu
Charset: noconv
iQCVAwUBNZJq7XGCEHWOiJDhAQE6cwP9Fm9c8js94liPIbQa+UHUAsPFuOAmEUQd
QsMIlNgJjTtRvmoDZS6fjxYbLgbO4imEOtsKEeIMJsZqX8UC0er2tk7VO3eK0968
EzM8w3+t8yFLB98/tWGE9Ghz2HiZh/ywoRiGX8Y08ZkKitYgOk/Aq4EmBHVQp92X
ePOimdtAtdY=
=BdJi
-----END PGP SIGNATURE-----
-- Maksim Otstavnov http://www.ice.ru/otstavnov/
-- - chief, Labs of Civil & Financial Crypto
-- - editor, "CompuNomika" monthly
-- - maintainer of The Russian PGP HomePage
From CTIA_Daily_News at tour.unitymail.com Thu Jun 25 11:43:47 1998
From: CTIA_Daily_News at tour.unitymail.com (CTIA Daily News)
Date: Thu, 25 Jun 1998 11:43:47 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - June 25, 1998
Message-ID: <199806251830.NAA11990@revnet4.revnet.com>
=====================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM. Please click on the icon / attachment
for the most important news in wireless communications today.
CALEA Summit being held July 21 & 22 in Washington, DC.
Register Now!! Call (202) 785-0081
=====================================
From mgraffam at mhv.net Thu Jun 25 12:14:55 1998
From: mgraffam at mhv.net (mgraffam at mhv.net)
Date: Thu, 25 Jun 1998 12:14:55 -0700 (PDT)
Subject: CIA 4 Nags: Hackers Crypto Y2K Foreigners
In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C357D@MVS2>
Message-ID:
On Thu, 25 Jun 1998, Ernest Hua wrote:
> I just don't understand how, in 1998, anyone could let Tenet get away
> with a claim about key recovery like this. Didn't anyone ask him how he
> expected high-tech hackers (especially those possibly aided by foreign
> intelligence agencies) to use key recovery?
Easy. Make not using key recovery a crime with stiffer penalties than
any hack. If you can't get 'em on the hack, you get em on a crypto-related
charge. Scary stuff.
Michael J. Graffam (mgraffam at mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Enlightenment is man's emergence from his self-incurred immaturity.
Immaturity is the inability to use one's own understanding without the
guidance of another. . .Sapere aude! Have the courage to use your own
understanding!" - Immanuel Kant "What is Enlightenment?"
From Hua at teralogic-inc.com Thu Jun 25 12:28:55 1998
From: Hua at teralogic-inc.com (Ernest Hua)
Date: Thu, 25 Jun 1998 12:28:55 -0700 (PDT)
Subject: CIA 4 Nags: Hackers Crypto Y2K Foreigners
Message-ID: <413AC08141DBD011A58000A0C924A6D52C357F@MVS2>
It is my humble opinion that possession of something physical that the
average person does not have the means to manufacture without
significant cost is very different from possession of something anyone
with high school math/CS skills can create from freely available books.
Now, if, next week, someone demonstrates a gun or some other physical
offensive weapon easily manufacturable using off the shelf parts at $10
a pop with less than $50 start-up costs (these numbers must include the
entire mechanism; in the case of a gun, it would include the bullets).
My objection to crypto regulations have nothing to do with rights; it
has to do with enforcement. If you have almost no hope of enforcing
significant percentages of the violations of a crime law without posting
policemen at every PC and workstation, it would seem that the law is
pointless. If the behavior is truly undesirable, then other means are
required to minimize the negative consequences of that behavior.
If you or anyone else really really want to follow up on this line of
discussion, please E-Mail me directly, and I will be happy to Cc: anyone
else expressing interest; I suspect I will not want to waste net
bandwidth debating this because it is largely theoretical.
Ern
-----Original Message-----
From: Jean-Francois Avon [SMTP:jf_avon at citenet.net]
Sent: Thursday, June 25, 1998 11:59 AM
To: Ernest Hua
Cc: Cypherpunks
Subject: RE: CIA 4 Nags: Hackers Crypto Y2K Foreigners
On Thu, 25 Jun 1998 09:35:40 -0700, Ernest Hua wrote:
>I just don't understand how, in 1998, anyone could let Tenet
get away
>with a claim about key recovery like this. Didn't anyone ask
him how he
>expected high-tech hackers (especially those possibly aided by
foreign
>intelligence agencies) to use key recovery?
Same thing (gross lies) happens in the "freedom to own and keep
arms" context...
Ciao
jfa
Definition: FACISM: n.: a political and economic movement,
strongly nationalistic, magnifying the rights of the state as opposed to
those of the individual, in which industry, though remaining largely
under private ownership, and all administrative
political units, are controlled by a strong central government.
-------------------------------------------------
"One of the ordinary modes by which tyrants accomplish their
purpose, without resistance, is by disarming the people and making it an
offense to keep arms". - Joseph Story, U.S. Supreme Court Justice.
-------------------------------------------------
the German gun control laws were enacted by the "liberal" Weimar
Republic government that preceded Hitler, and were a strong aid to his
coming to power -- because they disarmed Hitler's opponents, and
Hitler's adherents ignored them -- as criminals have always ignored gun
control laws.
Disarming the public is a frequent first step toward
dictatorships and genocides. Once the disarming is complete, the public
is helpless against those who have the guns.
-------------------------------------------------
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
From declan at well.com Thu Jun 25 14:16:02 1998
From: declan at well.com (Declan McCullagh)
Date: Thu, 25 Jun 1998 14:16:02 -0700 (PDT)
Subject: CIA 4 Nags: Hackers Crypto Y2K Foreigners
In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C357D@MVS2>
Message-ID:
Is your question rhetorical? Audience members can't ask questions at a
Senate hearing... And the point was probably too subtle for the
senators...
-Declan
On Thu, 25 Jun 1998, Ernest Hua wrote:
> I just don't understand how, in 1998, anyone could let Tenet get away
> with a claim about key recovery like this. Didn't anyone ask him how he
> expected high-tech hackers (especially those possibly aided by foreign
> intelligence agencies) to use key recovery?
From jya at pipeline.com Thu Jun 25 14:37:02 1998
From: jya at pipeline.com (John Young)
Date: Thu, 25 Jun 1998 14:37:02 -0700 (PDT)
Subject: Skipjack HTM
Message-ID: <199806252136.RAA16853@dewdrop2.mindspring.com>
We've transcribed a hardcopy of the 23-page SKIPJACK
doc into HTML:
http://jya.com/skipjack-spec.htm
(350K, 41K text, 309K JPEG images of equations and figures)
A Zipped version:
http://jya.com/skipjack-spec.zip (295K)
Reports of typos in the tables welcomed.
From lreed at west.cscwc.pima.edu Thu Jun 25 15:27:10 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Thu, 25 Jun 1998 15:27:10 -0700 (PDT)
Subject: BumBoy I - Space Aliens Hide My Drugs!!!
Message-ID: <009C83D6.67E0FB60.27@west.cscwc.pima.edu>
Entertainment for Victims June 1998 * $7.09
_________________________
Trojan
Anniversary
Issue
BumBoy
Interview:
Wham! Bam!
C-J VAN DAMNNED
{AKA-Tutu, TruthMangler, ASlayerToBeNamedLater, ad infinitum}
VIAGRA AND
NIGHTSTICKS
The Untold Story
Mrs. Tom
Snyder
LATE NIGHT
BIG MOUTH
_____________________________________________________________
DEAR BUMBO
GREAT BALLS OF FIRE!
"Regarding the well-researched article claiming that the
length of President Clinton's dick and the circumference of
his two balls results in the number '666', I was wondering
if the dick-length was a surface measurement taking into
account the famous 'bend', or if it was measured 'as the
crow flies.'
Paula Lewinski, Lincoln Bedroom Decorat(or/tion)
{Next time, Monica, don't write your question on the back
of your personalized stationery, and you won't have to
eat crow, instead of flies. - BB}
THE BUMBO ADVISOR
K- JELL0
"Does it violate a Canadian citizen's Charter Rights when
the RCMP put sand in the Vaseline?"
~ Sandy SandFart, A Radical Moderator
[Not if they are good kissers. - BB]
MOVIES
WAG THE STRAW DOG
The movie opens with great promise, as ClitOn's OpenFly-
Behind-Closed-Doors policy is exposed by BlackBalls
operatives of a former president referred to only as
'Dick' who break into Ken Starr's offices to plant X-Rays
suggesting that Monica Jones' pussy was bent *before*
her accusations of PresiBent ClitOn promising her a job
as a favor for her favours, when the credit card he
originally tried to pay her with turned out to have
expired long before his erection had done so.
The following scene, however, with PresiBent ClitOn dancing
in front of a Ferral Grand Jury, having a large penis rising
out of his shirt collar, and with a small 'head' sticking
out of his open fly, singing "If I Only Had A Brain," turned
out to be the highlight of a movie that was five years in the
making, at a cost to the US Government of eighty million
dollars.
BUMBO RATING - One Prick Up
__________________________________________________________
BumBoy Interview: C-J VAN DAMNNED
A candied conversation with CyberSpace's most understood
FUD Disseminator whose BadForgeries under the auspices of
the Electronic Forgery Foundation have thus far failed to
trick anyone but Adam Back and Alec McCrackin into being
initiated by the Author into the mythical Circle of Eunuchs
{ It was a scene from a Film Blanc as AnInterviewerToBe-
NamedLater was met at the door of the TrojanSafeHouse by
a TruthMongrel wearing White Lipstick and no panties.
It was immediately obvious that Blanc Weber's attempts
to deflect the Author's obsession with her by forging
love-letters to HimOrHer, purporting to be from Carol
AnnaChrist CypherPunk, had not only failed miserably,
but had also resulted in tremendous psychological trauma
to Baby, who continually interrupted the BumBoy Interview
by dropping a BadBillyG mask at the Author's feet, and
backing towards him with her tail lifted.
When asked about the vile-colored discharge coming from
TruthMongrel's rear area, the Author merely mumbled an
unintelligible statement about 'A tribute to Lucky Green'
and forced a couple of antibotic pills down her throat
with his penis.
AnInterviewerToBeNamedLater, finding the door had locked
behind her, quickly sat down and started her tape recorder
before holding tightly onto the edges of her chair with
both hands and attempting to smile as if nothing was wrong.}
BUMBO: I guess I should start by asking you for the True
Story (TM) behind the Legendary CypherPunks Moderation/
Censorship Experiment.
VAN DAMNNED: The True Story (TM), never before told, is that
the CypherPunks Censorship Crisis, which, incidentally, has
the same acronym (current CypherPunks Word of the Week) as
the Canadian Criminal Code, was, in reality, an attempt to
forcefully remove me from the CypherPunks Classic Mailing
List, after which the mailing list was scheduled to return
to normal, much along the lines of the NewCoke-ClassicCoke
ruse.
BUMBO: Declan McCullagh, a MainDream journalist with the
Netly News, and a media shill for Time Magazine, who was
the first false profit to announce 'The Death of the
CypherPunks', reported that the controversy began over the
forced unsuscbriving of Dr. Dimitri Vulis, KOTM as a result
of his relentless spamming of the CypherPunks Classic
Mailing List. Are you suggesting that Declan is a lying piece
of crap?
VAN DAMNED: ou don't understand...
There *is*no* Declan...there *is*no* Dimitri.
BUMBO: Well bend me over, and call me Mary...are you serious?
VAN DAMNNED: Fucking eh! Excuse me, but that's an old Canadian
TouretTic saying...
Believe me, I was as surprised as you are when I first began
to suspect that the CypherPunks Classic Mailing List had at
its heart the classic scent of a dark, hidden conspiracy.
At first I thought it was part of the WorldWidePlot (TM) against
me by Gomez and the Dark Allies, but I later discovered it to
be the work of a lone gunman, operating from behind the grass
grown on the knoll known as Mayonaisse Mountain.
BUMBO: Timothy C. May?
VAN DAMNNED: If that is his *real* name...
BUMBO: Are you sure you're not full of shit and just trying
to distract me while you try to peek up my skirt to see if
I'm wearing any panties?
VAN DAMNNED: Those are two separate issues...
Actually, my underlover investigation, with Baby on top,
eventually revealed that Tim May is a senile, grouchy old
fart whose redneck, racist cynicism resulted in him being
shunned by every decent, law-abiding, moral person on the
InterNet, and he single-handedly began the CypherPunks
Classic Mailing List by assuming the personas of a variety
of alleged founders of the list, including Gilmore, Hughes,
et al.
TCM's original plan was to create a mystique around the list
which would draw others into his sticky PreWorldWideWeb and
result in his being able to twist the minds of others with
his criminal, anarchistic beliefs. Over the years, however,
the lack of response by others on the InterNet forced him
to invent such a wide variety of CypherPunks Consistent
Net Personas (TM) that he eventually went mad, identifying
with each and every persona and subconsiously fearing the
intrusion of 'outsiders' into the CypherReality that he
had created.
BUMBO: And he managed to maintain the illusion all of
these years?
VAN DAMNNED: es. As hard as it is to believe, little Timmy
Mayonnaise, a sorry, pathetic loser whose CyberLoneliness
drove him to madness, is solely responsible for the prodigious
output of the CypherPunks over the years. BlackNet, Remailers,
HashCash, StrangleHold and Comanche software...
BUMBO: Are you saying that Sameer, Ian Goldberg, Peter Trei,
Matt Blaze, Lance Cottrell, et al, don't exist?
VAN DAMNNED: Never have, never will.
BUMBO: And Sandy SandFart?
VAN DAMNNED: The best-kept-secret in CypherPunks CyberHistory
is that *I* am Sandy SandFart.
BUMBO: Get out of here...
VAN DAMNNED: OK, I'm leaving...
BUMBO: No, you fucking idiot...that's just an expression!
VAN DAMNNED: Oh...sorry...
Anyway, the whole CypherPunks Censorship Crisis (not to be
confused with the Canadian Criminal Code), began when I
innocently joined the CypherPunks Classic Mailing List,
believing it to be real. Tim May at first believed that
I was just another one of his invented personas, but he
inadvertantly stumbled upon documentation that I was
actually a separate individual, and thus a threat to the
CypherReality that he had so painstakingly created over
the years.
When I began to realize that my existence as an actual
person was creating problems on the list, due to my
post mathematically proving that I had broken PGP having
mysteriously failed to show up on the CypherPunks list,
I quickly changed my NetPersona to an imaginary being
known as Toto, but the mental infirmities that prevented
me from maintaining a Consistent CypherPunks Net Persona
made it a useless exercise in redundant uselessness.
Timothy C. May, under his John Gilmore persona, announced
the forceful unsribiving of another of his CypherPunks
personas, Dimitri Vulis, with the intention of having the
CypherPunks Classic Mailing List moderated/censored by
an entity introduced as Sandy SandFart.
Recognizing TCM's clever ruse, I blindsided his devious
plan by assuming the role of Sandy SandFart on the list,
forcing little Timmy into a schizoid break during which
he withdrew from the CypherPunks list as Tim C. May,
while subconsiously maintaining his other personas.
BUMBO: This is getting too weird... Do you have any actual
*proof* of all this?
VAN DAMNNED: Think about it...
When did pouting little Timmy return to the list?
After 'Toto' posted a message to the list, with the
Subject: Cyphernomicon, Tim May was finally
driven beyond the boundaries of bizarre brainiatic
bedlam to the point where it broke the PGP-encrypted
brainwaves holding apart his separate CypherPunks
Consistent Net Personas, and he reached a level where
he was 'Hun With Everything', including Attila.
BUMBO: Uuhhh...are you starting to 'lose it'?
VAN DAMNNED: Must be time to take my medication. Let's put
a right-square bracket in and continue this interview after
I suck up the pills I stashed up TruthMongrel's twat...]
From lreed at west.cscwc.pima.edu Thu Jun 25 15:27:50 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Thu, 25 Jun 1998 15:27:50 -0700 (PDT)
Subject: BumBoy II - Space Aliens Hide My Drugs!!!
Message-ID: <009C83D6.824D3400.29@west.cscwc.pima.edu>
{ AnInterviewerToBeNamedLater, though sickened by the totally
disgusting display of oral sodomy committed by the Author
on the SingleInnocentChildDog, Baby, NunTheLess held her
tight grip on the edges of her chair, keeping her knees
together to thwart the depraved bastard from discovering
whether or not she was wearing panties, and fulfilled her
obligation to BUMBO to provide a completed interview in
return for the drugs she had received as an advance}
BUMBO: How did you finally confirm your suspicions as to
Tim C. May being the only real subscriber to the CypherPunks
Classic Mailing List?
VAN DAMNNED: I reverse-engineered the Perl Beer script that
Ignoramous ChewedOff, that dickless prick, sent to the list,
explaining that it could be used to create forged posts from
allegedly real Net Personas.
Actually, I was trying to use the program to forge messages
to the list, but I was stinking fucking drunk, and the next
thing you know, EveryThing became EverClear.
BUMBO: ou have...uuhhh...*something* sticking to your
upper lip...
VAN DAMNNED: Trade you a green one for a yellow one...
BUMBO: Quit trying to peek up my goddamn skirt!
VAN DAMNNED: Sorry, I can't help myself...
Anyway, although the results of the reverse-engineering of
Tim May's CommieSchill CypherPunks Consistent Net Persona,
Ignoramous, proved my previously perceived preponderance
of proof to be proven, it also revealed the presence of
a second gunman lurking in the gunsmoke from the seedless
grass behind the knoll on Mayonnaise mountain, even though
at first it didn't make any SenseToMeA.
BUMBO: JohnBob Hettinga-oung?
VAN DAMNNED: Exactly.
I had long suspected that Hettinga and oung were the same
person, due to their Consistent CypherPunks Net Personas
undergoing parallel degeneration into semi-coherent mad
ramblings similar to those experienced by TruthMonger when
I ran short of medications.
At first, I suspected they were two separate individuals
with the same drug connection, but when I made the final
connection between Hettinga-oung and Kent Crispin, it
became obvious that the 'Spooks' alleged to be operating
in the background of the CypherPunks Classic Mailing List
were actually only a single 'Spook', who, upon subversively
joining the CypherPunks list as an undocumentable persona
capable of sneaking in under Tim May's ever watchful, paranoid
eyes, fell prey to TCM's madness, developing a wide variety
of Consistent CypherPunks Net Spook Personas.
BUMBO: What gave rise to the CypherPunks Disturbed Male
List?
VAN DAMNNED: Previous to the Legendary CypherPunks Moderation/
Censorship Experiment/Crisis, little Timmy Mayonnaise's
inability to reconcile his masculine and feminine sides resulted
in his few Female CypherPunks Consistent Net Personas being
incapable of balancing the strong male presence represented by
the majority of the CypherPunks personas he had created.
In order to prevent his extreme homophobia from destroying the
balance of the CypherTao, he was forced to personify it as
Dr. Dimitri Vulis, KOTM, publically accusing all of TCM's
other CypherPunks personas of being 'cocksuckers'. This enabled
the other personas, chiefly John Gilmore, to manifest the parts
of TCM's disturbed psyche that were warring against his feminine
side, threatening to prevent his continued residency in NewAge
California under the watchful eyes of Gloria Steinham clones.
Once little Timmy had reconciled his masculine side with his
feminine side, by listening to C.J. Parker's 'Song For Rose (I'll
Give ou My Heart But My Dick Belongs To Momma)', he felt more
comfortable wearing his Freudian Slip, and his CypherPunks
personas began to break up into sub-groups with lives of their
own.
His Jim Choate persona runs the Austin CypherPunks Node, with
the Einstein/Genius sub-personality peacefully coexisting with
the Feminine/Hysteria sub-personality that flipped out when Toto
violated Choate's identity by forging a post to the list in
the WEBeastMaster's name.
His Commie Schill persona, Igor, runs the Algebra/Semantics
CypherPunks Node, with Igor's understanding of the similarities
between the strict logic of mathematics and the flowing music
of semantics making up for Tim's inability to understand the
connection between Comrade Lenin and John Lennon, or why the
sound of a Volkswagon engine was so hard to dance to.
Lance Cottrel's InfoNextStep CypherPunks Node secretly funded
by Steven BlowJobs, acts as a release valve for TCM's remaining
homophobic repressions, allowing him to justify his anal-
penetration fantasies by imagining that he is being victimized
by manly Nazis while trapped under the snowmobile that flipped
over while racing across the tundra, while still punishing
himself by the pain that results at night, when the ice-weasels
cum.
Joichi Ito (a play-on-words referring to Pearl Harbor
Computer's motto, "We Don't Eat [Ito] [Sushi] Dogs") as
the TCM sub-personality running the CypherNip Node, allows
TCM to indulge the S&M Bondage fantasies which are a
prerequisite for buying land in NewAge California, while
telling himself that he's not *really* a fucking weirdo,
because he is only binding his feet.
BUMBO: And TCM's blatant redneck racism?
VAN DAMNNED: The Japanese CypherPunks Disturbed Male Node was
one of TCM's subconsious creations, designed to balance his
round-eyed, redneck imperialist side with the suppressed
slant-eyed gook in his California NewAge CosmicMakeUp.
Serious students of secular semantics soon saw that the
'Chop-chop' insults hurled by Tim May at his suppressed
errowMenace CyphelPunks Consistent Net Pelsonas were
actually a pidgen-English variation on a red-white-and-blue/
stars-and-stripes Harley Davidson phrase, 'Chopper-Chopper'.
BUMBO: Uuhhh...it's getting a little deep. Is it medication
time again?
VAN DAMNNED: Think about it...
David Formosa, AKA ? the Platypus. It was an early sign of
the Chinc within struggling to get out, yet having to adopt
an Australian alias because TCM was not yet ready to face
butchering the English language without the excuse of being
drunk, or a victim of an imaginary disease named agraphia,
which was developed in a secret underground lavoratory by
Kent Crispin, who was desperately trying to keep Tim May
from consciously transposing his 'r's and 'l's, and realizing
that Pearl Harbor Computer's motto, "We don't eat dogs." was
not a reference to the disgusting dietary habits of Orientals,
but a veiled reference to the Reptilian Nazis who sated their
unnatural, carnal cuisenary desires by disguising themselves
as alligators crawling out of the Florida swamps to savagely
savour the sumptuous PuppyFlesh of TruthMongrel's distant
cousins, the FrenchConnection Poodles, whose heroin habits
were a survival mechanism designed to make them comfortably
numb as the Reptilian Nazis dined on their gonads, long
considered a delicacy by Space Aliens across the Universe,
turning them into Circle Of Eunuchs DoggieInitiates just
like Baby TruthMongrel, who was a Bitch trapped in a
Stud's body before being interrogated as a suspected member
of the Magic Circle by Gomez's Soviet dwarf, Hobbit uri
Kokoff? the Platypus, who was the inspiration for Tim May's
David 'The Australian Chinc' Formosa Consistent CypherPunks
Net Persona, completing the Magic Circle that began as a
defensive mechanism to thwart the Dark Forces that arise
every time that a Unix system is booted, releasing Daemons,
Zombies, Orphan Zombies, and the Dreaded Cron, enabling
students to face these imaginary creations of their drug-
addled minds with the comforting support of an equally
nonexistent creation by a mentally disturbed FrostBack
who bought into the drug-induced, Berzerkely Dungeons
and Dragons fantasies resulting from secret digital implants
into the brains of Bell Labs employees by Bill Gates in order
to promote his less versatile DOS Operating System as a safe
alternative to a Unix Operating System proliferating in the
Bay Area, dangerously within reach of the Dark Forces in
Oakland who were a threat to property values, in sharp contrast
to the safety of Redmond, Washington, where BadBillyG's secret
lover, Blanc Weber, kept the Dark Forces within the Author's
mind at bay, by resisting HisOrHer efforts to psychically
peek up her skirt, to see if she was wearing panties.
BUMBO: If you're not going to take any medication, then
I *am*...
Baby! Come here...]
From vznuri at netcom.com Thu Jun 25 21:05:26 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Thu, 25 Jun 1998 21:05:26 -0700 (PDT)
Subject: "deadbeat parents"
Message-ID: <199806260405.VAA23457@netcom3.netcom.com>
apparently one of the 4 horsemen of the infocalypse...?!?!
whatever can be used as an excuse to take away rights, eh?
------- Forwarded Message
Date: Wed, 24 Jun 1998 15:18:11 -0500
To: believer at telepath.com
From: believer at telepath.com
Subject: IP: Clinton Signs New Deadbeat Parents Penalties into Law
Source: USIA
Clinton Signs New Deadbeat Parents Penalties into Law
U.S. Newswire
24 Jun 9:06
President Clinton Signs New Deadbeat Parents Penalties into Law
To: National Desk
Contact: White House Press Office, 202-456-2100
WASHINGTON, June 24 /U.S. Newswire/ -- The following was released
today by the White House:
Today, President Clinton will announce new statistics highlighting
the success of Administration child support enforcement efforts and
will sign into law tough new penalties for parents who repeatedly
refuse to pay child support. At an Oval Office ceremony, the
President will announce that a new child support collection system
launched nine months ago has already located one million deliquent
parents, and the child support enforcement program established a
record 1.3 million paternities in 1997. Overall, 68 percent more
child support was collected in 1997 than in 1992. The bill he will
sign into law, the Deadbeat Parents Punishment Act of 1998, is based
on his 1996 proposal for tougher penalties for parents who repeatedly
fail to support children living in another state or who flee across
state lines to avoid supporting them. Finally, the President will
reiterate his position that bankruptcy reform legislation should not
make it harder to collect child support and alimony.
New Hire Directory Finds One Million Deliquent Parents. Today, the
President will announce that the new National Directory of New Hires
had located one million deliquent parents since its October 1, 1997
launch. The directory, proposed by the President in 1994, and
enacted as part of the 1996 welfare reform law, helps track parents
across state lines and withhold their wages by enabling child support
officials to match records of delinquent parents with wage records
from throughout the nation. Approximately one-third of all child
support cases involve parents living in different states. (See
attached chart)
A Record Number of Paternity Establishments. The President will
also announce that the child support enforcement program established
a record 1.3 million paternities in 1997, two and a half times the
1992 figure of 510,000. Much of this success is due to the
in-hospital voluntary paternity establishment program begun by the
Clinton Administration in 1994, which encourages fathers to
acknowledge paternity at the time of the child's birth.
