From one4evil at juno.com Mon Jun 1 01:38:27 1998 From: one4evil at juno.com (Nalus Optic) Date: Mon, 1 Jun 1998 01:38:27 -0700 (PDT) Subject: que pasa Message-ID: <19980531.003128.9966.0.one4evil@juno.com> Cypherpunks, I would like to thank Xcott for sending me that faq. Alos, thanks to the other guy who sent the info on e-mailing your way around the web...It is VERY confusing... I just have a few quick questions. I have gotten well over 25 messages from this list and so far only one of them had _anything_ to do with crypto...I know that most or all of you have a bit of background in crypto but I am just learning. So what I am wanting to know is a: are there any other crypto e-lists that are for newbies? b: are there any better text philes to read that give a better introduction that is for a newbie and c: what do you people feel is the best encryption someone can have that I could get? Thanks, D. _____________________________________________________________________ You don't need to buy Internet access to use free Internet e-mail. Get completely free e-mail from Juno at http://www.juno.com Or call Juno at (800) 654-JUNO [654-5866] From jya at pipeline.com Mon Jun 1 08:38:44 1998 From: jya at pipeline.com (John Young) Date: Mon, 1 Jun 1998 08:38:44 -0700 (PDT) Subject: RSA, NAI Settle Suit Message-ID: <199806011538.LAA11092@camel8.mindspring.com> PR Newswire, June 1, 1998 [Excerpt]: RSA Data Security and Network Associates Announce Settlement of Lawsuit; Network Associates Licenses RSA Crypto-security Software Redwood City and Santa Clara, Calif., June 1 -- RSA Data Security, Inc. and Network Associates today announced that the companies have settled patent infringement and copyright lawsuits brought by RSA against Network Associates and its subsidiaries PGP, Inc., and Trusted Information Systems (TIS). In addition, Network Associates entered into a new royalty-bearing license for RSA's crypto-security engines, providing Network Associates with rights to include RSA components within a number of Network Associates, PGP, and TIS products. Under the terms of the settlement agreement, Network Associates will draw on a previously established escrow set at the time of the PGP acquisition to pay RSA an undisclosed sum to settle past issues and for legal fees. As a result of today's settlement agreement, three federal actions and a court-ordered arbitration related to the dispute have been resolved. From sunder at brainlink.com Mon Jun 1 09:21:55 1998 From: sunder at brainlink.com (Sunder) Date: Mon, 1 Jun 1998 09:21:55 -0700 (PDT) Subject: When write high-speed implementation, In-Reply-To: <19980530042752.25126.qmail@hotmail.com> Message-ID: <3572D417.5145276A@brainlink.com> It's actually expressed as a set of complex numbers with lots of data in the imaginary side. These are displayed with fixed point decimals (or static point decimals) expressing a width and height for the rectangle hence the term S-Box. Since DES works on 64 bit blocks using a 56 bit key, you can use either 56 decimal places, or 64 for more accuracy, but far less speed. For purposes of optimization to extreme high speed, you should take your key and sort it (be sure to use Quick Sort here, and not bubble sort!), that is put all the 1 bits to the right, all the 0 bits to the left, and the naughty bits in your head. Then take the result and express it as 2^X-1, and extract X. Once you have X, repeat the process until X=2. With me so far? Good, now you have to extract the naughty bits from your mind, and let N express them. Your S boxes are now comprised of X+Ni which you can simply express as 2+Ni. Now, if you recall, Ni is the symbol for nickel, which is what this algorithm is worth $2.05 payable in Monopoly dollars. If you've been following the news, you'll know that Microsoft is a monopoly and therefore weighs the same as a duck. Since ducks float, and wood also floats, ducks must weigh the same as wood, and therefore are witches. Multiply this by the flight speed of an unladen African swallow, and divide it by the flight speed of a laden european swallow, then add your favorite color, and substract your name. Okay, so that's the high-speed write implementation, don't forget that the high speed read implementation is the opposite of the write, so reverse the sort and this time, make sure you use random sort. (That is toss the bits up randomly, and if they wind up in the order you wanted, you're done, otherwise keep tossing.) And don't forget that tossed bits require Ranch dressing or Italian, with onion crutons, but never Russian (because the USSR never used DES.) Now that we've told you the secret of high speed DES, your assignment is to come back in a week with source code to the above written in SNOBOL which can run on CP/M 6502 machines. Of course you'll need to roll your own CP/M 6502 OS as well as a SNOBOL compiler and assembler, but heck, that's easy. Oh, one catch, make sure your CP/M runs on all C64 and Apple II's, or you can't properly consider it a portable DES implementation. Good luck. [ Snicker, snicker, ROTFLMAO! I wonder how long it will take him to figgure out that he's being trolled... heh... ] Nobuki Nakatuji wrote: > > When write high-speed implementation, > Is S-box written by hexadecimal or > written by decimal? > Thanks. -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From jya at pipeline.com Mon Jun 1 10:33:08 1998 From: jya at pipeline.com (John Young) Date: Mon, 1 Jun 1998 10:33:08 -0700 (PDT) Subject: Counterpane Cracks MS's PPTP Message-ID: http://www.counterpane.com/pptp.html Thanks to GM From jya at pipeline.com Mon Jun 1 11:26:58 1998 From: jya at pipeline.com (John Young) Date: Mon, 1 Jun 1998 11:26:58 -0700 (PDT) Subject: Foundation for Information Policy Research Message-ID: <199806011826.OAA15687@camel14.mindspring.com> Source: http://www.ntk.net/fipr/ Subject: URGENT: press release - FIPR Date: Thu, 28 May 1998 16:52:16 +0100 From: Ross Anderson Title: New Independent Research Foundation Backed by Microsoft Embargoed until 11.00 Friday 29th May Too often, policy issues relating to information technology are seperately debated by two distinct grouups: technology experts and those focused on social concerns. Policy makers face the challenge of reconciling the seperate debates in areas where technology is often evolving very quickly. A new research foundation aims to provide clear advice that spans this gap and is independent of vested interests. The Foundation for Information Policy Research will fund research into how information technology affects society. It is launched at a press conference on Friday 29th May at 11.00 am. (1) Microsoft has contributed a six-figure sum to cover the launch costs. Internet service providers Poptel and Demon are also supporting the Foundation. Its independence will be guaranteed, however, by a board of trustees. (2) In the medium term it will be supported by subscriptions from a range of firms in commerce and industry. The goal of the Foundation is to promote research and understanding of the effects, and the likely future effects, of IT on society. Its areas of investigation include: (3) * the regulation of electronic commerce; * consumer protection; * data protection and privacy; * copyright; * law enforcement; * evidence and archiving; * electronic interaction between government, businesses and individuals; * the extent to which various information technologies discriminate against the less advantaged members of society; and * the new risks that computer and communication systems pose to life, health and economic well-being The Foundation will also provide a valuable resource for the press as it will be able to put journalists in touch with a wide range of experts who can explain IT issues as they arise. Contact: Caspar Bowden (Director of the Foundation) 0171 837 8706 Ross Anderson (Chair of the Foundation) 01223 334733 QUOTES The Director of the Foundation, Caspar Bowden, said: ``The IT policies (and failures) which the current government inherited, and the decisions which will be made by them in the future, will have far-reaching effects on who society's winners and losers will be. We have a duty to prevent technological innovation and development taking place at the expense of the poor, the old, the sick and the disabled. We believe that so long as we understand the social and policy implications of new technical innovations, we can make IT into a means to facilitate social inclusion. The Foundation's mission will be to achieve and to spread that understanding.'' The Managing Director of Microsoft UK, David Svendsen, said: ``It's important that we contribute to a broad and informed public discussion on these information society issues.'' The Chair of the Foundation, Ross Anderson of Cambridge University, said: ``We welcome this new source of funding for IT related research. An increase in the diversity of funding sources is almost always a good thing, and the Foundation will be particularly valuable as much of the available IT funding is directed to very short-term and narrowly technical agendas.'' NOTES (1) The press conference is at the "Scrambling for Safety" conference, at the Bloomsbury Theatre, University College, London. URL: (2) The Foundation's Director and full-time CEO, Caspar Bowden, has for the last three years been running Qualia, a consultancy business specialising in internet implementations. Before that he was a financial strategist with Goldman Sachs. He also researched IT and communications issues for Scientists for Labour. Its chair, Ross Anderson, is a faculty member at Cambridge University Computer Laboratory and has done extensive research on topics related to electronic commerce. BACKGROUND The "Millennium Bug" - the problem that many computers cannot deal correctly with the date roll-over from 1999 to 2000 - threatens to cause havoc with many systems and has been declared a national emergency by the Prime Minister. Another problem that has worried policymakers and concerned citizens is that new developments in IT may discriminate against the less well off members of society. For example, the current mechanisms for electronic commerce depend on consumers using their credit cards to order goods and services over the net. They often get a big discount for buying this way; but people without credit cards may lose out. The first task that the Foundation has set itself is to examine the underpinnings of electronic commerce. The European Commission has recently published a draft Directive on this subject and will launch a period of public consultation at the same conference at which the Foundation itself will be launched. (The draft directive is at [missing].) Other topics which the Foundation plans to investigate include: * the maintenance of public records in electronic form. We do not fully understand how to ensure that word processor files and other electronic documents created today can be safely stored for many years, and reliably made available in the future. This affects not just the new Freedom of Information Act, but also the work of future librarians and historians. * the development of copyright law. There are some industry proposals which would restrict the ability of libraries to lend out digital works. Will this mean the end of the public library, as more and more books, videos and other material become digital? What are the implications for schools and universities? What are the implications for the public, if all major sports events in future are pay-per-view? Are these developments inevitable, or is there something we can do about them? * the introduction of electronic communication between the citizen and the government has the potential to cut queues and the frustration of dealing with people on the phone. However, are these changes intrinsically more likely to favour the articulate, and to bring the most benefit to well-off people with their own computers? What technical developments are reasonably possible to ensure that all citizens get a fair deal? * the previous government's proposal for a "personal signature card" that would give access to all government services had a distinct flavour of an ID card. Are such developments necessary, or can we find workable alternatives? * the police are concerned about the spread of prepaid mobile phones, which are increasingly used by stalkers and extortionists. However, if they are banned, then how would people without credit cards obtain a mobile phone service? * there have been many disputes in the past over "phantom withdrawals" from bank cash machines, and banks have defended themselves by claiming that their computers cannot be wrong. How can this approach work when millions of merchants are selling services through a wide variety of computer systems? What will consumer rights amount to in the information age? * the failure of government computer systems - whether spectacular failure due to the millennium bug, or the continuing sporadic failures in the NHS - does most harm to pensioners, the disabled, single mothers, the unemployed and people on NHS waiting lists (who are typically elderly, female and working class). How can we encourage best engineering practice in the public sector? - - - ends - - Thanks to Danny O'Brien, UK Crypto Story: http://www.wired.com/news/news/politics/story/12624.html Web site under construction: http://www.fipr.org From StanSqncrs at aol.com Mon Jun 1 12:09:06 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Mon, 1 Jun 1998 12:09:06 -0700 (PDT) Subject: Nobody comes up with a great point! Message-ID: <9082dcf2.3572fc2e@aol.com> Unfortunately, he didn't seem to want to share it with the Cypherpunks. Nobody - << >> Of course, I do admit, that I do speak from a left POV. Which one? >> Mine. << There are so many left POVs! >> Correctamundo! We aren't a bunch of brain-washed DittoHeads like the right is. :-) Stan From one4evil at juno.com Mon Jun 1 12:18:08 1998 From: one4evil at juno.com (Nalus Optic) Date: Mon, 1 Jun 1998 12:18:08 -0700 (PDT) Subject: I need a compiler! Message-ID: <19980601.031903.11638.0.one4evil@juno.com> Cypherpunks, Tis I, D, again...I just have one other question...Could some of you tell me what C compilers you use...Also, could you just tell me every program you would have that has anything to do with crypto if you had the cash? I guess one would need a C compiler, a hex editer maybe, are there any crypto programs that are sort of like templates, where you set the paramiters and the program compiles the encryption for you...Pipe dream I am sure... That is about it... D. _____________________________________________________________________ You don't need to buy Internet access to use free Internet e-mail. Get completely free e-mail from Juno at http://www.juno.com Or call Juno at (800) 654-JUNO [654-5866] From angelos at dsl.cis.upenn.edu Mon Jun 1 12:58:59 1998 From: angelos at dsl.cis.upenn.edu (Angelos D. Keromytis) Date: Mon, 1 Jun 1998 12:58:59 -0700 (PDT) Subject: KeyNote v0.1 Release Announcement Message-ID: <199806011956.PAA12769@adk.gr> -----BEGIN PGP SIGNED MESSAGE----- To: coderpunks at toad.com Subject: KeyNote v0.1 Release Announcement Cc: cypherpunks at toad.com Date: 06/01/98, 15:56:45 KeyNote is a trust-management system, designed on the same principles as PolicyMaker, but simpler and better-defined. This is the first public release, and although the code has been tested, it is by no means guaranteed bug-free (but then, what is). That said, you can get a copy from http://www.cis.upenn.edu/~angelos/keynote-0.1.tar.gz -Angelos PS. From the README file: There should be a real README file here, but in the meantime read draft-angelos-spki-keynote-01.txt for the spec of KeyNote. There's much to be done yet to improve the user interface(s). Signature verification is (deliberately) missing from this release, but the next one will have it. The hooks are obvious in the code (search for XXX in parse_assertion.c). The makefile creates the libkeynote.a library which can be linked with other applications. The program keynote-verify can be used to verify a request, given a set of assertions and an environment. There will be a man page in the next release both for the library and the program, along with some sort of graphical UI to make assertion generation (including signing) easier. For any questions, comments, bug reports, praise, or anything else you have in mind, contact me at angelos at dsl.cis.upenn.edu Angelos D. Keromytis May 31 1998 -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: noconv Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface iQCVAwUBNXMHfr0pBjh2h1kFAQElOgP9FyKPDQPvctQyJLl5djz4xj/edgRgQrlb YmqwVQqGrKKC/KrgUbu/A6c/RyqT1l1/nk9U4pONQaJoAtT0pQcgpYISQ2Ji/0JY tG8y+r+WqhWElgUuPxZff5jH5V3mbCDInKoe4BvkE0wwnW7QvwCSVa/nP/Ecs+1e KpiewSL6Ug8= =0f31 -----END PGP SIGNATURE----- From J-Dog at Elitehackers.org Mon Jun 1 13:35:07 1998 From: J-Dog at Elitehackers.org (J-Dog) Date: Mon, 1 Jun 1998 13:35:07 -0700 (PDT) Subject: I need a compiler! In-Reply-To: <19980601.031903.11638.0.one4evil@juno.com> Message-ID: gee, gcc seems to always do teh trick for me when I want to compile some C..... Then again, if I was to say linux to you, you would prolly run in ph33r ... so, why don't you call bill up and ask him to send you a free version of Visual C++.... so that you too can crank out useless winblowz code... Latez JD On Mon, 1 Jun 1998, Nalus Optic wrote: > Cypherpunks, > > Tis I, D, again...I just have one other question...Could some of > you tell me what C compilers you use...Also, could you just tell me every > program you would have that has anything to do with crypto if you had the > cash? I guess one would need a C compiler, a hex editer maybe, are there > any crypto programs that are sort of like templates, where you set the > paramiters and the program compiles the encryption for you...Pipe dream I > am sure... > > That is about it... > > D. > > _____________________________________________________________________ > You don't need to buy Internet access to use free Internet e-mail. > Get completely free e-mail from Juno at http://www.juno.com > Or call Juno at (800) 654-JUNO [654-5866] > From whgiii at invweb.net Mon Jun 1 14:38:44 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Mon, 1 Jun 1998 14:38:44 -0700 (PDT) Subject: Counterpane Cracks MS's PPTP In-Reply-To: Message-ID: <199806012143.QAA018.23@geiger.com> -----BEGIN PGP SIGNED MESSAGE----- In , on 06/01/98 at 12:23 PM, John Young said: >http://www.counterpane.com/pptp.html >Thanks to GM when will people learn? Microsoft is *incapable* and *unwilling* to provide even nominal security for it's platforms. Several problems that exist: Technical Ability -- Microsoft is seriously lacking in the technical know-how when it comes to cryptology and data security. Corporate Mentality -- Microsoft does not have the mentality needed to produce secure products. This is a company that has historically shipped poorly designed, bug filled products out the door. Bugs are not seen as a problem but as an opportunity to sell upgrades. While this has done them well in selling their overpriced GameBoys (the sheeple never cease to disappoint me) it is *not* the environment for developing secure products. Previous security foobars by M$: NT C2 <---- LOL!!! Active X <---- Who was the brain child that though *that* up? Auto-Launch attached binaries in E-Mail <-- Can we say GoodTimes? Crypto-API <--- Right I would *trust* that. Honest. :) TCP/IP Stack <--- Too many flaws to list. Why would anyone trust these simpletons to produce any type of security product? - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html - --------------------------------------------------------------- Tag-O-Matic: I love running Windows! NOT! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNXMgd49Co1n+aLhhAQHmjAQArwgJj4kG8O+MYYCag4Xc8vr4zK4XDdGX niqu8nzfsJPfA2TisyFFyuFv9gejXQ6QhO7+tT2KQbbWJllPBIqIjjIqH8XkhcEW XhtMV/CoWprOp3tAHZi/n2LLn1kqtdhWG4FewGHn6R0Tzy6vq74ygk+qo9BeZNAd F92bia6qGio= =Cvy6 -----END PGP SIGNATURE----- From dorisaw at idt.net Mon Jun 1 14:59:30 1998 From: dorisaw at idt.net (Doris Woods) Date: Mon, 1 Jun 1998 14:59:30 -0700 (PDT) Subject: Kirtland Air Force Base In-Reply-To: <35709AFC.7DD3@nmol.com> Message-ID: <35732427.ECA43EB9@idt.net> Hi all, bill payne wrote: > > Saturday 5/30/98 5:15 PM > > > Masanori, the book Decision to Use the Atomic Bomb by Gar Alperovitz > presents fairly good evidence some in US government nuked Hiroshima and > Nagasaki merely to impress the Russians. > Carroll Quigley said in Tragedy and Hope... they were worried the war would be over with before they got their chance to use it! Doris From whgiii at invweb.net Mon Jun 1 15:56:14 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Mon, 1 Jun 1998 15:56:14 -0700 (PDT) Subject: Kirtland Air Force Base In-Reply-To: <35732427.ECA43EB9@idt.net> Message-ID: <199806012257.RAA019.42@geiger.com> -----BEGIN PGP SIGNED MESSAGE----- In <35732427.ECA43EB9 at idt.net>, on 06/01/98 at 05:59 PM, Doris Woods said: >Hi all, >bill payne wrote: >> >> Saturday 5/30/98 5:15 PM >> Masanori, the book Decision to Use the Atomic Bomb by Gar Alperovitz >> presents fairly good evidence some in US government nuked Hiroshima and >> Nagasaki merely to impress the Russians. >> >Carroll Quigley said in Tragedy and Hope... they were worried the war >would be over with before they got their chance to use it! Was this before or after they estimated that it would cost upwards of 1 Million lives to take the Japan mainland by conventional forces? - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html - --------------------------------------------------------------- Tag-O-Matic: I went window shopping...and bought OS/2! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNXMx849Co1n+aLhhAQEF/QP/Xz/1vWT108GyHjPe77raaL8JQRcfMa7N fwhcVkQcNMfwMlpEJC3F9eiEk5jpSD5papD3HA8Q7pSDX0vS5L7j7w9d2Xwc1vc/ +uEuZzGUqat5F4P0Iv2/KKPLDHgL/bL+2TkcyyLKkxj0e/IQQWCHIlirDXhY3zz2 TkJqXCgY9Mg= =a01s -----END PGP SIGNATURE----- From one4evil at juno.com Mon Jun 1 16:17:09 1998 From: one4evil at juno.com (Nalus Optic) Date: Mon, 1 Jun 1998 16:17:09 -0700 (PDT) Subject: I need a compiler! In-Reply-To: Message-ID: <19980601.071648.10254.1.one4evil@juno.com> J-Dog >who says I am socalled "elite"? Gee, your 'handle' is J-Dog...And your sending your mail through EliteHackers.org...Very original...I think have been to your web site once or twice...The EliteHackers.org that is... >WOW.. A dual PII 266... then you will really be elite... because you >know.. if you have a fast machine, you don't ahve to know shit.. you can >just fake it.. because your machine will cover up for you..... fuqin >moron... First...I am not a hacker and don't pretend to be...I phreak a little and like phones and shit...I subscribe to Telecom Digest and just like to play with phones...I like to blow shit up for fun so you could say I am a pyro...I got five bitches on my dick so you could call me a pimp...But I never said I was a hacker...I just like to know about how shit works...And in order to exploit any system, for fun or money or super 3l33t props, you gots to know the system...I want to put linux on my system because linux does have bugs and quirks and you have to know how to do more than click a mouse button for the shit to work. >bwhahahhaha....if you can not detect the sarcasm in here, then damn, you >are a bigger idiot than I thought..... geez man.. Ya, sure...Sarcasm...You laugh at me but dude...William is to busy with Netscape trying to dick him up the ass for me to call him again... >> And you know this...MAN! I am wanting to write my own supper program...I >> want to take all the good h/p/v/c apps out there and make a nice point > >and click interface for them all...one in linux and one in win ( ...fuck >> the mac people... ) Put it all on a CD and send free copies to all the >> cool hackers out there...Sort of a library O' chaos...Of coarse, I would >> not send one to just anyone...r00t would get a copy...I would send Eric B >> one just for kicks...Then I would send one to Death Vegi and the rest of >> the cDc...They got the cool philes....Anywhoo...Let me know who bill is. >Good Yogi, and while your att it, stop world Hunger, Racism, and poverty >with your uberhacker program... Again, you laugh at me for sarcasm.... But back to the real problem...yes, gcc would be ideal...How ever...I am not running Linux as of yet...so do you or any of you know any OTHER WINDOWS BASED COMPILERS that are worth a shit...I know it is a stretch but god... And J-Dog, what is up with the fucked up lingo...This ain't the movies... _____________________________________________________________________ You don't need to buy Internet access to use free Internet e-mail. Get completely free e-mail from Juno at http://www.juno.com Or call Juno at (800) 654-JUNO [654-5866] From jya at pipeline.com Mon Jun 1 16:38:15 1998 From: jya at pipeline.com (John Young) Date: Mon, 1 Jun 1998 16:38:15 -0700 (PDT) Subject: Echelon Furor Message-ID: <199806012338.TAA09612@camel14.mindspring.com> The UK Sunday Times on the Internet had a story yesterday on the rising Echelon furor in Europe, "Spy Station F83." http://www.sunday-times.co.uk (see Focus feature) If you don't want to register we've mirrored the piece: http://jya.com/nsa-f83.htm It reviews the rapidly-growing NSA operation at Menwith Hill and Bad Aibling, with some recent information not covered in earlier reports. Several European pols -- German, French, Italian, et al -- are calling for investigations of alleged economic spying by NSA. NSA denies all, the writers say, except the Agency claims it's the best in the world at what it's capable of but not doing. From jya at pipeline.com Mon Jun 1 16:51:04 1998 From: jya at pipeline.com (John Young) Date: Mon, 1 Jun 1998 16:51:04 -0700 (PDT) Subject: Commerce Echelon Message-ID: <199806012350.TAA13897@camel14.mindspring.com> The UK Sunday Times article claims that there is a unit in the Department of Commerce that receives NSA Echelon interceptions of economic data for massaging and passing on to interested US parties. Any information on this unit and how it decides who gets which secrets? From J-Dog at Elitehackers.org Mon Jun 1 16:57:27 1998 From: J-Dog at Elitehackers.org (J-Dog) Date: Mon, 1 Jun 1998 16:57:27 -0700 (PDT) Subject: I need a compiler! In-Reply-To: <19980601.071648.10254.1.one4evil@juno.com> Message-ID: > > >WOW.. A dual PII 266... then you will really be elite... because you > >know.. if you have a fast machine, you don't ahve to know shit.. you can > >just fake it.. because your machine will cover up for you..... fuqin > >moron... > > First...I am not a hacker and don't pretend to be...I phreak a little and > like phones and shit...I subscribe to Telecom Digest and just like to > play with phones...I like to blow shit up for fun so you could say I am a > pyro...I got five bitches on my dick so you could call me a pimp...But I > never said I was a hacker...I just like to know about how shit > works...And in order to exploit any system, for fun or money or super > 3l33t props, you gots to know the system...I want to put linux on my > system because linux does have bugs and quirks and you have to know how > to do more than click a mouse button for the shit to work. hah.. the fact that you are claiming that you are going to write a "program" that will combine all the good /h/p/v/c apps out there and combine them into one is simply ridiculous.. what you are claiming is that you are going to write a program that will have builting crackers, sniffers, DoSes, Tone Generators, Virii creation utils, box plans...etc. This is absolutely ridiculous... just for the record, what would you consider the "good /h/p/v/c" apps out there? the uberl33t winnuke.exe.. or perhaps maybe the k-rad linklooker.. it is ppl like you sho seriously make me wonder where society is headed... > > >bwhahahhaha....if you can not detect the sarcasm in here, then damn, you > >are a bigger idiot than I thought..... geez man.. > > Ya, sure...Sarcasm...You laugh at me but dude...William is to busy with > Netscape trying to dick him up the ass for me to call him again... ok hippy.... why don't you sport your /<-rad pvc pants and vinyl shirt and talk smack about how you are the uberhacker.... I think you have seen Hackers the movie one to many times there acid burn... > > >> And you know this...MAN! I am wanting to write my own supper > program...I > >> want to take all the good h/p/v/c apps out there and make a nice point > > >and click interface for them all...one in linux and one in win ( > ...fuck > >> the mac people... ) Put it all on a CD and send free copies to all the > >> cool hackers out there...Sort of a library O' chaos...Of coarse, I > would > >> not send one to just anyone...r00t would get a copy...I would send > Eric B > >> one just for kicks...Then I would send one to Death Vegi and the rest > of > >> the cDc...They got the cool philes....Anywhoo...Let me know who bill > is. > >Good Yogi, and while your att it, stop world Hunger, Racism, and poverty > >with your uberhacker program... > > Again, you laugh at me for sarcasm.... hell ya I laugh at you... either you are too big of an idiot to reaalize that you are being made fun of.. or you are to stupid to care.... at any rate, kill yourself... you are breating air I might need someday.... > > But back to the real problem...yes, gcc would be ideal...How ever...I am > not running Linux as of yet...so do you or any of you know any OTHER > WINDOWS BASED COMPILERS that are worth a shit...I know it is a stretch > but god... Not running linux as of yet? hehe so when are you gong to do a search for linux.exe and start to run it?.. as soon as your superkool P2 266 gets here... wowwie... I am impressed...... Hey DK.. pass me another beer... > > And J-Dog, what is up with the fucked up lingo...This ain't the movies... fucked up lingo? gee, I am very sorry if your small mind can not make out my words.. but I can assure you that this is NOT fucked up lingo... go read some h4x0r Br0s and then tell me about how fuct up my lingo is.... Latez JD btw... congrats on your really kool superl33t juno.com account.. you are r33t now. > > > > _____________________________________________________________________ > You don't need to buy Internet access to use free Internet e-mail. > Get completely free e-mail from Juno at http://www.juno.com > Or call Juno at (800) 654-JUNO [654-5866] > From one4evil at juno.com Mon Jun 1 17:19:45 1998 From: one4evil at juno.com (Nalus Optic) Date: Mon, 1 Jun 1998 17:19:45 -0700 (PDT) Subject: I need a compiler! In-Reply-To: Message-ID: <19980601.081903.10230.0.one4evil@juno.com> Ok, this is starting to get really odd. I am not a hacker...I DO NOT want to make some supper program...IT WAS A CRACK BASED ON WHAT YOU SAID ABOUT WIDOZE CODE!!! I don't know shit about hacking other than how to maybe use a cheese scanner like 'Phonetag' (which I have set up at school so that I don't get busted useing it at home.) I mean what is the argument here? Also, you keep putting things in here like: > uberl33t > k-rad > /<-rad Well, what the hell is up with that...I don't talk like that...Do you talk like that? Do you walk up to your local dealer and say you want some K-rad KB? No! You just say you want a fat once of KB! You don't fuck around. >Not running linux as of yet? hehe so when are you gong to do a search for >linux.exe and start to run it?.. as soon as your superkool P2 266 gets >here... wowwie... I am impressed...... Hey DK.. pass me another beer... Well, I have no net access...Boy that's 3L33T...and when I tried last time I had access, I kept having trouble makeing the boot disk...Maybe you can explane it to me...You do know stuff about linux and for that I ask a question...The page I was trying to get it from said that I needed to save some program ( this has been like eight months ago ) and then put the program, which was 1.44 mb, onto a floppy then boot your computer off the floppy...I put in a brand new, unnamed formated disk and it said that there was not enough disk space...I dont' have a damn clue as to why it would not work...Also, with my thirst for info, I am going to get the QUE linux book that comes with Linux 3.0.8 (?) slackware, redhat, a disk of misc. utilitys and a disk of net utilitys... I don't know why we are bitching at each other...You hack, I don't, you use jargon, I don't, I can spell and type, you can't...Where is the problem? Anyone back me up on this? I really don't like to fight with people I don't know...So what does the J stand for? Sort of ironic, my initals are JD, Jordan David...Fucked up, O my brothers... D. _____________________________________________________________________ You don't need to buy Internet access to use free Internet e-mail. Get completely free e-mail from Juno at http://www.juno.com Or call Juno at (800) 654-JUNO [654-5866] From caj at math.niu.edu Mon Jun 1 17:42:49 1998 From: caj at math.niu.edu (Xcott Craver) Date: Mon, 1 Jun 1998 17:42:49 -0700 (PDT) Subject: Holy QPRNF, part II (Re: Counterpane Cracks MS's PPTP) In-Reply-To: <199806012143.QAA018.23@geiger.com> Message-ID: > >http://www.counterpane.com/pptp.html This has got to be the scariest crypto-related paper I've ever read. Detailed therein is just an unnatural amount of screwing up for any one company, much less one product. How many of us had to explain to a sci.crypt newbie why we can't use the same one-time-pad string or cipher stream repeatedly? Here we have Microsoft re-using RC4 keys in OUTPUT FEEDBACK MODE. In the same session, fer God's sake, you and the server both use the same XOR stream to encrypt? This is not a subtle, excusable boo-boo. It's not even a crypto mistake: it's a basic inability to comprehend what the exclusive-or operation does. I gotta admit, my first impression was that Schneier, et al, were engaging in a heapin' helpin' of MS-bashing on their page. Having read the paper, however, I'm now convinced that they brushed too (po-)lightly over some real howlers. One might get the false impression that these are subtle flaws, rather than gaping holes from Hell. We gotta convince Bill to fire his crypto people, for the good of humanity. I suggest we get the message across by sending MS a bunch of t-shirts reading, "Everything I ever needed to know about crypto I learned from the LANMAN hash." -Xcott ==- Xcott Craver -- Caj at niu.edu -- http://www.math.niu.edu/~caj/ -== "This is a different thing: it's spontaneous and it's called 'wit.'" -The Black Adder From caj at math.niu.edu Mon Jun 1 18:01:56 1998 From: caj at math.niu.edu (Xcott Craver) Date: Mon, 1 Jun 1998 18:01:56 -0700 (PDT) Subject: I need a compiler! In-Reply-To: Message-ID: On Mon, 1 Jun 1998, J-Dog wrote: > at any rate, kill yourself... you are breating air I might need someday... Ah, lack of oxygen! I was going to blame a broken CAPS LOCK key. -Caj ==- Xcott Craver -- Caj at niu.edu -- http://www.math.niu.edu/~caj/ -== "This is a different thing: it's spontaneous and it's called 'wit.'" -The Black Adder From rah at shipwright.com Mon Jun 1 18:33:48 1998 From: rah at shipwright.com (Robert Hettinga) Date: Mon, 1 Jun 1998 18:33:48 -0700 (PDT) Subject: Commerce Echelon In-Reply-To: <199806012350.TAA13897@camel14.mindspring.com> Message-ID: At 7:48 PM -0400 on 6/1/98, John Young wrote: > Any information on this unit and > how it decides who gets which secrets? It helps if you're Chinese or Indonesian... Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' Philodox: , e$: From one4evil at juno.com Mon Jun 1 18:36:12 1998 From: one4evil at juno.com (Nalus Optic) Date: Mon, 1 Jun 1998 18:36:12 -0700 (PDT) Subject: No Subject Message-ID: <19980601.093541.11502.0.one4evil@juno.com> Ok, I was just going through Phrack 51again and found this...I don't know if you people care or are seeing it for the 51 time, but if you want the whole thing, e-mail me or just go do a search for Phrack and look at there archives...There is a lot more to the artical, but this little bit lets you know what it is about. D. ---[ Phrack Magazine Volume 7, Issue 51 September 01, 1997, article 13 of 17 -------------------------[ Monoalphabetic Cryptanalysis (Cyphers, Part One) --------[ Jeff Thompson aka 'Mythrandir' Written for Phrack and completed on Sunday, August 31st, 1997. --------- First a quick hello to all of those I met at DefCon this year. It was incredible fun to finally put faces to many of the people I have been talking with for some time. It was truly was a treat to meet so many others who are alive with the spirit of discovery. ---------- This is the first in a series of articles on Cryptology that I am writing. The goals of these articles will be to attempt to convey some of the excitement and fun of cyphers. A topic of much discussion in regards to cryptography currently, is about computer based cyphers such as DES, RSA, and the PGP implementation. I will not be discussing these. Rather, these articles will cover what I will term classical cryptology. Or cryptology as it existed before fast number crunching machines came into existance. These are the sorts of cyphers which interested cryptographers throughout time and continue to be found even to this very day. Even today, companies are producing software whose encryption methods are attackable. You will find these commonly among password protection schemes for software programs. Through the course of these articles I will explain in practical terms several common cypher types and various implementations of them as well as cryptanalytic techniques for breaking these cyphers. Creating cyphers is fun and all, but the real excitement and often times tedium is found in Cryptanalysis. Many of the ideas presented in these articles will based on three sources. The following two books: The Codebreakers by David Kahn (ISBN: 0-684-83130-9) and Decrypted Secrets by F.L. Bauer (ISBN: 3-540-60418-9). Both authors have put together wonderful books which both cover the history and methods of Cryptology. Do yourself and the authors a favor and purchase these books. You will be very pleased with the lot. Finally, a miniscule amount of these articles will be written based on my own personal experience. The fun is in the journey and I welcome you on what is certain to be an interesting trip. Please feel free to raise questions, engage me in discussions, correct me, or simply offer suggestions at jwthomp at cu-online.com. Please be patient with me as I am traveling extensively currently, and may be away from the computer at length occasionally. Out the door and into the wild... --Monoalphabetic Cyphers Monoalphabetic cyphers are often currently found in simple cryptograms in books and magazines. These are just simple substitution cyphers. This does not mean that they are always simple for the beginning amateur to solve. Three common monoalphabetic cyphers which are used are substitution, cyclical, and keyed cyphers. -Substitution Cyphers By taking an alphabet and replacing each letter with another letter in a unique fashion you create a simple monoalphabetic cypher. Plaintext Alphabet A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Cypher Alphabet Z I K M O Q S U W Y A C E B D F H J L N P R T V X G Plaintext Message The blue cow will rise during the second moon from the west field. Cyphertext Message nuo icpo kdt twcc jwlo mpjwbs nuo lokdbm eddb qjde nuo toln qwocm. -Cyclical Cyphers By taking an alphabet and aligning it with a rotated alphabet you get a cyclical cypher. For example: Plaintext Alphabet A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Cypher Alphabet N O P Q R S T U V W X Y Z A B C D E F G H I J K L M Indeed, you may recognize this cypher as a ROT13 which is commonly used on news groups to obscure messages. -Keyed Cypher Another way to create a monoalphabetic cypher is to choose a keyword or phrase as the beginning of the cypher alphabet. Usually, only the unique letters from the phrase are used in order to make sure the plaintext to cyphertext behaves in a one to one fashion. For example: Plaintext Alphabet: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Cypher Alphabet L E T O S H D G F W A R B C I J K M N P Q U V X Y Z The passphrase in this cypher is "Let loose the dogs of war" The advantage of such a system is that the encryption method is easy to remember. Also, a method of key change can be created without ever having to distribute the keys. For example, one could use the 4 words at a time of some piece of literature. Every message could use the next four words. Indeed, this change could occur more frequently, but that is a subject for another article. _____________________________________________________________________ You don't need to buy Internet access to use free Internet e-mail. Get completely free e-mail from Juno at http://www.juno.com Or call Juno at (800) 654-JUNO [654-5866] From one4evil at juno.com Mon Jun 1 18:58:38 1998 From: one4evil at juno.com (Nalus Optic) Date: Mon, 1 Jun 1998 18:58:38 -0700 (PDT) Subject: I need a compiler! In-Reply-To: Message-ID: <19980601.095731.12158.0.one4evil@juno.com> On Mon, 01 Jun 1998 21:37:58 -0400 "Robert A. Costner" writes: >People are making fun of you for the following reasons: > > * The 'C' compiler comes with the operating system What OS? > * Your email address is well... you look at it :) I am a satanist, sorry... > * Most of the crypto programs are GPL, which is not freeware, but > you probably would not know the difference. (You don't need cash) I don't care if I have to pay...I was just asking for everyone's oppinion > * You sound like you are under 25 17... > * You use vulgarities (Juno kicking my ass, net access blows) And always will...Sorry, nothing gets the point across like a good vulgarity > * You can't spell. OK w/o the other stuff. I know I can't spell...But I am doing better than J-Dog, what other stuff? > * Your dual PII-266 that you need, seems overblown to those running > 386-25Mhz, or even 10Mhz systems. Hey, at least I didn't say I wanted my oun cray or a duel 400 :) > * You don't seem to know what PGP is. PGP: Pretty Good Privicy...Not for export, puplic encryption, you puplish your key then people can send you encrypted files...I think... >Try reading the list for a month before you make your next message. >It >might work better. Or just get PGP and learn how to use it without >asking >the list. Besides, my domain is more elite than the other guy's >hackerorg >domain. I have been on for about a week...My welcome message got no replys, all I seam to get are political messages, I have seen one question about crypto, and the reply was half joke...I DO NOT HAVE NET ACCESS! how do I get pgp with out net access...I just wanted to know what everyone else was useing...What is up with J-Dog jumping my shit (sorry) with this stuff about, "Then again, if I was to say linux to you, you would prolly run in ph33r"? I know linux, I want linux, you have read the other posts so I won't go into it...I guess i am just on the wrong list...I sent out a post befor about are there any better 'newbie' lists on crypto but got no responce...oh well. D. p.s, I like Juno... :( _____________________________________________________________________ You don't need to buy Internet access to use free Internet e-mail. Get completely free e-mail from Juno at http://www.juno.com Or call Juno at (800) 654-JUNO [654-5866] From chris at cybernet.co.nz Mon Jun 1 20:24:24 1998 From: chris at cybernet.co.nz (Chris Wedgwood) Date: Mon, 1 Jun 1998 20:24:24 -0700 (PDT) Subject: Counterpane Cracks MS's PPTP In-Reply-To: Message-ID: <19980602152326.B32084@caffeine.ix.net.nz> On Mon, Jun 01, 1998 at 04:24:44PM -0500, William H. Geiger III wrote: > Previous security foobars by M$: > > NT C2 <---- LOL!!! Standard marketroid talk, I think M$ still tout this, but not so loudly these days. Last I heard they were trying to get C2 with network connectivity, but that was a while ago (2 years?) so they may have given up. I'm sure I would have heard if it had. That said, C2 doesn't necessarily buy you all that much. > Active X <---- Who was the brain child that though *that* up? Sure it sucks, it sucks for lots of reasons. But for the average luser it still better than plugins so thats why its taken off. And what make downloading a plugin and installing that any better? > Auto-Launch attached binaries in E-Mail <-- Can we say GoodTimes? Can anyone confirm that this has indeed been fixed yet? I should also point out that buffer overflow bugs have been known for some time (years?) with various unix mailers and their handling of .mailcap which essentially amounts to the same thing. > Crypto-API <--- Right I would *trust* that. Honest. :) Does anyone have a list of design and implementation flaws for CAPI? I've had discussions with a couple of people about these, but never seen anything published. > TCP/IP Stack <--- Too many flaws to list. Yeah... its crap, but not necessarily that much worse that some of the others out there. If someone were keeping score on which stacks help up the best against all the attacks of the last two years it probably wouldn't be the worst. > Why would anyone trust these simpletons to produce any type of security > product? Sure. 95% of the population does. People need to be educated about important issues, and using lots of complicated gobbledygook doesn't help. If you, like me, have a loved one that isn't terribly interested in computers or encryption, then see if the phrase 'modular exponentiation' doesn't kick there eye-glaze-secreting gland into over drive. I guess this is something Bruce Schneier has done well - a report for technical people who will read it, laugh and say they aren't surprised, and press releases with LOTS OF BIG LETTERS AND SMALL WORDS for the rest of the population including morons that are the media. I think everyone is waiting for NT5. Multi-user NT is at best an interesting concept. I remember at university using (arguably buggy) unix boxen with 200+ users simultaneously, with relatively few problems, but I'll be really surprised if NT could get close to this.... I am so looking forward to NT5, it should prove to be very entertaining and perhaps a really good opportunity to educate the public. OK, getting bored with this reply now, so here it goes, errors and all.... -Chris P.S. How does M$ sidestep the ITAR with ipsec code in Win98/NT5? From StanSqncrs at aol.com Mon Jun 1 21:19:17 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Mon, 1 Jun 1998 21:19:17 -0700 (PDT) Subject: I need a compiler! Message-ID: <8d3fc421.35737c2b@aol.com> In a message dated 6/1/98 7:11:19 PM Central Daylight Time, J- Dog at Elitehackers.org writes: << (1 4 Evil)> Ya, sure...Sarcasm...You laugh at me but dude...William is to busy with > Netscape trying to dick him up the ass for me to call him again... ok hippy... >> Hey, I didn't say that! Why are you talking to me? Stan From StanSqncrs at aol.com Mon Jun 1 21:25:13 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Mon, 1 Jun 1998 21:25:13 -0700 (PDT) Subject: Counterpane Cracks MS's PPTP Message-ID: In a message dated 6/1/98 10:38:20 PM Central Daylight Time, chris at cybernet.co.nz writes: << > Auto-Launch attached binaries in E-Mail <-- Can we say GoodTimes? Can anyone confirm that this has indeed been fixed yet? >> It was my understanding, that the so-called GoodTimes virus was a farce, apparently aimed at specific commercial spammers. Stan From cyburai at earthlink.net Mon Jun 1 21:27:50 1998 From: cyburai at earthlink.net (Christopher Turner) Date: Mon, 1 Jun 1998 21:27:50 -0700 (PDT) Subject: Tax revolt book Message-ID: <199806020427.VAA06278@italy.it.earthlink.net> C-punks, my apologies if this book was discussed on the list back when it first came out... in the course of cleaning up and packing in preparation for our move, I came across Bill Branon's first book, _Let Us Prey_. W/out going into any detail, the backdrop of the book takes place in present-day America where a sort of tax revolt is going on - over 1/3 of the taxpayers filed a Form 4868 - an automatic extension form - and 22% of those filers failed to enclose a check of any kind. There's a great part where the prez is freaking out because 1/3 of Americans are getting a gov't check of some kind and where the hell are they going to get the money when over another 1/3 of Americans won't pay their taxes. I highly recommend it. Take care all, and watch your six, Chris --- Ubi dubium ibi libertas Where there is doubt, there is freedom -Latin proverb From dave at bureau42.ml.org Mon Jun 1 22:17:55 1998 From: dave at bureau42.ml.org (David E. Smith) Date: Mon, 1 Jun 1998 22:17:55 -0700 (PDT) Subject: I need a compiler! In-Reply-To: <19980601.071648.10254.1.one4evil@juno.com> Message-ID: > But back to the real problem...yes, gcc would be ideal...How ever...I am > not running Linux as of yet...so do you or any of you know any OTHER > WINDOWS BASED COMPILERS that are worth a shit...I know it is a stretch > but god... um... so, why not get the Win32 port of GCC? ...dave ----- David E. Smith, P O Box 324, Cape Girardeau MO 63702 http://bureau42.base.org/people/dave/ dave at bureau42.ml.org From alan at ctrl-alt-del.com Mon Jun 1 22:23:25 1998 From: alan at ctrl-alt-del.com (Alan) Date: Mon, 1 Jun 1998 22:23:25 -0700 (PDT) Subject: Counterpane Cracks MS's PPTP In-Reply-To: <199806012143.QAA018.23@geiger.com> Message-ID: <3.0.5.32.19980601220343.04443930@ctrl-alt-del.com> At 03:23 PM 6/2/98 +1200, Chris Wedgwood wrote: > >On Mon, Jun 01, 1998 at 04:24:44PM -0500, William H. Geiger III wrote: > >> Previous security foobars by M$: >> >> NT C2 <---- LOL!!! > >Standard marketroid talk, I think M$ still tout this, but not so loudly >these days. Last I heard they were trying to get C2 with network >connectivity, but that was a while ago (2 years?) so they may have given up. >I'm sure I would have heard if it had. > >That said, C2 doesn't necessarily buy you all that much. Is this not what they claimed when they sold NT to the Air Force? Judging by some of the Air Force software I have seen, this frightens me more than most things. >> Active X <---- Who was the brain child that though *that* up? > >Sure it sucks, it sucks for lots of reasons. But for the average luser it >still better than plugins so thats why its taken off. And what make >downloading a plugin and installing that any better? You have a little more control over plug-ins. >> Auto-Launch attached binaries in E-Mail <-- Can we say GoodTimes? > >Can anyone confirm that this has indeed been fixed yet? > >I should also point out that buffer overflow bugs have been known for some >time (years?) with various unix mailers and their handling of .mailcap which >essentially amounts to the same thing. But those are specific to the client. Most Unix users know better. >> Crypto-API <--- Right I would *trust* that. Honest. :) > >Does anyone have a list of design and implementation flaws for CAPI? I've >had discussions with a couple of people about these, but never seen anything >published. I know of one, but I cannot release details yet. (I did not discover it and i need to wait until the non-beta version of the product is released.) Besides, I have been told I will be killed if I reveal it before it is time. >> TCP/IP Stack <--- Too many flaws to list. > >Yeah... its crap, but not necessarily that much worse that some of the >others out there. If someone were keeping score on which stacks help up the >best against all the attacks of the last two years it probably wouldn't be >the worst. A great deal of this blame can be placed on the WinSock spec. The spec was quite "loose" in many details of the implementation. You could be complient and still not be able to deal with much of the software out there. My vote for bad PC stack of the century was the one put out by Sun. Not even close to compatible... >> Why would anyone trust these simpletons to produce any type of security >> product? > >Sure. 95% of the population does. Sturgeon's law applies to people as well... >People need to be educated about important issues, and using lots of >complicated gobbledygook doesn't help. If you, like me, have a loved one >that isn't terribly interested in computers or encryption, then see if the >phrase 'modular exponentiation' doesn't kick there eye-glaze-secreting gland >into over drive. Most everything involving computers tends to do that. >I guess this is something Bruce Schneier has done well - a report for >technical people who will read it, laugh and say they aren't surprised, and >press releases with LOTS OF BIG LETTERS AND SMALL WORDS for the rest of the >population including morons that are the media. You can type it out in clear, short sentences and the media will still screw it up. If you have no clue as to what you are writing about, the accuracy of what you write will suffer. >I think everyone is waiting for NT5. Multi-user NT is at best an interesting >concept. I remember at university using (arguably buggy) unix boxen with >200+ users simultaneously, with relatively few problems, but I'll be really >surprised if NT could get close to this.... Multi-user NT is available now. Citrix and NCD both have versions out now. (Both are based on NT 3.51. They would have released a 4.0 product long ago, but Microsoft wanted the product for themselves.) The server load seems to be about 50 users per box. Depends on what you are running. >I am so looking forward to NT5, it should prove to be very entertaining and >perhaps a really good opportunity to educate the public. Assuming that they can be educated. Better to offer them a choice. It is hard to say "X is bad" unless you have an alternative. From chris at cybernet.co.nz Tue Jun 2 00:17:02 1998 From: chris at cybernet.co.nz (Chris Wedgwood) Date: Tue, 2 Jun 1998 00:17:02 -0700 (PDT) Subject: Counterpane Cracks MS's PPTP In-Reply-To: Message-ID: <19980602191625.A14758@caffeine.ix.net.nz> On Tue, Jun 02, 1998 at 12:20:11AM -0400, StanSqncrs at aol.com wrote: > In a message dated 6/1/98 10:38:20 PM Central Daylight Time, > chris at cybernet.co.nz writes: > > << > Auto-Launch attached binaries in E-Mail <-- Can we say GoodTimes? > > Can anyone confirm that this has indeed been fixed yet? >> > > It was my understanding, that the so-called GoodTimes virus was a farce, > apparently aimed at specific commercial spammers. GoodTimes is a hoax. I'm talking about a bug in Outlook (Express?) that will execute code when email messages are opened. -Chris From icollins at sol.co.uk Tue Jun 2 01:45:25 1998 From: icollins at sol.co.uk (Iain Collins) Date: Tue, 2 Jun 1998 01:45:25 -0700 (PDT) Subject: I need a compiler! Message-ID: <3573BB3C.BFF57DC@sol.co.uk> >> And J-Dog, what is up with the fucked up lingo...This ain't the movies... >fucked up lingo? gee, I am very sorry if your small mind can not make out >my words.. but I can assure you that this is NOT fucked up lingo... go >read some h4x0r Br0s and then tell me about how fuct up my lingo is.... > >Latez >JD > >btw... congrats on your really kool superl33t juno.com account.. you are >r33t now. Both of you lose all all guru/elite points accumulated thus far by wasting bandwidth due to (repeatedly) inapproproately posting to the CypherPunks mailling list. Doh! Iain Collins, icollins at sol.co.uk From chris at cybernet.co.nz Tue Jun 2 04:16:03 1998 From: chris at cybernet.co.nz (Chris Wedgwood) Date: Tue, 2 Jun 1998 04:16:03 -0700 (PDT) Subject: Counterpane Cracks MS's PPTP In-Reply-To: <199806012143.QAA018.23@geiger.com> Message-ID: <19980602231500.A532@caffeine.ix.net.nz> On Mon, Jun 01, 1998 at 10:03:43PM -0700, Alan wrote: > >That said, C2 doesn't necessarily buy you all that much. > > Is this not what they claimed when they sold NT to the Air Force? Judging > by some of the Air Force software I have seen, this frightens me more than > most things. Either M$ lied, or the Air Force should no better. In the former, the Air Force should sue M$, but more likely its the latter. Why should the Air Force have clue-full people when most large corporates, banks, governments, IT companies and software companies do not? Governments with large databases full of all your personal details and banks with all your financial details are two really good examples of organizations which should do a good job with system security and reliability but invariably do the worst (some exceptions apply). > >Sure it sucks, it sucks for lots of reasons. But for the average luser it > >still better than plugins so thats why its taken off. And what make > >downloading a plugin and installing that any better? > > You have a little more control over plug-ins. It doesn't really buy much. Most people will blindly download anything and install it. If it doesn't install the first time by finding all the right file locations, etc. and allowing the use to click Next every time, they will start deleting files at random trying to remove it. Perhaps I'm over stating things, but I'm a tad jaded from having to make documentation and software work for morons (the public at large). > But those are specific to the client. Most Unix users know better. The M$ example is confined to a specific client. Many unix users use unix because they are required too, these people are probably as clue-less and luse95 users. On average the number of clue-full 95 users against the number of clue-full unix users is probably 10:1 despite luse95 large user base, quoting numbers which I just made up of course and clue-full being defined by me, and able to be redefined whenever I feel like it. This is all beside the point - someone mentioned that a M$ mailer had a very nasty bug, I just pointed out that can and has also occurred elsewhere. > >Does anyone have a list of design and implementation flaws for CAPI? I've > >had discussions with a couple of people about these, but never seen > >anything published. > > I know of one, but I cannot release details yet. (I did not discover it > and i need to wait until the non-beta version of the product is released.) > Besides, I have been told I will be killed if I reveal it before it is > time. It can wait. It seems plenty of others are waiting.... > >Yeah... its crap, but not necessarily that much worse that some of the > >others out there. If someone were keeping score on which stacks help up > >the best against all the attacks of the last two years it probably > >wouldn't be the worst. > > A great deal of this blame can be placed on the WinSock spec. The spec > was quite "loose" in many details of the implementation. You could be > complient and still not be able to deal with much of the software out > there. The issues most people complain about are not related to the WinSock API, but poor coding in the stack that make stack overflows and memory buffer curruption trivial. Similar bugs used to exist in the *BSD and linux stacks, as with the streams library used by SCO and Solaris (although maybe solaris has something funny there). > My vote for bad PC stack of the century was the one put out by Sun. > Not even close to compatible... No, my shit-stack-off-the-week (I just decided now) goes to Ultrix stack which barfs on unknown tcp options and hence is complete fucked when tying to comminicate with a recent *BSD or linux boxes, solaris and possible Win98/NT5. > Sturgeon's law applies to people as well... ? Sorry... don't know it. > >People need to be educated about important issues, and using lots of > >complicated gobbledygook doesn't help. If you, like me, have a loved one > >that isn't terribly interested in computers or encryption, then see if > >the phrase 'modular exponentiation' doesn't kick there > >eye-glaze-secreting gland into over drive. > > Most everything involving computers tends to do that. Only because people are fed bullshit and lies by 80% of the industry 'consultants' who don't know much and use big words to cover this up. I really think people would be much more willing if they weren't feed so much crap at times. > You can type it out in clear, short sentences and the media will still > screw it up. If you have no clue as to what you are writing about, the > accuracy of what you write will suffer. Again, the above applies, but bear in mind that most people in the modern media have little interest in the truth unless it helps sales, and if not then just 'modify the story a bit'. It also helps to consider that most reporters are pretty dumb and lack any real qualifications to talk about the things that they do, PC rag. editors being a really good example. Lets face it, we use the 'net and crypto, so we are dirty filthy prevented peadophile unabomber criminals who are going to pervert the youth and corrupt the America way. If you deny this it just proves what an untrustworthy person you are. > Multi-user NT is available now. Citrix and NCD both have versions out now. > (Both are based on NT 3.51. They would have released a 4.0 product long > ago, but Microsoft wanted the product for themselves.) The server load > seems to be about 50 users per box. Depends on what you are running. Slightly different that NT5 though... I know people working on large Citrix boxes with 2GB of ram and they speak quite highly of it, but their 40+ users are running custom apps. with an NT4 like gui. I'm not so sure it would work so great with 10+ people running Visual C++ to compile and debug code.... where as unix boxen have been doing this for years with 500+ people. What really sucks is there is some nice ideas in bits of NT, only what little kewl stuff there is has lost all credibility because of the atrociously large bloated buggy code that constitutes the other 99% of it. > Assuming that they can be educated. Better to offer them a choice. It is > hard to say "X is bad" unless you have an alternative. The real shame in all this is there is no really viable choice to the evil borg. Not yet anyhow.... -Chris From adam at homeport.org Tue Jun 2 05:19:38 1998 From: adam at homeport.org (Adam Shostack) Date: Tue, 2 Jun 1998 05:19:38 -0700 (PDT) Subject: Commerce Echelon In-Reply-To: Message-ID: <199806021218.IAA27678@homeport.org> Robert Hettinga wrote: | > Any information on this unit and | > how it decides who gets which secrets? | | It helps if you're Chinese or Indonesian... I am shocked, shocked, to hear you suggest such a thing about our government. They don't care about these people's ethnicity, only their wallets. Thus, its helps if you're rich or stinkin' rich. That it came from the sweat of the peasants doesn't matter a whit. Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From kemp at indusriver.com Tue Jun 2 06:09:55 1998 From: kemp at indusriver.com (Brad Kemp) Date: Tue, 2 Jun 1998 06:09:55 -0700 (PDT) Subject: Counterpane Cracks MS's PPTP In-Reply-To: Message-ID: <3.0.3.32.19980602090947.0317cc10@pop3.indusriver.com> This is a good paper. It covered almost all of the failures of MS PPTP. However, I think it missed a big one. It is possible to recover all the clear text from a PPTP session, even if most of the traffic is going in one direction only. The failure is in MPPE. When MPPE gets a sequenceing error, it resets the key. This causes the cipher stream to be reset. It is partially covered in section 5.4 . Since RC4 is a stream cipher, it generates the same cipher stream for a given key. This cipher stream is XORed with the clear text. To recover the clear text, an attacker just needs to force a resyncronization by sending a packet that has a bogus coherency count. If the attacker captures the original stream and the resynchronized stream a simple XOR of the two streams results in an XOR of the cleartext. While compression does make it harder to determine what the cleartext is, It is likely that a determined attacker can decrypt and decompress the XORed result. Brad Brad Kemp Indus River Networks, Inc. BradKemp at indusriver.com 31 Nagog Park 978-266-8122 Acton, MA 01720 fax 978-266-8111 From icollins at scotland.net Tue Jun 2 08:20:43 1998 From: icollins at scotland.net (Iain Collins) Date: Tue, 2 Jun 1998 08:20:43 -0700 (PDT) Subject: Counterpane Cracks MS's PPTP In-Reply-To: <19980602152326.B32084@caffeine.ix.net.nz> Message-ID: <002301bd8e39$c8b18880$c7f3b094@webadmin.sol.co.uk> As reguards: > Previous security foobars by M$: > > NT C2 <---- LOL!!! I beleive that no operating system has ever been given a C2 certification, and that only indiviual installations can be certifed. This requries that each installation be transported and conducted under armed guard, which is case with certain US government Microsoft NT Workstation installations. It is also stated (somewhere, but I don't have the details to hand) that no C2 rated system should be plugged in to an external network connection (i.e. the internet), and that only connections to secure LAN's/WAN's are permitted (otherwise the C2 certification is meaningless, hence why NT Sever has never been C2 certified IIRC). I would be grateful if anyone can categorically deny or in any way support this. > Auto-Launch attached binaries in E-Mail <-- Can we say GoodTimes? The GoodTimes virus was, according to the DOE's CAIC a hoax. This is also my personal opinion. This is what DOE's CAIC have to say: http://ciac.llnl.gov/ciac/CIACHoaxes.html#goodtimes Or, more amusingly. http://ciac.llnl.gov/ciac/CIACHoaxes.html#goodspoof However All E-mail readers that support HTML & JavaScript/Java/Active-X are inherantly insecure. This inlcudes Netscape Navigator and Microsoft Outlook, where mearly the act of previewing a malicious message can cause adverse effects. If anyone were to include a embed a malicious Java or Active-X control then the supposed sandbox in Windows 9X/NT would be ineffectual as one could conceviably create a control which could execute software anywhere on the hard disk (this has already been done using both Active-X and IE under Windows 95). Thus it follows that it could determain what viewer it is being read under and execute any other attachments in the same e-mail from where the are stored (in Netscape/Outlook) which could then... Iain Collins, icollins at sol.co.uk From paulmerrill at acm.org Tue Jun 2 09:37:48 1998 From: paulmerrill at acm.org (Paul H. Merrill) Date: Tue, 2 Jun 1998 09:37:48 -0700 (PDT) Subject: Counterpane Cracks MS's PPTP In-Reply-To: <002301bd8e39$c8b18880$c7f3b094@webadmin.sol.co.uk> Message-ID: <3574553D.3F0BE65A@acm.org> Iain Collins wrote: <> > I beleive that no operating system has ever been given a C2 certification, > and that only indiviual installations can be certifed. > Both Right and WrongC2 (or other) certification is given to a product system, not an OS nor an installation. NT on a specific configuration of a specific manufacturer, fo instance. (and with a specific mix of other software) The intent was to make available Commercial Off The Shelf (COTS) systems for gov purchase.) But the concept was generated in the mainframe/Mini frame of mind. > This requries that each installation be transported and conducted under > armed guard, which is case with certain US government Microsoft NT > Workstation installations. > > It is also stated (somewhere, but I don't have the details to hand) that no > C2 rated system should be plugged in to an external network connection (i.e. > the internet), and that only connections to secure LAN's/WAN's are permitted > (otherwise the C2 certification is meaningless, hence why NT Sever has never > been C2 certified IIRC). > The network issue is one with deep ramifications and not as simple as listed in the above Para. Two totally secure nets can be not secure when connected to each other because of the data interface for security levels, user permisisions etc. > I would be grateful if anyone can categorically deny or in any way support > this. > NCSC has a whole line of books on it all. Red is the Network Interpretation, Orange is the Criteria itself. > <> PHM author, NOT the Orange Book -- A Guide to the Definition, Specification, Tasking, and Documentation for the Development of Secure Computer Systems -- Including Condensations of the Memebers of the Rainbow Series and Related Documents, Merlyn Press, WPAFB, 1992 NTOB is available for those who want it. From richardt at midgard.net Tue Jun 2 14:02:09 1998 From: richardt at midgard.net (Richard Threadgill) Date: Tue, 2 Jun 1998 14:02:09 -0700 (PDT) Subject: subscribe richardt@midgard.net Message-ID: <29466.896821142@yggdrasil.midgard.net> From gwb at gwb.com.au Tue Jun 2 15:57:13 1998 From: gwb at gwb.com.au (Global Web Builders) Date: Tue, 2 Jun 1998 15:57:13 -0700 (PDT) Subject: Pauline Hanson's speech in parliament Message-ID: <1.5.4.32.19980602225151.00b8d840@mail.pronet.net.au> G'day, The media are once again blatantly misrepresenting the issues that Pauline Hanson raised in parliament yesterday. We would invite you to see for yourself a verbatim transcript of what she said and view direct links to the ATSIC and UN home pages which confirm her concerns on the issues raised such as the planned "formation of independent Aboriginal states" in Australia. View: http://www.gwb.com.au/un.html Be informed! Do not believe the lies the media tell. Please print out her speech and distribute it freely. GWB Scott Balson From jtatz at chemistry.ohio-state.edu Tue Jun 2 16:10:10 1998 From: jtatz at chemistry.ohio-state.edu (Jim Tatz) Date: Tue, 2 Jun 1998 16:10:10 -0700 (PDT) Subject: WinNT C2? In-Reply-To: <002301bd8e39$c8b18880$c7f3b094@webadmin.sol.co.uk> Message-ID: Windows NT4.0 has been tested under the red book spec published by the NCSC. That means in effect, NT is C2 compliant in a stand alone environment. Howver, NT does NOT comply with the orange book spec which defines additional requirements when the machine is used in a networked environment. It *IS* possible for an operating system that is on a networked machine to be C2(Orange Book) compliant. Microsoft has never stated that it is C2 compliant on a network, however their page about C2 and NT is poorly worded, and effectively discounts the importance of the Orange Book spec. It would be fun to get ahold of the specs from the NCSC. -Jim From caj at math.niu.edu Tue Jun 2 16:31:53 1998 From: caj at math.niu.edu (Xcott Craver) Date: Tue, 2 Jun 1998 16:31:53 -0700 (PDT) Subject: Counterpane Cracks MS's PPTP In-Reply-To: <3.0.3.32.19980602090947.0317cc10@pop3.indusriver.com> Message-ID: On Tue, 2 Jun 1998, Brad Kemp wrote: > It is possible to recover all the clear text from a PPTP session, > even if most of the traffic is going in one direction only. > The failure is in MPPE. When MPPE gets a sequenceing error, it > resets the key. This causes the cipher stream to be reset. It is > partially covered in section 5.4. I really think the XOR weaknesses deserve as much publicity as possible, because they are IMHO the simplest to exploit, and the result of the dumbest mistakes. So far we have three: 40-bit RC4 uses the same key with every session (!!), the client and server seems to encrypt with the same key stream going both ways (!!!), and then this resequencing attack. Are all three of these fixed? The certainly aren't "theoretical." ==- Xcott Craver -- Caj at niu.edu -- http://www.math.niu.edu/~caj/ -== "This is a different thing: it's spontaneous and it's called 'wit.'" -The Black Adder From whgiii at invweb.net Tue Jun 2 16:51:48 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Tue, 2 Jun 1998 16:51:48 -0700 (PDT) Subject: WinNT C2? In-Reply-To: Message-ID: <199806022355.SAA008.18@geiger.com> -----BEGIN PGP SIGNED MESSAGE----- In , on 06/02/98 at 07:09 PM, Jim Tatz said: >Windows NT4.0 has been tested under the red book spec published by the >NCSC. That means in effect, NT is C2 compliant in a stand alone >environment. Howver, NT does NOT comply with the orange book spec which >defines additional requirements when the machine is used in a networked >environment. It *IS* possible for an operating system that is on a >networked machine to be C2(Orange Book) compliant. Microsoft has never >stated that it is C2 compliant on a network, however their page about C2 >and NT is poorly worded, and effectively discounts the importance of the >Orange Book spec. >It would be fun to get ahold of the specs from the NCSC. You have this backward, The "Red Book": NCSC-TG-005 "Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria" The "Orange Book": DOD 5200.28-STD "DOD Trusted Computer System Evaluation Criteria" A NT machine to meet DOD 5200.28 C2 rating needs to be seriously crippled when comapired to normal operation. No removable media, No Modem, No Network Connection, hell pluging the dam thing and turning it on probably puts it's C2 rating in jepordy. The reason M$ downplays their C2 rating is that in average day to day use of this OS it does not meet this rating. NT has never had any RedBook rating and is not certified for use in a secure network. - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html - --------------------------------------------------------------- Tag-O-Matic: OS/2 means...CURTAINS for Windows! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNXSQ/I9Co1n+aLhhAQH0/AQAmuhCSKG8mogzfbvq9x7Z90vghRWPOKzJ 4AMffpsPh4mpUnx6VHPLBksa4j3lyUh/67WwqozILzDna1fXfbYu/7eFsWltjw2n yb1YQKOIhJU+SgbO5kSfakc3oGaKAXElmHDcdTWJdl+g6PShDTM6KXRPgqcMi55I jfnqVPDKics= =CPFu -----END PGP SIGNATURE----- From ryan at michonline.com Tue Jun 2 16:54:58 1998 From: ryan at michonline.com (Ryan Anderson) Date: Tue, 2 Jun 1998 16:54:58 -0700 (PDT) Subject: WinNT C2? In-Reply-To: Message-ID: On Tue, 2 Jun 1998, Jim Tatz wrote: > > Windows NT4.0 has been tested under the red book spec published by the > NCSC. That means in effect, NT is C2 compliant in a stand alone > environment. Howver, NT does NOT comply with the orange book spec which > defines additional requirements when the machine is used in a networked > environment. It *IS* possible for an operating system that is on a > networked machine to be C2(Orange Book) compliant. Microsoft has never > stated that it is C2 compliant on a network, however their page about C2 > and NT is poorly worded, and effectively discounts the importance of the > Orange Book spec. > > It would be fun to get ahold of the specs from the NCSC. I believe you've got your colors backwards here.. NT is C2 compliant in standalone format, with Posix disabled. It's an unusable configuration. That's all I can remember off the top of my head though.. Ryan Anderson PGP fp: 7E 8E C6 54 96 AC D9 57 E4 F8 AE 9C 10 7E 78 C9 From jtatz at chemistry.ohio-state.edu Tue Jun 2 17:14:27 1998 From: jtatz at chemistry.ohio-state.edu (Jim Tatz) Date: Tue, 2 Jun 1998 17:14:27 -0700 (PDT) Subject: WinNT C2? In-Reply-To: <199806022355.SAA008.18@geiger.com> Message-ID: > A NT machine to meet DOD 5200.28 C2 rating needs to be seriously crippled > when comapired to normal operation. No removable media, No Modem, No > Network Connection, hell pluging the dam thing and turning it on probably > puts it's C2 rating in jepordy. > > The reason M$ downplays their C2 rating is that in average day to day use > of this OS it does not meet this rating. > > NT has never had any RedBook rating and is not certified for use in a > secure network. In addition to the converstaion, MS says: Microsoft has opted not to include certain components of Windows NT in the evaluation process, not because they would not pass the evaluation, but to save time by reducing the load on the NSA. Additionally, the MS-DOS/Windows on Windows (WOW) system may be treated as a Win32 application and would therefore not need to be evaluated as part of the Trusted Computer Base (TCB). Networking on NT may not have to go through the "Red Book," or "Trusted Network Interpretation." It may be enough to consider networking to be another subsystem, and therefore only the Orange Book would apply. New or modified components and other hardware platforms can go through a "RAMP" process to be included in the evaluation at a later time. http://support.microsoft.com/support/kb/articles/q93/3/62.asp [Isn't it great, you have to register for FREE support?] -Jim From DarkKnight at Elitehackers.org Tue Jun 2 17:42:52 1998 From: DarkKnight at Elitehackers.org (Dark Knight) Date: Tue, 2 Jun 1998 17:42:52 -0700 (PDT) Subject: WinNT C2? In-Reply-To: <199806022355.SAA008.18@geiger.com> Message-ID: > > >Windows NT4.0 has been tested under the red book spec published by the > >NCSC. That means in effect, NT is C2 compliant in a stand alone > >environment. Howver, NT does NOT comply with the orange book spec which > >defines additional requirements when the machine is used in a networked > >environment. It *IS* possible for an operating system that is on a > >networked machine to be C2(Orange Book) compliant. Microsoft has never > >stated that it is C2 compliant on a network, however their page about C2 > >and NT is poorly worded, and effectively discounts the importance of the > >Orange Book spec. Do you know the Redbook specs? From my understanding of the specs to have a C2 rateing you can't have a NIC card or Disk Drive. But I think you can have a NIC card in the machine connected to a network that is enrycpted network. But I could be wrong but I don't forget most of what I read.. > > >It would be fun to get ahold of the specs from the NCSC. > > You have this backward, > > The "Red Book": NCSC-TG-005 "Trusted Network Interpretation of the Trusted > Computer System Evaluation Criteria" > The "Orange Book": DOD 5200.28-STD "DOD Trusted Computer System Evaluation > Criteria" > > A NT machine to meet DOD 5200.28 C2 rating needs to be seriously crippled > when comapired to normal operation. No removable media, No Modem, No > Network Connection, hell pluging the dam thing and turning it on probably > puts it's C2 rating in jepordy. > > The reason M$ downplays their C2 rating is that in average day to day use > of this OS it does not meet this rating. > > NT has never had any RedBook rating and is not certified for use in a > secure network. MS is haveing problems meeting the standards and they have alot of work to do on NT when it comes to Secuirty. Any was see MSN.com today? |)ark |(night DEFINITION. Windows 95: n. 32 bit extensions and a graphical shell for a 16 bit patch to an 8 bit operating system originally coded for a 4 bit microprocessor, written by a 2 bit company, that can't stand 1 bit of competition. Http://www.EliteHackers.org/DarkKnight From whgiii at invweb.net Tue Jun 2 18:22:02 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Tue, 2 Jun 1998 18:22:02 -0700 (PDT) Subject: WinNT C2? In-Reply-To: Message-ID: <199806030125.UAA009.35@geiger.com> -----BEGIN PGP SIGNED MESSAGE----- In , on 06/02/98 at 08:14 PM, Jim Tatz said: >In addition to the converstaion, MS says: >Microsoft has opted not to include certain components of Windows NT in >the evaluation process, not because they would not pass the evaluation, >but to save time by reducing the load on the NSA. Additionally, the >MS-DOS/Windows on Windows (WOW) system may be treated as a Win32 >application and would therefore not need to be evaluated as part of the >Trusted Computer Base (TCB). Networking on NT may not have to go through >the "Red Book," or "Trusted Network Interpretation." It may be enough to >consider networking to be another subsystem, and therefore only the >Orange Book would apply. New or modified components and other hardware >platforms can go through a "RAMP" process to be included in the >evaluation at a later time. Good God what kind of double talk is this? It doesn't need Red Book eval. and networking can be treated as a sub-system?!? Well I guess the guys down at NSA just wrote the Red Book (which is significantly larger than the Orange Book) because they were board. I would not trust Micky$lop to tell me that the sky was blue and water was wet let alone trust them to provide *any* form of security product. - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html - --------------------------------------------------------------- Tag-O-Matic: Get OS/2 - the best Windows tip around! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNXSmHI9Co1n+aLhhAQEdowP9FsXmZOEk8KMKvgVun8wbMQqIUoGjB3wj e+dXsPglA/ya2S2+/wwdQFW2UEXvqHYR4MNV8Af/jqnxQgOk//4ZJVUrf+dkd65u dOfa2eICbFyRg8OgZZgWDXFr1IvgLpcS36U0V+LyebaoyCqI/WsMnx6zcx8qEzHs iiF7kDJJPmE= =HBxD -----END PGP SIGNATURE----- From whgiii at invweb.net Tue Jun 2 18:46:20 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Tue, 2 Jun 1998 18:46:20 -0700 (PDT) Subject: WinNT C2? In-Reply-To: Message-ID: <199806030150.UAA009.49@geiger.com> -----BEGIN PGP SIGNED MESSAGE----- In , on 06/02/98 at 12:35 PM, Dark Knight said: >Do you know the Redbook specs? From my understanding of the specs to >have a C2 rateing you can't have a NIC card or Disk Drive. But I think >you can have a NIC card in the machine connected to a network that is >enrycpted network. But I could be wrong but I don't forget most of what >I read.. You are making the same mistake the previous poster made on this. Orange Book == Standalone Red Book == Network The numerious criteria for the various levels of trusted systems are too numerious to list here. I *strongly* recomend obtaining copies of the Rainbow Series from the NSA (they will mail a copy for free) and studying the documentation. They are well written and easy to read (unlike many such papers which are techno-bable filled). There are aprox. 30 manuals in the Rainbow Series that cover a wide range of topics related to Trusted Systems of which the Orange Book is a small part. I doubt you could find more than 5 M$ employees that have read more than a quarter of the manuals let alone are able to implement their principals. - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html - --------------------------------------------------------------- Tag-O-Matic: I love running Windows! NOT! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNXSr2Y9Co1n+aLhhAQGtDAQApkDb/TiweTEuMnijTqOVcwcFuqQGKh/7 wZjiBu6S+VcyVUj/dcTyUwszqD1vuBUuevD8W9+dGdqjxRz/P8nxYelqaZfza997 sraI5Wc3MjGxp64plbRAt6qOzZjfFCXOv/ZSuRrf9tXjHFJeZz0KSkNex3Haz54j zmxljrbnmB8= =J5Mg -----END PGP SIGNATURE----- From q772d3 at att.net Tue Jun 2 19:31:51 1998 From: q772d3 at att.net (q772d3) Date: Tue, 2 Jun 1998 19:31:51 -0700 (PDT) Subject: No Subject Message-ID: <19943672.886214@relay.comanche.denmark.eu> Authenticated sender is Subject: q 77 Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit EMAIL MARKETING WORKS!! Bull's Eye Gold is the PREMIER email address collection tool. This program allows you to develop TARGETED lists of email addresses. Doctors, florists, MLM, biz opp,...you can collect anything...you are only limited by your imagination! You can even collect email addresses for specific states, cities, and even countries! All you need is your web browser and this program. Our software utilizes the latest in search technology called "spidering". By simply feeding the spider program a starting website it will collect for hours. The spider will go from website to targeted website providing you with thousands upon thousands of fresh TARGETED email addresses. When you are done collecting, the spider removes duplicates and saves the email list in a ready to send format. No longer is it necessary to send millions of ads to get a handful of responses...SEND LESS...EARN MORE!!! A terrific aspect of the Bull's Eye software is that there is no difficult set up involved and no special technical mumbo-jumbo to learn. All you need to know is how to search for your targeted market in one of the many search engines and let the spider do the rest! Not familiar with the search engines? No problem, we provide you with a list of all the top search engines. Just surf to the location of a search engine on your browser then search for the market you wish to reach...it's that easy! For instance if you were looking for email addresses of Doctors in New York all you would do is: 1) Do a search using your favorite search engine by typing in the words doctor(s) and New York 2) Copy the URL (one or more)...that's the stuff after the http://... for instance it might look like http://www.yahoo.com/?doctor(s)/?New+York 3) Press the START button THAT's IT!!! The Bull's Eye spider will go to all the websites that are linked, automatically extracting the email addresses you want. The spider is passive too! That means you can let it run all day or all night while you are working on important things or just having fun on your computer. There is no need to keep a constant watch on it, just feed it your target market and give it praise when it delivers thousands of email addresses at the end of the day! Features of the Bull's Eye Software: * Does TARGETED searches of websites collecting the email addresses you want! * Collects Email addresses by City, State, even specific Countries * Runs Automatically...simply enter the Starting information, press The Start Button, and it does the rest * Filters out duplicates * Keeps track of URLs already visited * Can run 24 hours per day, 7 days per week * Fast and Easy List Management * Also has built in filtering options...you can put in words that it "Must" have while searching,...you can even put in criteria that it "Must NOT Have"...giving you added flexibility * Also imports email addresses from any kind of files (text files, binary files, database files) * List editor handles Multiple files to work on many lists simultaneously * Has a Black-Book feature... avoid sending emails to people who do not want to receive it * Built-in Mail program...send email directly on the internet with just a click of your mouse * Personalized Emails...if the email address has the user's name when it is collected,..you can send Personalized emails!!! * Sort by Location, Server, User Name, Contact Name * Advanced Operations: � Email address lists export in many different formats (HTML, Comma delimited, text file) � Advanced editing...Transfer, Copy, Addition, Delete, Crop, Move to Top/Bottom � Operations between lists...Union, Subtraction, Comparison * Program is Passive,...meaning you can run other programs at the same time CALL FOR MORE INFORMATION 213-980-7850 CALL FOR MORE INFORMATION 213-980-7850 ORDERING INFORMATION Customer Name Company Name Address City State Zip Phone Fax Email Address ______ BULL'S EYE SOFTWARE $259.00 Includes Software, Instructions, Technical Support ______ Shipping & Handling (2-3 Day Fedex) $10.00 (Fedex Overnite) $20.00 ______ TOTAL (CA Residents add applicable sales tax) *All orders are for Win 95 and Win NT *****CREDIT CARDS ACCEPTED***** MASTERCARD VISA AMEX PLEASE CALL 213-980-7850 to process your order 9am-5pm Pacific Time Checks or Money Orders send to: WorldTouch Network Inc. 5670 Wilshire Blvd. Suite 2170 Los Angeles, CA 90036 Please note: Allow 5 business days for all checks to clear before order is shipped. From jimmy at weboneinc.net Tue Jun 2 20:29:48 1998 From: jimmy at weboneinc.net (jimmy at weboneinc.net) Date: Tue, 2 Jun 1998 20:29:48 -0700 (PDT) Subject: $25.00 Signup! Message-ID: <199806030329.XAA32240@josh1.weboneinc.com> This message is intended for Adult Webmasters only. We are sorry if you received this message in error. Just type remove and put your e-mail address on the subject line. Thank you for your consideration. Hello, Earn $25.00 per signup! XTV- 2000's adult webmaster referral program pays you $25.00 for every person that signs up on our site! You get paid more than any other program! We have the hottest online hardcore videos and spy-cams that everyone wants to see, so it will be easy to make money with our high commisions. Real time stats, bi-monthly payout, and all other details are on the sign-up page: http://208.156.131.103/xtv Sign-up and start making money right now! Thanks, Jim Stevenson VP Marketing XTV-2000 jimmy at weboneinc.net From DarkKnight at Elitehackers.org Tue Jun 2 21:32:09 1998 From: DarkKnight at Elitehackers.org (Dark Knight) Date: Tue, 2 Jun 1998 21:32:09 -0700 (PDT) Subject: WinNT C2? In-Reply-To: <199806030150.UAA009.49@geiger.com> Message-ID: > -----BEGIN PGP SIGNED MESSAGE----- > > In , on > 06/02/98 > at 12:35 PM, Dark Knight said: > > >Do you know the Redbook specs? From my understanding of the specs to > >have a C2 rateing you can't have a NIC card or Disk Drive. But I think > >you can have a NIC card in the machine connected to a network that is > >enrycpted network. But I could be wrong but I don't forget most of what > >I read.. > > You are making the same mistake the previous poster made on this. > > Orange Book == Standalone > Red Book == Network > > The numerious criteria for the various levels of trusted systems are too > numerious to list here. I *strongly* recomend obtaining copies of the > Rainbow Series from the NSA (they will mail a copy for free) and studying > the documentation. They are well written and easy to read (unlike many > such papers which are techno-bable filled). > > There are aprox. 30 manuals in the Rainbow Series that cover a wide range > of topics related to Trusted Systems of which the Orange Book is a small > part. I doubt you could find more than 5 M$ employees that have read more > than a quarter of the manuals let alone are able to implement their > principals. I had a copy but like a dumb ass I forgot them where I used to live. I don't think the NSA or DOD I think it's the NSA gives away free copys any more.. |)ark |(night DEFINITION. Windows 95: n. 32 bit extensions and a graphical shell for a 16 bit patch to an 8 bit operating system originally coded for a 4 bit microprocessor, written by a 2 bit company, that can't stand 1 bit of competition. Http://www.EliteHackers.org/DarkKnight From samantha21 at worldnet.att.net Tue Jun 2 21:53:36 1998 From: samantha21 at worldnet.att.net (samantha21 at worldnet.att.net) Date: Tue, 2 Jun 1998 21:53:36 -0700 (PDT) Subject: Lunch... Message-ID: <199806030453.AAA18564@spruce.libertynet.org> The Best Adults Only Website I've Seen! This one has EVERYTHING! Take a Look CLICK ONCE From awhite at indigo.ie Tue Jun 2 22:06:40 1998 From: awhite at indigo.ie (Andrew White) Date: Tue, 2 Jun 1998 22:06:40 -0700 (PDT) Subject: WinNT C2? Message-ID: <008e01bd8ead$5cdc4db0$0100007f@localhost> Versions are important, too... Quote from current Microsoft Web site... " evaluation along with the US TCSEC class C2 evaluation completed in 1995 for Windows NT 3.5 demonstrates Microsoft's commitment to building a secure operating system and continuing to provide customers with assurance of its security characteristics based on these evaluations>" NT 4.0 has never passed ANY security evaluation. NT 3.51 passed a UK one in October 1996, NT 3.5 passed C2 in 1995. Both these earlier versions are effectively unusable due to diverse and numerous bugs unrelated to security, and both the evaulations were without a network card. Later, Andrew. From jtatz at chemistry.ohio-state.edu Tue Jun 2 23:05:48 1998 From: jtatz at chemistry.ohio-state.edu (Jim Tatz) Date: Tue, 2 Jun 1998 23:05:48 -0700 (PDT) Subject: WinNT C2? - How about WinNT and some C-4? In-Reply-To: <008e01bd8ead$5cdc4db0$0100007f@localhost> Message-ID: > NT 4.0 has never passed ANY security evaluation. NT 3.51 passed a UK one in > October 1996, NT 3.5 passed C2 in > 1995. Both these earlier versions are effectively unusable due to diverse > and numerous bugs unrelated to security, > and both the evaulations were without a network card. Surprisingly enough NT4.0 has not received the C2 rating, although I could have sworn I have seen remarks about Nt4.0 and C2 certification on a Microsoft page. According to WIRED, NT 4.0 is undergoing testing, and will supposedly be certified in Oct. Apparently the gov't isn't too happy with the way MS is bluring the edges of C2 certification of their products [Which they are buying]. http://www.wired.com/news/news/technology/story/12121.html -Jim From billp at nmol.com Tue Jun 2 23:18:02 1998 From: billp at nmol.com (bill payne) Date: Tue, 2 Jun 1998 23:18:02 -0700 (PDT) Subject: refrigerator magnet Message-ID: <35734441.38FF@nmol.com> Monday 6/1/98 6:05 PM Masanori I put the refrigerator magnet 1945 509th COMPOSITE GROUP 1995 FIRST ATOMIC BOMBARDMENT 50th ANNIVERSARY in the mail to you today. Reason I sent the magnet is to show THAT THERE ARE SOME REALLY-SICK MINDS [see reverse side of magnet] IN POWER in the US. Just got off the phone with John Young. Governments, including Japan, TRY to mess with peoples' minds. There is a book on this. http://www.amazon.com/exec/obidos/quicksearch-query/002-2147604-1106833 But I have a solution. I do not read e-mail. At this time. I also believe in what Kahn wrote Thursday, March 20, 1980, 09:30 David Kahn addressed Congress, the Committee on Government Operations. Kahn stated to the committee, A final benefit is that refusing to restrict cryptologic studies erects yet another rampart against the chipping away of American liberties. Is this rampart, again, worth the danger to national security? Yes, because the danger is not as acute as the N.S.A. wishes people to see it. N.S.A. wants people to think that publication of cryptologic material would slam shut its window into the Third World countries. In fact such publication has little effect ... The national security dangers are not so great as to dismantle individual freedom. For all of these reasons, then, no limitation should be placed on the study of cryptology. And beyond them all lies something more fundamental, in the end, will probably prevent any restrictions anyway. It is called the First Amendment. I thank you. I hope you see that I am using the seventh amendment. http://www.jya.com/whp052898.htm And even more adamantly I believe For what shall it profit a man if he shall gain the whole world and lose his own soul. Kahn on Codes page 172 Best regards bill From billp at nmol.com Tue Jun 2 23:20:54 1998 From: billp at nmol.com (bill payne) Date: Tue, 2 Jun 1998 23:20:54 -0700 (PDT) Subject: Dr. Abdul Qadeer [Kahn] Message-ID: <3571FB7B.7338@nmol.com> Sunday 5/31/98 6:06 PM J Orlin Grabbe Read at http://www.aci.net/kalliste/ tonight India vs. Pakistan Another Pakistan Nuke.. Dr. Abdul Qadeer Friday 5/15/1998 Albuquerque Journal, Universal Press Syndicate, Syndicated Columnist Richard Reeves writes U.S. Indignation at India�s Nuclear Testing Hypocritical London - So, India has conducted its second test of a nuclear weapon, and its third, fourth, and fist and sixth, in the past few days. That put it 1,026 tests behind the United States. ... This has been coming for a long, time - and we have been foolish or deliberately looking the wrong way for decades. Fifteen years ago, in 1983, we the Reeves family, were living in the district called E-7, the best neighborhood in Islamabad, the capital of Pakistan. (My wife was doing work involving refugee camps in the northwest of the country, across the border from the Afghan-Soviet war.) Like everyone else around there, including American diplomats, we knew why military car arrived each morning to take the fellow around the corer, Abdel Qadeer Kahn, to his office - or laboratory. Kahn was in charge of building the bomb out in the Pakistani desert at a place called Kahuta. This was the so-called �Islamic bomb� ready for use against India, which had conducted its first test in 1974. Whatever we though, Pakistanis believed nuclear weapons were essential to checkmate the change of being overwhelmed by India., their 10-time-as-big neighbor. ... Small world. See Los Angeles Times syndicated columnist Richard Reeves at http://www.jya.com/whp052898.htm John Young's voice telephone is being picked-up by his fax tonight. Let's all hope for prompt peaceful settlement of the unfortunate matter. Later bill From billp at nmol.com Tue Jun 2 23:22:58 1998 From: billp at nmol.com (bill payne) Date: Tue, 2 Jun 1998 23:22:58 -0700 (PDT) Subject: Reeves 5/15/98 conclusion Message-ID: <35720025.1B0A@nmol.com> Sunday 5/31/98 7:03 PM Orlin I erred by not transcribing Reeve's conclusion in his Friday 5/15/1998 Albuquerque Journal editorial Our policy is not stupid. It's hypocritical and delusionary, but not stupid. What was stupid was to actually believe that countries like India, Pakistan, China, and Iran and Israel, too, would act on American words and illusions rather than on their own national interests and fears. This American blunder of intelligence and intellect is not another inside-the-beltway, Ken-and-Monica joke. This is an affair of state, a failure of state. Officials should not be subpoenaed or mocked; they should resign or be fired. Let ALL hope for release of the documents requested at http://www.jya.com/whp052898.htm and peaceful settlement of another �American blunder of intelligence�. Later bill From billp at nmol.com Tue Jun 2 23:23:18 1998 From: billp at nmol.com (bill payne) Date: Tue, 2 Jun 1998 23:23:18 -0700 (PDT) Subject: punching the Great FASCIST Satan in the nose Message-ID: <357352A0.6A81@nmol.com> Monday 6/1/98 7:16 PM John Young The SAND report you posted at http://jya.com/whpfiles.htm was a DELIBERATE attempt to send NSA a message. I had some help from Sandia classification. Bill Subject: refrigerator magnet Date: Mon, 01 Jun 1998 18:16:01 -0600 From: bill payne To: masanori fushimi CC: cypherpunks at toad.com, ukcrypto at maillist.ox.ac.uk Monday 6/1/98 6:05 PM Masanori I put the refrigerator magnet 1945 509th COMPOSITE GROUP 1995 FIRST ATOMIC BOMBARDMENT 50th ANNIVERSARY in the mail to you today. Reason I sent the magnet is to show THAT THERE ARE SOME REALLY-SICK MINDS [see reverse side of magnet] IN POWER in the US. Just got off the phone with John Young. Governments, including Japan, TRY to mess with peoples' minds. There is a book on this. http://www.amazon.com/exec/obidos/quicksearch-query/002-2147604-1106833 David Felton But I have a solution. I do not read e-mail. At this time. I also believe in what Kahn wrote Thursday, March 20, 1980, 09:30 David Kahn addressed Congress, the Committee on Government Operations. Kahn stated to the committee, A final benefit is that refusing to restrict cryptologic studies erects yet another rampart against the chipping away of American liberties. Is this rampart, again, worth the danger to national security? Yes, because the danger is not as acute as the N.S.A. wishes people to see it. N.S.A. wants people to think that publication of cryptologic material would slam shut its window into the Third World countries. In fact such publication has little effect ... The national security dangers are not so great as to dismantle individual freedom. For all of these reasons, then, no limitation should be placed on the study of cryptology. And beyond them all lies something more fundamental, in the end, will probably prevent any restrictions anyway. It is called the First Amendment. I thank you. I hope you see that I am using the seventh amendment. http://www.jya.com/whp052898.htm And even more adamantly I believe For what shall it profit a man if he shall gain the whole world and lose his own soul. Kahn on Codes page 172 Best regards bill From dac at zurich.ibm.com Wed Jun 3 03:28:09 1998 From: dac at zurich.ibm.com (Marc Dacier) Date: Wed, 3 Jun 1998 03:28:09 -0700 (PDT) Subject: Last Call For Participation - RAID 98 Message-ID: <9806031027.AA140462@collon.zurich.ibm.com> Last Call For Participation - RAID 98 (also available at http://www.zurich.ibm.com/~dac/RAID98) First International Workshop on the Recent Advances in Intrusion Detection September 14-15, 1998 Louvain-la-Neuve, Belgium We solicit your participation in the first International Workshop on the Recent Advances in Intrusion Detection (RAID 98). This workshop, the first in an anticipated annual series, will bring together leading figures from academia, government, and industry to talk about the current state of intrusion detection technologies and paradigms from the research and commercial perspectives. Research into and development of automated intrusion detection systems (IDS) has been under way for nearly 10 years. By now a number of systems have been deployed in the commercial or government arenas, but all are limited in what they do. At the same time, the numerous research and prototype systems developed have been more engineering than scientific efforts, with scant quantitative performance figures. As we survey the field of automated intrusion detection, we are faced with many questions: 1. What research questions have yet to be answered (or even asked) about IDS? 2. What are the open challenges, limitations, and fundamental concerns about present intrusion detection methodologies? 