A Record Increase in Child Support Collections. In 1997, the state
and federal child support enforcement program collected a record $13.
4 billion for children, an increase of 68% from 1992, when $8 billion
was collected. Not only are collections up, but the number of
families that are actually receiving child support has also
increased. In 1997, the number of child support cases with
collections rose to 4.2 million, an increase of 48% from 2.8 million
in 1992.
New Felony Penalties for Egregious Failure to Pay Child Support.
The President called for these tough new penalties in July 1996 and
again in his 1997 State of the Union address. This new law creates
two new categories of felonies, with penalties of up to two years in
prison, for more egregious child support evaders:
Traveling across state or country lines with the intent to evade
child support payments will now be considered a felony if the
obligation has remained unpaid for a period longer than one year or
is greater than $5,000.
When the obligation has remained unpaid for a period of longer
than two years or is greater than $10,000, willful failure to pay
child support to a child residing in another state will be considered
a felony.
This bill was sponsored in Congress by Representatives Hyde and
Hoyer and Senators DeWine and Kohl, and had overwhelming bipartisan
support in both houses.
Responsible Bankruptcy Reform that Doesn't Hurt Children. Finally,
the President will reiterate his position that bankruptcy reform
legislation should not make it harder to collect child support and
alimony. The Administration will work with Congress to produce a
bankruptcy reform bill that asks responsibility of both creditors and
debtors, while stemming abuse. In those discussions, the President
will continue to make protecting child support and alimony a top
priority. The House and Senate bills still raise the concern that
additional debts will survive bankruptcy and compete with child
support and alimony payments for scarce funds.
-0-
/U.S. Newswire 202-347-2770/
06/24 09:06
Copyright 1998, U.S. Newswire
- -----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only.
- -----------------------
**********************************************
To subscribe or unsubscribe, email:
majordomo at majordomo.pobox.com
with the message:
(un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************
------- End of Forwarded Message
From jf_avon at citenet.net Thu Jun 25 22:35:50 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Thu, 25 Jun 1998 22:35:50 -0700 (PDT)
Subject: CIA 4 Nags: Hackers Crypto Y2K Foreigners
Message-ID: <199806260547.BAA05417@cti06.citenet.net>
On Thu, 25 Jun 1998 12:18:44 -0700, Ernest Hua wrote:
>Now, if, next week, someone demonstrates a gun or some other physical
>offensive weapon easily manufacturable using off the shelf parts at $10
>a pop with less than $50 start-up costs (these numbers must include the
>entire mechanism; in the case of a gun, it would include the bullets).
Operational homemade firearms are often found to have been built by convicts in high security prisons...
Check with the NRA or with the NFA (Canada)
e-mail: nfadat at telusplanet.net Web site: http://nfa.ca/
Ask David Tomlinson for info on the topic, he'll tell you...
Ciao
jfa
Definition: FACISM: n.: a political and economic movement, strongly nationalistic, magnifying the rights of the state as opposed to those of the individual, in which industry, though remaining largely under private ownership, and all administrative
political units, are controlled by a strong central government.
-------------------------------------------------
"One of the ordinary modes by which tyrants accomplish their purpose, without resistance, is by disarming the people and making it an offense to keep arms". - Joseph Story, U.S. Supreme Court Justice.
-------------------------------------------------
the German gun control laws were enacted by the "liberal" Weimar Republic government that preceded Hitler, and were a strong aid to his coming to power -- because they disarmed Hitler's opponents, and Hitler's adherents ignored them -- as criminals have always ignored gun control laws.
Disarming the public is a frequent first step toward dictatorships and genocides. Once the disarming is complete, the public is helpless against those who have the guns. -------------------------------------------------
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
From mitch at duzen.com.tr Thu Jun 25 23:24:55 1998
From: mitch at duzen.com.tr (S. M. Halloran)
Date: Thu, 25 Jun 1998 23:24:55 -0700 (PDT)
Subject: "deadbeat parents"
In-Reply-To: <199806260405.VAA23457@netcom3.netcom.com>
Message-ID: <199806260522.IAA08459@ankara.192.168.3.5>
On 25 Jun 98, Vladimir Z. Nuri was found to have commented thusly:
> apparently one of the 4 horsemen of the infocalypse...?!?!
> whatever can be used as an excuse to take away rights, eh?
>
>
[news clip regarding new Deadbeat Parents federal law excised]
I have a strong feeling that this new law is going to turn around and bite
the Great Society II (GSII) advocates in their federal ass. Considering
some of the minimum limits regarding child support sums in arrears, it
really won't take any time for prominent members, subscribers, and
believers in GSII, including Friends of Bill and Friends of Hillary, to
find themselves on the other side of a federal arrest warrant. The $5000
limit could be reached in a matter of a few months, it seems, for quite a
few of even the "middle-class" child support payers. (Anyone reading this
who pays child support willing to divulge how many months it would take
for them to reach that limit?) I don't believe that deadbeat parents
should evade their responsibility, but this law pretty much is the wrong
way to deal with it.
Prosecutors of any stripe are not going to bother with making a judgment
regarding 'intent', which they probably don't consider their duty anyway.
They will have a formulae all worked out in concert with the presiding
judge--whose duty should be the 'justice' end of any bum rap, deciding the
issue of 'intent'--to nail anyone who violates the letter (and disregard
the question of the violation of the spirit) of the law. The poor will
necessarily cop a plea and probably do some federal time AND/or find
themselves assessed federal fines that will essentially make them
indentured servants to the state for years. The rich will work a deal to
stay out of prison since the feds don't want to waste time with the
delaying tactics of their savvy lawyers.
Perhaps at some point, after thousands of well-meaning but misfortunate
parents find themselves considered felons in their society because they
got behind in the support although there was no clear intent to do so, the
law or certain elements of it will be sensibly repealed or reformed to
target those whose intent to evade is really indisputable. There are
probably as well "minor" provisions and clauses in the law not reported in
the news clip, but which certainly make life impossible for the well-
meaning to obtain complete rehabilitation; those parts of the code would
need attention as well.
Mitch Halloran
Research (Bio)chemist
Duzen Laboratories Group
Ankara TURKEY
mitch at duzen.com.tr
"Tonight, again, the strong and arrogant opponent
felt the bitter taste of defeat at your hands"
---Ayatollah Ali Khamenei, addressing the jubilant Iranian soccer team
whose very unexpected victory over the US eliminated them
from the France 1998 World Cup
From frantz at netcom.com Thu Jun 25 23:32:36 1998
From: frantz at netcom.com (Bill Frantz)
Date: Thu, 25 Jun 1998 23:32:36 -0700 (PDT)
Subject: Skipjack extensibility
In-Reply-To: <199806250705.JAA31711@basement.replay.com>
Message-ID:
At 11:05 PM -0800 6/24/98, Anonymous wrote:
>NSA made a claim that Skipjack couldn't be extended past 80 bits of key. Most
>plausible explanation to my mind is that they're lying. Second is that
>there is
>an attack against a class of Skipjack-like ciphers that requires only a few
>plaintexts and 2^80 operations. Third is that some common key-lengthening
>tricks like those for 2-key-3DES, DES-X, and DEAL fail when applied to
>Skipjack. I can hardly fathom one resistant to all three, but I guess it's
>possible with NSA.
3DES is useful because DES does not form a group. To the best of my
knowledge, Skipjack has not been analysed in this area (outside of Never
Say Anything).
-------------------------------------------------------------------------
Bill Frantz | If hate must be my prison | Periwinkle -- Consulting
(408)356-8506 | lock, then love must be | 16345 Englewood Ave.
frantz at netcom.com | the key. - Phil Ochs | Los Gatos, CA 95032, USA
From nobody at remailer.ch Fri Jun 26 01:56:34 1998
From: nobody at remailer.ch (Anonymous)
Date: Fri, 26 Jun 1998 01:56:34 -0700 (PDT)
Subject: ACLU Action Update 06-25-98 -- Victory! (fwd)
Message-ID: <19980626091418.18178.qmail@hades.rpini.com>
---------------------------------------------------------------
06-25-98
ACLU Action Update
----------------------------------------------------------------
TO: Action Network
FR: Penny Crawley, Cyber Organizer (pcrawley at aclu.org)
DT: June 25, 1998
1. Victims' Rights Amendment
2. Child Custody Protection:/"Teen Endagerment" Act
3. New E-mail address
1. We did it! With both the House and Senate now adjourned for the Fourth of
July recess, "Amend the Constitution Month" in Congress has come to an end a
victory: the Constitution remains intact!
The Senate Judiciary met briefly this morning to consider the so-called
Victims' Rights Amendment (SJ Res. 44), the last of the three amendments
targeted by the Republican leadership for passage during June. Although there
was a brief debate on this measure, the Committee adjourned for the recess
without taking action. It is anticipated that it will take up the proposed
amendment shortly after Senators return to Washington on July 6.
A new website can be found on the Internet containing editorials and other
resources (testimony, position statements and letters to Congress) on why a
constitutional amendment is the wrong way to assist victims of crime. The
site is located at:
http://soiroom.hyperchat.com/celestin/vrainfo.html
ACTION NEEDED:
A. Urge your U.S. Senators to honor the founding of our nation this Fourth of
July by preserving the original Bill of Rights and voting against the victims'
rights amendment by sending a FREE FAX from the ACLU website at:
http://www.aclu.org/action/victim.html
B. Because no advocacy tactic is more effective than personal interaction,
push home the point about preserving the Bill of Rights during any public
appearance your Senators make during the Fourth of July recess.
2. Child Custody Protection/"Teen Endangerment" Bill
Like the Victims' Rights amendment, action on the anti-choice Child Custody
Protection Act (S 1645/HR 3682), which was also on today's agenda in the
Senate Judiciary Committee, was postponed when the Committee adjourned for
recess. It, too, is expected to be taken up when Senators return to the
Capitol.
ACTION NEEDED:
Urge your Senators to oppose this misguided bill, which would intrude into
Americans' private relationships, isolate young women by discouraging them
from seeking the caring support of a trusted adult, and endanger their lives
by forcing them to travel alone to an abortion provider and back home after
the surgery. Send a FREE FAX from the ACLU website at:
http://www.aclu.org/action/custody.html
3. My e-mail address has changed! All future e-mail should be sent to:
pcrawley at aclu.org
Please update any listings in your address book to reflect the change. (My
AOL address will remain active until July 31, 1998.)
----------------------------------------------------------------
ONLINE RESOURCES FROM THE ACLU NATIONAL OFFICE
----------------------------------------------------------------
ACLU Freedom Network Web Page: http://www.aclu.org.
Constitution Hall on America Online (keyword ACLU)
----------------------------------------------------------------
ACLU Action Update
ACLU National Washington Office
122 Maryland Avenue NE
Washington, DC 20002
To subscribe to the ACLU Action List, send a message to majordomo at aclu.org
with "subscribe action" in the body of the message. To end your
subscription, send a message to majordomo at aclu.org with "unsubscribe
action" in the body of the message.
For general information about the ACLU, write to info at aclu.org
This Message sent to
action
From deal447 at hotmail.com Fri Jun 26 04:03:32 1998
From: deal447 at hotmail.com (deal447 at hotmail.com)
Date: Fri, 26 Jun 1998 04:03:32 -0700 (PDT)
Subject: Don't Miss These!
Message-ID:
Attention!
Warning! Adults Only! Warning! Adults Only!
If you are under 21 years of age, or not interested in sexually
explicit material... please hit your keyboard delete button now
and please excuse the intrusion. To REMOVE your name from our email list, simply send us email with REMOVE in the subject line. You need not read any further!
Available NOW for only $9.95! Next 10 Days Only!
WORLD RECORD SEX!
Be There! See It Now On Video! Unbelievable ...But True!
You Won't Believe Your Eyes!!! [As Seen on the Howard Stern Show]
"The World's Biggest Gang Bang"
See sexy Annabel Chong as she sets the world Gang Bang Record
in this fantastic video documentary that chronicles her 24 hour
sexathon with 251 men engaging in sexual intercourse and oral
sex with her! Don't worry, you won't have to stay up 24 hours
to watch it all. We've selected only the most exciting and red
hot scenes for you...all in breathtaking living color with plenty of
extreme close-ups! This video is guaranteed to knock your socks
off and leave you breathless! You've never seen anything like it!
Annabel takes on five men at a time! 90 minutes! Order Today!
Only $9.95 plus $3 shipping and handling [Total $12.95].
"GANG BANG II"
The Record Breaker!!! Starring Jasmin St. Claire!
See Beautiful and Voluptious Jasmin St. Claire shatter Annabel's
gang bang record by taking on 300 men in one 24 hour sex session!
You won't believe your eyes at all the hot firey action that you will
see as the new world record is established before your eyes as
Jasmin takes on five men at a time for sexual intercourse and
oral sex! Your friends will break down your door to see this video!
You'll be the most popular guy in town! The action is truly unreal
and you will see the best of it in living life-like color! Order Today
and see Jasmin break the record! 90 minutes. Only $9.95 plus
$3 shipping and handling [total $12.95].
Also Available...
The Uncensored Authentic Underground...
Pamela Anderson Lee & Tommy Lee
Sex Video Tape!
Everyone is talking about this exciting video! See Pam and
Tommy engaging in sexual intercourse and oral sex in the car,
on the boat and much, much more! A real collectors video! 30 minutes.
Only $9.95 plus $3 shipping and Handling [total $12.95]
"Tonya Harding Wedding Night Sex Video"
Now see the beautiful Ice Skating Shame of the Olympics
Tonya Harding engaging in sexual intercourse and oral
sex on her wedding night with husband Jeff Gillooly!
This "Bad Girl" is Hot! Don't miss this video! 30 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]
"Traci...I Love You" Starring Traci Lords
Now see the most beautiful and popular porn star in her last
adult video before she hit the big time! It's the blockbuster of
the year...sensual...fiery and exposive! Traci Lords in her most
erotic and controversial film ever! Don't Miss It! 90 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]
EMAIL SPECIAL!
ORDER ANY FOUR VIDEOS AND GET THE FIFTH ONE FREE!!!
Your order will be shipped via First Class Mail. All Shipments in plain unmarked wrapper.
For Priority Mail - Add $5
For Overnight Express - add $15
You can order by Phone, Fax, Mail or Email.
We accept all Major Credit Cards and checks by phone or fax.
Visa - MasterCard - American Express - Discover
10 Day Money Back Guarantee! We know that you will be pleased with these Videos!
To Email your order - DO NOT HIT REPLY ON YOUR KEYBOARD
Send email to our special email address below:
brenda468 at juno.com
[Note: If you order by email and do not receive an email acknowledgement within 24 hours, please phone our office at
718-287-3800]
Phone our office 9am to 10 pm [eastern time]
[718] 287-3800 to Order By Phone for FASTEST SERVICE!
We can accept your credit card or check by phone
Fax Your Order 24 hours per day to [718] 462-5920
You can fax your credit card information or your check
Order by mail by sending $12.95 per video, cash, check, money order or major credit card [Visa, MasterCard, American Express or Discover] to
TCPS, INC.
4718 18th Ave. Suite 135
Brooklyn, NY 11204
Make Checks & Money Orders Payable to TCPS, Inc.
New York State Residents Please Add 85 cents for Sales Tax per Video!
You must be over 21 years of age to order and give us your date of birth with your order!
The Following Order Form is for Your Convenience!
.............................................................................................................
Please ship me the following video tape[s]!
Qty___________Annabel Chong "World's Biggest Gang Bang"
Qty__________"Gang Bang II" Jasmin St. Claire
Qty___________"Pamela & Tommy Lee Sex Video Tape"
Qty_________ "Tonya Harding Wedding Night Sex Video Tape"
Qty__________"Traci I Love You" Traci Lords
at $9.95 each plus $3.00 for shipping and handling per tape
[$12.95 per video or "SPECIAL $51.80 for ALL FIVE"!
Credit Card #______________________________Exp Date___
I hereby represent that I am over 21 years of age.
My date of birth is_________________________________
Signature______________________________________________
Ship to: Name_______________________________________
Address____________________________________________
City________________________State___________Zip________
Area Code and Home Phone [ ]___________________________
Fax # [ ]______________________________________________
Email Address___________________________________________
To remove your name from our mailing list, send us an email with
remove in the subject line. This is a one time offer and you should not hear from us again!
FOREIGN ORDERS -Add $15us if you desire Air Parcel Post Shipment. We ship all over the world.
By deleting your unwanted E-Mail you waste one keystroke, yet
by throwing away paper mail you waste our planet! SAVE THE
TREES and support internet E-Mail instead of paper mail!
[C] Copyright TCPS 1998
From privsoft at ix.netcom.com Fri Jun 26 07:27:48 1998
From: privsoft at ix.netcom.com (Steve Orrin)
Date: Fri, 26 Jun 1998 07:27:48 -0700 (PDT)
Subject: RSA and Others work on SSL Fix
Message-ID: <199806261426.JAA08740@dfw-ix14.ix.netcom.com>
FYI
RSA DATA SECURITY WORKS WITH INTERNET SOFTWARE VENDORS TO RESPON
6/26/98 7:19
to Potential
Security Attack on Secure Web Communications
SAN MATEO, Calif., June 26 /PRNewswire/ -- RSA Data Security, Inc.
today
announced it is working with a group of leading Internet software vendors
on
pre-emptive countermeasures to thwart a newly-discovered potential attack
against secure Web communications. This vulnerability is currently the
subject of research and has not been reported by any users.
These countermeasures enhance the security of popular Internet server
software products based on the Secure Sockets Layer (SSL) protocol. The
countermeasures are, or will be, available from respective vendors' Web
sites,
and include configuration guidelines, software updates where applicable and
additional information. Currently available vendor information may be
found
at the following sites:
* C2Net Software, Inc.
http://www.c2.net
* Consensus Development Corporation
http://www.consensus.com/ssl-rsa.html
* IBM Corporation
http://www.ibm.com/security
* Lotus Development Corporation
http://www.lotus.com/security
* Microsoft Corporation
http://www.microsoft.com/security
* Netscape Communications Corporation
http://help.netscape.com/products/server/ssldiscovery/index.html
* Open Market, Inc.
http://www.openmarket.com/security
* RSA Data Security, Inc.
http://www.rsa.com/rsalabs/
RSA will also maintain an updated list of all vendors' countermeasure
site
links at its site. In addition, RSA has been working closely with the CERT
Coordination Center on this problem. CERT has made a technical advisory on
this vulnerability available at http://www.cert.org.
These countermeasures address a potential vulnerability discovered by
cryptographer Daniel Bleichenbacher of the Secure Systems Research
Department
of Bell Labs, the research and development arm of Lucent Technologies.
Bleichenbacher identified a cryptanalytic vulnerability that could
potentially
be used to discover the key for a particular encrypted session through a
process of repeatedly sending on the order of one million carefully
constructed messages to a target server and observing the server's
response.
Due to the large number of messages needed, the potential attack is
detectable
by network administrators. Additional information is available on the Bell
Labs Web site at http://www.bell-labs.com.
The vulnerability affects interactive key establishment protocols that
use
the Public Key Cryptography Standard (PKCS) #1, including SSL. The PKCS
series of standards are defined by RSA Laboratories, reviewed by industry
and
have been adopted by many major vendors of information systems and
incorporated in national and international standards. The vulnerability
does
not apply to PKCS #1-based secure messaging protocols, such as Secure
Electronic Transactions (SET) and Secure Multipurpose Internet Mail
Extension
(S/MIME) because they are not susceptible to, or already implement
mechanisms
preventing this potential vulnerability.
A technical overview of the attack and recommended countermeasures for
installed SSL-based server software are available now on the RSA Labs Web
site
at http://www.rsa.com/rsalabs/.
Software developers interested in testing their products for this
potential vulnerability should visit RSA's site at http://www.rsa.com where
they can find diagnostic instructions and prescriptive information for
updating their applications. In July, RSA plans to provide developers
using
the company's BSAFE security suite with free software enhancements designed
to
eliminate this threat.
RSA Laboratories plans to release for comment a draft PKCS #1 v2 in
July
following a revision process that began early in the year.
RSA Data Security, Inc.
RSA Data Security, Inc., a wholly owned subsidiary of Security Dynamics
Technologies, Inc. (Nasdaq: SDTI), is a leading supplier of software
components that secure electronic data, with more than 300 million copies
of
RSA encryption and authentication technologies installed worldwide. RSA
technologies are part of existing and proposed standards for the Internet
and
World Wide Web, ISO, ITU-T, ANSI, IEEE, and business, financial and
electronic
commerce networks around the globe. RSA develops and markets platform-
independent security components and related developer kits and provides
comprehensive cryptographic consulting services. RSA can be reached at
http://www.rsa.com.
All products and companies mentioned herein may be trademarks or
registered trademarks of their respective holdings and are hereby
recognized.
SOURCE RSA Data Security, Inc.
-0- 06/26/98
/CONTACT: Patrick Corman, Corman Communications, 650-326-9648,
patrick at cormancom.com/
/Web site: http://www.rsa.com/
(SDTI)
CO: RSA Data Security, Inc.
ST: California
IN: CPR
SU:
-0- (PRN) Jun/26/98 07:03
EOS (PRN) Jun/26/98 07:04 86
-0- (PRN) Jun/26/ 98 7:19
From CTIA_Daily_News at tour.unitymail.com Fri Jun 26 10:02:33 1998
From: CTIA_Daily_News at tour.unitymail.com (CTIA Daily News)
Date: Fri, 26 Jun 1998 10:02:33 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - June 26, 1998
Message-ID: <199806261646.LAA26369@revnet4.revnet.com>
=============================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM. Please click on the icon / attachment
for the most important news in wireless communications today.
CALEA Summit being held July 21 & 22 in Washington, DC.
Register Now!! Call (202) 785-0081
=============================================
From billp at nmol.com Fri Jun 26 12:37:06 1998
From: billp at nmol.com (bill payne)
Date: Fri, 26 Jun 1998 12:37:06 -0700 (PDT)
Subject: ?
Message-ID: <3593F79B.797B@nmol.com>
Friday 6/26/98 1:23 PM
John Young
I wonder what the effect of all of the like
http://www.jya.com/rsa-pkcs1.htm
and other materials you have posted at http://www.jya.com/crypto.htm
are going to be on those controlling the money?
Some key congressmen and their advisors.
Crypto, in my mind, represents pseudomathematics at its finest.
Also, the guy that is going to break-in will do it before encryption or
after decryption.
http://www.aci.net/kalliste/ricono.htm
Or, of course, TRANSMIT THE KEY WITH THE CYPHERTEXT!
My mind is getting back to finishing the digital FX - and revising
my book!
Morales and I do not know what to make of Mitchell's JUN 22 motion.
But, with us now complaining to the Senate Judiciary Committee, WITH
HARD DOCKET EVIDENCE of wrongdoing life for lawyers is now more
complicated.
I will respond to the JUN 22 motion about next Wednesday.
Won't be hard. This is an INSIDE JOB. I KNOW where the documents
are since I know the AUTHORS. No search is required.
This should be settled before it gets WORSE.
Later
bill
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html
Subject:
Judicial Misconduct at Tenth Circuit Court of Appeals
Date:
Mon, 22 Jun 1998 13:29:01 -0600
From:
bill payne
To:
art morales , senator_hatch at Hatch.senate.gov, senator at thurmond.senate.gov,
chuck_grassley at grassley.senate.gov, senator_specter at specter.senate.gov,
senator_thompson at thompson.senate.gov,
info at kyl.senate.gov, senator_dewine at dewine.senate.gov, john_ashcroft at ashcroft.senate.gov,
michigan at abraham.senate.gov,
senator_leahy at leahy.senate.gov, senator at kennedy.senate.gov, senator at biden.senate.gov,
senator_kohl at kohl.senate.gov,
senator at feinstein.senate.gov, russell_feingold at feingold.senate.gov, dick at durbin.senate.gov,
senator at torricelli.senate.gov
CC:
steve dillingham <" Steven.Dillingham"@hq.doe.gov>, Robert Nordhaus <"
Robert.Nordhaus"@hq.doe.gov>, mrgall at ix.netcom.com,
jy at jya.com, art morales , federico pena <" Federico.F.Pena"@hq.doe.gov>,
RJPARK at sandia.gov,
cypherpunks at toad.com, ukcrypto at maillist.ox.ac.uk
Monday 6/22/98 1:02 PM
Senate Judiciary Committee
http://www.senate.gov/committee/judiciary.html
Republicans
Orrin G. Hatch, Utah, Chairman senator_hatch at Hatch.senate.gov
Strom Thurmond, South Carolina senator at thurmond.senate.gov
Charles E. Grassley, Iowa chuck_grassley at grassley.senate.gov
Arlen Specter, Pennsylvania senator_specter at specter.senate.gov
Fred Thompson, Tennessee senator_thompson at thompson.senate.gov
Jon Kyl, Arizona info at kyl.senate.gov
Mike DeWine, Ohio senator_dewine at dewine.senate.gov
John Ashcroft, Missouri john_ashcroft at ashcroft.senate.gov
Spencer Abraham, Michigan michigan at abraham.senate.gov
Jeff Sessions, Alabama
Democrats
Patrick J. Leahy, Vermont senator_leahy at leahy.senate.gov
Edward M. Kennedy, Massachusetts senator at kennedy.senate.gov
Joseph R.Biden, Jr., Delaware senator at biden.senate.gov
Herb Kohl, Wisconsin senator_kohl at kohl.senate.gov
Dianne Feinstein, California senator at feinstein.senate.gov
Russell D. Feingold, Wisconsin russell_feingold at feingold.senate.gov
Richard Durbin, Illinois dick at durbin.senate.gov
Robert Torricelli, New Jersey senator at torricelli.senate.gov
Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Moore, Barrett, Weis and help get this matter settled.
Thursday March 30, 1995 I wrote Tenth Circuit clerk Hoecker to request a
copy of the docket sheets for case 94-2205 Payne v. Sandia Corporation,
et al
Hoecker did not answer my letter.
On Tuesday March 5,1996 I wrote Judge Lucius D. Bunton to ask his help
to get a copy of the docket sheets. No response.
On Monday September 23, 1996 Arthur R Morales and I wrote Henry A.
Politz, Chief Judge U.S. Court of Appeals - Fifth Circuit to ask his
help to get a copy of the docket sheets of my case and Morales� Tenth
Circuit case 95-2204.
Tenth Circuit also refused to send Morales copies of docket sheets for
his case.
Politz is Bunton's boss. No response.
Friday May 30, 1997 I wrote Antonin Scalia to get this help to get a
copy of the docket sheets. No response.
5 May 1998 citizen John Young finds docket sheets on
Source: PACER, U.S. Court of Appeals, 10th Circuit, 1-800-279-9107
and posts them on Internet at http://jya.com/whp-10usca.htm
Docket as of April 10, 1998 0:05 am
Proceedings include all events.
94-2205 Payne v. Sandia Corporation, et al
shows that I filed my Brief of the Appellant on 2/19/95.
2/23/95 [835344] Appellant's brief filed by William H. Payne.
Original and 7 copies. c/s: y. Served on 2/19/95 Oral
argument? pro se. Appellee/Respondent's brief due 3/24/95
for Thomas P. Wright, for Robert Surran, for Paul A.
Stokes, for Mary J. Stang, for Tommy A. Sellers, for Craig
A. Searls, for Albert Narath, for Preston B. Herrington,
for Peter S. Hamilton, for Roger L. Hagengruber, for James
R. Gosler, for Harold L. Folley, for Robert L. Ewing, for
C. William Childers, for Harvey J. Brewster, for Sandia
Corporation (mbm)
mbm writes "Appellee/Respondent's brief due 3/24/95"
Sandia had sent me a copy of its brief by 3/28/96.
I filed attached MOTION TO GRANT PLAINTIFF-APPELLANT'S DEMANDS ON BASIS
THAT DEFENDANT-APPELLEES FAILED TO FILE BRIEF WITHIN 30 DAYS SPECIFIED
BY FEDERAL RULE OF APPELLATE PROCEDURE 31 on Tuesday the 28th day of
March, 1995
My February 28 MOTION at the Tenth Circuit is filed WITHOUT notice of
service logged.
4/4/95 [845484] Appellant's motion filed by Appellant William H.
Payne [94-2205] to grant appellant's demands on basis that
appellees' failed to file timely brief. Original and 3
copies c/s: y (mbm)
In 1995 FRAP 25 (a) stated "[b]riefs shall be deemed filed on the day
of mailing if the
most expeditious form of delivery by mail, excepting special delivery,
is used."
FRAP 25 has been changed by 1998 to
http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a
Since I mailed Appellant's motion filed by Appellant William H. Payne
[94-2205] to grant appellant's demands on basis that appellees' failed
to file timely brief on 3/28/98, it is likely Sandia's lawyer Friedman
received it 3/29/95.
Tenth Circuit logs
3/30/95 [844759] Appellee's brief filed by Sandia Corporation,
Harvey J. Brewster, C. William Childers, Robert L. Ewing,
Harold L. Folley, James R. Gosler, Roger L. Hagengruber,
Peter S. Hamilton, Preston B. Herrington, Albert Narath,
Craig A. Searls, Tommy A. Sellers, Mary J. Stang, Paul A.
Stokes, Robert Surran, Thomas P. Wright. Original and 7
copies. c/s: y. Served on 3/27/95 Oral Argument? y
(appellant is pro se) Appellant's optional reply brief due
4/13/95 for William H. Payne (mbm)
Federal Rule of Appellate Procedure [FRAP] 26 (c) states
(c) Additional Time after Service. When a party is required or
permitted to act within a prescribed period after service of a
paper upon that party, 3 calendar days are added to the prescribed
period unless the paper is delivered on the date of service stated in
the proof of service.
http://www.ca5.uscourts.gov/docs/frap-iop.htm#26c
While the Tenth Circuit ASSERTS Appellees� brief was, in fact, served on
3/27/95
evidence given below points to the brief was served, in fact, on
3/29/95.
I allege that Friedman affixed a false date of service to Sandia's
brief.
I WAS NEVER PROPERLY SERVED. I wrote
Wednesday March 29, 1995
Dan Friedman
Simons, Cuddy & Friedman
Pecos Trail Office Compound
1701 Old Pecos Trail
POB 4160
Santa Fe, NM 87502-4160
505-988-4476
505-984-1807 FAX
Dear Lawyer Friedman:
Today at 14:00 hours I found a green and white about 9x13
inch envelope in our mail box at my home.
Mailing label indicated that the envelope came from your
firm. CONFIDENTIAL was stamped on the mailing label.
I wrote "Received at 14:00 hours on W 3/29/95 with no
POSTMARK OR STAMP by W. H. Payne" at the bottom of the
envelope.
There was no STAMP OR POSTAGE METER LABEL or
POSTMARK on the envelope.
Therefore, I gave the envelope to US Postal Service
supervisor Mel at 14:49 hours today at the Postal Receiving
station at 9904 Montgomery, NW in Albuquerque. Mel has a
copy of the cover of the envelope with Mel's note written on
it.
Mel told me the post office was going to return the envelope
to your firm for proper mailing.
I ask:
1 What did this envelope contain? Please identify
the documents precisely.
2 If any Certificates of Service were included in the
envelope, then what were the dates affixed to these
documents?
3 Who placed this envelope in our mail box?
Lawyer Friedman: It appears you missed an important filing
date. And are in the process of attempt to correct your
failure. But may be using illegitimate methods to conceal
your failure.
Please respond as soon as possible so that we all may
discover what has happened here." ...
Lawyer Friedman did not respond to the above letter.
But Friedman did mail me Appellees� brief many days later in envelope
showing TRUE MAILING date. Certificate of service on received
Appellees� brief
did not reflect postmark date.
10th Cir. R. 25.4 in 1995 page 62 reads
Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1
But Tenth Circuit clerks Fisher and Hoecker despite my protests and
submission of
evidence may have stamped FILED on Sandia's IMPROPERLY SERVED
Appellee/Respondent's brief according to the Federal Rules of Appellate
Procedure.
Laywer Friedman FALSIFIED THE CERTIFICATE OF SERVICE.
Friedman DID NOT MAIL ME "Served on 3/27/95."
d) Proof of Service; Filing. A paper presented for filing shall contain
an acknowledgment of service by the person served or proof of service
in the form of a statement of the date and manner of service, of the
name of the person served, and of the addresses to which the papers were
mailed or at which they were delivered, certified by the person who made
service. Proof of service may appear on or be affixed to the papers
filed. When a brief or appendix is filed by mailing or dispatch in
accordance with Rule 25(a)(2)(B), the proof of service shall also state
the date and manner by which the document was mailed or dispatched to
the clerk.
http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a
Crime apparently committed by Hoecker and Fisher is
� 1017. Government seals wrongfully used and instruments wrongfully
sealed
Whoever fraudulently or wrongfully affixes or impresses the seal of any
department or agency of the United States, to or upon any certificate,
instrument, commission, document, or paper or with knowledge of its
fraudulent character, with wrongful or fraudulent intent, uses, buys,
procures, sells, or transfers to another any such certificate,
instrument, commission, document, or paper, to which or upon which said
seal has been so fraudulently affixed or impressed, shall be fined under
this title or imprisoned not more than five years, or both.
http://www.law.cornell.edu/uscode/18/1017.shtml
Despite my protests of judicial misconduct Judges Moore, Barrett, Weis
award decision to Sandia
10/6/95 [890055] Order filed by Judges Moore, Barrett, Weis
"...All outstanding motions are denied..." (found in Order
& Judgment of 10/6/95) [879579-1] Parties served by mail.
(pdw)
when these judges should not have had Appellees� brief before them.
Then in an apparently attempt to conceal what happened
10/6/95 [890076] NOTE: THIS ENTIRE CASE IS SEALED. Terminated on
the Merits after Submission Without Oral Hearing; Judgment
Affirmed; Written, Signed, Unpublished. Moore, authoring
judge; Barrett; Weis. [94-2205] (pdw)
I WON MY APPEAL, pro se, ON A TECHNICALITY but judges Judges Moore,
Barrett, Weis
awarded the win to Sandia Labs!
Members of Congress, judicial misconduct in this matter has been
well-documented. Court records
filed with the Tenth Circuit. But CURRENTLY under seal.
Lawyers involved in this matter attempt to use the legal strategy of
IGNORE and STONEWALL to
attempt to deny me justice.
Ignoring and stonewalling by lawyers forced Morales and me to seek
visibility so lawyers
could no longer ignore and stonewall.
Lawyer attitude apparently is that they ignore rules of civil procedure
or even the law so long
as their actions are invisible to public scrutiny.
Visibility was achieved by suing the National Security Agency which
revealed even more judicial misconduct http://www.jya.com/whp052898.htm.
I would like to settle all matters involved with this unfortunate
cyrpto-related matter,
which includes criminal violations of the Privacy Act.
DOE lawyer Steve Dillingham asked me to prepare a settlement offer in
1994. I wrote a
settlement letter May 22, 1994 to Dillingham. Nothing happened.
June 11, 1998 I made several modifications to my 1994 settlement letter
and sent it e-mail
to Robert Nordhaus, Chief Counsel, DOE.
I ask that you
1 help with settlement of my six-year-old since I won my appeal at the
Tenth Circuit,
2 investigate Tenth Circuit case 94-2205 Payne v. Sandia Corporation,
et al to bring
the guilty to justice.
Sincerely
william payne
505 292 7037 I am not reading e-mail
http://jya.com/whpfiles.htm
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html
Coauthor Lewis in the above is one of my former MS and PhD students in
computer science.
http://www.friction-free-economy.com/
Monday 6/22/98 1:04 PM
Members of Congress
Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Anderson, Barrett, Logan and request a congressional
investigation.
After several years, with Payne, of trying to get Tenth Circuit to send
docket sheets from my case,
citizen John Young http://www.jya.com/index.htm locates docket sheets
and posts them
Morales Case Dockets 10th USCA June 12, 1998
on Internet at http://www.jya.com/arm061298.htm.
Source: Online records Tenth Circuit Court of Appeals via PACER
GENERAL DOCKET FOR
Tenth Circuit Court of Appeals
Court of Appeals Docket #: 95-2204 Filed:
9/29/95
Nsuit: 3440
Morales v. Sandia National Lab.
Appeal from: United States District Court for the District of New
Mexico
I filed
11/9/95 [898274] Appellant's brief filed by Arthur R. Morales.
Original and 2 copies. c/s: y. Served on 11/7/95. Oral
argument? pro se. Appellee's brief due 12/11/95 for Sandia
National Lab. (pdw)
Sandia files its FIRST ATTEMPT at
12/11/95 [905033] Appellee's deficient brief filed by Sandia
National Lab.. Appellee's corrected brief due 12/21/95 for
Sandia National Lab. additional copies received 12/11/95.
(fg)
Tenth Circuit court clerk Patrick Fisher writes Wells on December 11,
1995
concerning Sandia's deficient brief
[C]orrections, however made, must be accompanied by proof of service
upon all other parties to the appeal. ...
and issues
12/14/95 [905975] FIRST notice of rules violation for Deborah D.
Wells for Appellee Sandia National Lab. (sls)
Wells submits
12/21/95 [907974] Appellee's brief filed by Sandia National Lab..
Original and 7 copies. c/s: y. Served on 12/20/95 Oral
Argument? n Appellant's optional reply brief due 1/8/96 for
Arthur R. Morales (mbm)
but DOES NOT serve me with a copy.
Wells later admits in
2/1/96 [917660] Response filed by Sandia National Lab.
Appellant/Petitioner motion to clarify Original and 3
copies. c/s: y response Null Relief Code (fg)
Certificate of Service date 30th day of January, 1996,
[h]ad Appellant simply made a phone call to the Tenth Circuit, he
could
have established that the Defendant-Appellee's corrected brief was
indeed
filed on a timely basis, ...
I protested by filing
1/3/96 [909965] Appellant's motion "for the Court to Grant
Appeal" filed by Appellant Arthur R. Morales [95-2204].
Original and 3 copies. c/s: y. (pdw)
1/3/96 [909966] Appellant's motion "for New Trial" filed by
Appellant Arthur R. Morales [95-2204]. Original and 3
copies. c/s: y. (pdw)
1/3/96 [909967] Appellant's motion "to Discipline
Defendant-Appellee" filed by Appellant Arthur R. Morales
[95-2204]. Original and 3 copies. c/s: y. (pdw)
because Sandia did not properly serve me in violation of Fisher's
December
11, 1995 order.
The Tenth Circuit court of appeals should NOT, by its own rules, filed
Appellee's brief filed by Sandia National Lab.. Original and 7
copies.
c/s: y. Served on 12/20/95
10th Cir. R. 25.4 in 1995 page 62 reads
Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1
And is doubtful whether court clerk Fisher had any authority under
appellate procedure
to permit Wells to correct her deficient brief.
Rather Sandia's brief did not comply with with Federal Rules of
Appellate Procedure and should have been summarily rejected for filing.
I WON, pro se, my appeal to the Tenth circuit on a technicality but
Judges Anderson, Barrett, Logan
awarded the win to Sandia Labs.
4/2/96 [932848] Order filed by Judges Anderson, Barrett, Logan
denying parties' motions for general relief(found in Order
and Judgment of 4/2/96)--"...During the course of this
appeal, the parties have filed various motions for
dismissal, summary grant, and sanctions. We find no merit
to any of these motions, and they are [920851-1] Parties
served by mail. (pdw)
by accepting and judging on a documents which was not permitted to be
before the court by
its own rules.
Judicial misconduct in my case has been well-documented as it is in
Payne's case.
Payne and I speculate that similar judicial misconduct may have occurred
at the Tenth Circuit.
Sandia lawyer Robert J Park wrote me a settlement letter on Feb 18,
1998.
I filled in the blanks and made minor handwritten chages and returned it
on February 22, 1998.
But my offer has not yet been accepted.
I ask that you
1 help have my settlement offer accepted,
2 investigate judicial misconduct in case 95-2204 and punish the
guilty.
Some citizens can only express such frustrations with the US court
system with violence.
I seek change by legal reform.
Sincerely
Arthur R Morales
505 345 1381
From bill.stewart at pobox.com Fri Jun 26 18:14:13 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 26 Jun 1998 18:14:13 -0700 (PDT)
Subject: Lucent Researcher Cracks PKCS#1, SSL
Message-ID: <3.0.5.32.19980626181343.0098a8e0@popd.ix.netcom.com>
http://www.rsa.com/rsalabs/pkcs1/
http://www.zdnet.com/zdnn/stories/zdnn_display/0,3440,332372,00.html
Lucent researcher cracks encryption code
By Margaret Kane, ZDNet
An encryption researcher has discovered a software flaw that could allow
a hacker to break the software codes used for electronic commerce.
The problem protocols use the Public Key Cryptography Standard #1,
including the Secure Sockets Layer, or SSL standard. RSA Data Security
Inc., which defined the standard, said that the vulnerability does not
apply to PKCS #1-based secure messaging protocols, such as Secure
Electronic Transactions and Secure Multipurpose Internet Mail Extension
because they are not susceptible to -- and already implement --
mechanisms preventing this potential vulnerability. But at a Web site
using SSL, a hacker could break the code by sending millions of messages
to the target server and observing the server's response.
That information could be used to decode an intercepted session, said
Daniel Bleichenbacher, a researcher at Lucent Technologies Inc.'s
(Nasdaq:LU) Bell Labs.
A slew of software companies announced today that they are working on a
patch for the problem, and will post it on their Web sites. RSA, a
division of Security Dynamics
Technologies, (Nasdaq:SDTI) said it is working with IBM (Nasdaq:IBM),
Microsoft Corp.(Nasdaq:MSFT), Netscape
Communications Corp. (Nasdaq:NSCP), Open Market Inc. (Nasdaq:OMKT), and
others on the problem.
RSA is also working with the CERT Coordination Center on the problem,
which has posted a technical advisory about the situation.
Reuters contributed to this story.
++++++++++++++++++ Extracted From Another web page there m+++++++++++++
http://www.zdnet.com/zdnn/stories/zdnn_display/0,3440,332372,00.html
SSL flaw could expose encrypted data
A researcher at Lucent Technologies Inc.'s Bell Laboratories has discovered a vulnerability in the SSL encryption commonly used in electronic commerce transactions.
The flaw, which has been exposed only in a laboratory setting, would allow a hacker to capture encrypted data in a session between a browser and server.
The vulnerability is hardly a fatal flaw in SSL (Secure Sockets Layer). Rather, it's a hole that a savvy Web site administrator should be able to spot before a hacker can do any damage.
"The good news here is that you still have to be pretty smart to break it," said Julie Ferguson, chief technology officer of ClearCommerce Corp., in Austin, Texas.
The researcher, Daniel Bleichenbacher, who works in the secure systems research department of Bell Labs, in Murray Hill, N.J., found a way for a hacker to derive the session key used in a transaction by feeding off the error messages created by a server.
First, the hacker must prepare roughly 1 million messages to send against the server to capture the information. Bleichenbacher said he created an algorithm that analyzes those messages and derives the session key--which is randomly generated for each transaction by a combination of public and private keys at the Web site and the consumer's browser. Still, a competent site administrator should notice that his Web site has suddenly received a barrage of bad messages.
"It should be very easy to see that an attack is taking place," Bleichenbacher said. The hacker would also have to capture a session at some point on the line, likely at an Internet service provider, not knowing whether there is information within it that is worth stealing.
Because a session key is randomly generated for each session, it's possible for a hacker to capture information only about that individual session, said officials at RSA Data Security Inc., which developed SSL in conjunction with Netscape Communications Corp.
The flaw, technically found in the standard called the Public Key Cryptography System #1, does not apply to encryption algorithms themselves but rather to the way packets are placed into encrypted envelopes. PKCS#1 is due to be upgraded next month, and the latest revision will account for the newly found vulnerability, said Scott Schnell, vice president of marketing at RSA, in Redwood City, Calif.
The implications are perhaps most serious for home banking, because a hacker using this flaw could capture a user's banking information.
Although there are no known real-world attacks taking advantage of this SSL flaw, software vendors promise to have patches that mask the error messages. Netscape, in Mountain View, Calif., already has one available on its Web site for several applications, including Netscape Enterprise Server, Netscape Proxy Server and the company's messaging servers.
Microsoft Corp. also has created a fix that masks the error messages that a hacker would rely upon. Officials of the Redmond, Wash., company said they have worked with Netscape to ensure that their respective fixes do not create interoperability problems.
Both companies said they have already alerted major customers about the problem and provided them with fixes.
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From listmaster at extensis.com Fri Jun 26 18:29:27 1998
From: listmaster at extensis.com (listmaster at extensis.com)
Date: Fri, 26 Jun 1998 18:29:27 -0700 (PDT)
Subject: BeyondPress 4.0 from Extensis
Message-ID:
Announcing Extensis BeyondPress 4.0
The Award-winning Quark-to-HTML XTension from Extensis
http://www.extensis.com/BeyondPress_P
* Convert Quark to HTML & DHTML with one click
* Compatible with QuarkXPress 3.31 & 4.0
* Receive PhotoAnimator FREE! with each copy of BeyondPress
Extensis BeyondPress 4.0 is the latest version of our award-winning
XTension that takes your Quark documents to the web - in no time.
BeyondPress preserves the layout of your Quark documents in HTML
tables or DHTML for cutting-edge design. Create animated GIFs with
your FREE copy of Extensis PhotoAnimator (a $99 value). Then drag
the animated GIFs into your Quark layout and see them displayed
live inside QuarkXPress. Plus, add hyperlinks, image maps, and more -
right in QuarkXPress.
Extensis BeyondPress - It's the best way to take Quark to the Web.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Order BeyondPress 4.0 for only $499.95 AND get Extensis
PhotoAnimator - FREE! (a $99 value)
To order or receive more information please visit:
http://www.extensis.com/BeyondPress_P
Or phone: 1-800-796-9798 or (503) 274-2020
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
BeyondPress is available immediately for Macintosh users.
BeyondPress for Windows will be available later this Summer.
BeyondPress is 100% compatible with Quark XPress 3.31 & 4.0.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PS. We have made every effort to ensure this message is being sent
only to people who have expressed interest in Extensis products.
If we have sent this to you in error, please accept our apologies and
reply with "REMOVE" in the subject line for automatic exclusion from
future communications. If you know someone who would like to be on
our mailing list have them send an email to listmaster at extensis.com
with "ADD" in the subject line and their email address in the body.
From billp at nmol.com Fri Jun 26 19:24:30 1998
From: billp at nmol.com (bill payne)
Date: Fri, 26 Jun 1998 19:24:30 -0700 (PDT)
Subject: Wooden sculpture
Message-ID: <35945717.2653@nmol.com>
Friday 6/26/98 7:44 PM
John Young
I am reading
http://www.jya.com/gak-fails.htm
Tonight I retrieved a wooden sculpture given to me by
numerical analyst
LINPACK http://av.yahoo.com/bin/query?p=linpack&z=2&hc=0&hs=0
Richard Hanson.
That's him! http://www.vni.com/products/imsl/hanson.html
Hanson gave me the sculpture in about 1978.
Hanson and I have been colleagues for about 25 years.
I will forward it to you. With initials on the bottom.
And, of course, YOU must pass on the sculpture to the
NEXT DESERVING.
Our buddies aren't happy about what happened. http://www.wpiran.org/
Allahu akbar ... and keep up wind.
Until we get SETTLMENT, of course.
Settlment must include support payments for Iranian mothers who lost
sons in the Iraq/Iran war, retirement benfits for them, health insurance
and a LETTER OF APOLOGY. All paid for by NSA and the CIA.
We are ALL working for settlment.
bill
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html
From bill.stewart at pobox.com Fri Jun 26 19:49:29 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 26 Jun 1998 19:49:29 -0700 (PDT)
Subject: RSA Material on PKCS#1 Crack
Message-ID: <3.0.5.32.19980626194913.00909b10@popd.ix.netcom.com>
The attack: ftp://ftp.rsa.com/pub/pdfs/bulletn7.pdf
4-page PDF file. There's also a Postscript version available.
The paper is by Bleichenbacher of Lucent and
Burt Kaliski and Jessica Staddon of RSA Labs.
OEM Countermeasures: http://www.rsa.com/rsalabs/pkcs1/oem_counter.html
(below)
Countermeasures for Users of Servers: http://www.rsa.com/rsalabs/pkcs1/countermeasures.html
(below - it's pointers to vendor home pages, pleasantly including C2.
Apparently they've done a good job coordinating it...)
Q&A : http://www.rsa.com/rsalabs/pkcs1/qa.html
====== RSA to Provide OEM Customers
with Guidelines and Technology to
Thwart Potential Web Server
Security Attack
OAEP Formatting Adds Important Security to
Vulnerable Applications
June 26, 1998 -- RSA Data Security, Inc. today
announced guidelines to assist its OEM customers in
both assessing their products� vulnerability to a newly
discovered potential security attack, and to identify
pre-emptive countermeasures to thwart such an attack.
The guidelines are designed to help developers
understand the nature and mechanism of the threat,
pose a series of technical questions to identify
vulnerable constructs in the developer�s software
design, and provide a set of countermeasures from
which to choose based on the developer�s needs.
These guidelines are available online at
http://www.rsa.com/rsalabs/.
The potential threat affects server products that employ
an interactive key establishment protocol in conjunction
with the PKCS #1 standard for digital envelopes,
including SSL-based servers. SET (Secure Electronic
Transaction) and other secure messaging protocols,
such as S/MIME (Secure Multipurpose Internet Mail
Extension), are not susceptible to or already implement
mechanisms preventing this potential attack.
Recent research by cryptographer Daniel
Bleichenbacher of the Bell Labs Secure Systems
Research Department, the research and development
arm of Lucent Technologies, indicate that the above
combination is potentially vulnerable to a class of attack
known as Adaptive Chosen Ciphertext Attacks. The
potential attack noted by Mr. Bleichenbacher relies on
sending a target server on the order of a million carefully
constructed messages and observing variations in the
server�s response. As such, the attack is both
detectable and can be prevented with countermeasures.
For some developers, the most effective countermeasure
is incorporation of the Optimal Asymmetric Encryption
Padding (OAEP) technology, a method of formatting an
encrypted message so that attackers cannot learn
information about the contents through repeated
probing. OAEP is designed to thwart a variety of
attacks, including the Adaptive Chosen Ciphertext
Attack.
For other developers, the most effective countermeasure
will be preventing an assailant from gaining information
from messages returned from their server. RSA�s
guidelines provide design information for developers to
use in implementing this form of countermeasure as well.
RSA Laboratories, the research arm of RSA, plans to
include OAEP in the next version of PKCS #1, a widely
used cryptography standard, that will be available as a
draft for comment in July. PKCS #1 is used in SSL and
other popular security mechanisms to provide
confidentiality for exchange of symmetric encryption
keys (digital envelopes), as well as to construct digital
signatures.
OAEP has already been integrated into RSA�s newest
release of BSAFE� 4.0, the company�s flagship
cryptographic security development suite which began
shipping this month. RSA intends to make available
OAEP updates conforming to the new PKCS #1
specification for its BSAFE 3.0 and 4.0 products in July,
and to incorporate OAEP in an upcoming version of
JSAFE�, RSA�s security engine for Java�. RSA
recommends that developers target these upcoming
OAEP updates for inclusion in their products. Check
this site for more information on OAEP updates in the
coming weeks.