3. What metrics can we use to measure IDS performance and thus compare different systems and methodologies? These measurements should highlight the successes and expose the limitations of current IDS approaches. 4. What factors are inhibiting transfer of research ideas into functional deployed systems? How can those be addressed? 5. What is the role of a deployed IDS? How should or can it fit in with other security systems? 6. What are the typical IDS operating environments? What can be done to configure IDS to unique operating environments? 7. What are the challenges for IDS in very large environments, such as the Internet? 8. Is it time to contemplate IDS standards? What are the advantages and disadvantages of standardizing components of IDS? What forums (e.g., IETF, ISO) would be appropriate for pursuing such standards? 9. What are the problems of turning the results of intrusion detection tools into legally reliable evidence? What are the problems of admissibility and of courtroom presentation? We invite proposals and panels that explore these questions or any other aspect of automated intrusion detection. We especially solicit proposals and panels that address: 1. New results related to intrusion detection methodologies and technologies. 2. Innovative ways of thinking about intrusion detection; for example, the applicability of R&D in the fields of survivable and/or dependable systems, data mining, etc. 3. User experiences and lessons learned from fielded intrusion detection systems. 4. IDS for emerging computer environments (e.g., Java, CORBA, and NT). 5. Commercial intrusion detection systems. We have scheduled RAID 98 immediately before ESORICS 98, at the same time as CARDIS 98, and at the same location as both of these conferences. This provides a unique opportunity for the members of these distinct, yet related, communities to participate in all these events and meet and share ideas during joined organized external events. GENERAL CO-CHAIRS ***************** Marc Dacier (IBM Zurich Research Laboratory, Switzerland) Kathleen Jackson (Los Alamos National Laboratory, USA) PROGRAM COMMITTEE ***************** Matt Bishop (University of California at Davis, USA) Dick Brackney (National Security Agency, USA) Yves Deswarte (LAAS-CNRS & INRIA, France) Baudouin Le Charlier (Universite de Namur, Belgium) Stuart Staniford-Chen (University of California at Davis, USA) Rowena Chester (University of Tennessee, USA) Deborah Frincke (University of Idaho, USA) Tim Grance (National Institute of Standards and Technology, USA) Sokratis Katsikas (University of the Aegean, Greece) Jean-Jacques Quisquater (Universite Catholique de Louvain, Belgium) Mark Schneider (National Security Agency, USA) Marv Schaefer (Arca Systems, USA) Peter Sommer (London School of Economics & Political Science, England) Steve Smaha (Free Agent, USA) Gene Spafford (Purdue University, USA) Chris Wee (University of California at Davis, USA) Kevin Ziese (Cisco, USA) SUBMISSIONS *********** The program committee invites proposals for both technical and general interest talks and panels. Each talk or panel submission must contain: 1) A separate title page with: The type of submission (talk or panel); The title or topic; and The name(s) of the speaker or panel chair and probable panelists, with their organizational affiliation(s), telephone and FAX numbers, postal address, and Internet electronic mail address. 2) A brief biography of each participant. 3) The time desired for the talk or panel. Talk proposals must also include an abstract that is a maximum of 600 words in length. Papers are not required, but if included as an addendum, will be used as supplementary information for the evaluation of the talk proposal. The program committee will allocate each accepted presenter either a 15 or 30-minute slot for the talk, based on the complexity and interest of the proposed topic and the wishes of the speaker. The presenter will be informed the slot length when notified of acceptance. Panel proposals must also include a description that is a maximum of 300 words, the format of the presentation, and short rationale for the panel. The program committee will allocate accepted panel sessions one to two-hour time slots, based on the complexity and interest of the proposed topic, the number of panelists, and the wishes of the panel chair. The panel chair will be informed the slot length when notified of acceptance. All proposals must be in English. Plan to give all panels and talks in English. We must receive all proposals before June 15, 1998. We strongly prefer they be submitted by e-mail to raid98 at zurich.ibm.com. Various formats (ASCII, postscript, Word, WordPro, Framemaker, and LaTex) are acceptable. If necessary, hardcopy proposals may be sent to: Marc Dacier Global Security Analysis Lab IBM Zurich Research Laboratory Saeumerstrasse 4 CH-8803 Rueschlikon Switzerland Each submission will be acknowledged by e-mail. If acknowledgment is not received within seven days, please contact the one of the General Co-Chairs. A preliminary program will be available at the RAID web site (http://www.zurich.ibm.com/~dac/RAID98) by August 1, 1998. CORPORATE SPONSORS ****************** We solicit interested organizations to contribute to student travel expenses for RAID 98. Corporate sponsorship will cost 2500 US$, and will entitle the organization to four general attendance workshop passes. Please contact a General Co-Chair for more information. REGISTRATION ************ Registration will open on 1 August 1998, at which point detailed registration information (including a list of recommended hotels) will be provided at the RAID 98 web site (http://www.zurich.ibm.com/~dac/RAID98). Travel instructions to Louvain-la-Neuve are available at http://www.dice.ucl.ac.be/crypto/acces-lln.html (courtesy of the UCL Crypto Group). Registration will close on 21 August 1998. Late registration will continue until 4 September 1998, but only on a space-available basis, and will include a penalty of 50 US$ (in addition to the fees specified below). Fees will be levied on a sliding scale, as follows: Student: $200 Speaker or Panel Member: 250 US$ General attendance: 350 US$ This fee will include workshop sessions, banquet, hosted reception, luncheons, light breakfast service, and coffee and refreshment breaks. There will be no special rate for one-day or other limited attendance. Payment in full will be required at registration. We are negotiating a registration discount for those attending both the ESORICS conference and the RAID or CARDIS workshops, and for interchangeable workshop registration. Further information will be available when detailed registration information is posted. PROCEEDINGS *********** On-line workshop proceedings will be posted on the RAID web site (http://www.zurich.ibm.com/~dac/RAID98) immediately following the workshop. It will include: 1) The final program; 2) A list of corporate sponsors; 3) A list of attendees (subject to each attendee's approval); 4) The submitted abstract and slides used by each speaker; 5) The submitted description and rationale for each panel; 6) The slides used by each panelist; and, 7) Written position statements from each panelist. In addition, the most outstanding workshop participants will be invited to submit an analogous formal paper to a special RAID edition of the refereed journal "Computer Networks and ISDN Systems." IMPORTANT DATES *************** Deadline for submission: 15 June 1998 Registration opens: 1 August 1998 Notification of proposal acceptance or rejection: 1 August 1998 Preliminary program posted to web: 1 August 1998 Registration closes: 21 August 1998 Late registration closes: 4 September 1998 Workshop: 14-15 September 1998 MORE INFORMATION **************** For further information contact one of the General Co-chairs: Marc Dacier IBM Zurich Research Laboratory Switzerland E-mail: dac at zurich.ibm.com Tel.: +41-1-724-85-62 Fax.: +41-1-724-89-53 Kathleen Jackson Los Alamos National Laboratory USA E-mail: kaj at lanl.gov Tel.: +41-1-724-86-29 Fax.: +41-1-724-89-53 The RAID 98 web site: http://www.zurich.ibm.com/~dac/RAID98, The ESORICS 98 web site: http://www.dice.ucl.ac.be/esorics98. The CARDIS 98 web site: http://www.dice.ucl.ac.be/cardis98/ From rescue9111 at hotmail.com Wed Jun 3 04:29:59 1998 From: rescue9111 at hotmail.com (rescue9111 at hotmail.com) Date: Wed, 3 Jun 1998 04:29:59 -0700 (PDT) Subject: 10-03 Message-ID: <> BENCHMARK PRINT SUPPLY 1091 REDSTONE LANE ATLANTA GA 30338 FOR ORDERS/PRICING ONLY PLEASE CALL (770)399-0953 CUSTOMER SERVICE/SUPPORT ISSUES PLEASE CALL (770)399-5505 FOR COMPLAINTS OR E-MAIL REMOVAL PLEASE CALL (770)399-5614 OUR LASER PRINTER/FAX/COPIER TONER CARTRIDGES, PRICES NOW AS LOW AS $39 & UP WE CARRY MOST ALL LASER PRINTER CARTRIDGES, FAX SUPPLIES AND COPIER TONERS AT WAREHOUSE PRICES INCLUDING: HEWLETT PACKARD SERIES 2/3/4/2P/4P/5P/4L/5L/3SI/4SI/5SI IBM/LEXMARK OPTRA SERIES 4019/4029/4039/4049/4059 EPSON SERIES 2/1100/1500/6000/7000/8000 NEC SERIES 90/95 CANON COPIER PC SERIES INCLUDING 3/6RE/7/11/320/720/10/20/25 ETC... HP FAX SERIES 700/720/5000/7000/FX1/FX2/FX3/FX4/FX5 CANON FAX ALL MODELS WE DO NOT CARRY : BROTHER - PANASONIC - XEROX - FUJITSU - OKIDATA - SHARP PRICES DO CHANGE PERIODICALLY. PLEASE CALL TO GET THE MOST RECENT PRICING/AVAILABILTY AND SPECIALS OF THE WEEK!!!! ORDERS/PRICING LINE ONLY CALL (770)399-0953 *****NEW,NEW,NEW $10 MAIL IN REBATE ON ALL CARTRIDGES***** ****SIMPLY ORDER YOUR NEW CARTRIDGE, WHEN IT ARRIVES MAIL BACK**** ****YOUR REBATE CERTIFICATE WITH ANY USED CARTRIDGE FOR INSTANT CREDIT**** WE ACCEPT ALL MAJOR CREDIT CARDS OR COD ORDERS CORPORATE ACCOUNTS AVAILABLE WITH APPROVED CREDIT ALL PACKAGES SHIPPED UPS GROUND UNLESS SPECIFIED OTHERWISE . PLEASE NOTE: WE ARE CURRENTLY BUYING HP-SERIES 5L - 5P - AND 4000 CARTRIDGES ALL LEXMARK OPTRA CARTRIDGES CANON PC COPIER CARTRIDGES NOTE: THESE ARE THE ONLY CARTRIDGES CURRENTLY INCLUDED IN OUR BUY BACK PROGRAM TO ARRANGE CARTRIDGE PICKUP CALL CUSTOMER SERVICE (770)399-5505 From rescue9111 at hotmail.com Wed Jun 3 04:29:59 1998 From: rescue9111 at hotmail.com (rescue9111 at hotmail.com) Date: Wed, 3 Jun 1998 04:29:59 -0700 (PDT) Subject: 10-03 Message-ID: <> BENCHMARK PRINT SUPPLY 1091 REDSTONE LANE ATLANTA GA 30338 FOR ORDERS/PRICING ONLY PLEASE CALL (770)399-0953 CUSTOMER SERVICE/SUPPORT ISSUES PLEASE CALL (770)399-5505 FOR COMPLAINTS OR E-MAIL REMOVAL PLEASE CALL (770)399-5614 OUR LASER PRINTER/FAX/COPIER TONER CARTRIDGES, PRICES NOW AS LOW AS $39 & UP WE CARRY MOST ALL LASER PRINTER CARTRIDGES, FAX SUPPLIES AND COPIER TONERS AT WAREHOUSE PRICES INCLUDING: HEWLETT PACKARD SERIES 2/3/4/2P/4P/5P/4L/5L/3SI/4SI/5SI IBM/LEXMARK OPTRA SERIES 4019/4029/4039/4049/4059 EPSON SERIES 2/1100/1500/6000/7000/8000 NEC SERIES 90/95 CANON COPIER PC SERIES INCLUDING 3/6RE/7/11/320/720/10/20/25 ETC... HP FAX SERIES 700/720/5000/7000/FX1/FX2/FX3/FX4/FX5 CANON FAX ALL MODELS WE DO NOT CARRY : BROTHER - PANASONIC - XEROX - FUJITSU - OKIDATA - SHARP PRICES DO CHANGE PERIODICALLY. PLEASE CALL TO GET THE MOST RECENT PRICING/AVAILABILTY AND SPECIALS OF THE WEEK!!!! ORDERS/PRICING LINE ONLY CALL (770)399-0953 *****NEW,NEW,NEW $10 MAIL IN REBATE ON ALL CARTRIDGES***** ****SIMPLY ORDER YOUR NEW CARTRIDGE, WHEN IT ARRIVES MAIL BACK**** ****YOUR REBATE CERTIFICATE WITH ANY USED CARTRIDGE FOR INSTANT CREDIT**** WE ACCEPT ALL MAJOR CREDIT CARDS OR COD ORDERS CORPORATE ACCOUNTS AVAILABLE WITH APPROVED CREDIT ALL PACKAGES SHIPPED UPS GROUND UNLESS SPECIFIED OTHERWISE . PLEASE NOTE: WE ARE CURRENTLY BUYING HP-SERIES 5L - 5P - AND 4000 CARTRIDGES ALL LEXMARK OPTRA CARTRIDGES CANON PC COPIER CARTRIDGES NOTE: THESE ARE THE ONLY CARTRIDGES CURRENTLY INCLUDED IN OUR BUY BACK PROGRAM TO ARRANGE CARTRIDGE PICKUP CALL CUSTOMER SERVICE (770)399-5505 From Quisquater at dice.ucl.ac.be Wed Jun 3 06:15:02 1998 From: Quisquater at dice.ucl.ac.be (Jean-Jacques Quisquater) Date: Wed, 3 Jun 1998 06:15:02 -0700 (PDT) Subject: CARDIS 98: smart card research Message-ID: <199806031314.PAA10742@ns1.dice.ucl.ac.be> CARDIS Conference Announcement Final Call for Papers and Panels ------------------------------------------------------------- THIRD SMART CARD RESEARCH AND ADVANCED APPLICATION CONFERENCE SEPTEMBER 14-16, 1998 UCL, LOUVAIN-LA-NEUVE, BELGIUM ------------------------------------------------------------ Aims and Goals Smart cards, or IC cards, offer a huge potential for information processing purposes. The portability and processing power of IC cards allow for highly secure conditional access and reliable distributed information systems. There are IC cards available that can perform highly sophisticated cryptographic computations. The applicability of IC cards is currently limited mainly by our imagination; the information processing power that can be gained by using IC cards remains as yet mostly untapped and is not well understood. Here lies a vast uncovered research area which we are only beginning to assess, and which will have a great impact on the eventual success of the technology. The research challenges range from electrical engineering on the hardware side to tailor-made cryptographic applications on the software side, and their synergies. Many currently existing events are mainly devoted to commercial and application aspects of IC cards. In contrast, the CARDIS conferences aim to bring together researchers who are active in all aspects of the design of IC cards and related devices and environments, such as to stimulate synergy between different research communities and to offer a platform for presenting the latest research advances. CARDIS 1994, sponsored by the International Federation for Information Processing (IFIP), held in November 1994 in Lille, France, successfully brought together representatives from leading IC research centers from all over the world. CARDIS 1996 was the second occasion for the IC card community in this permanent activity. CARDIS 1996 was organized jointly by the Centre for Mathematics and Computer Science at Amsterdam (CWI) and the Department of Logic and Computer Science of the University of Amsterdam (UvA). Organization General Chair Catherine Rouyer (UCL, Louvain-la-Neuve, Belgium) Program Chairs Jean-Jacques Quisquater (UCL, Louvain-la-Neuve, Belgium) Bruce Schneier (Counterpane, USA) Program Committee (in construction) William Caelli (QUT, Brisbane, Australia) Vincent Cordonnier (R2DP, Lille, France) David Chan (HP Labs, Bristol, UK) Jean-Fran�ois Dhem (Belgacom, Belgium) J. Eloff (RAU, South Africa) Marc Girault (CNET, France) Louis Guillou (CNET, France) Pieter Hartel (Southampton, UK and Amsterdam, The Netherlands) Peter Honeyman (Michigan U., USA) Pierre Paradinas (Gemplus, France) Qiang (Acad. Sciences, Beijing, China) Michel Ugon (Bull CP-8, France) Doug Tygar (Carnegie-Mellon Univ., USA) Anthony Watson (ECU, Perth, Australia) Wijang Zhang (Shangai, China) Steering Committee Chair Vincent Cordonnier (Rd2p, Lille, France) Local Organization Catherine Rouyer (UCL) Benoit Macq (UCL) SUBMISSIONS Submissions will be judged on relevance, originality, significance, correctness, and clarity. Each paper should explain its contribution in both general and technical terms, identifying what has been accomplished, saying why it is significant, and comparing it with previous work. Authors should make every effort to make the technical content of their papers understandable to a broad audience. Papers should be written in English. Working papers, research in progress are welcome. Authors should submit: an extended abstract (more or less 5 pages) either by email to jjq at dice.ucl.ac.be (we prefer the electronic submission) using one of the following formats: postscript, rtf, latex or word 6. or send 12 copies of the paper to Jean-Jacques Quisquater UCL/DICE Place du Levant, 3 B-1348 Louvain-la-Neuve Belgium The paper should be formatted using the LNCS format from Springer-Verlag, if possible. In any case, each paper should be accompanied by information submitted via email to jjq at dice.ucl.ac.be that consists of: * a single postal address and electronic mail address for communication * complete title, author and affiliation information * the abstract of the paper * a small selection of the keywords that appear on this call for papers, which best describes the contribution of the paper Preproceedings will be available at the conference. It is intended to publish the proceedings in the Springer-Verlag LNCS series. Authors of accepted papers may be expected to sign a copyright release form. IMPORTANT DATES Submission deadline June 15, 1998 Acceptance notification July 15, 1998 Camera ready paper due Augustus 15, 1998 Conference September 14-16 1998 THEMES Technology/hardware IC architecture and techniques Memories and processor design Read/Write unit engineering Specific co-processors for cryptography Biometry Communication technologies Interfaces with the user, the service suppliers Reliability and fault tolerance Special devices Standards Software The operating system, Java, ... Models of data management Communication protocols IC Card design Tools for internal or external software production Validation and verification Methodology for application design Electronic payment systems Road pricing Internet payment systems Untraceability Algorithms Formal specification and validation Identification Authentication Cryptographic protocols for IC cards Complexity Security Models and schemes of security Security interfaces Hardware and software implementation Security of information systems including cards Formal verification of transaction sets Protocol verification IC Cards, individuals and the society IC cards and privacy Owner access of data IC cards: political and economical aspects Is the IC card going to change legislation? Patents, copyrights Future of IC cards Innovative technologies Moving towards the pocket intelligence Convergence with portable PCs, lap tops etc ... PCMCIA Innovative applications Design methodology of applications IC cards and the information system Examples of new applications Requirements for innovative cards Standards Emerging standards Compliance and approval From jya at pipeline.com Wed Jun 3 08:47:39 1998 From: jya at pipeline.com (John Young) Date: Wed, 3 Jun 1998 08:47:39 -0700 (PDT) Subject: DNA sequencing info needed In-Reply-To: Message-ID: <199806031547.LAA04781@dewdrop2.mindspring.com> It's now a cliche of bio-terrorism bellringers that "this stuff scares me silly," with scientists, pols and first responders now comically repeating the code. A technological artist on Long Island has set up in his studio a collection of the most deadly germs known on earth, in a small glass display, with labels and descriptions of what they are and can do: dosages, kill ratios, distribution methods, sources of specimens and food supplies, URLs for bio-terrorists. He invites art connoisseurs to visit. They walk around the room looking for the show, see little except typical suburban living room furniture, then spy the glass tank, approach, read, freeze, then begin to tremble. Some scream, some faint, some vomit in horror, claw clothing, stampede for the exit. The artist tries to reassure them it's only a carefully constructed simulation. None believe him. They shiver outside in the yard and whimper accusations of terrorism, which, he confesses, is the truth of bio-terrorism, to scare sane people silly. From jimd at starshine.org Wed Jun 3 09:03:50 1998 From: jimd at starshine.org (Jim Dennis) Date: Wed, 3 Jun 1998 09:03:50 -0700 (PDT) Subject: subscribe richardt@midgard.net In-Reply-To: Message-ID: <199806031452.HAA08039@canopus.starshine.org> Hey Richard, I think you may have sent this the wrong way. You may want to resend it. Here's a summary of the headers as I recieved them: From: Richard Threadgill Subject: subscribe richardt at midgard.net To: cypherpunks-announce at toad.com Date: Tue, 02 Jun 1998 13:59:02 -0700 Message-Id: <29466.896821142 at yggdrasil.midgard.net> -- Jim Dennis (800) 938-4078 consulting at starshine.org Proprietor, Starshine Technical Services: http://www.starshine.org From billp at nmol.com Wed Jun 3 10:03:17 1998 From: billp at nmol.com (bill payne) Date: Wed, 3 Jun 1998 10:03:17 -0700 (PDT) Subject: My knowledge of NSA 'deficient' crypto algorithms Message-ID: <3575813B.4DBE@nmol.com> Wednesday 6/3/98 10:55 AM jensul So as not to misspell J[G]en[n]ifer. You might be interested to look at the University of Southern California home page on the gfsr. My co-author Lewis was one of my former ms and phd students. NSA's crypto algorithms are okay - for hardware implementation - but are classified, in my opinion, to possibly hide embarrassment. Some of us at Sandia offered to help NSA fix its 'deficient' crypto algorithms. For money, of course. It is EASY to make a BLUNDER in crypto. For theoretical or implementation reasons. NSA knows this too. And is pretty cautious about what it does. I partially read another crypto-related article at http://www.news.com/News/Item/0%2C4%2C22705%2C00.html?st.ne.fd.gif.j Best bill Subject: Marc Dacier Date: Wed, 03 Jun 1998 07:34:04 -0600 From: bill payne To: jy at jya.com CC: dac at zurich.ibm.com, kaj at lanl.gov Wednesday 6/3/98 7:25 AM John Young I looked at http://www.zurich.ibm.com/~dac/RAID98 I was in Marc Dacier's (IBM Zurich Research Laboratory, Switzerland) office last April in Zurich. Dacier was quizzing me about what the US was concerned about, secuity-wise, inside weapons systems. Spiking, of course. And it was so nice to learn only yesterday that USC has a home page something I thought-up. http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html I SURE UNDERSTOOD the algorithms behind the NSA KG schematics Brian Snow showed me. Let's continue to hope for prompt settlement of the unfortunate matter BEFORE things get WORSE. And we can all get onto better and hopefully less destructive, http://www.aci.net/kalliste/, endeavors. Later bill From SMODeLUX at aol.com Wed Jun 3 14:12:31 1998 From: SMODeLUX at aol.com (SMODeLUX at aol.com) Date: Wed, 3 Jun 1998 14:12:31 -0700 (PDT) Subject: [E-WRESTLING] New fed that's superior to all others ... Message-ID: <4abf174c.3575b995@aol.com> b r u t e f o r c e w r e s t l i n g . ............................................................ BFW HANDBOOK Last Revised: 4.22.98 -=-=-=-=-=-=-=-=-=-=-=-=-=- BFW INTRODUCTION: -=-=-=-=-=-=-=-=-=-=-=-=-=- Screw organization with those "preppy handbooks," Screw the weenies that take e-Wrestling seriously, and screw the critics. Do you think you're a tough guy? Are you _brutal_? Are you sure? You can't be sure unless you strut your stuff in the paragon of e-Wrestling fun, the BFW (Brute Force Wrestling). We don't really care what all the other fed heads think, and we're going to approach this federation a little differently. No longer will you see the 20k BORING as hell matches, we're going to keep them short, with the occasional overdrive. Now let me ask you, do you REALLY see 55 minute matches on regular broadcasts such as RAW or Nitro? I don't. Maybe on a PPV, but we'll stretch our matches on PPVs a little. Anywhoo, what will this short match process result in? Fewer late cards, I know you all love that. What else will make this fed fun? We'll give magazines instead of updates, updates usually just have the same stuff anyway. In fact, I always skip to the rankings when I read an update. We'll show you a good product with our magazine. In-depth articles, and must-read writing. Do you think you're up for it? If so, fill out this application form, but remember, we can only fit 20 singles wrestler's and 10 tags on our roster. But beware... those who enter shall never leave... for they will be engulfed in fun and excitement, and they'll never even shed the thought of leaving! Thanks, Sean and Chris -=-=-=-=-=-=-=-=-=-=-=-=-=- BFW ROLEPLAYING: -=-=-=-=-=-=-=-=-=-=-=-=-=- BFW is a booked wrestling league, meaning that you roleplay to win matches. We do not use TNM, WLS, or any other simulator. All matches are hand written for the most exciting action anywhere. The only rule for roleplaying is that you must do it often. If you don't roleplay for a month, you're history. We may keep you around as a scrub and job the hell out of you, ruining your reputation. We may also just kick you out of the fed completely. -=-=-=-=-=-=-=-=-=-=-=-=-=- BFW SPECIFICS: -=-=-=-=-=-=-=-=-=-=-=-=-=- Headquarters: BFW Arena in Salt Lake City, Utah Cards: House shows (Quick Result Report sent out weekly) Tuesday's televised show, BFW Tuesday Tap-Out Friday's televised show, BFW Friday Fright Night Monthly Pay-Per-View events Titles: BFW World Heavy-Weight Champion BFW World Tag Team Champions BFW Network Champion -=-=-=-=-=-=-=-=-=-=-=-=-=- BFW APPLICATION -=-=-=-=-=-=-=-=-=-=-=-=-=- ======================== YOUR INFORMATION: Hey, we can get to know ya. ======================== YOUR NAME - YOUR AGE - (optional) ======================== WRESTLER'S INFORMATION: Duh! ======================== WRESTLER'S NAME - ALLIGNMENT - (heel/face/neutral) WRESTLER'S HEIGHT - (nothing above 7", please) WRESTLER'S WEIGHT - (nothing extraordinary here, either) WRESTLER'S LOOKS - (breif description here. Add in attire) WRESTLER'S HISTORY - (Who, what, where, why, when?) TWENTY MOVES YOUR WRESTLER APPLIES - YOUR WRESTLER'S FINISHING MANEUVER - DESCRIBE IT - (it doesn't have to be TOO complex) YOUR WRESTLER'S MANAGER - (optional) YOUR WRESTLER'S THEME MUSIC - (nothing other than music done by real musicians, no real wrestler music) ======================== TAG TEAM INFORMATION (Optional) ======================== NAME OF TAG TEAM - WHO DOES HE TAG WITH? - TAG TEAM FINISHER - DESCRIBE IT - From az096 at freenet.toronto.on.ca Wed Jun 3 14:53:56 1998 From: az096 at freenet.toronto.on.ca (Robert Guerra) Date: Wed, 3 Jun 1998 14:53:56 -0700 (PDT) Subject: PGP Keysigning Announcement page In-Reply-To: <199806021710.NAA28763@shell1.interlog.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- I would like to know if you could include a link the following www address which I have setup in the PGP FAQ that you maintain. If you place a link to the page on your www page...please let me know so that I can place a reciprocal link. - --- In an attempt to encourage PGP keysigning parties I have created a PGP Keysigning Announcement page. (http://www.geocities.com/CapitolHill/3378/pgpparty.html) It is my hope that with time it will be a place where PGP users can know when & where the next keysigning session (in thier area) will be held. If you know of a keysigning party that is held anywhere please let me know so that I can list it. (any other comments or suggestions also welcome) regards robert -----BEGIN PGP SIGNATURE----- Version: PGP for Business Security 5.5.3 Comment: Digital signatures verify author and unaltered content iQEVAwUBNXVj2Is5aKqJYZvFAQF+Wwf9HPcukFKiYhFYN5h8dIFNApF8/+89kudu NWKWLy5WEEDvcK12Unf0i9Ihwch8a5hANb3oP5R57hNttUUJa+7Lb4O5pg/D52XM 7aHu+JHW/4ZCVhGUAqBvuV+rJkRZJgvCe1vGC3JsB6V3vBm+pNEmyz5C9w7R00nW 7dTG4wXlzxda8fIPbcdOC8iZYR3j2YeEiQvuV5gktsx0VIk9ZLn1Pz4TqNQCTUmW qyVTZz5LV6EKsjr2/SM1OLIJkjNZyCYMqQZ3Bt/ZPMXKuaYmhcTyYOXggEuU2r9W 4mITGDuHItyUwV45lJUBCzZYYowSNBABOXGJ4fwkpKRKWo1Uuw0vZg== =EmIr -----END PGP SIGNATURE----- Robert Guerra - Email-> mailto:az096 at freenet.toronto.on.ca ICQ #10266626 Home Page-> http://www.geocities.com/CapitolHill/3378 PGPKeys available on WWW Page & via finger://rguerra at flare.dynip.com From roy26 at prodigy.com Wed Jun 3 17:41:19 1998 From: roy26 at prodigy.com (roy26 at prodigy.com) Date: Wed, 3 Jun 1998 17:41:19 -0700 (PDT) Subject: Awesome! Message-ID: <199805190417.AAA07146@rly-zb04.mx.aol.com> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ This is intended for adults. If you are under 18, or viewing these materials is illegal where you live, please delete this now. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ AWESOME! http://www.pornsitez.com/hardcore/xxxmovies/ ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ From dorisaw at idt.net Thu Jun 4 12:14:22 1998 From: dorisaw at idt.net (Doris Woods) Date: Thu, 4 Jun 1998 12:14:22 -0700 (PDT) Subject: Kirtland Air Force Base In-Reply-To: <199806012257.RAA019.42@geiger.com> Message-ID: <3576F1BE.BA662E1B@idt.net> William H. Geiger III wrote: > > -----BEGIN PGP SIGNED MESSAGE----- > > In <35732427.ECA43EB9 at idt.net>, on 06/01/98 > at 05:59 PM, Doris Woods said: > > >Hi all, > > >bill payne wrote: > >> > >> Saturday 5/30/98 5:15 PM > > >> Masanori, the book Decision to Use the Atomic Bomb by Gar Alperovitz > >> presents fairly good evidence some in US government nuked Hiroshima and > >> Nagasaki merely to impress the Russians. > >> > > >Carroll Quigley said in Tragedy and Hope... they were worried the war > >would be over with before they got their chance to use it! > > Was this before or after they estimated that it would cost upwards of 1 > Million lives to take the Japan mainland by conventional forces? > > - -- Well... a Leo Szilard web site ( How do you say it? Say sil'-ahrd.) has an article where he is interviewed titled _Leo Szilard, Interview: President Truman Did Not Understand_ http://www.peak.org/~danneng/decision/usnews.html "After all, Japan was suing for peace." "Today I would say that the confusion arose from considering the fake alternatives of either having to invade Japan or of having to use the bomb against her cities." I admit I only followed a link from Home Page of J. Orlin Grabbe titled... _Target Committee Meeting, Los Alamos, May 10-11, 1945_ to get to that particular story. Of more particular interest to myself is the shipment of 65% uranium oxide, sent from the Belgian Congo, in 1939-40. 1250 tons were sent to Staten Island, NY, by Edward Sengier of Union Miniere, to prevent the Axis powers from obtaining it. p 852. It is a _good_ book. I enjoyed it. Doris Woods From sprokkit at hotmail.com Thu Jun 4 12:36:43 1998 From: sprokkit at hotmail.com (Sprokkit Amhal) Date: Thu, 4 Jun 1998 12:36:43 -0700 (PDT) Subject: anonymous mailboxes Message-ID: <19980604193606.27765.qmail@hotmail.com> Some time ago I heard about Lucky Green's then-immature scheme for anonymous email boxes, whereby a user can receive email and even a traffic analysis attacker is unable to glean information about who received what when. I forget exactly what ve called vis method... Is there a paper available anyplace? Has the scheme been validated mathematically? Has it been implemented? ::sprokkit:: ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From shamrock at cypherpunks.to Thu Jun 4 14:10:55 1998 From: shamrock at cypherpunks.to (Lucky Green) Date: Thu, 4 Jun 1998 14:10:55 -0700 (PDT) Subject: anonymous mailboxes In-Reply-To: <19980604193606.27765.qmail@hotmail.com> Message-ID: It was not my scheme. I simply gave a presentation at HIP of a system that was designed by a person wishing to remain anonymous. Much of the design has changed since. I am not at liberty to discuss futher details. The original presentation in MS PowerPoint format is still sitting at http://www.cypherpunks.to/~shamrock/anonmail.ppt I have no plans to update or convert this particular presentation. On Thu, 4 Jun 1998, Sprokkit Amhal wrote: > Some time ago I heard about Lucky Green's then-immature scheme for > anonymous email boxes, whereby a user can receive email and even a > traffic analysis attacker is unable to glean information about who > received what when. I forget exactly what ve called vis method... > > > > > Is there a paper available anyplace? > > Has the scheme been validated mathematically? > > Has it been implemented? > > > > > ::sprokkit:: > > ______________________________________________________ > Get Your Private, Free Email at http://www.hotmail.com > > -- Lucky Green PGP v5 encrypted email preferred. "Tonga? Where the hell is Tonga? They have Cypherpunks there?" From jya at pipeline.com Thu Jun 4 14:12:59 1998 From: jya at pipeline.com (John Young) Date: Thu, 4 Jun 1998 14:12:59 -0700 (PDT) Subject: NIST Publishes Draft FIPS for FKMI Message-ID: <199806042112.RAA12886@camel14.mindspring.com> The NIST Technical Advisory Committee has published its final draft for a FIPS for the Federal Key Management Infrastructure and a letter from the chairman to the Secretary of Commerce on the completion of the task in preparation for the final meeting of the committee June 17-19: http://csrc.nist.gov/tacdfipsfkmi/ under the "June 1998" section We offer mirrors of the drafts: http://jya.com/nist-fkmi.htm (chairman's letter) http://jya.com/FIPS698.txt (the FIPS, 222K) From bill.stewart at pobox.com Thu Jun 4 19:10:35 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 4 Jun 1998 19:10:35 -0700 (PDT) Subject: Spamford's new business venture Message-ID: <3.0.5.32.19980604155141.008fc6f0@popd.ix.netcom.com> Seems Spamford has found yet another way to Make M0ney 0n the Net - as an expert witness for people suing spammers. The paper said he'll be working for the law firm that nailed him with a $2M case earlier this year. Sigh..... Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From maxinux at khercs.dyn.ml.org Thu Jun 4 19:25:01 1998 From: maxinux at khercs.dyn.ml.org (Max Inux) Date: Thu, 4 Jun 1998 19:25:01 -0700 (PDT) Subject: Meetings and PGP 6.0 Message-ID: Now that Network General and Network Associates (McAfee) have merged (business wise aswell as buildings), I was wondering where the CypherPunks meetings are going to be at the old netgen building or the new (BIG) Network Associates (netass.com) building? And is it still gonna be at 12 on the second saturday of the month? (seeing as this saturday(first) is the NAI company picnic). And, has anyone here played with PGP 6.0 (still in developement). I hope they do more changes in the final, Photo ID's and the misc other changes. Thanks, Billy -- Max Inux (MaxInux at bigfoot.com) UIN: 207447, http://khercs.dyn.ml.org Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59 Or Kinky sex makes the world go round- Christie: Your in my sig too ^^ If Cryptography is outlawed, only outlaws will have cryptography ^^ From jf_avon at citenet.net Thu Jun 4 22:28:27 1998 From: jf_avon at citenet.net (Jean-Francois Avon) Date: Thu, 4 Jun 1998 22:28:27 -0700 (PDT) Subject: Fwd: NEWS - NRA Charles Heston speech Message-ID: <199806050537.BAA14762@cti06.citenet.net> ==================BEGIN FORWARDED MESSAGE================== >Date: Fri, 05 Jun 1998 09:50:22 +0930 >From: SSAA >Subject: NEWS - NRA Charles Heston speech >Organization: Sporting Shooters Association of Australia Speech by National Rifle Association First Vice President Charlton Heston Delivered at the Free Congress Foundation's 20th Anniversary Gala December 7, 1997 I like it when the party of Lincoln honors our free heritage. This nation has been blessed by the minds and mettle of many good people, and indeed Abe was among the best. A man of great moral character... a trait often lacking among our leaders. This is disturbing, but not without remedy. One good election can correct such ills. Above all, I hope those of us gathered here tonight have more in common with Mr. Lincoln than just party affiliation. Better that we grasp a common vision than simply wear the cloak. Even our President pretends to be a conservative when it suits him. We must be more than that. I know, I know... it is not easy. Imagine being point man for the National Rifle Association, preserving the right to keep and bear arms. Well, I ran for office, I was elected, and now I serve... as a moving target for pundits who've called me everything from "ridiculous" and "duped" to a "brain-injured, senile, crazy old man." Well, I guess that goes with the territory. But as I've stood in the cross hairs of those who aim at Second Amendment freedom, I've realized that guns are not the only issue, and I am not the only target. It is much, much bigger than that which is what I want to talk to you about. I have come to realize that a cultural war is raging across our land... storming our values, assaulting our freedoms, killing our self-confidence in who we are and what we believe, where we come from. How many of you here own a gun? A show of hands? How many own two or more guns? Thank you. I wonder how many of you in this room own guns but chose not to raise your hand? How many of you considered revealing your conviction about a constitutional right, but then thought better of it? Then you are a victim of the cultural war. You are a casualty of the cultural warfare being waged against traditional American freedom of beliefs and ideas. Now maybe you don't care one way or the other about owning a gun. But I could've asked for a show of hands on Pentecostal Christians, or pro-lifers, or right-to-workers, or Promise Keepers, or school voucher-ers, and the result would be the same. What if the same question were asked at your PTA meeting? Would you raise your hand if Dan Rather were in the back of the room there with a film crew? See? Good. Still, if you didn't, you have been assaulted and robbed of the courage of your convictions. Your pride in who you are, and what you believe, has been ridiculed, ransacked, plundered. It may be a war without bullet or bloodshed, but with just as much liberty lost: You and your country are less free. And you are not inconsequential people! You in this room, whom many would say are among the most powerful people on earth, you are shamed into silence! Because you embrace a view at odds with the cultural warlords. If that is the outcome of cultural war, and you are the victims, I can only ask the gravely obvious question: What'll become of the right itself? Or other rights not deemed acceptable by the thought police? What other truth in your heart will you disavow with your hand? I remember when European Jews feared to admit their faith. The Nazis forced them to wear six-pointed yellow stars sewn on their chests as identity badges. It worked. So what color star will they pin on our coats? How will the self- styled elite tag us? There may not be a Gestapo officer on every street corner yet, but the influence on our culture is just as pervasive. Now, I am not really here to talk about the Second Amendment or the NRA, but the gun issue clearly brings into focus the war that's going on. Rank-and-file Americans wake up every morning, increasingly bewildered and confused at why their views make them lesser citizens. After enough breakfast- table TV promos hyping tattooed sex-slaves on the next Rikki Lake show, enough gun-glutted movies and tabloid talk shows, enough revisionist history books and prime-time ridicule of religion, enough of the TV anchor who cocks her pretty head, clucks her tongue and sighs about guns causing crime and finally the message gets through: Heaven help the God-fearing, law-abiding, Caucasian, middle class, Protestant, or even worse Evangelical Christian, Midwest, or Southern, or even worse rural, apparently straight, or even worse admittedly heterosexual, gun-owning or even worse NRA-card-carrying, average working stiff, or even worse male working stiff, because not only don't you count, you're a downright obstacle to social progress. Your tax dollars may be just as delightfully green as you hand them over, but your voice requires a lower decibel level, your opinion is less enlightened, your media access is insignificant, and frankly mister, you need to wake up, wise up and learn a little something about your new America...in fact, why don't you just sit down and shut up? That's why you don't raise your hand. That's how cultural war works. And you are losing. That's what happens when a generation of media, educators, entertainers and politicians, led by a willing president, decide the America they were born into isn't good enough any more. So they contrive to change it through the cultural warfare of class distinction. Ask the Romans if powerful nations have ever fallen as a result of cultural division. There are ruins around the world that were once the smug centers of small-minded, arrogant elitism. It appears that rather than evaporate in the flash of a split atom, we may succumb to a divided culture. Although my years are long, I was not on hand to help pen the Bill of Rights. And popular assumptions aside, the same goes for the Ten Commandments. Yet as an American and as a man who believes in God's almighty power, I treasure both. The Constitution was handed down to guide us by a bunch of those wise old dead white guys who invented this country. Now, some flinch when I say that. Why? It's true...they were white guys. So were most of the guys who died in Lincoln's name opposing slavery in the 1860s. So why should I be ashamed of white guys? Why is "Hispanic pride" or "black pride" a good thing, while "white pride" conjures up shaved heads and white hoods? Why was the Million Man March on Washington celebrated in the media as progress, while the Promise Keepers March on Washington was greeted with suspicion and ridicule? I'll tell you why: Cultural warfare. Now, Chuck Heston can get away with saying I'm proud of those wise old dead white guys because Jesse Jackson and Louie Farrakhan know I fought in their cultural war. I was one of the first white soldiers in the civil rights movement in 1961, long before it was fashionable in Hollywood believe me or in Washington for that matter. In 1963 I marched on Washington with Dr. Martin Luther King to uphold the Bill of Rights. I'm very proud of that. As vice- president of the NRA I am doing the same thing. But you don't see many other Hollywood luminaries speaking out on this one, do you? It's not because there aren't any. It's because they can't afford the heat. They dare not speak up for fear of CNN or the IRS or SAG or the ATF or NBC or even W-J-C. It saps the strength of our country when the personal price is simply too high to stand up for what you believe in. Today, speaking with the courage of your conviction can be so costly, the price of principle so high, that legislators won't lead so citizens can't follow, and so there is no army to fight back. That's cultural warfare. For instance: It's plain that our Constitution guarantees law-abiding citizens the right to own a firearm. But if I stand up and say so, why does the media assault me with such a slashing, sinister brand of derision filled with hate? Because Bill Clinton's cultural warriors want a penitent cleansing of firearms, as if millions of lawful gun owners should genuflect in shame and seek absolution by surrendering their guns. That's what is now literally happening in England and Australia, of course. Lines long lines of submissive citizens, threatened with imprisonment, are bitterly, reluctantly surrendering family heirlooms, guns that won their freedom, to the blast furnace. If that fact doesn't unsettle you, then you are already anesthetized, a ready victim of the cultural war. You know, I think, that I stand first in line in defense of free speech. But those who speak against the perverted and profane should be given as much due as those who profit by it. You also know I welcome cultural diversity. But those who choose to live on the fringe should not tear apart the seams that secure the fabric of our society. Now I've earned a fine and rewarding living in the motion picture industry, yet increasingly I find myself embarrassed by the dearth of conscience that drives the world's most influential art form. And I'm an example of what a lonely undertaking that can be. Nobody opposed the obscene rapper Ice-T until I stood at Time-Warner's stockholders meeting and was ridiculed by its president for wanting to take the floor to read Ice-T's lyrics. Since I held several hundred shares of stock he had no choice, though the media were barred. I read those lyrics to a stunned audience of average American people the stockholders who were shocked at the lyrics that advocating killing cops, sexually abusing women, and raping the nieces of our Vice-President. True, the good guys won that time though: Time-Warner fired Ice-T. The gay and lesbian movement is another good example. Many homosexuals are hugely talented artists and executives... also dear friends. I don't despise their lifestyle, though I don't share it. As long as gay and lesbian Americans are as productive, law-abiding and private as the rest of us, I think America owes them absolute tolerance. It's the right thing to do. But on the other hand, I find my blood pressure rising when Clinton's cultural shock troops participate in homosexual-rights fund-raisers but boycott gun- rights fund-raisers... and then claim it's time to place homosexual men in tents with Boy Scouts, and suggest that sperm donor babies born into lesbian relationships are somehow better served and more loved. Such demands have nothing to do with equality. They're about the currency of cultural war money and votes and the Clinton camp will let anyone in the tent if there's a donkey on his hat, or a check in the mail or some yen in the fortune cookie. Mainstream America is depending on you counting on you to draw your sword and fight for them. These people have precious little time or resources to battle misguided Cinderella attitudes, the fringe propaganda of the homosexual coalition, the feminists who preach that it's a divine duty for women to hate men, blacks who raise a militant fist with one hand while they seek preference with the other, and all the New-Age apologists for juvenile crime, who see roving gangs as a means of youthful expression, sex as a means of adolescent merchandising, violence as a form of entertainment for impressionable minds, and gun bans as a means to lord-knows-what. We've reached that point in time when our national social policy originates on Oprah. I say it's time to pull the plug. Americans should not have to go to war every morning for their values. They already go to war for their families. They fight to hold down a job, raise responsible kids, make their payments, keep gas in the car, put food on the table and clothes on their backs, and still save a little for their final days in dignity. They prefer the America they built - where you could pray without feeling naive, love without being kinky, sing without profanity, be white without feeling guilty, own a gun without shame, and raise your hand without apology. They are the critical masses who find themselves under siege and are long for you to get some guts, stand on principle and lead them to victory in this cultural war. Now all this sounds a little Mosaic, the punch-line of my sermon is as elementary as the Golden Rule. In a cultural war, triumph belongs to those who arm themselves with pride in who they are and then do the right thing. Not the most expedient thing, not the politically correct thing, not what'll sell, but the right thing. And you know what? Everybody already knows what the right thing is. You, and I, President Clinton, even Ice-T, we all know. It's easy. You say wait a minute, you take a long look in the mirror, then into the eyes of your kids, your grandchildren, and you'll know what's right. Don't run for cover when the cultural cannons roar. Remember who you are and what you believe, and then raise your hand, stand up, and speak out. Don't be shamed or startled into lockstep conformity by seemingly powerful people. The maintenance of a free nation is a long, slow, steady process. And it is in your hands. Yes, we can have rules and still have rebels that's democracy. But as leaders you must we must do as Lincoln would do, confronted with the stench of cultural war: Do what's right. As Mr. Lincoln said, "With firmness in the right, as God gives us to see the right, let us finish the work we are in... and then we shall save our country." Defeat the criminals and their apologists, oust the biased and bigoted, endure the undisciplined and unprincipled, but disavow the self-appointed social engineers whose relentless arrogance fuels this vicious war against so much we hold so dear. Do not yield, do not divide, do not call a truce. Be fair, but fight back. It's the same blueprint our founding fathers left to guide us. Our enemies see it as the senile prattle of an archaic society. I still honor it as the United States Constitution, and that timeless document we call the Bill of Rights. Freedom is our fortune and honor is our saving grace. Thank you. ===================END FORWARDED MESSAGE=================== Jean-Francois Avon, B.Sc. Physics, Montreal, Canada JFA Technologies, R&D physicists & engineers Instrumentation & control, LabView programming. PGP keys: http://bs.mit.edu:8001/pks-toplev.html PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C From StanSqncrs at aol.com Thu Jun 4 23:23:39 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Thu, 4 Jun 1998 23:23:39 -0700 (PDT) Subject: NEWS - NRA Charles Heston speech Message-ID: <93c4594e.35778eca@aol.com> McVeigh is alot better than Heston (at lying-type propaganda. I couldn't even call McVeigh's "lying-type." It was filled with MUCH more fact than Heston's speech.) The glaring over-all problem I see with his speech, is his hypocracy when it comes to the 1st amendment (yea, I know he *claimed* to be a 1st amendments rights supporter, BUT his actions (the rest of the speech) counters that claim.) Here's why they want to remove our freedom of speech. It's because - dig this Cypherpunks - 'The pen is mightier than the sword.' If they take away our ability to speak, and they keep their silly guns, guess what. Then they have the more powerful weapon. And dig this - yes it IS that simple. Stan From bill.stewart at pobox.com Fri Jun 5 02:48:16 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Fri, 5 Jun 1998 02:48:16 -0700 (PDT) Subject: Meetings and PGP 6.0 In-Reply-To: Message-ID: <3.0.5.32.19980605022508.00952530@popd.ix.netcom.com> At 08:25 PM 6/4/98 -0700, Max Inux wrote: >Now that Network General and Network Associates (McAfee) have merged >(business wise aswell as buildings), I was wondering where the CypherPunks >meetings are going to be at the old netgen building or the new (BIG) >Network Associates (netass.com) building? And is it still gonna be at 12 >on the second saturday of the month? (seeing as this saturday(first) is >the NAI company picnic). Cypherpunks meeting is almost always at the same time, but often changes locations, depending on the availability of meeting places and the whims of the organizers :-) This month, we'll be meeting in Berkeley, and as usual I'd appreciate anybody suggesting topics they'd like to talk about there. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From netcenter-news at netscape.com Fri Jun 5 03:15:03 1998 From: netcenter-news at netscape.com (netcenter-news at netscape.com) Date: Fri, 5 Jun 1998 03:15:03 -0700 (PDT) Subject: Netcenter News - Volume 7 Message-ID: <199806051014.DAA03401@toad.com> Title: Netscape Netcenter News - May 1998 Welcome to Netcenter Netcenter is dedicated to the proposition that you should be able to find everything you need online in one place. This newsletter is one of the free benefits you receive for registering with a Netcenter program. Electronic commerce is creating one of the fastest growing marketplaces on the planet. Can small-scale entrepreneurs join the movement? Professional Connections Events Forum presents "E-Commerce and the Entrepreneur," featuring ZDNet's e-commerce expert Mitch Ratcliffe. Netscape proudly announces Netscape WebMail by USA.net, offering free web-based email accounts and value-added mail services, accessible from any computer across the globe. CNET honors Netscape Communicator with its Readers' Choice Award for Internet Excellence, noting that it far surpasses all other Net products and browser packages on the market. Enter to win a $5000 shopping spree from netMarket - the premier discount shopping club. Get guaranteed low prices and 5 percent cash back on purchases. � This issue of Netcenter News is brought to you by the Netscape Store. NETCENTER EXPANDS BUSINESS CHANNEL WITH DEBUT OF NETSCAPE SMALL BUSINESS SOURCE Small Business Source is designed to provide small businesses with the latest news, information, and services online for managing and growing their businesses. Whether you simply use the Internet to conduct research or leverage it to run a business online, this unique, one-stop Internet destination provides the best and most current web-based content and services available to help small businesses succeed. Launched on May 11, Small Business Source provides visitors with a wealth of free information and resources as well as easy access to leading Internet-based business tools. Did you know that a hard drive crashes every 15 seconds? With Netscape Online Backup by Atrieva, you never have to worry about your data being safe. Need to communicate or collaborate with colleagues and clients more efficiently? With Netscape Virtual Office by Netopia, you can have your own web office up and running in minutes. All the resources you'll find in Small Business Source have been tailored to meet the needs of small businesses - from news provided by NewsEdge and content from the Mining Co. to special services from Amazon.com, Travelocity, and software.net. Small Business Source is the smart choice for growing your business. Visit it today! Want to get the latest version of Communicator? Upgrade now to Communicator 4.05, using SmartUpdate - the fast, easy, and personalized way to keep your software up-to-date. Need to get the message out ASAP? Get real-time communication with Netscape AOL Instant Messenger - just released for the Macintosh. Stores closed? Tired? Curious about shopping online? Try Netcenter Marketplace. Your one stop for great deals on books, music, travel, and much more. Thanks to everyone who took last month's small-business survey!� Here is what you told us: 50 percent of you buy products online 28 percent of you sell products online 44 percent of you have a web page or home page for your company, while 56 percent have yet to make one the service you'd most like to see added to Netcenter is a contact manager This month, tell us what you'd like in an online community! Netscape respects your online time and Internet privacy. If you would prefer not to receive future issues, click here to to send an unsubscribe email or reply to this message with the word unsubscribe in the subject line. Copyright � 1998. Netscape Communications Corporation. All rights reserved. From waekualo98 at msn.com Fri Jun 5 04:45:54 1998 From: waekualo98 at msn.com ( ) Date: Fri, 5 Jun 1998 04:45:54 -0700 (PDT) Subject: L@@KING FOR A FRIEND or LOVER!! NOT A SEX SITE!! Message-ID: <199806051210ZAA212@emal2.net-serv.com> LIVE***LIVE***LIVE***LIVE***LIVE***LIVE***LIVE***LIVE **THE INTERNETS MOST POPULAR PARY LINES!!!!!!!! Join the Party Line!! It's your chance to be the life of the party. Meet new and interesting people who want to get to know you ALOT better. Or if your preferences are a little more Intimate we have the connections for you. 1 on 1 Fantasy, talk live with the opposite sex. For those with a bit more spice & energy talk live with 2 count em' 2 members of the opposite sex. Double your pleasure & Double your fun. For people with a different lifestyle we have live talks for Gays & Lesbians. You can let go and be yourself with someone who understands & shares your feelings. Maybe you're looking to find that special someone who's also looking for you. This is the safest, easiest way to connect with a new person. Skip the meat markets & all of the guess work. Spend your time choosing who & when, not wasting time hoping for maybe. Our Recorded Date Line is the key to all your dreams coming true. We have Recorded Fantasy Lines for those who might be a little shy, or who just like to be entertained without joining in on a dialogue. You won't be disappointed! 