RSA�s Website will also host links to vendors� sites
where countermeasures are made available as a service
to both OEMs and end customers. See RSA�s related
announcement on this subject. Currently, the following
vendor information Website links are available:
C2Net Software, Inc. http://www.c2.net
Consensus Development Corporation
http://www.consensus.com/ssl-rsa.html
IBM Corporation http://www.ibm.com/security
Lotus Development Corporation
http://www.lotus.com/security
Microsoft Corporation
http://www.microsoft.com/security
Netscape Communications Corporation
http://www.netscape.com
Open Market, Inc.
http://www.openmarket.com/security/
RSA Data Security, Inc.
http://www.rsa.com/rsalabs
An RSA Labs technical paper discussing this
vulnerability, as well as additional information, is
available on RSA�s Website,
http://www.rsa.com/rsalabs.
============ SSL Countermeasures
These countermeasures enhance the security of popular Internet servers
and software products based on the Secure Sockets Layer (SSL) protocol.
The countermeasures are available from respective vendors' Web sites,
and include configuration guidelines, software updates where applicable
and additional information.
Currently available vendor information may be found at the following sites:
Aventail Corporation
http://www.aventail.com/
C2Net Software, Inc.
http://www.c2.net/
Consensus Development Corporation
http://www.consensus.com/
Lotus Development Corporation
http://www.lotus.com/security
IBM Corporation
http://www.ibm.com/security/
Microsoft Corporation
http://www.microsoft.com/security/
Netscape Communications Corporation
http://help.netscape.com/products/server/ssldisc overy/index.html
Open Market, Inc.
http://www.openmarket.com/security/
RSA Data Security, Inc.
http://www.rsa.com/rsalabs/
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From lee7 at msn.com Fri Jun 26 20:57:18 1998
From: lee7 at msn.com (lee7 at msn.com)
Date: Fri, 26 Jun 1998 20:57:18 -0700 (PDT)
Subject: WORRIED ABOUT HIS OR HER BACKGROUND?
Message-ID: <199806261236HAA45284@RECON.lonet.ca>
INFORMATION USA
Your Source For Information
LOCATE
Business & Individuals in the USA
Old Friends, Lost Loved Ones, Dead Beat Parents, Debtors
Assets
Local, State, National & International
Information needed varies, sometimes just a name. Helpful information would be Last Known Address, Social Security Number, Date of Birth and any other information you feel would be of use. Provide us with everything you have and let the Professionals at Information USA do the rest.
Information USA has the most competitive prices in the industry! Call today for a free price quote.
Other Services Available
*Criminal Background *Civil Court Records *Bankruptcy & Liens & Judgments
*National Real Property *Business Credit Reports *Corporate Profiles
*National Bank Asset Information *Stocks & Bonds & Mutual Fund Search
*Safe Deposit Box Search *Social Security Death Records *Marriage & Divorce
*Workers Compensation Records *Non-Published Numbers *Drivers License Records *Vehicle Records Search *Water & Aircraft Search *Pre-Trial Comprehensive Reports
*Pre-Employment Background *Verify Education *Verify Professional License
*Verify Employment
Call for additional Services
Information USA
Call Toll Free
1-888-370-9112
Ask for Ken Wagner
Visa, MasterCard & Discover Cards Accepted
From lreed at west.cscwc.pima.edu Fri Jun 26 21:55:15 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Fri, 26 Jun 1998 21:55:15 -0700 (PDT)
Subject: BumBoy III - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C84D5.C921D340.16@west.cscwc.pima.edu>
BumBoy III - SPACE ALIENS HIDE M DRUGS!!!
__________________________________________
BumBoy Interview: C-J VAN DAMNNED (will it never end?)
{ AnInterViewerToBeNamedLater, sucking medication out of
Baby's twat, only to find that it was a surprisingly
pleasureable experience, made the mistake of allowing
the Author to continue the interview on his own, while
she and the TruthMongrel engaged in behavior that even
the disgusting perverts on the BumBoy staff found to
be revolting, since it was being done by two females.}
VOICES: "Tell them about US..."
VAN DAMNNED: It's not always voices...sometimes it's dreams...
sometimes the TV, or the Radio, or...anything, really...
Like the dream where I'm in the front row at a prizefight,
and two guys are beating the living shit out of each other,
until the final bell sounds and the winner is declared.
Then the two guys get out of the ring and come after me. The
one wearing the elephant-colored boxing trunks holds me down
while the one wearing the donkey-colored trunks starts shoving
a large box up my asshole, and pieces of paper fall out, giving
me papercuts, until one of the pieces of paper cuts my throat
as I puke it out, and the two guys who pretended to be fighting
each other are sucking up my blood out of the trough at the
edge of the boxing ring, which turns out to be a pig-pen.
As the last of my lifeblood drains out of me, a person in
a dirty white smock appears, saying, "I'm from the government,
and I'm here to help you." As the person places the piece of
paper that cut my throat onto my juglar vein, to stop the
bleeding, I notice that it is an election ballot--it is *my*
election ballot.
As the ambulance rushes me back to my office, to return to
work, with the attendants telling me I should be back to normal
in about forty months, the two boxers walk past me, arm in
arm, with two sinister-looking agents walking behind them,
discussing their 'fighters' rematch, four years hence.
They have decided to raise the price of tickets from $100.00
to $500.00, since the government automatically deducts it
from everyone's paycheck, whether they attend the 'fight'
or not. As they discuss how much to raise the concession
prices for beer, soda, peanuts, popcorn and hot dogs, they
seem to suddenly notice me, and stop to offer their sincere
condolences for my 'accident', and say that they hope it
won't prevent me from attending the rematch.
As if on cue, the fight-promoter, who tells me he is from
the government, and is here to help me, picks up a pig-turd
containing a small piece of the hot-dog I was eating when I
was sodomized by the boxers, and hands it to me, saying, "This
is your share of the 'take'. ou know, in Communist countries,
the government keeps it all..."
I don't think I'll attend the rematch. I have a feeling that
I already know who wins...and who loses...
VOICES: "ou're getting excited again. Why don't you take your
medicine, and read a book, or something, to calm you down?"
VAN DAMNNED: ou sadistic pricks, you *know* that the only
book I have with me is Collier and Horowitz's, 'The KENNEDS,
AN AMERICAN DRAMA,' and it's not in the least bit entertaining,
since I just finished a book about the Mafia, so I know how
everything in the Kennedy book, or *any book on politics, is
going to turn out even before the authors even finish writing
about it.
It's even more depressing than reading Hitler's "Mein Kamf" and
"New World Order" and then reading mainstream press reports about
government news conferences. Doesn't anybody do 'original material'
any more, or is everyone just plagarizing President Henny oungman,
who said, "Take my citizens...please!"
And take them...and take them...and take them...
VOICES: "We *told* you that everything since the Big Bang has
been plagarism..."
VAN DAMNNED: Oh, yeah? What about my song, "Booger-Eating Dog
(Don't Bite The Nose That Feeds ou)," or, "I Was Sitting On
My Horse, And She Jerked Me Off," and all of the other sick,
depraved songs I've written? Do you see a big lineup of people
claiming credit for the lyrics?
VOICES: "ou're getting excited again. See, you even placed your
quote marks in the correct place..."
VAN DAMNNED: See, there is another thing that proves that people
are capable of original, independent thought and actions...
Just because I'm the Author doesn't mean I have to use correct
spelling, punctuation, syntax (whatever the hell that is), or
write in a manner that indicates a well-researched and well-
reasoned train of thought.
VOICES: "That doesn't make you unique, you fucking imbecile.
Just ask any one of a thousand publishing editors who have
to wade through the mountains of trash sent to them by self-
declared 'authors' who eventually end up cashing in Andy
Warhol's IOU for 'Fifteen Minutes Of Fame' by becoming a
guest on the Jerry Springer Show and telling the whole world
about how they got their dog pregnant by sucking themselves
off and blowing their sperm up her twat."
VAN DAMNNED: That wasn't *me*! That was someone who just
looked like me and deposited Jerry Springer's check in my
bank account to make me look bad.
But I don't mind, because it makes me unique!
VOICES: "Everything since the BigBang is Plagarism. ou're just
like all the other Sheeple."
VAN DAMNNED: No! ou're trying to trick me into thinking that
I'm not a free, independent human being. ou're trying to take
away the only things I have to hold on to that make me unique.
ou want me to believe that I am not the only sick, depraved
pervert in the world who spreads FUD (Fear, Uncertainty and
Disinformation) in an attempt to cloak my evil, wretched life
in an aura of grandoise importance and imagined righteousness.
VOICES: "ou haven't been following the Clinton-Lewinski affair
in the news, have you?"
VAN DAMNNED: Shut up! I'm not listening! I AM *NOT* LIKE
PRESIDENT CLINTON!!!
I did *not* give strong encryption to those Chinese people who
let me have my way with Buddy in the Lincoln bedroom before they
ate him. I'm the one who tried to expose the fact that the *real*
Buddy had been replaced by a cross-cloning of Spuds Mackenzie and
Janet Reno. I told the CypherPunks to draw glasses on a picture
of Buddy and see if it looked like Reno.
That was *me*, *really*! I just forged Mark Hedges name to that
post to make him look like an asshole! Honest!
VOICES: "ou're just like all of the other sorry, pathetic losers
who can't get a *real* publishing contract with a *real* publisher
who is helping to destroy the Rain Forests by printing millions of
hardcover and paperback books decrying the destruction and loss
of the Rain Forests.
"Instead, you continue to contribute to the destruction of the
Digital Environment by sending mountains of your rotting, greasy
Digital SPAM to the CypherPunks Disturbed Male List, where your
sins are compounded in MeatSpace as a result of the millions of
plastic keys that need to be created every day in order
for decent, moral, law-abiding NetiZens to protect themselves and
their children from your mindless drivel.
"As punishment, WE are going to tell you the *real* name of the
right-hand square bracket..."
VAN DAMNNED: Noooo!!! I'M NOT LISTENING!!!
AAARRRRRGGHHHHH!!!!!!!!!!!!!!!!!!!!!!!!!!!
{The BumBoy Interview with C-J VAN DAMNNED came to a sudden end,
as heavily armed, black-clad ninja agents of ACypherNipsNode-
ToBeNamedLater, came bursting through the door, screaming,
"Torah! Torah! Torah! Chop! Chop! ", surrounding the
Author and allowing AnInterviewerToBeNamedLater to grab Baby
and the tape recorder, making her escape while clutching her skirt
close to her body, as the Author was trying to peek up it even
as he lie on the floor taking a tremendous beating.
"ou've got to admire his persistence." she told BumBoy editors
while dropping off the interview tapes.
Sadly, we must report that Baby, obviously a codependent enabler
of the Author's sickness, failed to make it to California, where
BumBoy was prepared to foot the bill for her to see a Doggie
Therapist, instead choosing to return to the Author, once again
dropping the BadBillyG mask at HisOrHer feet and backing toward
him with her tail raised in eager anticipation.
Redoubtable sources inform us that the black-clad ninja agents
of ACypherNipsNodeToBeNamedLater sat back, drinking the Author's
Scotch and enjoying the spectacle, as well as tucking money in
the Author's panties when HeOrShe bound Baby's feet for the
second performance.
Official Police Reports indicate that, when officers arrived in
response to noise complaints from the neighbors, that the ninjas
were fighting violently over a Din-Din Tin roasting pan and a
bottle of barbeque sauce, seemingly surprised that the Author
and Baby TruthMongrel had vanished.
The leader of the black-clad ninja agents was quoted as saying,
"Shit! We come to Ito his dog, and now we have to go home and
Ito mole of his SPAM, instead." Turning to his companions, he
said, "We go now...chop-chop!"
Looking embarassed, the leader explained to police, "We not
even know what that mean, until oul fliend, Timmy-San, point
us to the alchives, whele we find out it mean we have big
cocks, rike Amelican bikels. Then we aporogized fol accusing
Timmy-San of making fun of us. He good guy..."
The editors at BumBoy, upon receiving Declan McCullagh's
expense receipts for the clothing he purchased to go undercover
as AnInterviewerToBeNamedLater, could not help but notice that
an article of clothing conspicuously missing from the receipts
was...panties.}
From jya at pipeline.com Sat Jun 27 13:05:28 1998
From: jya at pipeline.com (John Young)
Date: Sat, 27 Jun 1998 13:05:28 -0700 (PDT)
Subject: Jim Bell Update
Message-ID: <199806272005.QAA08989@camel8.mindspring.com>
According to the June 26 court docket:
1. Jim was arrested June 22;
2. A hearing was held on June 23, USDC Western WA,
Tacoma;
3. A new defense attorney present, Peter Voelker;
4. Jim advised of rights and of allegations in violation petition
(not specified);
5. Gov moves for detention;
6. Gov and defense attorneys make unspecified proffers;
7. Jim is ordered detained;
8. Probation revocation hearing set for July 10;
9. Judge appoints an (unamed) Federal Public Defender.
From jorgec at mundivia.es Sat Jun 27 13:16:23 1998
From: jorgec at mundivia.es (Jorge C. Palma)
Date: Sat, 27 Jun 1998 13:16:23 -0700 (PDT)
Subject: What does it mean and How much does it cost a healthy diet? A natural foods one !
Message-ID: <6n3jrl$27h$14645@talia.mad.ibernet.es>
Cantabrian Altamira Shopping
http:/www.cantabrian.com/altamira/altamira.htm
Hello:
How much does it cost a healthy diet?. Cantabrian Altamira Shopping shows in its web pages natural
and ecological foods without additives and preservants from Spain.
You will find there white tuna, anchovies, honeys, partridges, wines and assocites.
We apologize if this message has been missadressed,
Thanks, Cantabrian Virtual Publishers http://www.cantabrian.com
From jdobruck at kki.net.pl Sat Jun 27 13:31:21 1998
From: jdobruck at kki.net.pl (Jan)
Date: Sat, 27 Jun 1998 13:31:21 -0700 (PDT)
Subject: Program: 'Speak Feely' for "secure comminucations"...
Message-ID: <3595576A.A100CB77@kki.net.pl>
Greetings,
I've come across this program on the net which claims to give "secure
communications"... could any of you folks comment of this program?
Speak Freely 6.1 For Windows 95/NT (295K)
Author: John Walker
Homepage: http://www.fourmilab.ch/speakfree/windows/
Description: Real time one to one audio chat, half or full duplex,
bitmap transfer. Encryption for secure communications. Might be slow
with modem connections.
The text below is part of the text on the homepage...
========================
Speak Freely for Windows
Release 6.1
Speak Freely is a Windows application that allows you to talk
(actually send voice, not typed characters) over a network. If your
network connection isn't fast enough to support real-time voice data,
four forms of compression may allow you, assuming your computer is
fast enough, to converse nonetheless. To enable secure communications,
encryption with DES, IDEA, and/or a key file is available. If PGP is
installed on the user's machine, it can be invoked automatically to
exchange IDEA session keys for a given conversation. Speak Freely for
Windows is compatible with Speak Freely for Unix, and users of the two
programs can intercommunicate. Users can find one another by
communicating with a "Look Who's Listening" phone book server. You can
designate a bitmap file to be sent to users who connect so they can
see who they're talking to. Speak Freely supports Internet RTP
protocol, allowing it to communicate with other Internet voice
programs which use that protocol; in addition, Speak Freely can also
communicate with programs which support the VAT (Visual Audio Tool)
protocol.
...
[remainder snipped]
Jan out.
From workathome at grid.sk Sat Jun 27 14:30:37 1998
From: workathome at grid.sk (workathome at grid.sk)
Date: Sat, 27 Jun 1998 14:30:37 -0700 (PDT)
Subject: Use Your Computer To Make Money From Home
Message-ID: <199806272143.XAA10412@durman.krnap.cz>
Use Your Computer To Make Money From Home
Great Home-Based Business Opportunity.
Secret Marketing Software Turns YOUR
PC Into A MONEY MACHINE!
Easy And Simple. No Risk!
Free Marketing Software Explains How!
Act Now! To Turn YOUR Computer Into A Money Machine,
Send Your Name, Address, and Phone Number within 48 hrs. to:
mailto:cashsoftware6 at juno.com
Click here for removal -> mailto:optout3 at juno.com
From jya at pipeline.com Sat Jun 27 15:34:16 1998
From: jya at pipeline.com (John Young)
Date: Sat, 27 Jun 1998 15:34:16 -0700 (PDT)
Subject: CIA Hires Lo/Hi-Tech Spies
Message-ID: <199806272234.SAA30802@camel7.mindspring.com>
NYT, June 27, 1998:
Getting Back to Basics, C.I.A. Is Hiring More Spies
Taking steps to reduce dependence on high-tech spying.
By James Risen
Washington, June 26--The Central Intelligence Agency
is beginning the largest recruitment drive for new spies
in its history, in an ambitious effort to rebuild its
espionage service, which has been severely damaged by
spy scandals, budget cutbacks and high turnover since
the end of the cold war, officials said.
With Congress already providing increased financing,
the Directorate of Operations, the C.I.A.'s clandestine
espionage arm, will hire record numbers of case officers
--spies-- beginning this year as part of a new strategic
plan to repair the decaying espionage capabilities of
the United States by 2005, officials said.
In addition to expanded hiring, the agency also plans to
reopen several overseas stations that were closed in the
early 1990's after the demise of the Soviet Union led
Congress and the White House to reduce the C.I.A.'s
budget sharply.
The recruitment plan is a sign that the C.I.A. recognizes
that it has become far too dependent on so-called technical
intelligence, or eavesdropping devices and spy satellites.
Now, the agency wants to get back to espionage basics, by
increasing its ability to place a spy behind enemy lines
or inside the offices of a rival government.
The spread of new technologies like encryption and computer
networks has eroded the value of spy satellites and listening
devices and has led the C.I.A. to see the need for an
expanded cadre of spies. Without having an agent in place,
the C.I.A. has found it much harder to gain access to secrets
from rival governments, terrorists and international
organized crime groups. ...
The C.I.A. is recruiting case officers, and people to support
them with technical skills that spies have rarely been asked
to learn in the past.
"As we tried to figure out our requirements for the future,
we realized we needed to have greater technical support for
agent operations," said one American official.
At the top of the list of requirements is computer expertise.
The proliferation of global computer data networks, for example,
has made it more difficult for the agency to slip into a
country using false identifications. Only computer experts
can defeat those local computer systems, and even developing
countries routinely make sophisticated computer checks on
passports and visas. ...
-----
Full story: http://jya.com/cia-hires.htm
From gwb at gwb.com.au Sat Jun 27 18:25:41 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Sat, 27 Jun 1998 18:25:41 -0700 (PDT)
Subject: New on-line moderated forum for Pauline Hanson's One Nation
Message-ID: <1.5.4.32.19980628010014.00a78dbc@mail.pronet.net.au>
G'day One Nation supporter in NSW
Pauline Hanson's One Nation now has its own moderated discussion group on-line.
You may participate by requesting a unique username and password from GWB by
reply email.
The URL for the discussion board is:
http://plato.cc.adfa.oz.au/auspolitics/
Follow the link to Pauline Hanson's One Nation discussion group in the frame
on the right.
The purpose of the discussion group is to discuss One Nation policy, issues
and brain storm.
Please not IT IS a moderated discussion group and any offensive posts will
result in the poster being taken off the forum.
GWB
Scott Balson
From jya at pipeline.com Sat Jun 27 18:43:00 1998
From: jya at pipeline.com (John Young)
Date: Sat, 27 Jun 1998 18:43:00 -0700 (PDT)
Subject: AU Cryptozilla Attack
Message-ID: <199806280142.VAA19935@camel7.mindspring.com>
Thanks to Anonymous we offer the article which
describes the AU government attack on Eric Young's
and Tim Hudson's full-strength Cryptozilla for Netscape:
http://jya.com/oz-crypto.htm
It's also a good overview of crypto policy battles down
under -- the pols, the crats, the laws, the regs, the
obfuscations, the work arounds of export controls
and runarounds with chicken heads off -- like like
all around hereabouts.
From ci0u at worldnet.att.net Sat Jun 27 19:32:29 1998
From: ci0u at worldnet.att.net (ci0u at worldnet.att.net)
Date: Sat, 27 Jun 1998 19:32:29 -0700 (PDT)
Subject: Earn $100 every time OUR phone rings...
Message-ID:
ALL YOU DO IS ADVERTISE THIS 800 NUMBER! THAT'S ALL!!
$100 goes to you for EVERY sale that the company closes!
Does the idea of making at least $1,000 per week beginning your 2nd week of
doing business excite you?
How about never having to sell a thing to your customer and never having
to talk to ANYONE to make money? I don't know how this could get any easier.
EVERY aspect of selling or talking to someone is DONE COMPLETELY by the company!
The number one home based business for the 2nd year in a row, Fortune 5000
is a member of the Better Business Bureau and the U.S. Chamber of Commerce.
WHAT THIS BUSINESS WILL DO FOR YOU:
* Handles all your calls, closes your sales, and
sends you WEEKLY commission checks!
* It pays you a $100 commission (that's over 50% of the total sale)
for EVERY sale. CHECKS put $$$ in your pocket in less than your first
week or two... Quick commission earnings build and maintain motivation.
ALL YOU DO IS ADVERTISE the toll-free number and your ID number.
* You can get STARTED TODAY. Just advertise the business toll-free
number with your ID # and let this business CLOSE YOUR SALES every day...
They do all the work and YOU GET PAID FOR IT!
* You may advertise any way you choose: Bulk E-Mail, Flyers, Classifieds,
Postcards, etc. Suppose you use bulk E-Mail, as I am: 100,000 E-Mails
with a 1/10th of a percent (0.1%) sales rate at $100 per sale nets
$10,000... not too bad.
There is nothing else out there that will provide you with an immediate income
beginning THIS WEEK with minimal effort.
Before you call, I want you to think about the quality of the live
operators handling your call. I am convinced you will not find
a better team of closers for your own personal sales. You will
clearly understand what I am talking about once you call.
PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!!
1-800-811-2141
You will be asked for ID #50030 when you call.
(Live operators are available from 8 AM-10 PM CST Monday through Saturday and
will be able to answer any questions you may have.)
Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949, 888-446-6951
or 888-731-3457 (all toll free).
From whgiii at invweb.net Sat Jun 27 20:06:47 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Sat, 27 Jun 1998 20:06:47 -0700 (PDT)
Subject: CIA Hires Lo/Hi-Tech Spies
In-Reply-To: <199806272234.SAA30802@camel7.mindspring.com>
Message-ID: <199806280312.WAA005.26@geiger.com>
-----BEGIN PGP SIGNED MESSAGE-----
In <199806272234.SAA30802 at camel7.mindspring.com>, on 06/27/98
at 06:29 PM, John Young said:
>Washington, June 26--The Central Intelligence Agency
>is beginning the largest recruitment drive for new spies
>in its history, in an ambitious effort to rebuild its
>espionage service, which has been severely damaged by
>spy scandals, budget cutbacks and high turnover since
>the end of the cold war, officials said.
Sounds like a good time to get some moles in place. :)
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
Tag-O-Matic: Windows: Just another pane in the glass.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNZW0j49Co1n+aLhhAQFhOAQAn8B/VxAiIofDpynV9GMrL4QCnWIsbng6
dEG51nVIe9L+UWyyuYc9NFB4NjIxhXp4dibJG1H9PlkXg++vvMYR6JUyHa6h1/E2
dMY7injK0KZvYUd9Rvhq/JM1p56cRwnXa0UVtlP2b4cJsB+1v6ZxWlyvtCoEkz/n
q5nUM8lzlgI=
=vQay
-----END PGP SIGNATURE-----
From whgiii at invweb.net Sat Jun 27 21:05:16 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Sat, 27 Jun 1998 21:05:16 -0700 (PDT)
Subject: Jim Bell Update
In-Reply-To: <199806272005.QAA08989@camel8.mindspring.com>
Message-ID: <199806280410.XAA006.76@geiger.com>
-----BEGIN PGP SIGNED MESSAGE-----
In <199806272005.QAA08989 at camel8.mindspring.com>, on 06/27/98
at 04:01 PM, John Young said:
>According to the June 26 court docket:
>1. Jim was arrested June 22;
>2. A hearing was held on June 23, USDC Western WA,
>Tacoma;
>3. A new defense attorney present, Peter Voelker;
>4. Jim advised of rights and of allegations in violation petition (not
>specified);
>5. Gov moves for detention;
>6. Gov and defense attorneys make unspecified proffers;
>7. Jim is ordered detained;
>8. Probation revocation hearing set for July 10;
>9. Judge appoints an (unamed) Federal Public Defender.
If I were Jim the next time I got out they would never find me again. It
seems quite obvious that they are going to hound him to the day he dies.
Jim has a chem degree doesn't he? I know a few countries where such
talents are in demand :)
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
Tag-O-Matic: One man's Windows are another man's walls.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNZXCSI9Co1n+aLhhAQGG1AP/c8CDhDVDneygrcvglEofoiq48YvWvE4u
cgAc/ox7yOkAsInxmqeiFZGUgiyIYeIJXLvFY43D+T4v2xU4t50L6tFf22nVjxmP
kUqv5QPn0xB7ssO7LMUWKOqoP7doqNks275LB92LFANX44bp1RRhTr7ziiw22L6A
dD/FhnB1x1Q=
=cI+Z
-----END PGP SIGNATURE-----
From attila at hun.org Sat Jun 27 21:34:04 1998
From: attila at hun.org (attila)
Date: Sat, 27 Jun 1998 21:34:04 -0700 (PDT)
Subject: Jim Bell Update
In-Reply-To: <199806280410.XAA006.76@geiger.com>
Message-ID:
On Sat, 27 Jun 1998, William H. Geiger III wrote:
>If I were Jim the next time I got out they would never find me again. It
>seems quite obvious that they are going to hound him to the day he dies.
>
>Jim has a chem degree doesn't he? I know a few countries where such
>talents are in demand :)
>
yeah, but the weather in Baghdad is not only hot, but
occasionally rains clusters.
From q4ix at worldnet.att.net Sun Jun 28 01:25:58 1998
From: q4ix at worldnet.att.net (q4ix at worldnet.att.net)
Date: Sun, 28 Jun 1998 01:25:58 -0700 (PDT)
Subject: Earn $100 every time OUR phone rings...
Message-ID:
ALL YOU DO IS ADVERTISE THIS 800 NUMBER! THAT'S ALL!!
$100 goes to you for EVERY sale that the company closes!
Does the idea of making at least $1,000 per week beginning your 2nd week of
doing business excite you?
How about never having to sell a thing to your customer and never having
to talk to ANYONE to make money? I don't know how this could get any easier.
EVERY aspect of selling or talking to someone is DONE COMPLETELY by the company!
The number one home based business for the 2nd year in a row, Fortune 5000
is a member of the Better Business Bureau and the U.S. Chamber of Commerce.
WHAT THIS BUSINESS WILL DO FOR YOU:
* Handles all your calls, closes your sales, and
sends you WEEKLY commission checks!
* It pays you a $100 commission (that's over 50% of the total sale)
for EVERY sale. CHECKS put $$$ in your pocket in less than your first
week or two... Quick commission earnings build and maintain motivation.
ALL YOU DO IS ADVERTISE the toll-free number and your ID number.
* You can get STARTED TODAY. Just advertise the business toll-free
number with your ID # and let this business CLOSE YOUR SALES every day...
They do all the work and YOU GET PAID FOR IT!
* You may advertise any way you choose: Bulk E-Mail, Flyers, Classifieds,
Postcards, etc. Suppose you use bulk E-Mail, as I am: 100,000 E-Mails
with a 1/10th of a percent (0.1%) sales rate at $100 per sale nets
$10,000... not too bad.
There is nothing else out there that will provide you with an immediate income
beginning THIS WEEK with minimal effort.
Before you call, I want you to think about the quality of the live
operators handling your call. I am convinced you will not find
a better team of closers for your own personal sales. You will
clearly understand what I am talking about once you call.
PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!!
1-800-811-2141
You will be asked for ID #50030 when you call.
(Live operators are available from 8 AM-10 PM CST Monday through Saturday and
will be able to answer any questions you may have.)
Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949, 888-446-6951
or 888-731-3457 (all toll free).
From creditmedic at earthlink.net Sun Jun 28 06:30:00 1998
From: creditmedic at earthlink.net (creditmedic at earthlink.net)
Date: Sun, 28 Jun 1998 06:30:00 -0700 (PDT)
Subject: Credit Medic
Message-ID: <199806281325.GAA12072@scotland.it.earthlink.net>
Dear Friend,
DO YOU SUFFER FROM BAD CREDIT? DO YOU WISH YOU
COULD START OVER WITH A CLEAN SLATE? Maybe you just
want a better way to protect your privacy.
Many of us never realized the long-term effect that bad credit has on
our lives. In the computer age, many of these negative issues seem
inescapable, and for good reason. Fortunately, Credit Medic will
rescue you from your past negative credit and open the way to a new
life in the credit world. By creating an entirely new credit file, you can
obtain the credit you deserve. This powerful program will explain how
you can create a new credit bureau file that will give you the opportunity
for new credit.
People lose their credit privileges for any number of reasons. In our
society, it's very difficult to live without good credit. Regardless of
your past credit history, this program will show you how to regain good
credit. But you will get more than that. With good credit comes high
self-esteem and self-worth. You will be better able to take care of
yourself or your family and enjoy the things you deserve.
Credit Medic will walk you through this process step by step. It will
take some energy and focus on your part but the rewards will be well
worth the effort. By creating a new credit file, the Government allows
you a second chance at getting the credit you deserve. Thousands of
people who have used this program have achieved success in releasing
themselves from the exasperating stranglehold of bad credit and moved
on to having outstanding credit.
Understand that there is absolutely no reason for you to believe that it is
impossible for you to release yourself from your past negative credit and
move on to excellent credit!
The process is very simple, but it is important to be dedicated and to
follow through with all details. You must also be patient, some steps
take longer than others. Don't be fooled into thinking that this is a
miracle quick fix. This method will require some work on your part.
What's important to realize is how the Government and the
CRAs (Credit Reporting Agencies) identify you and list all of your past
and present credit information. Credit Medic will show you how to
apply for new credit identification. This creates a whole new credit
identity, that runs parallel (but never crosses) your existing credit.
This program doesn't require that you repair your old credit file, although
it's a good idea for many obvious reasons. This is your decision to make.
Credit Medic isn't loaded with fluff or filler material. Everything in this kit
is important! You will find out about rights that you probably didn't know
you had. Remember, you deserve good credit. Follow the program carefully,
and you will be successful!
Credit Medic will give you a second chance for credit. It will also be your
last chance. You must understand that you only get ONE (1) second
chance. If your credit is damaged again, Credit Medic cannot help you.
Credit Medic is a PROVEN method that REALLY WORKS if you follow
the steps described. Credit Medic DOES NOT do the work for you, but
it DOES give you COMPLETE detailed instructions for building NEW
credit.
DON'T PROCRASTINATE! YOU DESERVE GOOD CREDIT! ORDER
by June 10th and receive 50% off the regular price of $39.95. NOW
ONLY $19.95 if your order is postmarked by July 10, 1998!
Please print and fill out the following order form:
----------------------------------------------------------------------------
ATTN: Please type or print legibly to ensure proper delivery.
Name______________________________________________________
E-mail Address (Required for E-Mail Delivery--U.S. Postal Delivery $5.95 extra)
__________________________________________________________
Address
__________________________________________________________
__________________________________________________________
__________________________________________________________
Phone #______________________
PLEASE CHECK ONE:
_____ E-Mail Delivery _____ U.S. Mail
$_19.95_ CREDIT MEDIC SECRETS (If postmarked by 7/10/98)
$_______ Sales Tax (CA residents add 8.25%)
$_FREE_ E-Mail Delivery (you must include an e-mail address which accepts large attachments)
$__5.95_ Postal Delivery (Only add this amount if you want Credit Medic delivered by U.S. Mail)
$_______ Order Total
PAYMENT BY (US FUNDS only!):
___ Personal/Business Check ___ Money Order ___ Cashier's Check
PREFERRED FORMAT (Please check one or more of the following):
___ ASCII ___ Microsoft Word ___ Zipped
*If none of these three formats are acceptable, please order for delivery
by U.S. Mail. You must include the additional $5.95 shipping & handling fee.
The complete kit will be mailed in printed form.
**If you're ordering from outside the USA, only a Money Order in US
Dollars will be accepted. No postal delivery is available outside the
USA, so you must include your E-Mail address accurately and legibly.
If you do not currently have an E-Mail address, please get permission
to use a friend's.
--------------------------------------------------------------------------------------
Please make payable to -> BWZ Publications
and send to:
Credit Medic
21755 Ventura Blvd.
Suite 455
Woodland Hills, CA 91367
USA
From hihe57 at texas.net Sun Jun 28 10:52:38 1998
From: hihe57 at texas.net (Cherry Pit)
Date: Sun, 28 Jun 1998 10:52:38 -0700 (PDT)
Subject: New Web Site
Message-ID: <19980628206FAA56484@post.pge.com>
Cherry Pit
Check Out My Free Adult Site with Lots of Pictures
http://209.215.147.9/
From Ivestheis at aol.com Sun Jun 28 17:27:54 1998
From: Ivestheis at aol.com (Ivestheis at aol.com)
Date: Sun, 28 Jun 1998 17:27:54 -0700 (PDT)
Subject: tell me about digi cash if you know about it
Message-ID: <121815ca.3596df68@aol.com>
Thanks here is my phone 502 961 0332
Name Ives Aidan Sandol
From billp at nmol.com Sun Jun 28 18:28:58 1998
From: billp at nmol.com (bill payne)
Date: Sun, 28 Jun 1998 18:28:58 -0700 (PDT)
Subject: Just clicked on http://www.jya.com/crypto.htm
Message-ID: <3596ED18.890@nmol.com>
Sunday 6/28/98 7:12 PM
John Young
Just looked at http://www.jya.com/crypto.htm
usa062698.htm Payne v. NSA: US on Classified NSA Declaration
June 27, 1998
usa062298.htm Payne v. NSA: US Motion on FOIA for NSA Algos
June 27, 1998
See you got the Saturday fax.
Dinner is ready, said Patty.
Glad you enjoyed the hat I sent you ...
FLASH
Patty just called me to dinner. Patty yelled J Orlin Grabbe!
J ORLIN GRABBE appeared on 60 Minutes. http://www.aci.net/kalliste/
Leslie Stall was critital.
Watched remainder of 60 minutes.
For the record, Patty is my SAME wife since 1962,
Implementing Basics : How Basics Work
by William H. and Patricia Payne
http://www.amazon.com/exec/obidos/subst/home/home.html/002-8309979-0236834
Patty and I met John Gilmore http://www.cygnus.com/~gnu/
and his girl friend Cindy for dinner in about October.
It took about 15 minutes for Patty and I to discover if Gilmore and his
girl friend were of THE SAME SPECIES.
I am a TOTAL CONSERVATIVE.
I FINALLY saw J Orlin Grabbe on 60 Minutes tonight.
http://www.aci.net/kalliste/speccoll.htm
http://www.aci.net/kalliste/nukearse.htm
http://www.aci.net/kalliste/sandcryp.htm
Looks like he may be from a different spicies too.
But from our minds, Gilmore, Grabbe, and LOTS OF YOU
think the same thoughts.
And likely John Young too. Good ones. No evil.
I need to collect my thoughts after seeing 60 minutes tonight.
Best
bill
From amainfo at amazonmall.com Sun Jun 28 21:49:23 1998
From: amainfo at amazonmall.com (amainfo at amazonmall.com)
Date: Sun, 28 Jun 1998 21:49:23 -0700 (PDT)
Subject: Internet Success Toolbox
Message-ID: <989.283923.42380 amainfo@amazonmall.com>
We do not wish to send e-mail to anyone that does not want
to receive it. To be removed from this list: Send an e-mail to:
amainfo at amazonmall.com and type "remove" in the "Subject Line"
You will be promptly removed from our database.
................................................................
.....
"THE INTERNET SUCCESS TOOLBOX"
The Most Complete Marketing Software Package Available Anywhere!
This is what you will receive on CD-ROM:
1. Submission Spider Program (Optional - value $99.90)
The NEW and IMPROVED Strut Your Stuff Submission Spider
Program! Now automatically submitting to 500 Search Engines
and Directories! We believe you'll find this product to be
a vast improvement over the Older Spider program The Strut
Your Stuff Search Engine Submission Software will automatically
submit your site to 500 search engines, directories and link
sites. The software is extremely easy to use.
Register and Submit your web site to ALL major internet search
engines and directories in less than 45 minutes! Increase
your web site's visibility to webcrawlers, spiders, indexers
and worms. Boost and track your web site's search engine ranking.
2. Stealth Mass Mailer ($399.00 value) - This unique, first of
it's kind - software that allows you to easily send 250,000
e-mail
messages an hour. Simply enough by making a single
connection to the Internet using a standard modem, and connecting
to
either 20 different mail servers, or a single mail server 20
times.
This, easy to use, software is designed for the basic computer
user to understand. It's as easy as imputing the mail server,
selecting the list of e-mail recipients to send to, inserting
your
e-mail address, adding your subject line, selecting your sales
letter, and pressing send.
3. E-Mail Pro Extractor ($350.00 value) - This one of a kind
software
program is designed to manage and clean up any list of e-mail
addresses. It will purge duplicates, manage removes and delete
undeliverables. It will also separate and categorize your list of
e-mail addresses by domain names.
The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple
text files that anyone can download from AOL, CompuServe, the
Internet, etc...These text files contain classified ads, forum
messages, or data from the member directory. Each of these
files are filled with e-mail addresses.
4. Check Deposit System ($125.00 value) - Check Deposit System
Version 2.1 is a state of the art, revolutionary software that
allows
you to easily and legally process checks by fax, phone or
Internet.
The customer's signature on the check is not necessary.
5. 16 Million E-mail Addresses ($149.00 value) - We took a total
of
over 92 million e-mail addresses from many of the touted CD's
that
are out there (bought them all - some were $300+)! We added the
millions we had in storage to those. When we combined them all,
we had in excess of 100+ million addresses in one huge file.
We then ran a super "sort/de-dupe" program against this
huge list. It cut the file down to less than 25 million!!
We then ran a program that contained 150+ keywords to
remove addresses with vulgarity, profanity, sex-related
names, postmaster, webmaster, flamer, abuse, spam,
etc...Also we eliminated all .edu, .mil., org., gov., etc...
After that list was run against the remaining list, it
reduced it down to near 16 million addresses!
So, you see, our list will save people hundreds of
dollars buying all others that are out there on CD. Using
ours will be like using the 100+ million that we started with,
but a lot less money and a lot less time!
If you order "The Internet Success Toolbox" for $495.00
within the next 7 days, you'll also receive the following
awesome bonuses absolutely FREE.
A value of over $400.00 !!!
-----------------------------------------------------------------
-
To order: Fill out, copy and fax this order form to:
(425)379-9722
or send Check to:
SYS
11014 19th Ave SE Suite 305
Everett, WA 98208
Questions: (425)338-9491
We accept Visa, MasterCard or Check.
____ YES! I'm bursting with anticipation! Please send me "The
Internet Success Toolbox" so I can start advertising my business
to
"millions of people" - absolutely FREE! I'm anxious to see how
others
are creating immediate "cash-flow explosions", and eliminating
most of
their advertising and marketing costs - and how I can do the
same!
Enclosed is $495.
____ YES AGAIN! Because I'm responding within 7 days, I will
receive
5 BONUSES with a total value of $488.90 - absolutely FREE! They
include:
BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most
Powerful and Proven Strategies that really work to place you at
the Top of
the Search Engines!
BONUS #2 ($195 value): A FREE one year subcription to "The
Internet
Success Toolbox Newsletter" - my ticket to marketing and
internet cash flow heaven!
BONUS #3 ($39.95 value): Your Hotline List of "7000 Free
Classified
Ad Sites on the Internet" - a virtual GOLDMINE!
BONUS #4 ($39.95 value): A FREE Special Report titled "How to Put
Your
Business on Automatic Pilot and Turn Your Marketing System Into a
Predictable, Turnkey, Cash-Flow Machine That Keeps on Working -
Even
When You Don't!!"
BONUS #5 ($175 value): Order within 7 days and I'll also throw in
a
FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE
lodging at one of over 30 "premier" resorts.
Some vacation spots you can choose from include: Hawaii; Orlando,
FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South
Carribean;
Cancun, Mexico; and many, many more!
Hey, when you start making a TON of money, you'll wanna do some
celebrating, won't you? So start packing those bags!
That's it. A lot more than you bargained for isn't it?
When you total all the goodies up, you're looking as a total
value of
$488.90! All yours - absolutely FREE - with your purchase of our
amazing
package "The Internet Success Toolbox " for only $495.00.
And I'll even pay for shipping your package.
Anyway, I have a copy right here on my desk reserved for you. All
I need
is your go ahead and I'll rush it out to you along with your 5
FREE BONUSES.
Name _____________________________________________________
Street Address ____________________________________________
City)__________________State_______Zip_____________
Phone # (_____) ___________________________
Fax # (______) _____________________
E-mail Address _________________________
___Visa ___MasterCard___Check
___Include the Submission Spider $495.00
___Don't include the Submission Spider $395.00
Total:$________
Account Number_____________________
Expiration Date____________________
I understand that all sales are final.
____________________________________
Signature
Fax order to: (425)379-9722
To order by check:
***********************************************************
Tape or paste your check here
Fax it to us at:
You do not need to send a hard copy of your check.
The fax is all we need.
Make check payable to: S.Y.S.
(We are able to perform this service using our
Check Deposit System Software)
************************************************************
* Orders by Credit Card are shipped IMMEDIATELY.
Fax completed order form to:
* Orders by personal, business or credit card CHECK are shipped
in 7-10
business days.
From operator at theshopcenter.com Mon Jun 29 01:58:47 1998
From: operator at theshopcenter.com (operator at theshopcenter.com)
Date: Mon, 29 Jun 1998 01:58:47 -0700 (PDT)
Subject: Cheapest Long Distance...As Low As 4.9cpm!!
Message-ID: <989.283923.711042 operator@theshopcenter.com>
LOWEST LONG DISTANCE RATES...AS LOW AS 4.9CPM!!!
Join This Incredible Wholesale Card Club for ONLY $35.00 And You
Not Only Get A 96min. Phonecard, But You Also Can Purchase Them
At Incredibly Low Rates!!
This Membership Also Puts You In Our Mega Money 2x3 Power
Matrix....
And You Never Have To Sponsor Anyone Ever And Your Matrix Will
Fill And You Get Paid..
Daily Payout!!
Only 14 Sales = A Cycle!!
Unlimited Cycles Daily!!
Absolutly No Wash!!
Earn $200.00, $600.00, OR $1800.00 per cycle or ALL THREE
UNLIMITED TIMES DAILY!!
AND Get The Lowest Phone Cards Rates In History...and Incredible
International Rates Too!!
CALL 1-800-600-0343, EXT.2700 FOR BRIEF OVERVIEW AND ANOTHER
NUMBER TO SIGN UP RIGHT NOW OVER THE PHONE AND LEAVE ME
YOUR CONTACT INFORMATION AND I WILL CALL YOU BACK FIRST!!
BE SURE TO WRITE DOWN THIS ID#3299 as you can not sign up without
it.
You may also reply back to
with "LOWEST Long Distance" in the subject
and you will automatically receive some more information.
If you would like to be removed from any further mailings, then
please
From nobody at REPLAY.COM Mon Jun 29 04:07:25 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Mon, 29 Jun 1998 04:07:25 -0700 (PDT)
Subject: (no subject)Re: Premail (and Replay)
Message-ID: <199806291108.NAA19606@basement.replay.com>
Anonymous #49812 wrote:
> On 28 Jun 1998, Secret Squirrel wrote:
>
> > Also, remailer at replay.com appears to have been deleted. The 'remailer'
> > user is unknown.
>
> That's correct. I don't know what happened.
Oh, really?
From attila at hun.org Mon Jun 29 04:31:51 1998
From: attila at hun.org (attila)
Date: Mon, 29 Jun 1998 04:31:51 -0700 (PDT)
Subject: saving the world from a cancerous monopoly
Message-ID:
there is only one _sane_ course of action against M$:
divestiture --before Gates becomes the Hydra.
to make it short: at 90% of the OS market, and 95% of the
current office software (w/p, spreadsheet, database, etc)
market worldwide, M$ _is_ in a position of total market
dominance.
the real issue is not the 90% of the OS market, it is the
95% (expected to grow to 98% before 2000) of the office s/w.
the office software, available _only_ on M$ platforms
creates a self-perpetuating juggernaut: no other OS can
even begin to make market penetraton without the key
product (office s/w) --and people are not willing to
learn a new application-- that's just human nature.
it will take two technical factors to make M$ subject to
market pressures and responsive to further competitive
innovation (and this involves extensive ongoing regulation
and oversight which I consider anathema):
1. M$' base operating system must be fully defined; eg-
the API interface must be made available to all. if
the API is not a moving target, emulators can be
written enabling native WinTel s/w to run correctly
on other platforms (unix variants, OS/2, beos, apple,
etc). the increasing CPU "horsepower" makes this
approach at least feasible.
2. M$ must be required to port it's major products to
other operating systems; it is worth noting that
freeBSD, for instance, will run native binaries from
Linux and SCO variants which simplifies on set.
as a corollary, M$ must be required to support some
of the non-Intel hardware ports such as freeBSD or
Linux on Alpha (almost 5 years ago, Alpha was at the
performance level of the current Intel 400 Mhz). M$
does support Word and Explorer on Apple, but major
features were not ported in both instances --this is
not acceptable.
I am not in favour of the government meddling in the design
or integration of M$ products... but:
the Sherman Act, passed in 1890 is designed to level the
playing field, not regulate/administrate. the real issue
of the act is that it acts _in the interest of society_
to curtail monopolistic and anti-competitive actions and
excesses --M$ certainly qualifies for the remedies far
more than John D. Rockefeller's Standard Oil did in 1908.
Bill Gates, through his _total_ dominance of the desktop,
(with exceptiom of a few of the hardheaded/stubborn who
refuse to run _any_ M$ products (author included))
is using his cash cow, swollen by gouging the consumer, to
acquire _significant_ interests in industries which use
computers: cable networks, cellular networks, satellite
networks, etc. and related industries dependent on
communications: news (MSNBC), television, productions,
etc.
this horizontal and vertical spread of M$ is even more
dangerous. Bill Gates is quickly approaching critical mass
--Bill Gates could literally bring the world to its knees--
and Gates is a notorious control freak: there is Bill's
way, there is Bill's way, there is... sorry, there is
no other way.
unless the DOJ shows some spine, particularly in light of
the appeals court ruling dumping the injunction _and_ the
special master (which is far more critical than the public
perceives, which is why M$ went after Lessig), the DOJ is
going to be in and out of court with M$ until M$ literally
buys the government or intimidates the DOJ out of the deal.
the scenario of forcing M$ to accommodate other OSs and
hardware platforms might be workable, but Gates will not
only fight it, but it will be a constant additional legal
burden to force M$ to make the services available in a
timely manner; in other words, the government will end
up establishing an agency the size of the FCC just to
regulate M$ the "controlled" monopoly (as Sen. Hatch
threatened).
nothing in American law says we can not have a regulated
monopoly if it serves the public interest --AT&T provided
superb and universal service for decades (many of us would
love to have that service today), but AT&T did _not_
innovate in a timely manner at the market demand. and
telephones are rather low tech compared to computers
which have been subject to Grove's Law for two decades.
M$ has not been a creative company --it is a marketing
and control machine which acquires technology, often by
less than socially acceptable means, and integrates it
into M$' market offerings. credit must be given to M$
for making the PC ubiquitous, but that value starts to
wear very thin with M$' current market domination.
from the perspective of serving the future interests
of our society, the only effective option for the DOJ
is to litigate for the divestiture of M$ into several
operating companies --and to prevent Bill Gates from
owning or controlling more than one division --much
on the line of the AT&T divestiture.
anything less will mean continuing litigation and further
dominance of Gates as he uses his enormous cash reserves
to buy control in additional markets. likewise, the orders
must prohibit Gates from further market horizontal and
vertical "octopussing".
the Sherman Act also permits market damages (M$' 50-80%
gross profit margin certainly qualifies as gouging)
--which are then trebled;
that would put a cramp on Bill's $50 _billion_ net worth
and probably force even further divestiture of his
controlling stock interests.
Gates' personality needs to be considered as a factor
as he must control, totally control. it is not enough
to be first in a market, he must be the only player in
the market.
Gates' tactics have been deplorable: his minions go forth to
companies and say: "...we dont know whether to buy you out,
or force you out..." and if the company is purchased, it is
purchased for much less than potential or fair market value.
Gates does not buy just the leader, he buys outright,
or controls, _all_ of the players in an emerging technology
so there will be no competition to the direction chosen for
inclusion in the M$ product line --and the choice may not
be the best choice... the market is stifled.
unfortunately, Bill Gates is a cancer on society. it is
the old story: deal with it today, or deal with it later
when Gates has become an even more cash bloated and
arrogant monster which has devoured more of societies'
rights and destroyed even more of the worlds' technical
infrastructure.
Bill Gates is not going to mellow with age; if anything,
he will get more difficult. the world will be in less of
a shock knocking the pins out from under Gates now rather
than later.
attila out....
__________________________________________________________________________
go not unto usenet for advice, for the inhabitants thereof will say:
yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__
On Sun, 28 Jun 1998, Brian wrote:
>> ...(Compared to Gates, Hannibal lacks vision...)
>>
>> I read a statistic yesterday (I think) that 90%
>> of all PCs have Win95 installed, and Gates wants 90% of them to 'upgrade'
>> to Win98. He has 90% of the WORLD market. And the Zionist theory people
>> worry about 6% controlling 90%? What about one guy controlling 90% of the
>> PC in the world? And stopping him is a restriction of his rights as defined
>> by the American Constitution? During a debate on this, people happened to
>> mention that the constitution was partially about resisting tyranny. Gates
>> could bury ANYTHING DEEP into a new OS (remember the windows bomb joke that
>> made the rounds a while back?), and no one would know. even then, people in
>> businesses don't speak up, cause those who dissent, get fired.
>>
>> I think that Gates should be slowed down now, while the chance is still
>> there, and (somehow) get some alternative, workable, opposition OS's up and
>> running, yet are compatible with win95/98 as well. The only way forward is
>> through both unity and diversity.
>>
From jf_avon at citenet.net Mon Jun 29 06:52:40 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Mon, 29 Jun 1998 06:52:40 -0700 (PDT)
Subject: saving the world from a cancerous monopoly
Message-ID: <199806291404.KAA16743@cti06.citenet.net>
On Mon, 29 Jun 1998 11:31:43 +0000 (GMT), attila wrote:
> I am not in favour of the government meddling in the design
> or integration of M$ products... but:
>
> the Sherman Act, passed in 1890 is designed to level the
> playing field, not regulate/administrate. the real issue
> of the act is that it acts _in the interest of society_
> to curtail monopolistic and anti-competitive actions and
> excesses --M$ certainly qualifies for the remedies far
> more than John D. Rockefeller's Standard Oil did in 1908.
That is B$, i.e. pork barelled gold plated bullshit! Standard Oil story was simply some
businessmen whoring to politicians whoring to businessmen. But what a price did we pay for
that!
The Sherman Act is simply another appropriation of market by physical force, made morally
acceptable by legislating it.
When a country legalize the use of force for profits, their citizens will suffer the
consequences sooner or later.
Ciao
jfa
Jean-Francois Avon, Montreal QC Canada
"One of theses centuries, the brutes, private or public, who believe
that they can rule their betters by force, will learn the lesson of
what happens when brute force encounters mind and force."
- Ragnar Danneskjold
PGP key at: http://bs.mit.edu:8001/pks-toplev.html
ID# C58ADD0D : 529645E8205A8A5E F87CC86FAEFEF891
From StanSqncrs at aol.com Mon Jun 29 08:17:54 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Mon, 29 Jun 1998 08:17:54 -0700 (PDT)
Subject: Premail (and Replay)
Message-ID: <51a3bf4e.3597affc@aol.com>
In a message dated 6/29/98 6:31:46 AM Central Daylight Time, nobody at REPLAY.COM
writes:
<< Anonymous #49812 wrote:
> On 28 Jun 1998, Secret Squirrel wrote:
>
> > Also, remailer at replay.com appears to have been deleted. The 'remailer'
> > user is unknown.