1-900-993-3284 Must be 18 or older (2.50-3.99min) You will have the choice of anyone of the services when y From billp at nmol.com Fri Jun 5 08:21:31 1998 From: billp at nmol.com (bill payne) Date: Fri, 5 Jun 1998 08:21:31 -0700 (PDT) Subject: twa 800, semiconductors & internet, polyforth & Java Message-ID: <35780C56.4E5C@nmol.com> Friday 6/5/98 9:11 AM J Orlin Grabbe Albuquerque Journal w 6/3/98 TWA 800 Explosion Not on �High Seas� NEW YORK - A judge said Tuesday that the TWA 800 explosion did not occur on the �high seas,� a ruling that could make victim eligible for additional money in their lawsuit. against the airline and the aircraft manufacturers. ... http://www.aci.net/kalliste/navy800.htm and other electronic articles on TWA 800 at http://www.aci.net/kalliste/ Albuquerque Journal f 6/5/98 Motorola To Cut 15,000 Jobs No Word of Impact In Albuquerque The Associated Press CHICAGO - Motorola Inc., struggling to weather the Asian economic crisis, said Thursday it is eliminating 15,000 jobs over the coming 12 months. Profits plunged 45 percent to !180 million ... But in the same issue Chip Sales Expected to Rebound Semiconductor Group Predicts Double-Digit Growth in 1999 The Associated Press SAN JOSE, Calif. Asia�s weak economies, a slow-down in personal computer sales and an overabundance of memory chips will push own semiconductor sales nearly 2 percent this year, according to an industry group. But those troubles are expected to ease in the second half of 1998, boosting sales and returning the industry to double-digit growth next year and beyond, the Semiconductor Industry Association said. �Thanks to the unprecedented growth of Internet usage, we now expect the industry�s expansion to occur in 1999 as semiconductor growth rates return to their historical averages of 17 percent or more,� said SIA president George Scalise. ... John Young Albuquerque Journal f 6/5/98 India, Pakistan Nuke Claims Exaggerated, Scientists Say By David S. Cloud Chicago Tribune WASHINGTON - American scientists monitoring remote sites where India and Pakistan detonated nucleardevices sharply question public claims by both nations about the size and number of weapons tested. Scientists examining seismic data on the tests, picked up at monitoring stations around the globe, say that both India and Pakistan have exaggerated the explosive power of the detonations and perhaps even the total number of devices tested. The Clinton administration has similar doubts about the claims by the South Asian rivals. Pakistani officials apparently disconnect a seismic monitor that would have given outsiders more precise data about their tests. And two nuclear devices that India claimed to have set off were not detected by a single known seismic monitor station anywhere in the world. ... The gap between the claims and the seismic data suggests that the test may not have gone as well as each side announced, said experts interviewed by the Chicago Tribune. The discrepancies in monitoring data prove ammunition for some critics of an international test-ban treaty. These critics argue that the lack of data for India�s announced second round of nuclear weapons tests calls into question whether clandestine nuclear test can be accurately monitored. ... Jim Durham, Sandia�s seismic CTBT project leader http://jya.com/da/whpda.htm, told me that the coupling [impendance match?] between the bomb and the surrounding ground had much to do with what a seismic station receives. Lastly, and what I think is the most important, Albuquerque Journal f 6/5/98 USS Yorktown Found Explorer Located Titanic Wreck By Randolph E. Schmidt The Associated Press WASHINGTON - Three miles under water, the USS Yorktown�s four-barrel anti-aircraft gun still aims skyward 56 years after the aircraft carrier went to the bottom of the Pacific Ocean, a victim of the Battle of Midway. Photos and video of the giant ship, sitting upright on the ocean floor, were unveiled Thursday by Robert Ballard, the undersea explorer who found the wrecks of the Titanic and the German battleship Bismarck. http://www.nationalgeographic.com/features/98/midway/ REASON is that Ballard uses PolyForth http://av.yahoo.com/bin/query?p=polyforth&z=2&hc=0&hs=0 in the submersible robots, Jeff Allsup of Woods Hole told me. Allsup downloaded ALL of the code and documentation from my Forth http://jya.com/f86/whpf86.htm book from Vesta in Colorado at 1,200 bps. Allsup told me this took several days. This is same software technology which is used for the US satellite program. http://groucho.gsfc.nasa.gov/forth/ Java http://www.mrl.nyu.edu/meyer/jvmref/ appears also to be a byte threaded code technology. Let�s hope for settlement of the unfortunate matter so that we can all got on to other constructive projects. I would like to do some more with http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html and revise http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 for the 80C32 communicating over ieee 1284 ecp to a Windows PC. Later, bill From billp at nmol.com Fri Jun 5 15:19:57 1998 From: billp at nmol.com (bill payne) Date: Fri, 5 Jun 1998 15:19:57 -0700 (PDT) Subject: Site Secrets Message-ID: <35786E62.1452@nmol.com> Friday 6/5/98 3:49 PM John Young NOTHING from the court, DOE or EEOC today. Good. I loaded my boat in the back of my truck. Fishing tomorrow and Sunday at Navajo lake. Navajo lake is on the Colorado border. My primary goal is to finish the digital FX. But I need a mental health break. I got kick out of the moralist lecture to schneier at counterpane.com. http://www.jya.com/bud-avbsp.htm I can only imagine "Bud" �s horror when he reads about Morales and my genocide, deficient crypto, and crooked judge lawsuit. But, of course, we are merely trying to promote settlement of this UNFORTUNATE matter before something POSSIBLY serious happens. Settlement progress is reported to our friends at http://www.wpiran.org/ and others in hope it is passed along to the interested. Peaceful MONETARY settlement of this UNFORTUNATE matter is clearly in everyone's best interest. Thoroughly enjoyed Site Secrets. http://www.jya.com/crypto.htm#site The Real World again. Have a good weekend all. bill From gwb at gwb.com.au Fri Jun 5 15:21:29 1998 From: gwb at gwb.com.au (Global Web Builders) Date: Fri, 5 Jun 1998 15:21:29 -0700 (PDT) Subject: Sixty Minutes vs Pauline Hanson Message-ID: <1.5.4.32.19980605221229.0070d830@mail.pronet.net.au> Dear One Nation Supporter in NSW, PLEASE READ THIS EXTREMELY IMPORTANT MESSAGE and CIRCULATE WIDELY TO ALL YOU CAN. In the lead up to the Queensland State and Federal Elections there has been growing hysteria in the media, major political parties and by minority groups that "support for Pauline Hanson's One Nation is somehow bad for Australia". It should be of no surprise that One Nation has one goal in mind and that is to bring equity in treatment back to ALL Australians irrespective of colour, race, or creed. If you read the first sentence again you will see who is going to 'lose' when divisive policies are removed by One Nation from the Australian equation. However, the most divisive force in Australia today is the mainstream media, carefully controlled by men of enormous wealth who now seek the ultimate prize, 'power over the politicians who run Australia'. Many believe that they have already achieved this goal. Many believe that the support for Pauline Hanson's One Nation is a direct result of 'populist' Australians (that's you and me) seeing through the deals being done between the major political parties and the media barons. Today Australians face a real fight to retain their democratic rights in the face of the media moguls. This is the 'real' media-hidden war that is being raged right now with Pauline Hanson being the focus, the enemy. The coming Queensland state and Federal elections are not over 'race' as the media would have you believe, they are over our freedom of speech and democracy which has already being largely destroyed through the concentration of our media. Last Tuesday Pauline Hanson raised the issue of 'The Draft Declaration on the Rights of Indigenous Peoples' in Parliament. What followed was the most disgraceful vilification by Howard, Beazley, supported by the media, of Pauline Hanson, the messenger, while the message - the potential impact of this treaty on all Australians - was totally ignored. This vilification was epitomised by the live interview with Ray Martin on Channel 9's 'A Current Affair' during which he changed the 'rules of engagement' previously agreed to. The interview was supposed to be about Pauline's speech in parliament and the ramifications of the UN draft agreement. A range of links to documents related to Pauline Hanson's speech can be seen at: http://www.gwb.com.au/un.html Channel 9 have used these tactics before to secure an interview under blatantly dishonest terms. Sixty Minutes approached Pauline Hanson to do a 'prime time' broadcast on 'a new political party in the making'... in 1997. The original letter to David Ettridge confirming the 'rules of engagement' with Pauline Hanson can be seen at this link: http://www.gwb.com.au/gwb/news/onenation/letter.gif In both Channel 9 interviews Pauline Hanson has appeared stunned, was ridiculed by those interviewing her and thereafter denigrated by many of her opponents. Quite simply she has been ambushed with unrelated questioning by a less than ethical media doing the bidding of powers higher up. This Sunday Channel 9's 'Sixty Minutes' has intimated that it will be doing an 'expose' on Pauline Hanson's One Nation links to 'American influences'. As of late yesterday they had refused to supply the source of their information so that One Nation could respond. It will be an interesting time for 'Sixty Minutes' to carry such a damaging, unsubstantiated programme, less than a week before the Queensland state election. The background to the programme to be run tomorrow can be seen at: http://sixtyminutes.ninemsn.com.au/news/17029.asp Here is a quote from that page: 'But as 60 Minutes has discovered, Pauline Hanson's one nation has little to do with our nation. Much of her ideology is borrowed from loony extremists in the United States, right down to her claim this week that the UN was undermining Australia's sovereignty. Jeff McMullen reports that this fear of a UN-led global world order is the central theme in the thinking of militia groups at war with the US Government. And the militia leaders admit they know and admire Pauline Hanson and have advised her supporters.' With this in mind I would ask you to take this personal assurance from me. I have been privileged to get to know Pauline and understand the fire that burns within her for Australia and her children, our future. She is not influenced by anybody from overseas, her gun laws actually tighten gun control through "an instant record check to ensure those persons ineligible to own a firearm can be quickly identified; we shall establish a register of persons prohibited from firearm ownership. Prohibited persons: ie those convicted of a violent offence." See: http://www.gwb.com.au/onenation/press/guns.html Pauline's aims are to work for the return of Australia to Australians - away from the negative, direct influence of overseas-based multinationals; to introduce Citizen Based Referendums; to allow you to have a real say in your future (One Nation's policies can be seen at: http://www.gwb.com.au/onenation/policy.html) and to dismantle the power blocks controlled by the media barons. It is this last goal which is behind the vilification of Pauline Hanson by the media and what she stands for, not the opinions expressed by those who do their master's bidding. You may like to tell 'Sixty Minutes' what you think of their programme, if so use this link: http://sixtyminutes.ninemsn.com.au/60m/content/email.asp PLEASE BROADCAST THIS EMAIL WIDELY A personal message from Scott Balson, Pauline Hanson's One Nation web master One Nation home page: http://www.gwb.com.au/onenation From bill.stewart at pobox.com Fri Jun 5 19:12:02 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Fri, 5 Jun 1998 19:12:02 -0700 (PDT) Subject: IP: Uncle Sam is Hooked on Forfeiture (fwd) In-Reply-To: <19980605092007.3442.qmail@hades.rpini.com> Message-ID: <3.0.5.32.19980605092233.008e0100@popd.ix.netcom.com> Somebody, probably Vlad, forwarded this via Swiss Remailer. I normally try not to reply to Ignition-Points forwards here, but this one's relevant. "Access devices" often includes things like computer passwords as well as smartcards for building entry. So "Crack a password, lose your computer" would apply as well as "Crack 15+ passwords, get busted". I don't know if that was Senator Sleazy's intent with the bill, but it's an obvious application if not. Did the bill pass? >---------- Forwarded message ---------- >Date: Wed, 03 Jun 1998 16:21:31 -0400 >From: Patricia Neill >To: ignition-point at majordomo.pobox.com >Subject: IP: Uncle Sam is Hooked on Forfeiture > > 4.Counterfeit Access Devices > S.1148 > SPONSOR: Sen D'Amato (introduced 09/04/97) > TITLE(S): > OFFICIAL TITLE AS INTRODUCED: > A bill to amend title 49, United States Code, to require the >forfeiture of counterfeit access devices and device-making equipment. > "Amends Federal transportation law to declare counterfeit >access devices and device-making equipment contraband subject to mandatory >seizure and forfeiture." > > Well, what are we talking about here? Duplicate key for the apartment? >What can it be extended to tomorrow, is the real question. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From StanSqncrs at aol.com Fri Jun 5 21:46:38 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Fri, 5 Jun 1998 21:46:38 -0700 (PDT) Subject: Nobody on Video ;-) Message-ID: It appears the Cypherpunks have infiltrated the FBI and have installed a survailence camera on one of the agents investigating the Cypherpunks. ;-) Here's one of them FBI agents tryin' to track you guys down ;-) , check this out - http://www.cnbc.com/moreinfo/badday.mpeg 4.5 meg (but worth every byte) Stan 'Amazing! How can you tell the dancer from the dance' (Brave Combo - The Jeffrey) Visit 'What's A Meta U (and What's It 2U) http://members.aol.com/WhtsAMetaU/ (Cypherpunks, the Brave Combo's latest studio release ('Group Dance Epidemic - Fun .... and Functional!' - Rounder Records) is themed on my war with the Bucketheads that led me to this list. The cover picture depicts the Bucketheads (a group of people pretending to be having a good time.) It was the leader of the Bucketheads that subscribed me to this list (I'm VERY sure). The song, 'The Jeffrey', in particular, is all about the 'flame' (as 'they' call it) war, and based much on some of my posts. The list is now un- moderated, and in the control of free persons. Check out that cd.) From vac22737889 at msn.com Sat Jun 6 01:54:37 1998 From: vac22737889 at msn.com (vac22737889 at msn.com) Date: Sat, 6 Jun 1998 01:54:37 -0700 (PDT) Subject: URGENT BUY RECOMMENDATION Message-ID: <221548788987.MAA45587@mail.msn.com> R & R Resources. Symbol: R R R I Recent Price: 8 3/4 ($8.75/share) Wall Street analysis from Harvard Equity Research has issued a STRONG BUY recommendation on RRRI stock. Robert Renquist was quoted as predicting a $13.50-$15.00 price near-term with "the high probability of continuing appreciation during the 4th quarter of 1998". Harvard Equity Research's recommendation AATK went from $3 to $9.00 in ten trading days! Harvard Equity Research is so confident of their projections that they are offering their subscribers a money-back guarantee on their subscription if RRRI doesn't at least double within the next year. To reiterate: an IMMEDIATE & STRONG BUY recommendation on RRRI. For further information go to: http://quote.yahoo.com/ or send a SASE, for a free issue of Harvard Equity Research's latest top-rated newsletter, to:H.E.R., 35 rue des Bains, CH-1205 Geneve, Switzerland. From gwb at gwb.com.au Sat Jun 6 03:26:22 1998 From: gwb at gwb.com.au (Global Web Builders) Date: Sat, 6 Jun 1998 03:26:22 -0700 (PDT) Subject: Statement on Sixty Minutes by Pauline Hanson Message-ID: <1.5.4.32.19980606101637.0084b320@mail.pronet.net.au> Date: Sat, 6 Jun 1998 20:00:04 +1000 NEWS RELEASE 6/6/98 60 minutes' Fairytales "This Sunday, 60 Minutes is airing a segment devoted to connecting Pauline Hanson with individuals or groups in the United States. While we don't know who these people are, what is certain is that Pauline Hanson is not in contact politically or organisationally with anyone in the United States - the 60 Minutes story is a fairytale. After hearing of an advertisement for this Sunday's 60 minutes, David Oldfied contacted the programme to check its content. Despite making it clear there was absolutely no communication between Pauline Hanson, her advisers, or the organisation's heads and anyone in the United States, 60 minutes refused to even consider they had manufactured the story. They also refused to allow One Nation an opportunity to rebut their fairytale until the programme the following week. This is a nefariously timed lie. This is deceptive and dishonest journalism at its worst and all credible journalists, whatever their personal feelings, should be appalled at 60 minutes' approach. Regardless of what evidence 60 Minutes produce or what they may state, the whole story is a fairytale fabricated without the slightest basis of truth. There is no connection or communication between the United States and Pauline Hanson or One Nation. While we have no knowledge of such activities, it is possible some individual member may be in contact with people overseas but this, if it has happened, is a personal affair and unrelated to us as an organisation. It should also be understood that One Nation letterhead and other documents have been forged on a number of occasions. Further to this, people have falsely claimed to be party officials and candidates as well as one incident where a person in Western Australia claimed to be a close personal adviser to Pauline when in fact she had never even met him. We are not sure what 60 minutes will put to air, but having spoken to them twice, it is clear they will peddle the lie of links that simply do not exist. Perhaps they have cleverly manufactured a fairytale with the help of people either willing to perjure themselves or who are just not aware they are not really in contact with Pauline or One Nation, but whatever the case, their story is fiction in the 1st, 2nd and 3rd degree. 60 minute's refusal of an opportunity for us to face their fairytale on their programme this Sunday night, in itself, proves their intention to simply maliciously attack Pauline and One Nation by any means regardless of the total lack of truth. 60 minutes has no credibility and should be treated accordingly. Even their Internet story announcing their programme is filled with lies when factual evidence is clearly available by speaking to us, something they chose not to do because the truth would ruin their dishonest and despicable claims." "Pauline Hanson and One Nation is, and will always be, 100% Australian owned and 100% Australian influenced." Statement issued by request of Pauline Hanson MP. From kip at bdi.sem.hhs.nl Sat Jun 6 05:05:52 1998 From: kip at bdi.sem.hhs.nl (kip at bdi.sem.hhs.nl) Date: Sat, 6 Jun 1998 05:05:52 -0700 (PDT) Subject: JUST RELEASED! 10 Million!!! Message-ID: <011297055501222@g_fantasm.com> IT WAS JUST RELEASED!! INTRODUCING...MILLIONS VOL. 1A We took a total of over 92 million email addresses from many of the touted CD's that are out there (bought them all - some were $300+)! We added the millions we had in storage to those. When we combined them all, we had in excess of 100+ million addresses in one huge file. We then ran a super "sort/de-dupe" program against this huge list. It cut the file down to less than 25 million!!! Can you believe that? It seems that most people that are selling CD's are duping the public by putting numerous files of addresses in the CD over and over. This created many duplicate addresses. They also had many program "generated" email addresses like Compuserve, MCI, ANON's, etc. This causes a tremendous amount of undeliverables, and for those that use Stealth programs, clogs up servers quickly with trash, etc. We then ran a program that contained 1800+ keywords to remove addresses with vulgarity, profanity, sex-related names, postmaster, webmaster, flamer, abuse, spam, etc., etc. Also eliminated all .edu, .mil, .org, .gov, etc. After that list was run against the remaining list, it reduced it down to near 10 million addresses! So, you see, our list will save people hundreds of dollars buying all others that are out there on CD and otherwise. Using ours will be like using the 100+ million that we started with, but a lot less money and alot less time!! We also purchased Cyber-Promos ($995.00) CD. We received it just prior to finishing production work on the new CD. We had our people take a random sample of 300,000 addresses from the touted 2.9 that they advertised. We used a program that allows us to take a random sample of addresses from any list. We were able to have the program take every 9th address, thus giving us a 300,000 list of Cyber's email addresses from top to bottom. We cleaned these, and came up with about 100,000 addresses. These are also mixed in. We also included a 6+ million "Remove/Flamer" file broke into seperate files for ease of extracting and adding to your own database of removes. "You can buy from the REST or you can buy from the BEST. Your choice. _____________________________ What others are saying: "I received the CD on Friday evening. Like a kid with a new toy, I immediately started bulking out using the new email addresses. Over the course of the weekend, I emailed out over 500,000 emails and I received less than TWENTY undeliverables!! I am totally satisfied with my purchase!! Thanks Premier!!" Dave Buckley Houston, TX "This list is worth it's weight in gold!! I sent out 100,000 emails for my product and received over 55 orders! Ann Colby New Orleans, LA **************************************** HERE'S THE BOTTOM LINE Here is what you get when you order today! >> 10 Million Email Addresses... 1 per line in simple text format on a CD. Files are in lots of 5,000 (no codes needed to open files). All files are separated by domain name for your convenience. PLUS you receive a tremendous REMOVE list! 6 Million+ >>> NOW ONLY $150.00! This price is effective for the next seven days, thereafter the price will be $199.00 so ORDER NOW! All lists are completely free of any Duplicates. We also on a continual basis, add New Names and Remove Undeliverables and Remove Requests. The result is the Cleanest Email Addresses Available Anywhere to use over and over again, for a FRACTION of the cost that other companies charge. Typical rates for acquiring email lists are from 1 cent to as high as 3 cents per email address - that's "INFORMATION HIGHWAY" ROBBERY!. ***ADDED BONUS*** All our customers will have access to our updates on the CD volume they purchase. That's right, we continually work on our CD. Who knows when those other CDs were made. We're constantly adding and deleting addresses, removes. Etc. It all comes back to quality. No one else offers that! Don't even hesitate on this one or you will miss out on the most effective way to market anywhere...PERIOD! If you have any further questions or to place an order by phone, please do not hesitate to call us at: 800-600-0343 Ext. 2693 To order our email package, simply print out the EZ ORDER FORM below and fax or mail it to our office today. We accept Visa, Mastercard, AMEX, Checks by Fax. _________________ EZ Order Form _____Yes! I would like to order MILLIONS Vol. 1A email addresses for only $150.00. *Please select one of the following for shipping.. ____I would like to receive my package OVERNIGHT. I'm including $15 for shipping. (outside US add an additional $25 for shipping) ____I would like to receive my package 2 DAY delivery. I'm including $10 for shipping. (outside US add an additional $25 for shipping) DATE_____________________________________________________ NAME____________________________________________________ COMPANY NAME___________________________________________ ADDRESS_________________________________________________ CITY, STATE, ZIP___________________________________________ PHONE NUMBERS__________________________________________ FAX NUMBERS_____________________________________________ EMAIL ADDRESS___________________________________________ TYPE OF CREDIT CARD: ______VISA _____MASTERCARD CREDIT CARD# __________________________________________ EXPIRATION DATE________________________________________ NAME ON CARD___________________________________________ AMOUNT $____________________ (Required) SIGNATURE:x________________________ DATE:x__________________ You may fax your order to us at: 1-212-504-8192 CHECK BY FAX SERVICES! If you would like to fax a check, paste your check below and fax it to our office along with all forms to: 1-212-504-8192 ****************************************************** ***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR CHECK HERE AND FAX IT TO US AT 1-212-504-8192 ******************************************************* If You fax a check, there is no need for you to send the original check. We will draft up a new check, with the exact information from your original check. All checks will be held for bank clearance. (7-10 days) Make payable to: "GD Publishing" From sahazali at ew.mimos.my Sat Jun 6 11:13:39 1998 From: sahazali at ew.mimos.my (sahazali at ew.mimos.my) Date: Sat, 6 Jun 1998 11:13:39 -0700 (PDT) Subject: Find out what "They" don't want you to know!!! Message-ID: <011297033301222@g_fantasmimages.com> Dear Friend: If you have already responded to the following announcement a few days ago, that means your package is already on its way and it should be arriving soon! If you have not responded to this before, please pay attention to it now. This is very important!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!! IMPORTANT ANNOUNCEMENT IMPORTANT ACCOUNCEMENT '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' ''''''''''''''''''''''''''' Your future May Depend on it ! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!! Before you know about this 'Important Announcement', you must first read the following 'Editorial Excerpts' from some important publications in the United States: NEW YORK TIMES: "In concluding our review of Financial organizations to effect change in the 90's, special attention should be called to a California based organization, 'WORLD CURRENCY CARTEL'. Members of this organization are amassing hundred of millions of dollars in the currency market using a very LEGAL method which has NEVER been divulged to the general public. While their purpose is not yet known, their presence has most certainly been felt". NBC NIGHTLY NEWS: "Members of 'World Currency Cartel', who always keep a low profile, are considered to be some of the most wealthiest people in North America". More excerpts later, but first let us give you this very 'IMPORTANT ANNOUNCEMENT": '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' ''''''''' We are glad to announce that for the first time and for a very short period of time, WORLD CURRENCY CARTEL will instruct a LIMITED number of people worldwide on 'HOW TO CONVERT $25 INTO ONE HUNDRED OF LEGAL CURRENCY'. We will transact the first conversion for you, after that you can easily and quickly do this on your own hundreds or even thousands of times every month. TAKE ADVANTAGE OF THIS "SECRET FLAW" ! ****************************************************************** ****************************************************************** *** It is even more explosive than we have yet disclosed. While currency does fluctuate daily, we can show you 'HOW TO CONVERT $99 INTO $588 AS MANY TIMES AS YOU WANT'. That means, you will be able to EXCHANGE $99, AMERICAN LEGAL CURRENCY DOLLARS, FOR $580 OF THE SAME. You can do this as many times as you wish, every day, every week, every month. All very LEGAL and effortlessly! It takes only 5 to 10 minutes each time you do this. You can do this from home, office or even while traveling. All you need is an access to a phone line and an address. Best of all, you can do this from ANY CITY ON THIS EARTH!!! Again, we must reiterate, anyone can do this and the source is NEVER-ENDING. For as long as the global financial community continues to use different currencies with varying exchange rates, the "SECRET FLAW" will exist. >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> As we said earlier , we will do the first transaction for you and will show you exactly how to do this on your own, over and over again! The amount of exchange you would do each time is entirely up to you. Working just 2 to 10 hours a week, you can soon join the list of Millionaires who do this on a daily basis many times a day. The transaction is so simple that even a high school kid can do it! We at the World Currency Cartel would like to see a uniform global currency backed by Gold. But, until then, we will allow a LIMITED number of individuals worldwide to share in the UNLIMITED PROFITS provided for by the world currency differentials. We will espouse no more political views nor will we ask you to do so. We can say however, that our parent organization, NDML, benefits greatly by the knowledge being shared, as we ourselves, along with YOU, benefit likewise. Your main concern surely will be, how you will benefit. As soon as you become a member, you will make transactions from your home, office, by telephone or through the mail. You can conduct these transactions even while traveling. Don't believe us? Experience it for yourself! ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; Unlike anyone else, we will assure you great financial freedom and you will add to our quickly growing base of supporters and join the list of MILLIONAIRES being created using this very "SECRET FLAW" in the world currency market. ****************************************************************** ****************************************************************** *** DON'T ENVY US, JOIN US TODAY!!! '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' ''''''''' There is a one time membership fee of only $195. BUT, if you join us by June 29th, 1998, you can join us for only $25 administrative cost. Your important documents, instructions, contact name/address, phone number and all other pertinent information will be mailed to you immediately. So take advantage of our Anniversary date and join us today. (If you are replying after June 29th, you must pay $195.00 for the membership fee. NO EXCEPTIONS, and no more E-mail inquiries please). Upon becoming a member, you promise to keep all infos CONFIDENTIAL! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~ Should you choose to cancel your membership for any reason, you must return all papers/documents for a refund within 60 days. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~-- IMPORTANT: **************** 1...Please write your name & mailing address VERY CLEARLY on a paper 2...Below your mailing address, please write your E-mail address 3...At the top left hand corner, please write the words "NEW MEMBER" 4...Attach a CHECK or MONEY ORDER for $25 + $10 for the shipping and handling of documents (TOTAL = $35.00) Outside US add $10 (TOTAL = $45) PAYABLE TO "EBSN" and mail to: EBSN PO BOX 66 ROSELLE PARK, NJ 07204 }}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}} }}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}} }}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}} Here are some more 'Editorial Excerpts': ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ WALL STREET: "A discreet group of Americans, operating under the guise of World Currency Cartel have recently begun making rumbles in world finance market. While at this time, their game is not completely known, they certainly will be watched by those making major moves in the currency contracts". FINANCIAL WEEK: "Watch them, monitor them, extract their knowledge and try to become one of them. That is the soundest financial advice we could give to anyone". NATIONAL BUSINESS WEEKLY: "While this reporter has been left in the cold as to its method of operation, we have been able to confirm that 'World Currency Cartel' and its members are literally amassing great fortunes overnight". $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$END$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ We thankfully credit DIAMOND INT. for the content of this IMPORTANT ANNOUNCEMENT. From gwb at gwb.com.au Sat Jun 6 13:26:58 1998 From: gwb at gwb.com.au (Global Web Builders) Date: Sat, 6 Jun 1998 13:26:58 -0700 (PDT) Subject: Toyota - Sixty Minutes' sponsors need to know Message-ID: <1.5.4.32.19980606202036.00b43b7c@mail.pronet.net.au> Dear One Nation supporters Toyota are the bona-fide sponsors of Sixty Minutes. Further to our email yesterday about their coverage of Pauline Hanson tonight, ****I would encourage**** you to take a moment to send your message of concern about the unethical behaviour of this Channel 9 programme and express yours views clearly on how you feel this might reflect on their business. Here is Toyota's email address: toyota at spike.com.au GWB Scott Balson Here is a copy of the email sent to you yesterday from Pauline Hanson: NEWS RELEASE 6/6/98 60 minutes' Fairytales "This Sunday, 60 Minutes is airing a segment devoted to connecting Pauline Hanson with individuals or groups in the United States. While we don't know who these people are, what is certain is that Pauline Hanson is not in contact politically or organisationally with anyone in the United States - the 60 Minutes story is a fairytale. After hearing of an advertisement for this Sunday's 60 minutes, David Oldfied contacted the programme to check its content. Despite making it clear there was absolutely no communication between Pauline Hanson, her advisers, or the organisation's heads and anyone in the United States, 60 minutes refused to even consider they had manufactured the story. They also refused to allow One Nation an opportunity to rebut their fairytale until the programme the following week. This is a nefariously timed lie. This is deceptive and dishonest journalism at its worst and all credible journalists, whatever their personal feelings, should be appalled at 60 minutes' approach. Regardless of what evidence 60 Minutes produce or what they may state, the whole story is a fairytale fabricated without the slightest basis of truth. There is no connection or communication between the United States and Pauline Hanson or One Nation. While we have no knowledge of such activities, it is possible some individual member may be in contact with people overseas but this, if it has happened, is a personal affair and unrelated to us as an organisation. It should also be understood that One Nation letterhead and other documents have been forged on a number of occasions. Further to this, people have falsely claimed to be party officials and candidates as well as one incident where a person in Western Australia claimed to be a close personal adviser to Pauline when in fact she had never even met him. We are not sure what 60 minutes will put to air, but having spoken to them twice, it is clear they will peddle the lie of links that simply do not exist. Perhaps they have cleverly manufactured a fairytale with the help of people either willing to perjure themselves or who are just not aware they are not really in contact with Pauline or One Nation, but whatever the case, their story is fiction in the 1st, 2nd and 3rd degree. 