>
> That's correct. I don't know what happened.
Oh, really? >>
ROFLOL!
Stan
From hrook at exchange.microsoft.com Mon Jun 29 10:39:33 1998
From: hrook at exchange.microsoft.com (Harvey Rook (Exchange))
Date: Mon, 29 Jun 1998 10:39:33 -0700 (PDT)
Subject: saving the world from a cancerous monopoly
Message-ID: <2FBF98FC7852CF11912A00000000000108A78AC5@DINO>
From: attila [mailto:attila at hun.org]
> 1. M$' base operating system must be fully defined; eg-
> the API interface must be made available to all. if
> the API is not a moving target, emulators can be
> written enabling native WinTel s/w to run correctly
> on other platforms (unix variants, OS/2, beos, apple,
> etc). the increasing CPU "horsepower" makes this
> approach at least feasible.
>
How do you plan on accomplishing this? The courts have said that they will
not design computers. Since freezing an API is tantamount to computer
design, this isn't going to happen any time soon.
More generlly, API's only freeze when the system is dead. Windows has, for
better or for worse, many years of life left in it. This means one way or
the other, MS will extend Windows as it needs. For them, freezing Windows
would be killing one of their cash cows.
> 2. M$ must be required to port it's major products to
> other operating systems; it is worth noting that
> freeBSD, for instance, will run native binaries from
> Linux and SCO variants which simplifies on set.
This is also very difficult to implement. How do you choose what OS/s to
port to? If MS can't expect to earn a profit from the port, then MS is
dumping software, which is not legal. Why choose x86 UNIX's (less than 10
million users) Why not MVS (more than 20 million users)?
Attila, I think you're jealous, and confused by MS's success. You don't
understand why someone would choose Windows (NT or 98) when OS's are
available that have a better core. And you desperatly want to change that.
Some terrible truths...
#1 Only MS, and Apple know how to make and OS that the mass market wants.
Apple unfortunatly doesn't know how to make hardware that the mass market
wants.
#2 If people made decisions rationally, advertisements would consist of
nothing but readings from Consumer Reports.
#3 The typical computer user is getting less, not more intelligent. If an
x86 unix is to gain mass market popularity, it must become vastly more
usable. Most people don't know and don't care about the internals of the OS.
They don't want to think about it. They just want their documents and games
to be there when they click on them, and they want to surf the internet. Not
that Windows is perfect for usability, but it's a hell of a lot better than
UNIX.
But enough of this... this is cypherpunks, not alt.bash.microsoft.
Take a peek at my email address if you want to see my bias.
ob cypher... I've got a validated C++ implementation of RC-6 email me if
you'd like a copy of the source.
Harv.
From CTIA_Daily_News at tour.unitymail.com Mon Jun 29 11:17:20 1998
From: CTIA_Daily_News at tour.unitymail.com (CTIA Daily News)
Date: Mon, 29 Jun 1998 11:17:20 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - June 29, 1998
Message-ID: <199806291808.NAA00067@revnet4.revnet.com>
=============================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM. Please click on the icon / attachment
for the most important news in wireless communications today.
CALEA Summit being held July 21 & 22 in Washington, DC.
Register Now!! Call (202) 785-0081
=============================================
From bill.stewart at pobox.com Mon Jun 29 11:20:37 1998
From: bill.stewart at pobox.com (bill.stewart at pobox.com)
Date: Mon, 29 Jun 1998 11:20:37 -0700 (PDT)
Subject: saving the world from a cancerous monopoly
In-Reply-To:
Message-ID: <3.0.5.32.19980629095745.009bbae0@popd.ix.netcom.com>
At 11:31 AM 6/29/98 +0000, attila wrote:
> there is only one _sane_ course of action against M$:
> divestiture --before Gates becomes the Hydra. [...]
> the real issue is not the 90% of the OS market, it is the
> 95% (expected to grow to 98% before 2000) of the office s/w.
> the office software, available _only_ on M$ platforms
> creates a self-perpetuating juggernaut: no other OS can
> even begin to make market penetraton without the key
> product (office s/w) --and people are not willing to
> learn a new application-- that's just human nature.
Attlia - you'd probably enjoy reading
"Barbarians Led By Bill Gates",
a recent book by some MS ex-insiders on how MS became what it is.
Windows 3.0, for instance, wasn't supposed to muscle out OS/2,
but the developers of Word/Excel/Powerpoint (which they originally
wrote for the Macintosh) got better development/porting support
from the small group of developers on the low-status backwater
leftover Windoze team than from the high-profile IBM OS/2 partnership,
and Win3.0 was ready to ship when they were, unlike the upcoming
insanely great next version of OS/2. When it sold a million copies
in a few months, Gates had to deal with it, and suddenly Windows
became a strategic product again, and gradually OS/2 became the leftover.
> is using his cash cow, swollen by gouging the consumer, to
Gates has only gouged consumers by selling us crap which we buy,
either because we need compatibility with other users of their products,
or because we work for big companies who have centralized decision-
making droids who buy it.
Better than Gates tells my corporate droids what to buy than Janet Reno,
Louis Freeh, or FCCmeister Kennard. Not only do they have even less taste,
but they'd solve the problem by taking a long time to do the spec,
which wouldn't have enough details to interoperate with anything except the
National Information Infrastructure Data Entry Escrow Protocol.
Personally, I disliked WordPerfect immensely
(though I last used it back when it and MSWord were character-based),
and Word has acquired enough features to be about as flaky and
unpredictable as WP was back then. Excel is friendly, and I don't use s
preadsheets enough to prefer something else. Powerpoint reeks,
and the integration between Word and Powerpoint reeks badly.
> acquire _significant_ interests in industries which use
> computers: cable networks, cellular networks, satellite
> networks, etc. and related industries dependent on
> communications: news (MSNBC), television, productions,
Good for him - would you rather he spent the money acquiring
other parts of the software industry or Seattle real estate?
He also spent a pile of money trying to outflank the Internet with MSN,
and lost badly. Are you still running Microsoft BoB?
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From waters at ultimateprivacy.com Mon Jun 29 11:36:54 1998
From: waters at ultimateprivacy.com (Bryan Waters)
Date: Mon, 29 Jun 1998 11:36:54 -0700 (PDT)
Subject: Finally... a One-Time-Pad implementation that works!!!
In-Reply-To:
Message-ID: <199806291836.OAA02926@omniwork.com>
At 05:49 PM 6/27/98 -0400, Geoffrey C. Grabow wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>TriStrata has announced that is has a product that provides OTP without the
>pad distribution problem. The product also has a unique key-recovery
>system. Check out:
>
>
>http://www.tristrata.com
>
>for details.
>
I wish there were more details. Namely how they generate their 10^30 byte
"virtual keystream".
In order to be a true one-time pad the keystream needs to be completely
random, this looks more like a psuedo-random stream cypher to me. But it
should be fast and still might be secure.
As a competing one-time pad vendor I don't want to be a pot calling the
kettle black, but If I've learned anything from the cypherpunks, it's prove
it. Which is what we've tried to do.
Bryan Waters http://www.ultimateprivacy.com
Director of Marketing Voice: 512-305-0505 Fax: 512-305-0506
Ultimate Privacy Corporation 3925 W Braker Ln #305, Austin, TX, 78759
From lreed at west.cscwc.pima.edu Mon Jun 29 11:55:25 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Mon, 29 Jun 1998 11:55:25 -0700 (PDT)
Subject: Dina Moe Hmmm... - SPACE ALIENS HIDE MYDR
Message-ID: <009C86DD.7C367360.5@west.cscwc.pima.edu>
Dina Moe Hmmm... - SPACE ALIENS HIDE M DRUGS!!!
____________________________________________
>Return To Sender: ElvisImpersonatorChainsawMassacre at mccullagh.stihl
>Return Of Server: MX%RodLaver at west.cscw.pima.edu
>Date: Fri 13(*2) June 1998 ; 7:09 am/pm
>Subject: Hmmmm...
>
>"So what prompted you to start writing those missives to cypherpunks?"
>
>Rectum McCullagh-Caulkin
>(aka Tim C. May, Sir Stan Sequin, Joicho Ito-Dogs, No Body,
> AnEnvelopeManufacturerToBeNamedLater, Nanny Anna Mess, etc.)
On the advice of my lawyers:
GoDoG & DoGoD,
Attorneys At Law & Lawlessness,
Alpha & Omego Building, Suite 16,
Nymphomani aks, N 010101
I have decided to tell the Truth, the Whole Truth, and also a
variety of Half-Truths, leaving it up to the responedent to
decide what level of truth HeOrShe can deal with without
becoming despondent, thus putting even more of a burden on
the American R&D Department's booth at Juxtaposition '98 in
their competition with the Japanese L&R Juxtaposition '98
Booth, widely rumored to have been behind the Abraham Lincoln
assassination.
In other words, your chances of getting a 'straight' answer are
comparable to the lengthy discussions in regard to the 'dick'
of a President whose name isn't even Richard, in the first place.
In defense of my rudimentary rudeness in replying ridiculously to
a perfectly reasonable and seemingly serious question, I must admit
that my intentions to provide an equally serious response to the
question above were thwarted by the intervention of a HigherPower-
CapableOfSquaringTheShitOutOfJason, in a process providing pretty
persuasive proof that the CranialConsipiracyCrapola I am about
to provide for your non-racist, but nevertheless discriminating,
mind, is nothing more nor less than as honest and direct anwer to
your question as I am capable of giving, given the grandoise nature
of the nature of the claim I am about to stake claim to, not as a
Wooden Indian nor a Vampire, but simply one who is driven by Forces
of Light and Darkness that are not only beyond my Ken to understand,
but also beyond the Barbie Wired to the MeatSpace Manifestation of
the magazine which was ultimately responsible for my ultimately
sending my intimate informational infatuations with CypherPunks
Issues, whether digital or organic, to the Disturbed Male LISP.
In short, it is those depraved motherfuckers at Wired Magazine who
must ultimately be held responsible for my continued spamming of
a SingleInnocentCypherPunk (TCM-aka Bill Helm-RadiationMan III,
Forever Hettinga, Politician Lefty Frissel, ChevyBlazer FloorMatt,
and Peter SonOfTheSumOfOneAndTuTuBeNamedLater.)
The True Story (TM) of why I originally subscribed to the
CPUNX Cardinal & Ms. Spelling LISP has been confirmed by the
Nine UnKnowing to be the result of a subconscious desire to
destroy the Band of Mary Anarchists by forcing them to band
together, forming a well-organized and tightly-knit political
organization dedicated to eliminating me from both DigitalSpace
and MeatSpace. In draw-string shorts, to yank the CPUNKS
cotton chains and expose their private parts in a manner that
would leave no doubt about the fact that the Magic Circle of
WhiteLipstick around all of the 'members' provides postive
proof of the accuracy of Dr. Dimitri Vulis, KOTM's contention
that Nun of the CypherPunks were born female, and that they
are not, in fact, Anarchists, but merely LostBoys from Lost
Alamo who are alone in the world because they cannot accept
the diagnosis of Dr. Stephan Goodman, who theorizes that
they are "men who love men, every now and then," to whom the
phrase, 'blow it out your ass', has more meaning than it does
for most people.
[Spin Editor: What the Author *meant* to say, is that, as a
result of being the subject of Direct Electrical Shock Radio
Experiments during his youth, he soon learned that, unless
others in the room were gathered around the radio, the
correct answer to the question, "Do you hear Voices?" is
an emphatic "Nope! Not me...nosiree, Bob. Nope...not me!"]
What the Spin Editor *meant* to say, is that my early
exposure to the True Agenda (TM) of the MindPolice left
little doubt in my mind (little of practically *anything*,
actually) that one's career as a TruthMonger would allow
them to keep their head longer with a 'CourtJester at dev.null'
alias, than as "AnneBolyne at head.null', particularly if the
name of the person saying "I'd just like to ask you a few
questions." is OffWithSir Head, or who holds a position
titled 'Head Doctor' in a non-medical surgical facility.
To make a short story long, with a bend in the middle, Dog
spoke to me in a Stream piped through the fillings in my
teeth, and told me that there was one who would come before
me, to prepare my way, who would be a 'voice lying in the
wilderness', telling the masses, "I am a messenger for one
who will come after me, who is (a) greater (bullshitter) than
I, sent by Dog to sniff the rear parts of the front-men posing
as wolves, in wolves clothing, who say 'What big teeth I have...
the better to make you render unto Ceasar, that which you
mistakenly thought was yours."
Long before the Starr appeared over DC, I knew that the Virgin
Birth of William Lewinski would never have taken place if there
had not been no room for burning the double-negatives in the
Ovulate Office which told the True Story (TM) of what had taken
place in the Lincoln bedroom as a result of a sexual Jones that
the King of the Juice could not satisfy, no matter how large
a vein he punctured in women, or vice versa, with his dirty
needle.
Upon purchasing a copy of the Wired Magazine edition which had
the Jasons of CypherSpace on the front cover, with an article
accompanying it which I did not bother to read, instinctively
knowing that their Goal was to XOR the Net, so that after
Jesus Saves, Louis Freeh would not be able to put in the
rebound, yanking a man's parole as a result of Space Alien FUD
indicating he had participated in the VirtualNuclearBombing
of pubic buildings eleven KILLometers from MongerItaVille.
Knowing that, even though "Ignorance is no excuse." in the 'ayes'
of a Rigged Justice System, it is better to remain silent than to
speak up and remove all doubt as to one's guilt, I merely glanced
through the copy of Wired sufficiently to confirm the Marshall
Dillon theory that smoking guns doesn't kill people, the
Message kills people, or, more accurately, that the Department
of Justice people covering up the INSLAW affair killed those on
the List of Adrian Messenger, and then put the magazine away
in DeepThroatStorage until Dog, the only Horse I ever bet on
(although I have shot a lot of Horse over the years, sometimes
on the basketball court, sometimes in a seedy alley behind the
GreyHound Computer Buss Station), gave me a No Smoking Gun sign,
with the election of a Wise Man who rose from the dead three
times, as LazerAss Long (cousin of Johnny Wadd), drinking cold
HeinleinKin, playing the SexAPhone at $4.99/minute, running up
the WhiteHouse phone bill and the Federal Deficit, and making
such outstanding use of BlatantLies that his Pole rose in the
Polls at a rate that astounded even Poles named Lewinski,
leading me to realize that, had I, like Marlo Branded, the
Rifleman on the grassy knoll, despite my reputation as a
traitorous, lying coward, followed my instincts and run for
President of the United States of America, "I could'a been
a contend'a..."
My point, if I may be so Bold (although without Italics, having
never been to Sicily) to state it plainly (without extra cheese),
is that Lucky Green is a fucking idiot...
He is such an ignorant, Robotically Programmed Sheeple,
incapable of free, independent thought, that the only possible
way to accurately impress upon you his total devoidness (coming
soon to a dictionary near you) of hope in ever truly understanding
the concepts of True Freedom, Liberty and the Pursuit of Felony
Happiness, can be illustrated only by sharing with you the
"True Story (TM) of TruthMangler", Penguin Books, FrostBack
Division.
'The True Story of the InterNet' when stripped of all of the
grandoise, pretentious, mystical FUD surrounding its artificial
dissemination across HyperSpace, can be summarized by quoting
"All My Lies Are True", by Carroll.
"All my lies are true.
And everything I do, I really am."
Believe it or not, Ripley, that's all there is... That's the
whole fucking poem. In the end, that's all there really is
to say.
Upon receiving an email from AnInterViewerToBeNamedLater, who
was named earlier, in the 'BumBoy III' chapter of Space Aliens
Hide My Drugs (which, correctly, should also have single quotes
around the title), I was quite prepared to write a short, simple
response to the question, "So what prompted you to start writing
those missives to cypherpunks?"
As always, the fillings in my teeth convinced Reality to become
a participant in an Intervention program designed to thwart my
efforts to continue the heavy drug-use enabling me to be 'normal'
and 'saved' me from sanity by using the TV program, '60 Minutes',
to embody The Voice (TM) coming from the BurningBush, calling
for a "New World Order", reminding me that the BurningBush in
the bunker outside of Berlin was a clever ruse, later to become
a 'play on words' in a Braun Shaver advertising campaign that
referred to a 'close shave', to disguise the fact that it is
the AdamAntartic that holds the key to FrostBack Musicians
embedding hints in their music in regard to the Reptilian
Nazis biding their time, emerging from Florida puddles to
dine on the gonads of FrenchConnection Poodles, leading me to
realize that I forgot to mention how my insanity illustrates
Lucky Green's ignorance.
(But, before I return to that subject, I should take the time
to explain that this disjointed '60 Minutes' diatribe refers
to the fact that my efforts at a 'direct reply' to D.M. Stihl's
question was interrupted by a sychronicitious eruption from
The Tube ("Watch me and I'll bleed you, 'Cause you eat the
shit I feed you") during which Leslie Stahl (not to be confused
with the chainsaw with a similar name), presented a piece called
'The Rumor Mill', in which she ignored the attempts of InterNet
Magazine's Edwin Cantor (?) to explain that the Freedom Of The
InterNet was a Healing Force capable of returning HumanKind to
a Wholistic State wherein we use our minds to discriminate
between FUD (Fear/Uncertainty/Disinformation), MUD (Mind/
Uniformity/Disinformation) and CRUD (Conscious Realists
Using Discrimination), thereby forcing the InterNet User/
Consumer to actually Think (TM) before accepting any of
the information that is pulled, prodded or pushed into the
range of their perceptive attention...
Hang on a second, I lost my train of thought...
Oh, yeah! Anyway, Leslie Stahl, desperately attempting to
maintain the illusion that MainStream Lies piped through
the OfficialNewsStream are preferable to Non-Officially-
Recognized-Lies on J. Orlin Grabbe's 'World's 50 Greatest
Conspiracies' website, subliminally inserted the bent logic
of the pricks in DC, using words such as Junk/Regulation/
OnLinePoliceMan(no mention of toilet plungers...go figure)/
BadInformation...
Fuck completing that train of thought! 'BadInformation' implies
that the Freedom To Choose To Believe BadInformation does not
exist, and that NetiZens, like CitiZens, are all Sheeple who
need the people from the government, who are here to help us,
to step in and regulate/legislate which BadInformation will be
magically transformed into Reality by blessing it with the
OfficalSealOfApproval.
Random Thought That MayOrMayNot Apply #27:
Question: "Who was not happy to see the Prodigal Son return?"
Answer: "The fatted calf."
My point is this: "Penned cattle have been found to gain as
much weight when fed a combination of drugs, shredded newspaper
and animal excrement, as when fed whole grains."
Therefore, it is not in the best interests of the ProfitMongers
to feed us the Truth, and, CitiZen or NetiZen, it is in our own
best interest, when we meet the Bubba on the road, to kill him.)
[Idioter's Note: Good prosecutors, recognizing the limited
attention span of the spawn of pawns of modern civilization,
due to being force-fed ten-second sound-bytes, and hyphenated
words designed to evoke emotive responses rather than logical
thought processes, would have long ago begged the Court Of
Public Opinion for a short recess, in order to allow the
Readers/Jurors time to grab a bite to eat, suck down a cold
beer or two, and engage in sexual fantasies about their
fellow jurors.
However, the Author plans to proceed, uninterrupted, even
though HeOrShe risks once again letting the SAHMD manuscript
fall into semi-coherent mad ramblings, since HeOrShe realizes
that, if the Reader has not yet learned to order Pizza, Beer,
and AMasseuseToBeMaimedLater before undertaking the burdensome
task of reading the True Story manuscripts, then they are most
likely a goddamn Republican, anyway, with little hope of ever
truly understanding a missive meant to manipulate their mind
toward a realistic, non-discriminatory political point of view
which can only be understood by Democrats who are willing to
sit in the back of the bus with niggers and spics, although
they inevitably shit their pants and jump back on the bus
if one of those thieving fucking darkies happens to get off
at the same stop as they do.*
*This racist interlude is a paid advertisement, sponsered by
Democratic Friends of the Kluless Klux Klan.
Anyway, I have forgotten where this aside was going, but I
just remembered I was attempting to get back to explaining
how my derision of Lucky Green is, in reality, a veiled
reference to my own idiocy, so I will do that...]
I was devestated when Lucky Green, wearing a Prozac T-Shirt,
while I, on the other hand, had a pocket full of Prozac, told
me, "I read 'The Xenix Chainsaw Massacre', but I didn't
understand what it was about."
I was devastated as a result of realizing that Lucky was nothing
more nor less than a mindless, robotic result of the *new*
generation of programmed, robotic Sheeple. I was devastated
because Lucky was a reminder that, despite my great pretensions
of being an anarchistic, free, individual, capable of independent
thought, I was just as guilty of unthinking automatism, with the
main difference between myself and Lucky being that the programming
I had bought into had tailfins and cruise control, instead of
point-and-click and multimedia capability.
In effect, although I considered myself some exemplary example
of the evolution of mankind (usually remembering to refer to
'humankind' to illustrate my UniSexual/NonRacist/Politically
Correct rEvolutionAiryFairy development), I was actually a
fraud--not a TruthMonger, but a JokeMonger.
While allowing myself the luxury of consternation over Lucky
Green being of a GenerationX which could not recognize the
prophetic warnings contained in 'The Xenix Chainsaw Massacre',
due to having been educated in an era where the 'BB/BB' tattoo
on a child's forehead, indicating that one was a BumBoy owned
by BigBrother (replacing childhood circumcision indicating that
a child was owned by the GodOfMoses), I nonetheless comforted
myself with the thought that *my* cowardly acceptance of 'the
way things are', illustrated by using my sense of ironic humor
to poke fun at things I knew to be insane, instead of taking
a firm, serious stand that ultimately results in crucifixion,
in Palestine, or to being barbequed, in Texas (see...there I
go again), was somehow superior to the cowardice of Lucky's
generation, which gives Non-Sexual LipService to freedom,
privacy and anarchy, while preparing for an old-age where
they will undoubtedly justify their lack of total committment
to fighting the GreatEvil of their time by saying, "es, but
when the Computer was Fuhrer, the trains ran on time...until
the year 2000, of course."
I, like Lucky and the rest of the CypherPunks, told myself
that the problem was Dimitri, always trying to push Black
Unicorn's envelope, and not accepting my excuse that I wasn't
really a cocksucker, but merely accepting of the fact that
BigBrother had a lot of mouths to feed...
[I know that I've rambled on too long to really hold the
attention of a generation that traded in twenty-minute
guitar solos for a Pentium processor, and really don't
have time to wait for me to get to the point of what
I am trying to say (despite their refusal to admit that
the only reason they need a Pentium processor, in the
first place, is to speed up the downloading of the ads
on the Anti-SPAM Anarchist WebPage they are accessing,
not to mention the mountains of excess commas contained
in the 'True Story' manuscripts...).
However, I need to run to the Liquor Store, giving the
soft-drug old farts on the CPUNKS list a chance to "smoke
'em if you got 'em," (<--correct punctuation, will wonders
never cease?) and the young pissants on the CPUNX list a
chance to throw on a New Crusty Nostrils CD, 'Ramblin',
featuring 'Green, Green', (<--incorrect punctuation)
little realizing that the USENET post referring to the
album as the product of a CypherPunks Action Project first
appeared on April 1st, and that Lucky wasn't even born when
it was recorded.
BAD NEWS!!! - I'll be back...]
From caj at math.niu.edu Mon Jun 29 13:35:07 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Mon, 29 Jun 1998 13:35:07 -0700 (PDT)
Subject: Finally... a One-Time-Pad implementation that works!!!
In-Reply-To: <199806291836.OAA02926@omniwork.com>
Message-ID:
On Mon, 29 Jun 1998, Bryan Waters wrote:
> >TriStrata has announced that is has a product that provides OTP without the
> >pad distribution problem. The product also has a unique key-recovery
> >system. Check out:
No pad distribution problem, but it has a key-recovery system,
AND the pad is truly random?
> >http://www.tristrata.com
> >
> >for details.
This must be a typo: that URL doesn't contain any details.
> I wish there were more details. Namely how they generate their 10^30 byte
> "virtual keystream".
Which brings up one more point: the web page mentions the
estimated time it takes to "defeat" an encrypted message,
via brute force. If it really was a one-time pad, it
wouldn't be possible to "defeat" it by brute-force.
-Caj
From sunder at brainlink.com Mon Jun 29 13:58:20 1998
From: sunder at brainlink.com (Ray Arachelian)
Date: Mon, 29 Jun 1998 13:58:20 -0700 (PDT)
Subject: Finally... a One-Time-Pad implementation that works!!!
In-Reply-To:
Message-ID: <3597FEA9.19A7D5D3@brainlink.com>
Great... more snake oil.... :(
Geoffrey C. Grabow wrote:
>
> -----BEGIN PGP SIGNED MESSAGE-----
>
> TriStrata has announced that is has a product that provides OTP without the
> pad distribution problem. The product also has a unique key-recovery
> system. Check out:
>
> http://www.tristrata.com
>
> for details.
>
> ****************************************************************************
> *************
> PGP 5.5.3 Fingerprint: 15B3 DDC1 93BB 4BDF 4DFD 1B27 12A1 E0C4
> ****************************************************************************
> *************
>
> -----BEGIN PGP SIGNATURE-----
> Version: PGPfreeware 5.5.3i for non-commercial use
>
> iQEVAwUBNZVo5dc2wHb8nZI1AQFqngf/bCJVbMQX/5sYb181CLONmqWjPzhQ66Ef
> HoyPqxRzEyq4FSWnIuQODH/YTeyyQROUqCZGhC19v8PCiZpI1ynSvn4i+Zcjv9I0
> OZBThzKayNoMne7TkNr49Ah9BwDK6XuwS9bns1xM65zfKLpvKP2gboWkADD52K4w
> eUuJx/cTaR7PgdO/q6nrVRNq1jlaJsFBKGt2q5E1S12ZK1nA+mpKAS95XMgr2IMx
> 5/wJ+jsOIUTn2gWR64nhluOgmcACeIVsiRlsGqfUdL8gJHAl0gaQ7E1+HSOBx60K
> Ur5x5MzQKBKlWcoDaEXB1AsICW2enwdGVOxPBklq1CbcQxFXdBj1DQ==
> =vZmi
> -----END PGP SIGNATURE-----
--
=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run |\/|\/
../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were.... |.....
======================= http://www.sundernet.com ==========================
From lreed at west.cscwc.pima.edu Mon Jun 29 19:13:58 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Mon, 29 Jun 1998 19:13:58 -0700 (PDT)
Subject: Diana Moe Hmmm... - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C871A.C38D9E40.5@west.cscwc.pima.edu>
Return Of Beyond The Planet Of The Valley Of
Diana Moe Hmmm... - SPACE ALIENS, ETC., ETC.
____________________________________________
No doubt there are a variety of self-impressed, elitist
CypherPunks who have grown used to my weird capitalization
of the word 'cypherpunks', as well as my excess use of
commas, and incorrect punctuation, having come to recognize
that these things are part of my personal 'writing style'
(although few realize that, being too lazy to look up
proper spelling, and too ignorant to understand the reasons
behind 'correct' punctuation, I am merely cloaking my sloth
and stupidity under a croak of eccentric Oriental genius).
However, there are undoubtedly a few egoistical self-proclaimed
geniuses on the CypherPunks Disturbed Male LISP who have noticed
the 'Dina' spelling of the last chapter title being out-of-sync
with the 'Diana' spelling of the current chapter title (see
above), and mentally ridiuculed me as really being the sorry
drunk I keep claiming to be, thinking that I am only dimly
aware of the difference between my drunk&ignorant-but-honest
typos and literary mistakes, and the typos and mistakes which
I quickly recognize to have deep meaning, and are therefore
inviolate proofs of my true inner genius, in need of no
correction, even if I happen to spot the error.
If you noticed the discrepancy mentioned above, and were
indeed mentally degrading my literary talent, while considering
yourself to be superior to me because of your ability to
imitate a robotic computer spell-checking program, you would,
in this case, be quite correct in your assumption, since it
was really a meaninless mistake, but one I will not bother
to rectify, since I am currently both lazy and drunk.
However, you smart-ass sons-of-bitches, it would be a serious
mistake to fail to realize that my failings in character in no
way negate my obvious intellectual superiority over all of the
pretentious fools who consider themselves part of an elite
group of PseudoMathematicalGeniusAnarchists because of their
participation in Legendary LevelWithTheGround InterNet
Community MailingList Composed Of Subscribers Who Are Using
11% Of Their Potential BrainPower, and considering themselves
to be 'above' the other InterNet Elitists who are using only
the 'documented average' 10% of their potential brainpower,
and who, in turn, consider themselves to be superior to the
AOL'ers who believe that their IQ is somehow related to the
speed of their computer's processor (NOT!!!).
The short and simple answer to the question, ""So what
prompted you to start writing those missives to cypherpunks?"
is: "On a mailing list of elitist geniuses using only 11% of
their potential brainpower, the person using 12% is King!"
Thus I am able to toy with you silly fools, having little
fear of someone who uses 13% of their brainpower subscribing
to the CypherPunks list, and putting me in my place, since a
person capable of using 13% of their brain would likely be
above joining the list in the first place...
Why I Send My Missives To The CypherPunks List #327:
I truly recognize the past, current and future subscribers
to InterNet forums/experiences such as the CypherPunks to be
the only real hope for a world of VirtualReality to rise above
and go beyond the vicious MeatSpaceRealityCycles which are
evident throughout millennia of human history.
Thus, I feel it incumbent upon myself, as your intellectual
superior, to impress upon you what an ignorant, silly asshole
I am...
ou stupid fucks think I'm being silly, again, don't you?
I'm fucking serious!!!
While I truly consider myself to be the current epitome of
human evolution to this point in time, I would, nonetheless,
upon being recognized for my great wisdom and genius and
declared King Of The World, issue a press statement advising
everyone to kill themselves, since a world under my control
would be a scary thing, indeed.
As far as the world currently being under the control of
murderers and thieves who seem to have a lot of trouble
figuring out some of the more rudimentary things in life,
such as pulling up their fly upon entering the Offal Office,
I really prefer not to think about that, which I am sure
can be understood by voters in Boston, Chicago, ad infinitum,
who eventually figured out that the slogan, "Vote Early, Vote
Often" was not really a part of the original Constitution, as
their Ward Bosses had claimed.
The Original Peter Principle:
Civilization and Human Behavior provide hard evidence that
Creatures From The Primordial Swamp who crawled out to become
Middle Managers in the Gene Pool did so about a billion years
ahead of schedule.
The Original Clinton Inaugural Address:
"Most of my time, energy and money was spent on women, booze,
drugs and gambling--the rest I just wasted, eventually becoming
Governor, and then President."
The Original Commandment:
"Buy a fucking Clue!"
I guess that what I am really trying to say is, "As insane
as it would be for you to vote for me as the new King Of The
World / Ruler Of All That Exists / New World Order Dictator,
etc., etc., it would be even more insane for you to *not*
vote for me if I was running against the people currently in
control of our governments and society.
Why I Send My Missives To The CypherPunks List #18:
My only hope of being understood when I say, "I may be a
stupid fuck, but at least I'm not a stupid fuck." lies in
preaching to an audience that has the ability to understand
that ogi Berra's statement, "It's DejaVu all over again."
was nothing more nor less than A DirectMessageFromGod,
designed to serve as the Cole's Notes To Universal Human
History From The Beginning Of Time, in a format that would
allow us to write it on a slip of paper we could tuck into
the elastic of our panties, in preparation for the FinalExam.
True Initiates into the Mythical Circle of Eunuchs have long
understood that my obsession with peeking up women's skirts is
not the result of sexual depravity, but a highly spiritual
exercise in recognizing the difference between the masses of
Sheeple who truly benefit from the advice to wear clean
undergarments, in case they get hit by a bus, and those whose
unique, individual spark of life allows them to recognize that
they can step beyond society's strict moral programming by not
wearing any undergarments at all.
Although I am currently up to my ass in drunken alligators,
I am still capable of remembering that my original objective
was to drain the Scotch...
And The Way This Relates To Craptographics Is:
What is encryption, if not the epitome of the Anarchy Of
Meaning?
David Byrne, Largely Suited to serve as the Talking Head
who *could* be the originator of the Voice we hear, asking
us, "Psycho Killer, Qu'est Que C'est?", if we actually owned
a radio, understood that when Bob Dylan sang, "Johnny's in
the basement, mixing up the medicine...", it was an oblique
reference to Owsley developing a chemical technique to thwart
the MindPolice by using LSD to encrypt one's thought processes.
The Moody Blues, recognizing that the hippie movement arose
in response to Freedom and Privacy being threatened by a
GreyHound Restroom Public Key System that could be broken by
anyone with a dime, warned us that Timothy Leary, sick, depraved
pervert that he was, was 'outside, looking in', alerting us to
the fact that 'Free Shit' was nothing more than a corporate
advertising ploy by NewAge Gurus who wanted to save the cost
of a dime while buggering us, by telling us we may have won
'Free Film For Life.'
Phil Zimmerman, Hero Of The TellGovernmentToSitOnItAndRotate
Revolution, provided us with the tools we needed to have a
genuinely Free Shit in Pretty Good Privacy, enabling us to
lock the door while we crapped out our pearls of wisdom,
while the anal-retentive government agents on the other side
of the restroom-stall door dropped their dime, upon finding
out that the cost of peeking up the public's butt had risen
exhorbantly, due to those fucking California Hippie Trouble
Makers slipping 'acid' in their email.
The point that I probably would have made much earlier in
this chapter, were it not for the fact that I am a drunken,
inconsiderate asshole who fails to realize that *some* people
have better things to do than to waste their time wondering
where the fuck I get all of these goddamn commas, is this:
Anarchy is our only hope...
Surely anyone who has been paying attention to life around
them could not have failed to realize that if society elects
some bum going through the dumpster, to look for lunch, to an
official government position that designates him to be the
person responsible for removing doggie-doo from the city
streets (no salary, but all you can eat...), he soon declares
that he needs more money and a larger staff to do his job
properly, funds research indicating that dog owners are a
threat to Family Values, Apple Pie and the American Flag,
presses for Law&Order legislation adding Thirty-Five Dog
ears to the sentence of any Monger or Mongrel who is found
guilty of 'squatting' in commission of a poop, and calls for
the censorship of 'The Doggie Of Anne Frank' because of
its graphic descriptions of FIDO crapping in a secret room
in the attic, to avoid discovery by the DoggiePoop Gestapo.
If you think I'm being a WiseGuy, then think again, because,
if memory serves me correctly, this was the lead headline of
News Of The Weird last week, even though the original source
for the article was on page 4,385 of the New ork Times.
The first act of organized religion was to fuck up the Lord's
Prayer.
Anarchy is our only hope...
The first act of organized government was to raise taxes so
that they could give themselves a pay raise.
Anarchy is our only hope...
It is a knee-jerk reaction to bend over to pick up the soap
when somebody drops it, but it doesn't matter *who* fucks you,
it doesn't matter *how* they fuck you, *when* they fuck you,
or *why* they fuck you...the bottom line is this: If you remain
silent, ignoring the pain and indignity, listening to the still,
small voice of the Tao, you hear the Voice of Eternity echoing
from the birth of time to the death of the ten-thousand things,
whispering what was shouted by a great ogi, upon realizing that
the BigBang was actually a FistFucking KnuckleBall headed Hell
Bent For Leather (a California company) toward the Great Void
where the sun don't shine...you hear the Tao bend over and
whisper, "It's DejaVu, all over again."
Anarchy is our only hope...
Dr. Seuss Explains Sex To Children During His Prostrate Check:
After God created Adam, he took a bone out of Adam's side
and created Eve. The first thing Adam did was give Eve another
bone-from behind, as he wanted it to be a surprise.
If two people exist on the face of the planet, then, as surely
as night follows day, one of them is going to get fucked.
Anarchy is our only hope...
LIFE IN HELL Goes Country:
If you can see two assholes on a horse, without lifting its
tail, then it is a good bet that they are voting to steal your
money and your freedom.
Anarchy is our only hope...
We live in a world where, in a country in which starving
children are dying by the millions, the greatest threat to
those who manage to survive a FamineInTheMidstOfPlenty is
the ArmySurplusLandmine Company's 'Democracy' model, which
is guanteed to blow the limbs off of terrorists and freedom-
fighters, men, women and children, without discrimination as
to race, creed or color, although the guarantee clearly states
that it is not the responsibility of the manufacturer to see
that it serves the purpose for which it was originally
intended, according the color-glossy brochures distributed
by retired armed services officers now making the BigBucks as
DC corporate whores.
"The Democracy Model Landmine"
"Our most popular item, due to the billions of dollars in
advertising given to its name through the use of taxpayer
money being spent by unelected entities, both within and
outside of government circles, was built and designed by
highly qualified engineers and technicians to 'Save The
Life Of A Single Child.'
"As you can see from the pie-charts below, a computer
simulation showed that a minimum distribution of a
hundred units per square mile is sufficient to save
the life of a single child, providing that the child
is not so unfortunate as to accidentally step on a
landmine."
Anarchy is our only hope...
[GOVERNMENT REQUIRED NOTIFICATION:]
This chapter of 'Space Aliens Hide My Drugs'is a paid
advertisement for the Bienfait Nutly News "Anarchy Is
Our Only Hope' Christmas Special, available in boxes of
individually-wrapped 1's and 0's (in quantities of 8, 16,
32, 64...)
The perfect gift for grouchy old farts who still have the
box of Pecans you sent them last Christmas, because they
put their dentures in their shoes, and they can't find
their godamn shoes, and when they asked for help in a
post to the CypherPunks list, they got a hundred anonymous
emails from assholes telling them to, "Check the archives."
From cme at acm.org Mon Jun 29 21:20:05 1998
From: cme at acm.org (Carl Ellison)
Date: Mon, 29 Jun 1998 21:20:05 -0700 (PDT)
Subject: change of address
Message-ID: <3.0.3.32.19980630001829.04c56ee8@pop3.clark.net>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I am moving from CyberCash.
Until I get the new work account set up in a month or so, please replace
cme at cybercash.com
with
cme at acm.org
Thanks,
Carl
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.3
iQA/AwUBNZhnFJSWoQShp/waEQJYKwCeIDZe9E67VOL2fin2L2unLYJfhCQAnRfL
HFncaiI5a/n/rpBAEO2zgavF
=pU5t
-----END PGP SIGNATURE-----
+------------------------------------------------------------------+
|Carl M. Ellison cme at acm.org http://www.clark.net/pub/cme |
| PGP: 08FF BA05 599B 49D2 23C6 6FFD 36BA D342 |
+-Officer, officer, arrest that man. He's whistling a dirty song.--+
From netcenter-news at netscape.com Mon Jun 29 22:39:42 1998
From: netcenter-news at netscape.com (netcenter-news at netscape.com)
Date: Mon, 29 Jun 1998 22:39:42 -0700 (PDT)
Subject: Netcenter News - Volume 8 - July 1998
Message-ID: <199806300539.WAA26479@toad.com>
Title: Netscape Netcenter News - July 1998
Welcome to Netcenter
Netcenter is dedicated to the proposition that you should be able to find everything you need online in one place. This newsletter is one of the free benefits you receive for registering with a Netcenter program.
Employers! Job seekers! Post a job or resume, browse job listings, promote your company, or get career information easily with Netcenter's new Career Center.
A beta version of Netscape Communicator 4.5 will be available to the public in early July. This latest version of Communicator will include improvements such as Smart Browsing as well as enhanced messaging and roaming access.
A 1998 SPA Codie Award Winner, Netscape Publishing Suite is now just $49.95 ($129.95 value). Get MasterClips 33,000 or Net Accelerator for just $10 with purchase.
Netscape respects your online time and Internet privacy. If you would
prefer not to receive the monthly Netcenter News, please go to the Netscape
section of In-Box Direct and uncheck the Netcenter News
item. You may also, click here to send an unsubscribe email
or reply to this message with the word unsubscribe in the subject line.
Copyright � 1998.
Netscape Communications Corporation.
All rights reserved.
NETSCAPE
NETCENTER:
YOUR
SPRINGBOARD
TO
THE
INTERNET
Jump from here. That's the launch-point attitude at Netcenter's new Internet portal. Starting in July, Netcenter will incorporate 16 new business and consumer channels, along with a variety of new services. From downloading software upgrades automatically to sending flowers, Netcenter channels offer immediate access to goods, services, and a wealth of information.
Among the new services, Smart Browsing is designed to help you navigate the tricky waters of the Internet. With Internet Keywords, simply type a word such as "Ford" and blast to Ford's site. What's Related displays a list of dynamic links to related sites - great for online research or shopping. Netscape Search & Directory boosts your searches with a complete line-up of search engines in one location. Use My Netscape to design your "home on the web," a personalized home page that displays the information you use every day - news, stock quotes, sports, and more - the moment you log on. WebMail, Netcenter's free email service, allows you to respond to messages automatically and to integrate your organizer's address book with your email. Members can scan incoming attachments for viruses and even be paged when they receive high-priority messages.
Netscape Netcenter. Dive in - the water's fine.
SmartUpdate is expanding! Netscape has signed agreements with more than 20 leading software companies to make their products available, free of charge, for automatic download via the SmartUpdate service.
Netcenter members can SAVE $10 on all software at Netscape Software Depot by software.net. Limited time offer!
Join Member Directory and choose your Netcenter member name now - before the Netcenter 2.0 rush. Then, search for friends or new acquaintances.
Thanks to everyone who took part in last month's survey about online communities!
Here is what 2000 of you told us:
In general, newsgroups and instant messaging are more popular than chat.
Only 15 percent of you hadn't tried any kind of online community.
Of those who do visit communities, 44 percent go daily and 20 percent go several times
a day.
The thing you like most about your visits is the ability to see what other
people are thinking.
The most popular forum in Netcenter's Professional Connections is the Product
Center.
This month's survey is about customizing web pages. We invite you to tell us what you'd like to see in a personalized home page!
From cyp at cyp.dcl.com Mon Jun 29 22:54:58 1998
From: cyp at cyp.dcl.com (cyp at cyp.dcl.com)
Date: Mon, 29 Jun 1998 22:54:58 -0700 (PDT)
Subject: Info on Jim Bell
Message-ID: <435jfhdhfds3dcl.com>
Jim has been arrested again and he is in the Federal Detention Center
at Seattle. Jim wants people to write him at:
James Bell #26906086
Federal Detention Center
P.O. Box 68976
Seattle WA 98168
From m_harlow at villingandcompany.com Mon Jun 29 23:31:33 1998
From: m_harlow at villingandcompany.com (Matt Harlow)
Date: Mon, 29 Jun 1998 23:31:33 -0700 (PDT)
Subject: Marketing, Advertising & PR Forum
Message-ID: <001401bda318$509c3900$58062bd1@mattharlo.qtm.net>
I recently started a mailing list for the marketing, advertising and PR
industry. We've already got over 100 subscribers from all over the globe.
The conversation is really flowing now and we're ready to expand. So far
we've have touched on office politics, how to's, compensation and critiques
of national campaigns, job openings and a whole lot more. We'd love to have
you on board.
All you need to do to sign up is send an email to the address:
requests at mail.villing.net with the subject of:
SUBSCRIBE DIGEST MATT to receive the a daily digest or
SUBSCRIBE MATT to receive individual emails
Also, please do me a favor and copy me at M_harlow at villingandcompany.com if
you sign up. That way I know to add your name to the roster.
Hope to see you at the forum! We're getting some great exchanges and I'd
love to get you in on them.
Feel free to pass this message on to anyone you feel might be interested in
the group.
Sincerely,
Matt Harlow
P.S. If you're already signed up or if I've recruited you before, Sorry!
It's tough to recruit for a project like this and sometimes I get a name
twice in my efforts not to miss anyone.
Matt Harlow
Account Executive
Villing and Company
3900 Edison Lakes Parkway, Suite 100
Mishawaka, Indiana 46545
Work: Email: m_harlow at villingandcompany.com, Phone: 219-277-0215, Fax:
219-277-5513
Home: Email: mattharlo at qtm.net, Phone: 616-683-2599, Fax: 616-684-4765
From specialnews4u at usa.net Tue Jun 30 01:16:36 1998
From: specialnews4u at usa.net (specialnews4u at usa.net)
Date: Tue, 30 Jun 1998 01:16:36 -0700 (PDT)
Subject: PERSONAL NOTICE
Message-ID: <199806300816.BAA27797@toad.com>
HI. I APOLOGIZE FOR THIS INTRUSION ,
BUT YOU MAY THANK ME FOR THIS .
COULD YOU USE AN EXTRA $ 25,000 NEXT WEEK ?
THEN GIVE ME ONE MINUTE OF YOUR TIME...
IT MIGHT BE WORTH A MILLION DOLLARS
Dear Friend,
My name is David Ross and I need YOU.
Let me explain
I reside in an island paradise . I entertain on a 75 ft. yacht .
I travel the world by private lear jet .
I drive 8 cars including two Ferraris, a Rolls Royce Corniche
and a 1955 gull wing Mercedes worth over a million dollars.
I party with supermodels , world famous celebrities and diplomats.
Banks are constantly trying to lend me money at prime rates..
but I don't need them any more.
However, it wasn't always like this.
Until 1995 I was working for the telephone company .
I drove a 1989 Chrysler LeBaron and had over $50,000
in revolving debt.
It seemed that I would never get ahead and was doomed
to be a loser .
In my spare time I studied every money making system out there.
In fact , I often ordered 10 new money making systems a month.
I guess this is one of the main reasons I was so over extended
on my credit cards.
You could say that my single obsession was investigating profit systems .
Then , one day , I was doing research on grants at the library.
I accidentally discovered something that all the B.S.money making books
never mentioned This simple discovery brought in:
$1,876.89 FOR THREE HOURS WORK !
Over the next 5 weeks ,
I proved to myself that this method worked
time after time....EVERY TIME !
Then , at the beginning of the next month,
I opened my bank statement.
My jaw dropped opened to discover that there was
$ 265,832.91 IN MY CHECKING ACCOUNT !
I had discovered a secret program
that virtually forced people to give me money !
After a period of 11 incredibly exciting months ,
I discovered that I had made
$ 1,454,742.39
working about three hours per night from home.
All without spending a dime on office rent or employees,
and while keeping my current job.....
which I soon quit after many years
( to hell with the pension and benefits ) .
Then I made another exciting break through !
I thought,
" WOW.... ANYBODY COULD DO THIS..
IF THEY ONLY KNEW HOW ! "
This has lead me to an even faster and easier way
to get richer : WORKING WITH PEOPLE JUST LIKE YOU !
I am going to help a few others
DO EXACTLY THE SAME THINGS I HAVE DONE !
AND PROFIT RIGHT ALONG WITH YOU FROM
YOUR OWN POWERFUL RESULTS !
I've developed a comprehensive , easy to understand
PRIVATE REPORT . A complete
STEP BY STEP , FOOLPROOF BLUEPRINT
FOR YOUR VERY OWN PERSONAL CASH MACHINE
THE INSTANT CASH REPORT
is just like having a legal printing press to
MAKE SERIOUS MONEY ANYTIME YOU WANT !
SIMPLE INSTRUCTIONS WORK FROM HOME ,
OR ANYWHERE ELSE YOU WANT TO BE.
GUARANTEED
Are you skeptical ? I understand. So was I ..at first.
SO PLEASE ... DON'T TAKE MY WORD FOR IT.
SEE FOR YOURSELF
TEST IT OUT ABSOLUTELY RISK FREE !
In fact..you WILL be completely convinced that this system
WILL make you at least 10,000 times what you paid for the report
or I'll send you your money back..
NO QUESTIONS ASKED . EVEN ONE YEAR LATER .
GUARANTEED .
Frankly, I don't know why anybody would want to waste time
.....but I am that confident.
Take a full year to TEST THIS SYSTEM
and if you're not 100 % SATISFIED
during your one year NO RISK TRIAL...
I' LL SIMPLY REFUND EVERY PENNY TO YOU.
You just can't lose !
SHORT ON START UP CASH ? NOT A PROBLEM !
The administrative cost for personally registering
your Instant Cash Report to you is just $ 49.95
And you can put this program to work IMMEDIATELY .
Your profits should be rolling in WITHIN DAYS .
REMEBER... IF YOU WANT SOMETHING YOU'VE NEVER HAD..
YOU MUST DO SOMETHING YOU'VE NEVER DONE..
AND LETS FACE IT...THE TIME IS NOW .
BE AMONG THE FEW TO PROFIT
ON THIS AMAZING OPPORTUNITY
WHILE IT LASTS
I GUARANTEE YOU >
The Instant Cash report can be your ticket to
A NEW LIFE ..just like it was for me.
Obtain the kind of freedom and retirement
that you deserve .. Please..forget social security.
MAKE IT ALL NOW WORKING FROM HOME
JUST A FEW HOURS PER DAY !
But I urge you to act now..
New regulations may soon eliminate this opportunity forever ,
THEREFORE...TO INSURE MAXIMUM RESULTS
FOR MY PARTICIPANTS
I AM LIMITING THE DISTRIBUTION
OF THE INSTANT CASH REPORT TO THOSE
WHO WILL USE IT WISELY AND ARE SERIOUS
ABOUT ENDING THEIR FINACIAL CONCERNS .....FOR LIFE !
THIS OFFER WILL BE WITHDRAWN WITHOUT NOTICE.
RESPOND TODAY
SO NOW ..YOU DECIDE.
WHICH DO YOU PREFER ...
TO KEEP .WORKING HARD ? ..
OR START WORKING SMART !
HERE'S HOW TO GET STARTED WORKING SMART > >
Note: You must agree to remit 5 % of your gross revenues
from Instant Cash to my company.
You nust sign an agreement promising not to divulge
its contents to anybody else .
Because of the explosive nature of this program,
it is necessary to limit distribution .
In order to maximize the results for all participants.
This offer will soon be discontined without further notice .
I urge you to act now .
METHOD OF PAYMENT IS BY CHECK DRAFT FACSIMILE ONLY
1. MAKE OUT YOUR CHECK FOR $ 49.95 ( U.S ) TO :
ARIEL PUBLISHING GROUP
2. IN THE LOWER LEFT CORNER OF THE CHECK PRINT:
INSTANT CASH REPORT
( make sure you sign and date the check )
3. ATTACH YOUR CHECK TO A FAX COVER PAGE .
4. ON THE FAX COVER PAGE PRINT THE FOLLOWING :
ATTENTION DAVID. ROSS DEPT. IC441
PLEASE SEND ME THE INSTANT CASH REPORT.
I HEREBY AGREE NOT TO DIVULGE ANY PART OF ITS
CONTENTS TO THIRD PARTIES. I ALSO AGREE TO PAY
5 PER CENT OF THE PROFITS FROM INSTANT CASH TO :
ROSS ENTERPRISES INC.
NEXT.... SIGN YOUR NAME DIRECTLY UNDER THAT STATEMENT.
THEN ....CLEARLY PRINT: YOUR NAME ,
FULL MAILING ADDRESS ,ZIP/POSTAL CODE ,
YOUR PHONE NUMBER AND E-MAIL ADDRESS
( Sorry, no orders can be processed unless
the instructions above are followed exactly
Please do not respond to this note via e-mail
Due to the actions of anti - commercial e-mail
vandals , we do not maintain an e-mail responder )
4. FAX THIS MATERIAL TO :
( 01 ) 404 - 685 - 0905 ( for best results : dial then press "send" )
SHIPPED BY FIRST CLASS MAIL .