60 minute's refusal of an opportunity for us to face their fairytale on their programme this Sunday night, in itself, proves their intention to simply maliciously attack Pauline and One Nation by any means regardless of the total lack of truth. 60 minutes has no credibility and should be treated accordingly. Even their Internet story announcing their programme is filled with lies when factual evidence is clearly available by speaking to us, something they chose not to do because the truth would ruin their dishonest and despicable claims." "Pauline Hanson and One Nation is, and will always be, 100% Australian owned and 100% Australian influenced." Statement issued by request of Pauline Hanson MP. From StanSqncrs at aol.com Sat Jun 6 16:40:23 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Sat, 6 Jun 1998 16:40:23 -0700 (PDT) Subject: FBI Video Message-ID: <544efa54.3579d342@aol.com> Bill had a correction for me (Thanks Bill!). That cypherpunks survailance video is only 416k (I've got .MP3 sizes on my mind, sorry) Download it if you haven't seen it - http://www.cnbc.com/moreinfo/badday.mpeg Stan From gwb at gwb.com.au Sat Jun 6 17:44:27 1998 From: gwb at gwb.com.au (Global Web Builders) Date: Sat, 6 Jun 1998 17:44:27 -0700 (PDT) Subject: Queensland State Elections Live Message-ID: <1.5.4.32.19980607003915.023003b4@mail.pronet.net.au> Dear One Nation supporter Bookmark this page: http://www.gwb.com.au/onenation/qldstate/june13 We will be covering the state elections live from here on behalf of One Nation. You will be able to participate in live IRC Chat (find out how now) and Follow stories and images as they unfold. GWB Scott Balson From martybishop at yahoo.com Sat Jun 6 18:59:38 1998 From: martybishop at yahoo.com (Martin Bishop) Date: Sat, 6 Jun 1998 18:59:38 -0700 (PDT) Subject: Tigerteam Contract Message-ID: <19980607015916.1565.rocketmail@send1e.yahoomail.com> A request for all tigerteam specialists: If any of you has access to a sample of a tigerteam contract (a company orders an attempt to break into their information system) - for any country - preferably European, I would very much appreciate you directing me to it (or sending it). I have assembled a team of various security specialists but really wouldn't like to step into some legal trap that may have been avoided. My primary concerns are: - attempt to "steal" information that the company considers confidential or classified (are they allowed to authorize such attempt at all and who gets sued if they can't but do it anyway) - possible hinderance or partial destruction of company's information system - software, data, functionality (e.g. when conducting highly violent attacks) - using forged identity (very handy when doing social engineering but what is the legal aspect of it?) - "attacking" company's employees (can a company authorize someone to do a background research on their employees, to hack into their home computers as well, to social engineer them out-of-work, to abduct and threaten them etc.?) - protecting from your own team members (trust nobody: a member of my team could eventually - under threat or some other pressure - insert a backdoor/trojan/virus etc. into the company's information system) Thank you in advance for your answers and have a nice day. Please respond to me directly or CC. Martin Bishop _________________________________________________________ DO YOU YAHOO!? Get your free @yahoo.com address at http://mail.yahoo.com From reoru89 at demeter.psych.uw.edu.pl Sat Jun 6 23:16:29 1998 From: reoru89 at demeter.psych.uw.edu.pl (THE HOBBY PROS) Date: Sat, 6 Jun 1998 23:16:29 -0700 (PDT) Subject: CABLE DECSRAMBLER Now Only $6.00 !! Message-ID: <199806063592AAA6754@564897845784511@Inovations.com.inmh.ro> This is really cool! PREMIUM CHANNELS and PAY PER VIEW EVENTS **** FREE **** EASY to assemble plans for only $6.00 ! We will send your plans the day we receive your order! YOU WILL BE WATCHING HBO, SHOWTIME, THE MOVIE CHANNEL, Pay per view events, Adult stations, and any other scrambled signal NEXT WEEK! You can EASILY assemble a cable descrambler in less than 30 minutes! You have probably seen many advertisments for similar plans.... BUT OURS are BETTER! We have compared it to all the others and have actually IMPROVED the quality and SIMPLIFIED the design !!! ** We even include PHOTOS! ** OUR PLANS ARE BETTER! We have NEW, EASY TO READ,EASY to assemble plans for only $6.00! We have seen them advertised for as much as $29.00 and you have to wait weeks to receive them! WHAT THE OTHERS SAY IS TRUE! Parts are available at "The R***O S***k" Trademark rights do not allow us to use a national electronics retail chains' name but there is one in your town! Call and ask them BEFORE you order! They are very familiar with these plans and will tell you that it....... DOES INDEED WORK! ASK THEM! You will need part #'s 270-235 271-1325 278-212 RG59 coaxial cable, #12 copper wire, and a variable capacitor. They may have to special order the variable capacitor.... But WHY WAIT for a special order? WE have them! ** WE have secured a supply of the capacitors directly from the manufacturer, and We WILL include one with your plans for an ADDITIONAL $10.00 only! It is LEGAL, providing of course you use these plans for educational purposes only. IT'S FUN! We're sure you'll enjoy this! Our FAMILIES sure do! * you need one descrambler for each TV. NO MORE MONTHLY BILLS! $ 6.00 for plans only $10.00 for variable capacitor only $16.00 for The easy to assemble plans and one variable capacitor! Pay by check or money order payable to: The Hobby Pros 336 Bon Air Center #254 Greenbrae, Ca. 94904 Please provide a self addressed stamped envelope (.64) So we can RUSH your order to you! ot3 ^^ If this E-mail offends anyone, we apologize ......and feel free to use the DEL key. "By deleting your unwanted E-Mail you waste one key stroke, yet by throwing away paper mail you waste a planet! SAVE OUR TREES and support internet E-Mail instead of traditional mail"! ^^ From s955349 at mailserv.cuhk.edu.hk Sat Jun 6 23:20:57 1998 From: s955349 at mailserv.cuhk.edu.hk (s955349 at mailserv.cuhk.edu.hk) Date: Sat, 6 Jun 1998 23:20:57 -0700 (PDT) Subject: What "THEY" Don't Want You To Find Out!! Message-ID: <53556360_13892432> Dear Friend: If you have already responded to the following announcement a few days ago, that means your package is already on its way and it should be arriving soon! If you have not responded to this before, please pay attention to it now. This is very important!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' IMPORTANT ANNOUNCEMENT IMPORTANT ANNOUNCEMENT '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' Your future May Depend on it! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! Before you know about this 'Important Announcement', you must first read the following 'Editorial Excerpts' from some important publications in the United States: NEW YORK TIMES: "In concluding our review of Financial organizations to effect change in the 90's, special attention should be called to a California based organization, 'WORLD CURRENCY CARTEL'. Members of this organization are amassing hundred of millions of dollars in the currency market using a very LEGAL method which has NEVER been divulged to the general public. While their purpose is not yet known, their presence has most certainly been felt". NBC NIGHTLY NEWS: "Members of 'World Currency Cartel', who always keep a low profile, are considered to be some of the most wealthiest people in North America". More excerpts later, but first let us give you this very "IMPORTANT ANNOUNCEMENT": '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' We are glad to announce that for the first time and for a very short period of time, WORLD CURRENCY CARTEL will instruct a LIMITED number of people worldwide on 'HOW TO CONVERT $25 INTO ONE HUNDRED OF LEGAL CURRENCY'. We will transact the first conversion for you, after that you can easily and quickly do this on your own hundreds or even thousands of times every month. TAKE ADVANTAGE OF THIS "SECRET FLAW" ! ****************************************************************** It is even more explosive than we have yet disclosed. While currency does fluctuate daily, we can show you 'HOW TO CONVERT $99 INTO $588 AS MANY TIMES AS YOU WANT'. That means, you will be able to EXCHANGE $99, AMERICAN LEGAL CURRENCY DOLLARS, FOR $580 OF THE SAME. You can do this as many times as you wish, every day, every week, every month. All very LEGAL and effortlessly! It takes only 5 to 10 minutes each time you do this. You can do this from home, office or even while traveling. All you need is an access to a phone line and an address. Best of all, you can do this from ANY CITY ON THIS EARTH!!! Again, we must reiterate, anyone can do this and the source is NEVER-ENDING. For as long as the global financial community continues to use different currencies with varying exchange rates, the "SECRET FLAW" will exist. >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> As we said earlier , we will do the first transaction for you and will show you exactly how to do this on your own, over and over again! The amount of exchange you would do each time is entirely up to you. Working just 2 to 10 hours a week, you can soon join the list of Millionaires who do this on a daily basis many times a day. The transaction is so simple that even a high school kid can do it! We at the World Currency Cartel would like to see a uniform global currency backed by Gold. But, until then, we will allow a LIMITED number of individuals worldwide to share in the UNLIMITED PROFITS provided for by the world currency differentials. We will espouse no more political views nor will we ask you to do so. We can say however, that our parent organization, NBT, benefits greatly by the knowledge being shared, as we ourselves, along with YOU, benefit likewise. Your main concern surely will be, how you will benefit. As soon as you become a member, you will make transactions from your home, office, by telephone or through the mail. You can conduct these transactions even while traveling. ================================================================= Don't believe us? Experience it for yourself! ================================================================= Unlike anyone else, we will assure you great financial freedom and you will add to our quickly growing base of supporters and join the list of MILLIONAIRES being created using this very "SECRET FLAW" in the world currency market. ================================================================== DON'T ENVY US, JOIN US TODAY!!! ================================================================== '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' There is a one time membership fee of only $195. BUT, if you join us by June 30, 1998, you can join us for only $25 administrative cost. Your important documents, instructions, contact name/address, phone number and all other pertinent information will be mailed to you immediately. So take advantage of our Anniversary date and join us today. (If you are replying after June 30, you must pay $195.00 for the membership fee. NO EXCEPTIONS, and no more E-mail inquiries please). Upon becoming a member, you promise to keep all info. CONFIDENTIAL! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Should you choose to cancel your membership for any reason, you must return all papers/documents for a refund within 60 days. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ************************** IMPORTANT: ************************** 1...Please write your name & mailing address VERY CLEARLY on a piece of paper or index card. 2...Below your mailing address, please write your E-mail address (optional). 3...At the top left hand corner, please write the words: "NEW MEMBER" 4...Attach a CHECK or MONEY ORDER for $25 + $5 for the shipping of documents (TOTAL = $30.00) PAYABLE TO "NBT" and mail to: NBT PO BOX 1129 UNION, NJ 07083-1129 *If outside US add an additional $10 (TOTAL = $40.00, International Money Orders Only) }}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}} Here are some more "Editorial Excerpts": ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ WALL STREET: "A discreet group of Americans, operating under the guise of World Currency Cartel have recently begun making rumbles in world finance market. While at this time, their game is not completely known, they certainly will be watched by those making major moves in the currency contracts". FINANCIAL WEEK: "Watch them, monitor them, extract their knowledge and try to become one of them. That is the soundest financial advice we could give to anyone". NATIONAL BUSINESS WEEKLY: "While this reporter has been left in the cold as to its method of operation, we have been able to confirm that 'World Currency Cartel' and its members are literally amassing great fortunes overnight". END $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ We thankfully credit DIAMOND INT. for the content of this IMPORTANT ANNOUNCEMENT! From favvafeephjmg.com at uk.newbridge.com Sat Jun 6 23:23:51 1998 From: favvafeephjmg.com at uk.newbridge.com (favvafeephjmg.com at uk.newbridge.com) Date: Sat, 6 Jun 1998 23:23:51 -0700 (PDT) Subject: E-Mail anything to 57 million people for only $99 Message-ID: <76cd44dbs84f81co640a655aa@myweb.com> 57 MILLION EMAILS FOR ONLY $99 INCLUDES STEALTH MAILER That's right, I have 57 Million Fresh email addresses that I will sell for only $99. These are all fresh addresses that include almost every person on the internet today, with no duplications. They are all sorted and ready to be mailed. That is the best deal anywhere today ! Imagine selling a product for only $5 and getting only a 1/10% response. That's $2,850,000 in your pocket !!! Don't believe it? People are making that kind of money right now by doing the same thing, that is why you get so much email from people selling you their product....it works ! I will even tell you how to mail them with easy to follow step-by-step instruction I include with every order. These 57 Million email addresses are yours to keep, so you can use them over and over and they come on 1 CD. I will also include the stealth mailer - this is a full version of the incredibly fast mailing program that hides your email address when you send mail so no one will find out where it came from and you won't lose your dial up account. The stealth mailer is an incredible program and absolutly FREE with your order ! If you are not making at least $50,000 a month, then ORDER NOW. ORDER NOW BY FAX: Simply print out this order form and fax it to us along with your check made payable to: Cyber Bulk for only $99. Our Fax # is: 760 430 2220 We will confirm your order by email and then mail your cd out via priority mail. Name:_____________________________ Street Address:______________________________ City:_____________________ State:________________ZipCode:_____________ Phone number:__________________________ Email:_______________________________ Tape your check here. Returned checks are subject to $25 NSF Fee. Fax it to 760 430 2220 Or You can mail a check or money order to: Cyber Bulk 167 Hamilton ST Oceanside, CA 92054 If you want to be removed from our mailing list just send a email here From bill.stewart at pobox.com Sun Jun 7 12:40:45 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Sun, 7 Jun 1998 12:40:45 -0700 (PDT) Subject: Counterpane Cracks MS's PPTP In-Reply-To: Message-ID: <3.0.5.32.19980607123650.008cf970@popd.ix.netcom.com> >> << > Auto-Launch attached binaries in E-Mail <-- Can we say G**dT*mes? >> It was my understanding, that the so-called GoodTimes virus was a farce, >> apparently aimed at specific commercial spammers. >G**dT*mes is a hoax. > >I'm talking about a bug in Outlook (Express?) that will execute code when >email messages are opened. G**dT*mes and its ilk are hoaxes, which infect the mind of some readers, causing Fear and Panic, and propagating around like chain letters. But the fear-causing part is the assertion that if you read the message, it will execute on your computer and do Bad Scary Things. In the case of G**dT*mes, this was bogus, but it doesn't have to be. In a passive-mail-reader environment, this won't happen, because there's no reason your mailreader will execute commands embedded in email, but if you've got a mail-reader that executes scripts sent to it in the mail, you don't need the human reader's participation to spread things, you just need to tell the mail-reader to propagate and then do whatever payload you've sent along as well. The IBM Christmas-Tree Virus didn't use Fear to execute - it promised the readers an amusing animated Christmas Tree on their terminals (back when that was still perceived as cool :-) and if the sucker ran it, it ran its propagation phase before or during the animation. And back when we used Real Terminals instead of emulators, you could send a crafty escape sequence to an HP2621 or VT100 to stash material in a register or on the screen and get it sent back to the computer. If you made a good guess about the environment, this was enough ("Quit mailreader, run /tmp/boom".) There was an article in the SFChron or Oakland Trib in spring 1979 about how "hackers at Berkeley" discovered a security hole in "the Unix, a computer made by DEC", which was really a terminal exploit. How good is that VT100 emulator you're using to telnet to that shell account? . . . . . . . ESC[42m; . yeah, that was fake..... From jya at pipeline.com Sun Jun 7 12:46:03 1998 From: jya at pipeline.com (John Young) Date: Sun, 7 Jun 1998 12:46:03 -0700 (PDT) Subject: PGP International Accused Message-ID: <199806071407.KAA08652@camel8.mindspring.com> There are accusations from Russia and France that PGP International and Network Associates are improperly and probably illegally refusing downloads of PGP to legitimate users. http://jya.com/pgpi-x-ru.htm http://jya.com/nai-x-fr.htm Phil Zimmermann and the companies have been asked by the plaintiffs to explain why public affirmations of open access are contradicted by illegal restrictions. Could this be due to pressure from US agencies or legal counsel to comply with covert directives of the nations to restrict access or pay the price of being denied markets? Maybe this is the way the Stewart Baker policy of encryption duplicity is being spread from NSA to the marketeers: Public assurances of concern and covert arrangements with authority to assure perpetuation of national security lockdown. From usethe800number at mailexcite.com Sun Jun 7 15:15:11 1998 From: usethe800number at mailexcite.com (usethe800number at mailexcite.com) Date: Sun, 7 Jun 1998 15:15:11 -0700 (PDT) Subject: Search Engines Message-ID: <29348246_22149450> I saw your web site on the internet. I work for a company that specializes in submitting web sites to search engines. We can submit your web site to over 350 of the world's best search engines for only $39.95! All work is verified. If you would like to get more traffic to your web site feel free to give me a call at our toll-free number listed below or order directly from our web site. We are a U.S. Based company that does business world wide. Sincerely, David Scott (800) 484-2621 X5568 http://www.skymax.net/searchengines From net10 at mail.domain-serv.com Sun Jun 7 18:19:09 1998 From: net10 at mail.domain-serv.com (net10 at mail.domain-serv.com) Date: Sun, 7 Jun 1998 18:19:09 -0700 (PDT) Subject: Don't Risk Losing That Great Domain Name! Message-ID: <199806080049.RAA05067@outlook.domain-serv.com> ********************************************************************* Don't Risk Losing That Great Domain Name For Your Personal Or Business Use. ********************************************************************* Register your Domain Name for a one time fee of $35.00. Planet Net's Domain Registration Services will not only register your domain name, but for no monthly charge, allow you to use the Planet Net Name Service. When you are ready to post your web site or use your domain for mail, The decision is up to you; select another website hosting company or Host with Planet Net. We'll even waive the set-up fees. Also available are packages with custom "under construction" pages and mail services allowing you to use your new domain for e-mail. Planet Net, the Internet's premier webmasters resource, offers high performance Website Hosting and Dedicated Servers. Lightning fast 30 MB virtual web hosting packages starting at $19.99/Month. Reseller packages with domain hosting as low as $10 /month All packages include bundles of free webmaster tools. Sign-up before June 30, 1998 and receive up to 3 Free months of web site hosting. If you would like to check the availability of your domain name or learn more about Planet Net type the following address in your web browser. http://www.serveramerica.com See You On The Net!! From zenna at mail.com Sun Jun 7 19:23:26 1998 From: zenna at mail.com (zenna at mail.com) Date: Sun, 7 Jun 1998 19:23:26 -0700 (PDT) Subject: Do you need extra money Message-ID: <51603356@teleport.com> Hello: Forgive us for the intrusion. Let me ask you a question. Are you in debt? Think about that for a moment while I introduce our company. We are American Capital Mortgage Services, we specialize in helping homeowners establish ONE easy LOW monthly payment with the added benefit of not needing any equity in your home. American Capital is constantly working with other lenders throughout the U.S. to provide you with the best interest rate possible. We have a number of different companies that we work with and this is at NO cost to you EVER. We are simply a referral agency. If you answered yes to the above question, please read on as I am sure American Capital can save you a huge amount of money on monthly payments as well as in taxes.. Consider This.....Did you know that: ~78% of Americans are in debt... ~$5,000.00 is the average Credit Card balance... ~8 Million plus people will file Bankruptcy in 1998 alone... Are you aware that banks throughout the United States are pressuring Congress that people in a high tax bracket can only file Chapter 13 so that the banks have some kind of recourse. Let me assure you these statistics are not to scare you but rather to inform you that you may or may not be alone. The goal of American Capital is to provide homeowners with lenders that fit your needs. We can provide you with lenders that will loan you up to 125% of the value of your home and there is NO equity needed.. In any case there are NO upfront fees or advances of ANY KIND on your part. What do you have to lose, why not give it a shot and see if you can better your situation. Utilize the loan for whatever purpose you may need: ~ A new car ~ College tuition ~ Taxes ~ Credit Cards ~ Vacation ~ Home improvements and the list goes on....... You can have the cash in your pocket usually within 7-14 days. Did you also know that your loan is tax deductible? All we simply ask for is your name, address, phone number and e-mail address. The rest is optional. This way a representative can personally call you so he or she can answer all your detailed questions. For a FREE loan evaluation please, visit our website by CLICKING HERE or type: www.debtmasters.as/131.html in your browser Thank you for your time and I know that we can help you in getting the money you deserve and in some cases need. TO BE REMOVED FROM OUR MAIL LIST CLICK HERE NOW **************************************************** The mailing list for this message has been preprocessed by an independent service to remove the addresses of those who are not interested in unsolicited email. Free registration for this mailer-independent removal service is at http://www.ctct.com **************************************************** From gnu at toad.com Sun Jun 7 21:39:00 1998 From: gnu at toad.com (John Gilmore) Date: Sun, 7 Jun 1998 21:39:00 -0700 (PDT) Subject: President's Export Council advisors consider Encryption Policy Message-ID: <199806080438.VAA05215@toad.com> [Largely bureaucratic, but there may be some interesting nuggets. This is an advisory group to watch over exports in general, with a subcommittee that is chartered to watch over encryption issues. --gnu] EXECUTIVE SUMMARY PRESIDENT'S EXPORT COUNCIL SUBCOMMITTEE ON ENCRYPTION APRIL 23, 1998 SUMMARY OF OPEN SESSION The open session of the President's Export Council Subcommittee on Encryption (PECSENC) was called to order at 8:30 a.m. Mr. Adorjan noted the Committee's mandate and described the framework and agenda of the meeting. He then described the proposed focus of the Subcommittee working groups on U.S. regulation and legislation, international, and technology. He emphasized that the objective would be for each working group to address the many subjects related to encryption export policy from the perspective of the primary topic. He noted that as the working groups made progress on issues, they would bring recommendations for decision to the entire Subcommittee. He added that each working group would issue individual reports or recommendations rather than waiting for an integrated report of all three working groups. He again noted his hope that the work of the three groups be integrated further on in the process. He commented that there had been discussion of a fourth group focused on law enforcement, but concluded that it would be more valuable to integrate law enforcement issues into the work of the three groups because of its impact on these areas. He then described the proposed list of working group participants and possible chairs, noting that his goal was to get a balanced representation of members within each group. He said that during the afternoon breakout sessions, he would like each working group to reach a set of decisions on the scope and approach of its work plan, and the timetable for completion. Mr. Adorjan then discussed how the PECSENC, as a Subcommittee of the President's Export Council, would communicate any formal activity to the Administration, noting that the process used by the PEC Subcommittee on Export Administration (PECSEA) worked well. He described this process, and explained that any proposals to send reports or letters to the Administration were submitted by the Subcommittee Chair to the PEC Chair for distribution to Committee members, with the PEC staff coordinating this effort. Mr. Adorjan then commented on Mr. Stewart Baker's e-mail recommendation to submit a letter urging the Administration to move forward on the financial institutions regulation which had been pending. He agreed with Mr. Baker's assessment that the Subcommittee should focus not only on long-term issues, but also intervene in short-term issues. Mr. Adorjan added that issuing a letter to the Administration with support of PEC and Subcommittee members was an effective means of bringing a topic to the forefront. He then suggested that the working groups address such time sensitive issues, as appropriate, and formulate recommendations for circulation throughout the entire Subcommittee. Mr. Adorjan then asked for any comments with regard to the working group activities. As there were none, he turned to the issue of membership, noting that the PECSENC had 23 members with approximately 30 total members planned. He added that at the previous meeting, members had discussed the importance of having a cryptographer and insurance industry representative as members. He assured members that the department was pursuing these recommendations. At the request of Subcommittee members, Under Secretary Reinsch discussed Secretary Daley's recent remarks to a group of information technology associations regarding the release of the Commerce Department report titled "The Emerging Digital Economy." Mr. Reinsch noted that while the report focused on electronic commerce, the Secretary also took the opportunity to comment on the encryption debate. He emphasized that the Secretary supported the President's policy to balance national security, privacy, and commercial interests, but believed that implementation of the policy had not been as successful as it should be. He added that if it could not be implemented successfully, the victims would be the law enforcement community and U.S. business, as foreign products would become more dominant. With respect to the ability of the United States to impact the activities of foreign countries on encryption, Mr. Reinsch noted that each country that confronted the issue had to work out the debate in its own way. Responding to Mr. Lynn McNulty's request for views on the Economic Strategy Institute's report entitled "Finding the Key, Reconciling National and Economic Security Interests in Cryptography Policy", Mr. Reinsch noted that while the report did not offer alternatives, it demonstrated that balancing the competing interests in the debate was difficult. Mr. Adorjan then introduced the first presenter in the Justice Department's threat assessment briefing, Mr. Charles Barry Smith, Supervisory Special Agent, Office of Public and Congressional Affairs at the Federal Bureau of Investigation. Agent Smith began by stating that law enforcement was supportive of strong encryption to protect privacy, but that it would be adversely impacted by commercially available non-recovery encryption products. He discussed the legal issues related to wiretapping, describing it as a technique of last resort done under strict judicial procedures. He then described the adverse impact of non-recovery encryption on law enforcement's ability to perform search and seizure of criminally related electronically stored data. He provided case examples where electronic surveillance had been used successfully and described high-profile cases where encryption played a role. In response to Raymond Humphrey's question as to whether or not criminals would use key recovery products, Agent Smith said that past experience showed that criminals tended to use what was generally available, citing the use of cellular phones as an example. Ambassador Katz raised the issue of whether it was too late to reverse the impact of the general availability of non-key recovery encryption. Agent Smith responded that at this point encryption was just an added feature, but would soon become integrated into products and user-friendly, resulting in increased use. In response to Ms. Simons' question of the issue of domestic controls, Agent Smith noted that law enforcement was in fact concerned about the proliferation of non-recovery products within the United States, as well as the impact of imports of such products. Agent Smith emphasized that law enforcement did not advocate that the government be the holder of the information or key, but that it have access to information pursuant to lawful authority without having to go to the individual who may be engaged in the illegal activity. Adorjan then introduced the second Justice Department speaker, Mr. Scott Charney, Chief of the Computer Crime and Intellectual Property Section in the Criminal Division of the Justice Department. Mr. Charney began by commenting that his office was a large proponent of using cryptography to protect systems for both authentication and privacy and commerce purposes based on its experience with hacker cases. He noted that if information was encrypted, it was not as much of a concern if hackers gained access to it. He said that the question to ask was whether the public wanted the kind of infrastructure that helped criminals protect themselves because products were unbreakable and law