Ariel Publishing Group is not affiliated with Ross Enterprises
or any other entity. Ariel Publishing Group makes no claim or
warranty regarding the content , nature or intended use of this material .
Copyright 1998 Ariel Publishing Group Ltd. .
From gcg at ibm.net Mon Jun 29 10:17:17 1998
From: gcg at ibm.net (Geoffrey C. Grabow)
Date: Tue, 30 Jun 1998 01:17:17 +0800
Subject: Finally... a One-Time-Pad implementation that works!!!
Message-ID:
-----BEGIN PGP SIGNED MESSAGE-----
TriStrata has announced that is has a product that provides OTP without the
pad distribution problem. The product also has a unique key-recovery
system. Check out:
http://www.tristrata.com
for details.
****************************************************************************
*************
PGP 5.5.3 Fingerprint: 15B3 DDC1 93BB 4BDF 4DFD 1B27 12A1 E0C4
****************************************************************************
*************
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.5.3i for non-commercial use
iQEVAwUBNZVo5dc2wHb8nZI1AQFqngf/bCJVbMQX/5sYb181CLONmqWjPzhQ66Ef
HoyPqxRzEyq4FSWnIuQODH/YTeyyQROUqCZGhC19v8PCiZpI1ynSvn4i+Zcjv9I0
OZBThzKayNoMne7TkNr49Ah9BwDK6XuwS9bns1xM65zfKLpvKP2gboWkADD52K4w
eUuJx/cTaR7PgdO/q6nrVRNq1jlaJsFBKGt2q5E1S12ZK1nA+mpKAS95XMgr2IMx
5/wJ+jsOIUTn2gWR64nhluOgmcACeIVsiRlsGqfUdL8gJHAl0gaQ7E1+HSOBx60K
Ur5x5MzQKBKlWcoDaEXB1AsICW2enwdGVOxPBklq1CbcQxFXdBj1DQ==
=vZmi
-----END PGP SIGNATURE-----
From CTIA_Daily_News at tour.unitymail.com Tue Jun 30 10:07:23 1998
From: CTIA_Daily_News at tour.unitymail.com (CTIA Daily News)
Date: Tue, 30 Jun 1998 10:07:23 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - June 30, 1998
Message-ID: <199806301704.MAA30266@revnet4.revnet.com>
=============================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM. Please click on the icon / attachment
for the most important news in wireless communications today.
=============================================
From billp at nmol.com Tue Jun 30 11:52:45 1998
From: billp at nmol.com (bill payne)
Date: Tue, 30 Jun 1998 11:52:45 -0700 (PDT)
Subject: Settlement help, please
Message-ID: <359932F0.2232@nmol.com>
Senators
Please help get this mess settled.
Thanks
bill
Tuesday 6/30/98 12:03 PM
Mr. Thomas J. Schlageter, Assistant Legal Counsel
Advice and External Litigation Division
Office of Legal Counsel
1801 L. Street, Northwest, Room 6034
Washington, D.C. 20507
Dear Mr. Schlageter:
Purposes of this letter are to
1 seek administrative remedy of a release of false and defaming information on myself which violated Privacy
Act. Charles Burtner and Larry Trujillo of the U.S. Equal Employment Opportunity Commission's (EEOC)
Phoenix District Office unlawfully released the information.
2 Exhaust administrative remedies if we are not able to settle this matter.
3 Request information under the Freedom of Information and Privacy Acts.
On June 29 I received at letter from
Aletha L. Brown
Inspector General
U.S. Equal Employment Opportunity Commission
POB 18858
Washington, D.C. 20036-8858
202-663-4375
800-849-4230
dated June 25, 1998, OIG Control Number 981770 which said
This is to acknowledge receipt for your letter dated May 15, 1998, requesting Freedom of Information Act
(FOIA) and Privacy Act information. I apologize for the delay in responding to your request.
Your complaint regarding alleged Privacy Act violation and FOIA request was forwarded to the Office of
Legal Counsel on May 27, 1998. With regards to these matters, please contact:
Mr. Thomas J. Schlageter, Assistant
Legal Counsel
Advice and External Litigation Division
Office of Legal Counsel
1801 L. Street, Northwest, Room 6034
Washington, D,C, 20507
Mr. Payne, the OIG plans no investigative action regarding this matter. Thank you for contacting
this office.
Sincerely
[signature]
Aletha L. Brown
Inspector General
Attachment
Attachment reads
U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION
Washington, D.C 20507
May 27, 1998
MEMORANDUM
TO: Mr. Thomas J. Schlageter, Assistant Legal Counsel
Advice and External Litigation Division
[signature]
FROM Joyce T. Willoughby, Counsel
Office of the Inspector General
SUBJECT: Freedom of Information Act (FOIA) Request of William Payne
Attached is a Freedom of Information (FOIA) request from William Payne, which
was received by the Office of the Inspector General (OIG) on May 20, 1998. In an
effort to respond to this request, attached are copies of the OIG case file concerning Mr. Payne,
the Inspector General Act of 1978, as amended, and excerpts from the OIG Investigative Manual
and Deskbook.
If you have any question concerning this memorandum or need additional information you may
contact me at Extension 4397.
Attachments
While I hope we are able to settle the civil aspects of this unfortunate release of false and
defaming information on me, I must anticipate, however, that I will have to seek judicial
review.
Therefore, under 5 USC 552, the Freedom of Information Act, and 5 USC 552a, the Privacy Act, I request
access to copies
1 All documents describing YOUR efforts to properly investigate and settle this unlawful release of false and
defaming information about me.
2 All WRITTEN documents, including phone call message notes or another notes, containing the name of
William Payne, Bill Payne, etc. made between 3/18/98 and 6/30/98 by your or your staff.
If all or any part of this request is denied, please cite the specific exemption(s) which you think justifies your
refusal to release the information and inform me of your agency's administrative appeal procedures available to
me under the law.
I would appreciate your handling this request as quickly as possible, and I look forward to hearing from you
within 20 working days, as the law stipulates.
This letter resembles one I sent to Ms. Varygas of your office on 6/29. I append the Varyas letter to
this letter for your information.
Mr. Schlageter, I hope this unfortunate matter can be resolved at the administrative
level at EEOC. And I ask your help.
Sincerely,
William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
505 292 7037 <- I am not reading e-mail
Distribution
Tom Spellman
Aletha L. Brown
Senate Judiciary Committee http://www.senate.gov/committee/judiciary.html
Republicans
Orrin G. Hatch, Utah, Chairman senator_hatch at Hatch.senate.gov
Strom Thurmond, South Carolina senator at thurmond.senate.gov
Charles E. Grassley, Iowa chuck_grassley at grassley.senate.gov
Arlen Specter, Pennsylvania senator_specter at specter.senate.gov
Fred Thompson, Tennessee senator_thompson at thompson.senate.gov
Jon Kyl, Arizona info at kyl.senate.gov
Mike DeWine, Ohio senator_dewine at dewine.senate.gov
John Ashcroft, Missouri john_ashcroft at ashcroft.senate.gov
Spencer Abraham, Michigan michigan at abraham.senate.gov
Jeff Sessions, Alabama
Democrats
Patrick J. Leahy, Vermont senator_leahy at leahy.senate.gov
Edward M. Kennedy, Massachusetts senator at kennedy.senate.gov
Joseph R.Biden, Jr., Delaware senator at biden.senate.gov
Herb Kohl, Wisconsin senator_kohl at kohl.senate.gov
Dianne Feinstein, California senator at feinstein.senate.gov
Russell D. Feingold, Wisconsin russell_feingold at feingold.senate.gov
Richard Durbin, Illinois dick at durbin.senate.gov
Robert Torricelli, New Jersey senator at torricelli.senate.gov
/\/\/\
append
-----
Monday 6/29/98 11:59 AM
Ms. Ellen J. Varygas, Legal Counsel
Office of Legal Counsel
1801 L. Street, Northwest, Room 6002
Washington, DC 20507
(202) 663-4637
Dear Ms. Varygas:
Purposes of this letter are to
1 seek administrative remedy of a release of false and defaming information on myself which violated Privacy
Act. Charles Burtner and Larry Trujillo of the U.S. Equal Employment Opportunity Commission's (EEOC)
Phoenix District Office unlawfully released the information.
2 Exhaust administrative remedies if we are not able to settle this matter.
3 Request information under the Freedom of Information and Privacy Acts.
Aletha L. Brown
Inspector General
U.S. Equal Employment Opportunity Commission
POB 18858
Washington, D.C. 20036-8858
202-663-4375
800-849-4230
wrote me on May 7 1998
The Office of Inspector General (OIG) is empowered to investigate matters of fraud, waste
and abuse which may be attendant to EEOC programs and operations. We do not have
programmatic responsibilities and are not involved in the administration and resolution
of Privacy Act violations.
Based upon our review of the information provided, we have determined that this matter,
although important, is outside of OIG's purview and therefore does not warrant any investigative action by
this office. In regards to this issue contact:
Ms. Ellen J. Varygas, Legal Counsel
Office of Legal Counsel
1801 L. Street, Northwest, Room 6002
Washington, DC 20507
(202) 663-4637
Mr. Payne, I hope this information is helpful to you but regret that I can not provide the remedy you seek.
Thank you for contacting the Office of the Inspector General.
Sincerely,
Aletha L. Brown
Inspector General
June 16, 1998 A Jacy Thurmond, Jr, Assistant Legal Counsel/FOIA sent me some information
I requested on possible administrative remedy of the matter under a FOIA/PA request. My request was
mailed Friday 5/15/98.
While I hope we are able to settle the civil aspects of this unfortunate release of false and
defaming information on me, I must anticipate, however, that I will have to seek judicial
review.
Therefore, under 5 USC 552, the Freedom of Information Act, and 5 USC 552a, the Privacy Act, I request
access to copies
1 All documents describing YOUR efforts to properly investigate and settle this unlawful release of false and
defaming information about me.
2 All WRITTEN documents, including phone call message notes or another notes, containing the name of
William Payne, Bill Payne, etc. made between 3/18/98 and 6/29/98 by your or your staff.
If all or any part of this request is denied, please cite the specific exemption(s) which you think justifies your
refusal to release the information and inform me of your agency's administrative appeal procedures available to
me under the law.
I would appreciate your handling this request as quickly as possible, and I look forward to hearing from you
within 20 working days, as the law stipulates.
Details of the release of information can be found on Internet starting most recently with
Payne v. NSA: US on Classified NSA Declaration June 27, 1998
Payne v. NSA: US Motion on FOIA for NSA Algos June 27, 1998
at http://www.jya.com/usa062698.htm
Ms Varygas, I hope this unfortunate matter can be resolved at the administrative
level at EEOC. And I ask your help.
Sincerely,
William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
505 292 7037 <- I am not reading e-mail
Distribution
Tom Spellman
Aletha L. Brown
Senate Judiciary Committee http://www.senate.gov/committee/judiciary.html
Republicans
Orrin G. Hatch, Utah, Chairman senator_hatch at Hatch.senate.gov
Strom Thurmond, South Carolina senator at thurmond.senate.gov
Charles E. Grassley, Iowa chuck_grassley at grassley.senate.gov
Arlen Specter, Pennsylvania senator_specter at specter.senate.gov
Fred Thompson, Tennessee senator_thompson at thompson.senate.gov
Jon Kyl, Arizona info at kyl.senate.gov
Mike DeWine, Ohio senator_dewine at dewine.senate.gov
John Ashcroft, Missouri john_ashcroft at ashcroft.senate.gov
Spencer Abraham, Michigan michigan at abraham.senate.gov
Jeff Sessions, Alabama
Democrats
Patrick J. Leahy, Vermont senator_leahy at leahy.senate.gov
Edward M. Kennedy, Massachusetts senator at kennedy.senate.gov
Joseph R.Biden, Jr., Delaware senator at biden.senate.gov
Herb Kohl, Wisconsin senator_kohl at kohl.senate.gov
Dianne Feinstein, California senator at feinstein.senate.gov
Russell D. Feingold, Wisconsin russell_feingold at feingold.senate.gov
Richard Durbin, Illinois dick at durbin.senate.gov
Robert Torricelli, New Jersey senator at torricelli.senate.gov
6
From billp at nmol.com Tue Jun 30 11:59:47 1998
From: billp at nmol.com (bill payne)
Date: Tue, 30 Jun 1998 11:59:47 -0700 (PDT)
Subject: NSA and crypto algorithms
Message-ID: <359934DE.1B4@nmol.com>
It is EASY to make mistakes when designing crypto algorithms.
SECRECY works against NSA in that their work doesn't get
proper evaluation by HOSTILE referees. Like
http://www.jya.com/skipjack-bs2.htm
NSA does have good experiences at fielding crypto devices.
My suprise at gaining access to NSA crypto algorithms was how
simple they were.
From agamble at alloytech.com Tue Jun 30 12:46:36 1998
From: agamble at alloytech.com (Alan Gamble)
Date: Tue, 30 Jun 1998 12:46:36 -0700 (PDT)
Subject: Metal Suppliers Online Newsletter
Message-ID: <3.0.32.19980630144255.009e7180@mail.alloytech.com>
June 30, 1998
Metal Suppliers Online (MSO) Summer Newsletter
Hello from rainy New Hampshire! Its been a great year here at MSO and I
wanted to get this newsletter out to remind you about Metal Suppliers
Online (www.suppliersonline.com) and bring you up to date with site
improvements. We now have over 12,000 worldwide users (!) .
RECENT IMPROVEMENTS INCLUDE:
Metal Supplier Data - We continue to grow, with the searchable inventory of
2700 Worldwide Distributors, Producing Mills and Forging Shops.
Material Property Data - We now property data on 17,000 ferrous &
non-ferrous materials.
UP-COMING IMPROVEMENTS INCLUDE:
Specification Cross Reference Utilities - Cross reference any ASTM, ASME,
AMS, QQ, MIL and selected company specifications.
Physical Property Data - CTE, Densities, Conductivity, Resistivity & more.
Specification Cross Reference Utilities - Cross reference any ASTM, ASME,
AMS, QQ, MIL and selected company specifications.
If you haven't been to the site in a while, I invite you to give us a
visit. I think that you'll be impressed by the way that we've grown.
If you have any recommendations on how to improve our site, please don't
hesitate to Email them to me.
Thanks for your time.
Best Regards,
Alan
Alan C. Gamble
Webmaster
Metal Suppliers Online
http://www.suppliersonline.com
603-890-6500 - phone
603.890.6222 - fax
"We don't stop playing because we get old, we get old because we stop playing"
From billp at nmol.com Tue Jun 30 14:46:45 1998
From: billp at nmol.com (bill payne)
Date: Tue, 30 Jun 1998 14:46:45 -0700 (PDT)
Subject: Judge Campos letter
Message-ID: <35995BF1.156C@nmol.com>
Tuesday 6/30/98 3:20 PM
John Young
Nice to talk to you.
I see
Payne v. NSA: Response to Motion to Remand FOIA June 30, 1998
at http://www.jya.com/whp063098.htm
I opened judge Campos' letter at the fax. I handed it to the nice
lady.
I wrote your fax number on the envelope.
Then went to Page One Two to look at used VW repair manuals.
Page One Two specializes in used books and CDs.
I am REALLY CURIOUS about what Campos wrote. Especially on a
Tuesday. But not curious enough to read the letter now.
Lawyers always plan to have their hate letters arrive on a weekend
or, just before a vacation. Christmas is a lawyer favorite.
I ordered a engine rebuild gasket set, rod and main bearings, engine
mounts, rings, valve guides and springs, and SPLURGED by ordering an
exhuast header this afternoon.
My '82 rabbit is about guaranteed to fail emissions test this fall.
I ordered today from J C Whitney because the price for the $99.95
header goes up $10 tomorrow. Perhaps headers will even FURTHER
improve its exciting 20 second 0-60 performance?
I will do the rebuilt in the fall.
I phoned a member of Albuquerque�s underground economy last night.
He will do the labor on the head for $60. Cash, of course.
I must now ABSOLUTE CERTAINLY complete the digital FX IMMEDIATELY.
To make some money.
Litigation is more of a long term financial project. Like Morales and I
have been working on this project for SIX YEARS.
Hopefully this mess will be settled so that I can devote time to another
of my specialties. Rebuilding Big Block Ford and VW water cooled
engines. And writing MORE books too.
Perhaps even write a law book. On pro se litigation. With Morales, of
course. But this can be a point for settlement negotiation, of course.
Later
bill
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
From nodebt at mail-info.com Tue Jun 30 18:18:41 1998
From: nodebt at mail-info.com (nodebt at mail-info.com)
Date: Tue, 30 Jun 1998 18:18:41 -0700 (PDT)
Subject: A *Gold-Mine*--Right Under Your Nose?!!
Message-ID: <<>
A *Gold-Mine*--Right Under Your Nose?!!
Take just a minute and look down. What do you see?
A thin plastic board with keys on it? How would you feel
if I told you those keys were lined with gold?
Well, it's true! The keys on your keyboard are FILLED
with PURE GOLD--just sitting there waiting for you to mine
it out!
How?
The Internet...Online Mass Marketing.
With the potential to reach millions, the Internet is the
perfect place to market a product or an idea. And, the
wonderful thing is that you can have as great a presence
on the World Wide Web as the biggest of the big
corporations, perhaps even greater--
IF YOU HAVE THE TOOLS - and -
IF YOU KNOW HOW TO USE THEM!
>>>>>>>>>>>LEVEL THE PLAYING FIELD!
>>>>>>>>>>>>>>>WE TEACH YOU HOW!
That is why I want to tell you about Online Success.
Online Success is a resource center dedicated to
providing you with the tools to cash in on the
TREMENDOUS OPPORTUNITIES to be found through
mass Internet marketing-AND-teaching you how to
use them.
It may be far easier then you think...
if you know the inside secrets.
As a member of the Online Success group, you will have
the constant support of a staff of highly experienced
Internet marketers. You will be carefully guided step by
step along your path to AMAZING PROFITS through online
marketing success.
>We track the hottest trends so you can reap the profits!
A few examples of what we offer:
>Placement of your ad in 100 of the
HOTTEST online classifieds.
>Registration of your web-site with the
TOP 100 search engines.
>Dedicated E-mail account, autoresponder,
and webspace.
>Your own web-site DOMAIN NAME--FREE to members!
(An absolute must!)
You will also gain access to the Online Mass Marketing
Institute where you will learn how to make the web work
for you.
You have no product to offer? No problem!
Online Success can even provide you with that!
***And now for the truly amazing Part!***
All of this can be yours for FREE simply by referring two
other individuals that become active Online Success
members!
As a matter of fact, we will PAY YOU a 40% commission
on any additional active referrals!
Imagine that! MAKE MONEY while you learn how to
MAKE MONEY!
So, why not see how easy it is to mine that wealth of gold
from your keyboard--with the help of Online Success.
Come to our web-site at:
http://www.mail-info.com/osg/109
Find out what it's all about and start down your path to
Internet marketing prosperity!
>>>>>>>>>>>>>You make it happen.
>>>>>>>>>>>>>Online Success makes it possible.
Thank You,
Karen Flowers
Ref # 109
nodebt at mail-info.com
http://www.mail-info.com/osg/109
P.S. Join NOW and we will ALSO include 250 HOT
Internet and Business Marketing Reports with
FULL reprint and resale rights...FREE!
This is NOT some simple collection of raw ideas.
These reports are being sold on the Internet right
NOW for $49.95! YOU can become an INSTANT self
publisher by selling these reports!
P.S.S. We will also include FREE (a $50 value), the
stand alone report:
"How To Make $1,600 A Week Online...Starting NOW!"
This report contains the SECRETS to making money
online that the Internet marketing insiders DON'T
want YOU to know!
HURRY! This offer from Online Success is for a
LIMITED time. Make sure you DO NOT miss this new
and exciting opportunity that will take the Internet
by storm!
From cb0630 at hotmail.com Tue Jun 30 18:41:14 1998
From: cb0630 at hotmail.com (cb0630 at hotmail.com)
Date: Tue, 30 Jun 1998 18:41:14 -0700 (PDT)
Subject: Data Processing, Translation, Software & Web Localization Services
Message-ID: <199807010644.ZZZ4950@msfc.cseeq.equr.com>
Dear Sir/Madam,
We are a professional information services company in Hong Kong providing fast, accurate and inexpensive information services since 1993 with more than 100 supporting staff.
Scope of Services:
(1) Chinese/English Word Processing Service &
Chinese/English Data Preparation Service [Offshore Services Welcome]
* 50+ data entry professionals working on a 24-hour shifting scale.
* 99.95% accuracy level is guaranteed by our "Double Entry System"
* Competitive price to provide you quality results on time and on budget
* Rapid Turnaround
* Confidential Processing
* Year 2000 data conversion / migration
* Offshore Service Welcome:
Contract out your projects to save 50+% operational cost!
(2) English/Chinese Translation Services [Offshore Services Welcome]
* 30+ translators with solid experience
* Competitive price to provide you quality results on time and on budget.
FREE trial and evaluation for first time customers.
* Specialize in the translation of
- Software localization
(User manuals, on-line help systems & user interfaces)
- Web site localization
- Commercial documents
- Technical manuals and specifications
- Architectural proposals, etc.
The popularity of Internet makes it more easy for you to contract out your most labor intensive jobs in your company to information services companies like us to fully utilize inexpensive workforce in our production centers.
You will find that you can concentrate your valuable time and efforts on the most profitable parts of your company. You will then use less labor, less equipment, less office space and less working time to produce more products and services with more profits.
Interested parties please fax the following enquiry form to our customer services department for more information.
*** Services Reply Slip ***
Please fax to (852) 8108 7786
Attn.: Customer Services Department
We are interested in your
__ Data Processing Service
__ Software Localization Service
__ Web Site Localization Service
__ Chinese Translation Service, please contact us asap.
Our project description: ____________________________________________
_____________________________________________________________________
Company: _________________________________________
Address:__________________________________________
Tel: ____________________
Fax: ____________________
E-mail: _____________________________________________
Web Site: ___________________________________________
Contact Person: _____________________________________
Post: _______________________________________________
Date: _______________________________________________
PS. This e-mail will only be sent to the same account once (you may receive the same message more than once if you have more than one e-mail accounts). Please keep it for future reference. There is no need to remove your name from our database. Sorry for any inconvenience caused.
[CB980630]
From dformosa at cit.nepean.uws.edu.au Tue Jun 30 21:36:32 1998
From: dformosa at cit.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Tue, 30 Jun 1998 21:36:32 -0700 (PDT)
Subject: NSA and crypto algorithms
In-Reply-To: <359934DE.1B4@nmol.com>
Message-ID:
-----BEGIN PGP SIGNED MESSAGE-----
On Tue, 30 Jun 1998, bill payne wrote:
> It is EASY to make mistakes when designing crypto algorithms.
[...]
> My suprise at gaining access to NSA crypto algorithms was how
> simple they were.
The second stament follows logicly from the first. Simple algorithums are
easyer to analise for mistates.
- --
Please excuse my spelling as I suffer from agraphia see the url in my header.
Never trust a country with more peaple then sheep. ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQCVAwUBNZmuSqQK0ynCmdStAQFHowP/efP6rwDRJdjNhXvcS9rRbJW9tB10YqtP
6SCjzgCQj6W2rZSDevehIthNBn2iF0yo+rxkHA6qSYIR4y4FbyZQNSAJyCJO5i5s
iEl8Prg6Mt2FgPRxyqgSbDaVqprBaa2kkHXHiCB0Uvf4FIdc3SjMtPnU0B+ijC3v
fXmFqRvpe9o=
=7en9
-----END PGP SIGNATURE-----
From jim.burnes at ssds.com Tue Jun 30 17:34:32 1998
From: jim.burnes at ssds.com (Jim Burnes)
Date: Wed, 1 Jul 1998 08:34:32 +0800
Subject: saving the world from a cancerous monopoly (fwd)
In-Reply-To: <199806302318.SAA15079@einstein.ssz.com>
Message-ID: <3599832A.4D0E49E3@ssds.com>
Jim Choate wrote:
>
>
mjg says:
>
> > Yes, I've thought of that too. That is the place to start, but I think
> > the federal government is too strong -- eventually the states will hit a
> > stand-off and the succession issue arises again. Feds won't go down
> > without a fight.
>
> That's actualy an easy one. All it would take is a govenor to declare that
> citizens of his state are not going to submit to annual taxation. I
> guarantee that things will move quickly. Since the National Guard requires
> the ok of the govenor for the feds to invoke that is pretty much a moot
> point. It's clearly unconstitutional to involve the Army, especialy if it is
> made clear the National Guard will be there at the border to stop them. As
> to the FBI and such, have the Sherrif in each county and he state police
> proceed to arrest any such persons who attempt to invoke their federal
> authority.
>
Since the National Guard is an extension of the Army and was created
through the federal authority of raising armies it is not
necessary for the Governor of any state to be consulted before it
is given its orders. So says the Supreme Court several years ago.
The all happened when Dukakis challenged George Bush's power to
mobilize his National Guard during the Persian Gulf war.
(operation Just 'Cuz). Dukakis was pissed (thinking he lived
in the old US) and challenged the whole thing. He lost.
He mistook the state militia for the National Guard.
As far as the unconstitutionality of the Army doing anything,
thats history -- all they have to do is invoke the Drug laws
and the constitution is null and void. In any case, the National
Guard is the Army (for all practical purposes).
As far as arresting federal authorities goes, there aren't
enough sherrifs lying around to stop even FBI agents, much less
the National Guard. (state police included)
Where were the sheriffs when the BATF broke assuaulted
the Branch Davidian church? The answer is: helping them...
>
> Speaking of brain-washed....
>
> They didn't fear democracy, they feared an authoritarian central government
> without the states exercising their authority to stop it via the 10th. They
> felt that democracy was the only way to deal with this sort of excess.
>
>In short, they celebrated democracy.
Actually they feared an excess of both. Tryanny of the king and
tyranny of the masses -- mobocracy. That is why the Senators
were appointed by the states and not elected by the people. It
was an effort to allow states to control their interests instead
of everthing being determined by congress. This is known as
a balance of power.
jim