enforcement had no access to data, or the kind of infrastructure where the public got the benefits of robust cryptography but where it did more to preserve public safety. Mr. Douglas McGowan asked about the method of controlling keys for individual users of key recovery encryption outside of the corporate environment. Mr. Charney responded that there were many ingenious ways to implement the technology which allow people to retain control to information and keys while providing for government access with the necessary authority. He added that there were ways to implement key recovery that offered benefits for the consumer and public safety, and used the example of "self-wrapping" encryption. Mr. Donald Goldstein noted that there was evidence that the public was relatively trusting and accepting of key management and recovery techniques, citing the example of ATM card usage. He cautioned that the network might become unreliable if a vulnerability was introduced which could result in the public not trusting the system anymore. Mr. Chaney responded that this vulnerability was far less than what existed in today's plaintext world and that an expectation of zero risk on networks was not realistic. He added that there needed to be a balance of benefits and risks and that it was difficult to quantify risks to privacy versus public safety. There was also a general discussion with Messrs. Smith and Charney on related issues, including the concept of a "Net Center", the policies of other countries, imports of non-recovery encryption, the difficulty in designing different products in different markets, the possibility of a single law enforcement standard, economic intelligence and espionage, including losses to the economy if robust encryption was not available, the need for real time access to encrypted communications, and the ability of law enforcement to solve crimes in the future if constrained by non key-recovery encryption products. Mr. Anthony Pentino of the National Security Agency suggested that law enforcement might find a better way to communicate its position beyond the congressional level to the general public at large to counter what appeared to be an exaggeration of privacy concerns fostered by its detractors. Ms. Simons then asked that in the future, the Subcommittee members have the opportunity to submit questions to speakers. Mr Adorjan suggested that these questions be conveyed through the working groups. Mr. Linton Wells from the Department of Defense commented that Deputy Secretary of Defense John Hamre recently spoke to NATO allies in Brussels regarding the importance of each country developing national solutions on encryption. He noted that Hamre's point was that encryption needed to be regarded not just from commerce and law enforcement standpoint, but as a national security issue as well. As NATO moved from military dedicated command and control to public networks, strong identification, authentication, and interoperability were crucial. He also noted that with respect to the Defense Department engaging in electronic commerce, key recovery encryption would be necessary from an internal control standpoint. Mr. Adorjan agreed that this issue was not unique to the Defense Department, but corporations as well. Turning to the briefing foreign activities, Mr. Adorjan introduced Ms. Michelle O'Neill, Executive Director to Ambassador Aaron and Mr. James Lewis, Director of the Office of Strategic Trade and Foreign Policy Controls. Ms. O'Neill began by explaining that Ambassador Aaron, who was unable to attend the meeting, had been appointed as Special Envoy for Cryptography in November 1996. The goal of his discussions with other countries was international consensus on the development of key management and key recovery architectures that would foster robust, dependable security for global information infrastructure while protecting public safety and national security. She said that two key issues were the need for harmonized export control policies and the development compatible infrastructures, as it was clear that no widely used encryption system or any successful national policy would be possible without international cooperation. She also noted that while governments must provide appropriate policy framework, the task of building this infrastructure would lie with the private sector. She said that through Ambassador Aaron's discussions, they had learned that while most governments were behind the United States in development of encryption policies, each shared the same concerns as the United States in trying to strike the right balance. Mr. Lewis' discussion focused on multilateral controls on encryption exports. He began by noting that a number of countries controlled the export of encryption, but that the task was to modernize encryption export controls to reflect today's environment and agree to the implementation of common policies. He added that most governments had common concerns about role of encryption in society. He noted that the U.S. objectives with respect to encryption policy were law enforcement access, use of recoverable encryption, and promotion of electronic commerce. He then explained the history and structure of Wassenaar Arrangement and outlined the issues that the forum was considering with respect to encryption, including moving to a positive control list, consideration of the treatment of commercial encryption products given widespread commercial use, treatment of software and intangible technology (phone conversations, faxes, Internet transmissions), decontrol levels, and transparency in reporting. He said that the United States had raised encryption as an issue for discussion at the last Wassenaar Arrangement plenary in December 1997 and asked countries to adopt similar policies as the United States. He indicated that given the scope of the issues under consideration, he was not sure that resolution would happen anytime soon. He added that Ambassador Aaron's group was finding that other countries were moving slowly in the U.S. direction and had more sympathy for the U.S. position than it would appear. There was a general discussion of the issue of mass market encryption software, the treatment of intangible technology and the need to develop a common approach on encryption. Following the lunch break and the meeting of the non-public working group sessions, Chairman Adorjan reconvened the Subcommittee at 3:00 p.m. He asked each group to give a report on its discussions and began with Mr. Gant Redmon and the working group on technology. Mr. Redmon began by noting that the issue of interoperability was a key part of the group's discussion and said that building key recovery was not an impossible project (with respect to stored data). He said that from a technological standpoint, interoperability could cause a great deal of difficulty in terms of those products that have key recovery and those that do not. He also noted the strong domestic impact of export issues and other pressures to create encryption products a certain way. With respect to mass market software, he said that the working group generally agreed that 56 bit encryption products were the de facto standard. Mr. Adorjan then turned to Ambassador Katz for a briefing on the international working group discussion. Katz noted that the first task they agreed to focus on was developing an understanding of the state of current encryption policies, including foreign availability and policies of other governments. He said that the working group would seek briefings from government and the private sector and perhaps survey suppliers and users. He indicated that the group had identified another issue: whether export control policy is the most effective instrument to meet broader objectives of law enforcement, national security, and privacy. He finished by noting that the working group planned on completing its information gathering prior to the September meeting and would then work on policy recommendations. Mr. Adorjan then turned to the Regulatory and Legislative working group. Mr. Richard Barth began by noting that the working group had considered the letter drafted by Mr. Baker and supported it with minor edits. He added that they felt that the issue of raising the decontrol level to 56 bit encryption products could be included as a second point. He then noted that the group had agreed on a set of operating principles for themselves and perhaps for the use of the entire Subcommittee. These included the objective of balancing the interests of law enforcement, privacy and national, seeking this balance via market driven forces and, where necessary, taking a legislative approach. He concluded with a request for a panel briefing on the legislative environment and a briefing on the export control requirements on encryption. Adorjan agreed that briefings on three issues would be useful, specifically briefings on the status of legislative issues, export policies and administration, and international threat briefing by the National Security Agency. With respect to these briefings, he would ask the presenters to provide topical outlines in advance of the briefings. Mr. Adorjan said he looked forward to the working groups developing a defined scope of work by the next meeting, and suggested that they interact by e-mail. He added that the working groups did not need to get consensus, but that the long term objective was to formulate a set of recommendations. Finally, he noted that he and Under Secretary Reinsch would invite Secretary Daley to participate at the June 22 meeting. Mr. Adorjan asked if there were other issues to be discussed. As there were none, he adjourned the session at 3:35 p.m. From jmatk at tscm.com Sun Jun 7 23:49:35 1998 From: jmatk at tscm.com (James M. Atkinson, Comm-Eng) Date: Sun, 7 Jun 1998 23:49:35 -0700 (PDT) Subject: TSCM-L Technical Security List Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/enriched Size: 10579 bytes Desc: not available URL: From hollyelliott at hotmail.com Mon Jun 8 00:00:34 1998 From: hollyelliott at hotmail.com (hollyelliott at hotmail.com) Date: Mon, 8 Jun 1998 00:00:34 -0700 (PDT) Subject: Take your business to the next level... Message-ID: <198701171124.gbc hollyelliott@hotmail.com> Direct E-mail is the future of your business over the Internet. Reach millions of potential customers, imagine, just a 1% return. We are the professionals of the e-mail Industry. We have been sending e-mail for two years with no interruptions. We will also help you with your subject line and letter. NO CHARGE. We guarantee results. ( depending on what you are marketing ) CALL NOW limit openings 1-800-600-0343 ext.1256 From StanSqncrs at aol.com Mon Jun 8 01:45:20 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Mon, 8 Jun 1998 01:45:20 -0700 (PDT) Subject: Amway and Brave Combo Evidence Update Message-ID: <81aeaeca.357ba471@aol.com> On that page I point to with the X-tian fish discussion, I linked the "moderator nazi" with the right-wing because of his use of this symbol "&" to replace the "And" in "Andy". I have come to learn, it's got 2 meanings. It looks like the symbol for the "Know-nothing" movement is - "K & N". Of course, to know the significance of that, you have to know something about the "Know-nothing" movement. I think anyone that's ever observed many of the lists around, will see some remarkable similarities. Check this out - ==== Know-nothing (1827) 1 a : IGNORAMUS b: AGNOSTIC 2 cap K & N : a member of a 19th century secret American political organization hostile to the political influence of recent immigrants and Roman Catholics Know-nothingism (1854) 1 cap K & N : the principles and policies of the Know- Nothings 2 : the condition of knowing nothing or desiring to know nothing or the conviction that nothing can be known with certainty esp. in religion or morality 3 often cap K & N : a mid-twentieth century political attitude characterized by anti=intellectualism, exaggerated patriotism, and fear of foreign subversive influences Merriam-Webster's Collegiate Dictionary, 10th edition ==== 'Know-Nothing' Movement U.S. political movement in the mid-19th cent. The increased immigration of the 1840s had resulted in concentrations of Roman Catholic immigrants in the Eastern cities. The Democrats welcomed them, but local nativist societies were formed to combat "foreign" influences and uphold the "American" view. The American Republican party, formed (1843) in New York, spread to neighboring states as the Native American party and became a national party in 1845. Many secret orders sprang up, and when outsiders made inquiries of supposed members, they were met with a statement that the person knew nothing; hence members were called Know-Nothings. The Know-Nothings sought to elect only native Americans to office and to require 25 years of residence for citizenship. Allied with a faction of the WHIG PARTY, they almost captured New York in the 1854 election and swept the polls in Massachusetts and Delaware. In 1855 they adopted the name American party and dropped much of their secrecy. The issue of slavery, however, split the party, and many antislavery members joined the new REPUBLICAN PARTY. Millard FILLMORE, the American party's presidential candidate in 1856, won only Maryland, and the party's national strength was broken. The Concise Columbia Encyclopedia is licensed from Columbia University Press. Copyright � 1995 by Columbia University Press. All rights reserved. ==== Cypherpunks, these are the bastards that have control of congress. If you are serious about freedom, you must go out and register to vote, and you must vote the real punks (Christian Coalition types (the CC is simply a front for the Know-nothing movement, and I'll bet you now believe me. ;-) )) out of power. They are the bastards that are controlling speech (and thought, IMHO) on that Camelogue list (the Humpheads). AND they were doing the same thing on that Brave Combo list (The Bucketheads gang that I seem to have incapacitated. Hey, can I say that I saved the Brave Combo? ;-) ) And the evidence is on Brave Combo cds. Not only the one that I'm on, but now that I've gone in looking at it from this angle, I see they've been documenting the invasion of the Bucketheads for 10 years. It starts with Humansville with the cover showing a "the" 'beast', IMHO raising it's ugly head out of the water. Also on that one, is a song called "Move" which starts with a message that was left on Jeffrey Barnes answering machine one night, that threatened him to turn down his music. There was no music being played in his house that night. They were trying to tell him to censor the Brave Combo. I haven't had a chance to search that album for other stuff yet. Those were the obvious things. The theme continues for the next 4 Brave Combo (only (they were doing collabarations also during this period)) studio releases. Since yous guys are Cypherpunks, I'm not gonna give you that many more clues (for right now, there are some songs patterned after certain specific Bucketheads that you probably won't get the connection, but if you think of various folk you've met on the net, I'll bet you find some remarkable similarities in the lyrics/titling/liner notes) So, it continues on to the next ones (and in this order) - Night On Earth No No No-Cha Cha Cha Polkas For A Gloomy World (BTW: Grammy nominated, lost (probably due to the Know-nothings. Study this one's liner notes VERY carefully (and Mystery Spot Polka lyrics for sure)) And up to the one I'm on - 'Group Dance Epidemic - Fun ...... and Functional!' Those are all excellent cds, but if you don't want to spend the money, all of the lyrics are on the Discography page (http://www.brave.com/bo/discography/) at the official website (which the Bucketheads still seem to have some control of. How do I know? Guess which lyrics they DON'T have there. The Jeffrey. (and other reasons) I forced them to put the Mystery Spot Polka's lyrics up there when I attempted to discuss it on the list (and I was censored.) They had to try to show that it wasn't being censored.) So, I'll post my interpretation of The Jeffrey because of that - ===== The Jeffrey (Barnes, Cripps, Finch, Hernandez - Wise Monkey Music) (Jeffrey (spoken)) I am the master of my own universe And I dance just as good as I want to ====== I am a genius because I want to be ==== I have created a dance in my own image Look at me! ====== I have written a song and dance just like me, I expect all BRAVE Combo fans to look for it's meaning! I'm not happy! (see insert photo of the Part 1 (The) Jeffrey) ==== (backup) One, two, three, four ====== I want you to analyze my song and dance line-by-line. ==== Nothing ((backup) Nada) ====== I'm waiting. I've been waiting. ==== Amazing! ====== Wow! Someone came along and analyzed my song, and (pretty much) nailed it! ==== How can you tell the dancer from the dance. ====== That is what is revealed by careful analysis of my song - how YOU can know about certain-type of people that "lurk (dictionary definition)" the Brave Combo list ==== (girl) moans - Oh, Oh, Oh Oh Jeff, your dance is devine ==== I like your song, Jeff (SERIOUSLY! :-) (I really mean this, Combo fans! ;-) )) ====== Teach me to dance Jeffrey ==== I want to learn how to tell the difference between reality and perception of reality ====== Move my body with your hands ==== Dazzle me with how simple it all is ====== How should I move my hips? ==== How can I learn how to do that? ====== (Jeffrey) Your hips will take care of themselves. ==== Jeffrey's answer - Join FreeGroup (http://members.aol.com/whtsametau/FreeGroup.html) and/or Visit What's A Meta U (http://members.aol.com/WhtsAMetaU/) ====== (backup (sung)) Your hips will take care of themselves ==== Hippies will take care of themselves ====== (Jeffrey) 'Hip'ssssssss ==== Hippies ====== Creator ==== Yes, he's the creator of his song and dance. The song describes a dance created by man, the "Know-nothing" movement (otherwise known around here as the "Chicken" Coalition). The dance is, well, I've already given you a hint as to where that is, Cypherpunks! ====== Nowwwww. Resume the active things! ==== Get off of your butts and stop being politically apathetic. NOW! Take these guys out of power (they're preventing you from expressing yourself, and they're trying with all their might to prevent Jeffrey (Carl, etc.) from expressing himself) ====== (backup (sung)) Hips will take care of themselves Hips ==== Hippies ====== I am the master of my own universe And I dance just as good as I want to ==== I am a (UNDISPUTED) genius, because I used my own free will to decide to play the 'United Snakes ... ' ;-) in the BRAVE Combo (he plays 2 saxaphones at the same time. In harmony) ====== I have created a dance in my own image ==== My song and dance is just like me. ====== LOOK AT ME! ==== He's Mad! Only one Combo fan knowing the true meaning of his song and dance is NOT good enough for a genius! Analyze his song and dance. He's waiting. A review of recent history reveals that Brave Combo fans that truly 'get' their music are HIGHLY rewarded. (liner notes) The band once discovered Jeffrey Barnes doing this dance all by himself in a corner. He denies all responsibility, as his conscious mind was elsewhere at the time. Part I All dancers get on dance floor (with great enthusiasm) 1. Do nothing. 2. Stand with your arms folded across your chest. 3. Shift your weight from one leg to another 4. Exhibit all symptoms of extreme boredom. When this becomes unbearable, move on to Part II. ====== Part I represents 'closed-mindedness'/censorship/Bucketheads ==== Part II 1. Put fist out with thumbs up. 2. Attach your thumbs to turntables in your mind. 3. Rotate your thumbs clockwise. ====== Check out the right ==== 4. Rotate your thumbs counter-clockwise. ====== Check out the left ==== 5. Your hips will want to wiggle, let them. ====== But Hippies will want to investigate things other than just left and right, you better let them. :-) ==== When this becomes unbearable, return to Part I. ====== Part II represents "open-mindedness"/freedom/Stan ==== Repeat Part I and Part II until you wish to stop. ====== So you Bucketheads can do your 'dance' for as long as you want, but while you're doing that, us Hippies will take care of ourselves. Stan ============ Various lines in there refer to various posts that I posted during that so- called "flame" war. If anyone wants to see a few of those, let me know. "I want you to know", that compared to breaking the Buckethead gang, getting on that cd meant very little to me, except, that it was designed as a tool for me to use against the Know-nothings. I think I'll go post that over on the Brave Combo list. 'Tis a shame that my only audience, is the Bucketheads (and the Camelogue moderator nazi is lurking (dictionary definition) the list.). The Bucketheads ran everyone who wouldn't "drink" with them off. Guess what, Cypherpunks. I'm betting that 95% of the music (probably other forums as well (Republicans For All Americans is one I know about for sure)) lists (and websites) are in control of the "Know-nothings." We have got to get those kooks out of power, or it will be too late. It's VERY possible that your favorite musicians are trying to send secret messages out to thier fans through their music/lyrics and cover art, personal notes, etc., on this very same subject matter. Look for these clues to find out if your favorite bands lists/websites have the same "pesky" problem. They can't tell you outright because they got Know-nothing goons watching 'em. "That's all we know." Serious shit, Sherlock(s)! Stan From bill.stewart at pobox.com Sun Jun 7 12:59:22 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Mon, 8 Jun 1998 03:59:22 +0800 Subject: anonymous mailboxes In-Reply-To: <19980604193606.27765.qmail@hotmail.com> Message-ID: <3.0.5.32.19980607021342.008b1370@popd.ix.netcom.com> >On Thu, 4 Jun 1998, Sprokkit Amhal wrote: >> anonymous email boxes, whereby a user can receive email and even a >> traffic analysis attacker is unable to glean information about who >> received what when. I forget exactly what ve called vis method... One way to do pseudonymous email boxes is to use a web-based mailbox server such as hotmail and pick up the mail through anonymizers or onion routers. Obviously you need SSL for the anonymizer connections, and for the mailbox connection as well, and the name of the mailbox needs to be in the encrypted portion of the SSL requests rather than in the sniffable URL parts. The main threat is eavesdroppers watching the anonymizers over a period of time, picking up patterns that may not show during a single mail pickup. So you need enough anonymizers out there, or enough cover traffic on a smaller number of anonymizers, but it should basically be doable. It also helps if you can send mail to the mailer using the web, with SSL and chains of anonymizers to do it, to protect the sender, but anonymous remailers can also solve that problem. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From billp at nmol.com Mon Jun 8 07:33:24 1998 From: billp at nmol.com (bill payne) Date: Mon, 8 Jun 1998 07:33:24 -0700 (PDT) Subject: Spiking keyboards, digital cash, appeals, shift registers Message-ID: <357BF591.7D7@nmol.com> Monday 6/8/98 7:53 AM John Young I am reading http://jya.com/sitesec.htm a bit more carefully. You have NEVER WRITTEN SO MUCH. Fishing was great. I used a $10 THE INSTANT CALLING CARD [TM] VOCALL COMMUNICATIONS CORP The World's Most advanced prepaid Calling Card which allows access with a pin of 718-2455-7091-xxx [my SECRET] in ENGLISH, SPANISH, ARABIC, URDU, KOREAN, JAPANESE, GERMAN, FRENCH, ITALIAN to call you TWICE on Saturday. At only $.14/min. I left one message about Xandi and spiking computer keyboards. Xandi MADE low-power transmitters, http://www.gernsback.com/HyperNews/get/forums/resource/226.html like the kind I MIGHT use IF I were going to spike a keyboard [most which use an 8051 http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2] so that the keystrokes would be broadcast. This, of course, defeats crypto attempts to cipher keystrokes. But I DO NOT DO, or have to do, ILLEGAL THINGS for the FBI or any other government agency. I, as a DOE contractor employee, was protected under 10 CFR 708. http://av.yahoo.com/bin/query?p=10+cfr+708&hc=0&hs=0 But 10 CFR 708 does not appear to be working well in my case. Therefore, we had to try other remedies. VOCALL is getting real close to digital cash, one of Orlin Grabbe's interests. http://www.aci.net/kalliste/dcguide.htm I have to do mostly technical work on the digital FX this week but will try to get two notices of appeal to the Tenth circuit written. http://jya.com/whp043098.htm Morales and I, with all the publicity you and Orlin have given us, can go all the way to the Supreme Court with our genocide and crypto deficiency lawsuits. http://jya.com/whpfiles.htm Pro se, of course. Too bad NSA did not take my criticisms of its shift register work more constructively. http://jya.com/da/whpda.htm, click on Appendix S Perhaps NSA should have worked with some of us at Sandia to come-up with fixes to overcome deficiencies. This unpleasantness could have been avoided. I�ve had ideas to improve shift register algorithm operation before. http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html Let�s all hope for settlement of this UNFORTUNATE matter before it gets worse. Later bill From jya at pipeline.com Mon Jun 8 09:08:27 1998 From: jya at pipeline.com (John Young) Date: Mon, 8 Jun 1998 09:08:27 -0700 (PDT) Subject: Campaign Against Global War on Drugs Message-ID: <199806081608.MAA00773@camel14.mindspring.com> The New York Times today has a two-page ad: "We believe the global war on drugs is now causing more harm than drug abuse itself," with a letter to UN Secretary General Annan signed by hundreds from around the world, across the political spectrum. Web site for list and invitation to sign: http://www.lindesmith.org/news/un.html Public Letter to Kofi Annan June 1, 1998 Mr. Kofi Annan Secretary General United Nations New York, New York United States Dear Secretary General, On the occasion of the United Nations General Assembly Special Session on Drugs in New York on June 8-10, 1998, we seek your leadership in stimulating a frank and honest evaluation of global drug control efforts. We are all deeply concerned about the threat that drugs pose to our children, our fellow citizens and our societies. There is no choice but to work together, both within our countries and across borders, to reduce the harms associated with drugs. The United Nations has a legitimate and important role to play in this regard -- but only if it is willing to ask and address tough questions about the success or failure of its efforts. We believe that the global war on drugs is now causing more harm than drug abuse itself. Every decade the United Nations adopts new international conventions, focused largely on criminalization and punishment, that restrict the ability of individual nations to devise effective solutions to local drug problems. Every year governments enact more punitive and costly drug control measures. Every day politicians endorse harsher new drug war strategies. What is the result? U.N. agencies estimate the annual revenue generated by the illegal drug industry at $400 billion, or the equivalent of roughly eight per cent of total international trade. This industry has empowered organized criminals, corrupted governments at all levels, eroded internal security, stimulated violence, and distorted both economic markets and moral values. These are the consequences not of drug use per se, but of decades of failed and futile drug war policies. In many parts of the world, drug war politics impede public health efforts to stem the spread of HIV, hepatitis and other infectious diseases. Human rights are violated, environmental assaults perpetrated and prisons inundated with hundreds of thousands of drug law violators. Scarce resources better expended on health, education and economic development are squandered on ever more expensive interdiction efforts. Realistic proposals to reduce drug-related crime, disease and death are abandoned in favor of rhetorical proposals to create drug-free societies. Persisting in our current policies will only result in more drug abuse, more empowerment of drug markets and criminals, and more disease and suffering. Too often those who call for open debate, rigorous analysis of current policies, and serious consideration of alternatives are accused of "surrendering." But the true surrender is when fear and inertia combine to shut off debate, suppress critical analysis, and dismiss all alternatives to current policies. Mr. Secretary General, we appeal to you to initiate a truly open and honest dialogue regarding the future of global drug control policies - one in which fear, prejudice and punitive prohibitions yield to common sense, science, public health and human rights. ---------- There are a gang of heads of state gathering at the UN, with cavalcades of limosines and guards racing around Manhattan to indifference, except for me, the only one jumping hurray at the sirens, whirling lights and bristling vans. All the SS guys facing backwards finger shot my middle digit aimed at them, then a sniper behind me put a red dot on it, scaring me shitless, I ran home. From jya at pipeline.com Mon Jun 8 11:50:42 1998 From: jya at pipeline.com (John Young) Date: Mon, 8 Jun 1998 11:50:42 -0700 (PDT) Subject: Update of Risks of Key Recovery Report Message-ID: <199806081850.OAA09458@camel14.mindspring.com> http://www.cdt.org/crypto/risks98 The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption 1998 Hal Abelson Ross Anderson Steven M. Bellovin Josh Benaloh Matt Blaze Whitfield Diffie John Gilmore Peter G. Neumann Ronald L. Rivest Jeffrey I. Schiller Bruce Schneier Final Report -- 27 May 1997 Updated -- June 8, 1998 ---------- Introduction and CDT's press release: http://jya.com/risks98.htm From hedges at infonex.com Mon Jun 8 14:56:39 1998 From: hedges at infonex.com (Mark Hedges) Date: Mon, 8 Jun 1998 14:56:39 -0700 (PDT) Subject: Campaign Against Global War on Drugs In-Reply-To: <199806081608.MAA00773@camel14.mindspring.com> Message-ID: And Marijuana remains California's number one cash crop as long as it is illegal... documented way back when by Dukmejian's (sp) agriculture secretary, whom he fired after the report. The cops cite you, confiscate it and smoke it, and everyone's happy because they're all making $480 per ounce from the end consumer on this crazy gene-engineered greenbud designed, catalogued, and bred by the University of California biology departments (esp. Santa Cruz). If it were legal, tobacco shops would stock joints for a tenth the price... they need new markets with the stricter tobacco legislation; maybe there's a lobby. I watched Dennis Peron battle it out with some meat-fisted guy from the Sherrifs' orgs in Congress. The cop went on about how "if we decriminalize marijuana, marijuana would no longer be illegal" and attempted to justify its classification with crack, methamphetamines and heroin. He and Peron were two extremes. Peron, who drove the medical marijuana bill and is also gay, runs under the republican ticket. So, I voted for him in the open primary to screw up their statist ics. I had fun with that open primary. --mark-- -hedges- >The New York Times today has a two-page ad: > >"We believe the global war on drugs is now causing >more harm than drug abuse itself," with a letter to UN >Secretary General Annan signed by hundreds >from around the world, across the political spectrum. >Web site for list and invitation to sign: > > http://www.lindesmith.org/news/un.html > >Public Letter to Kofi Annan > > June 1, 1998 > > Mr. Kofi Annan > Secretary General > United Nations > New York, New York > United States > > Dear Secretary General, > > On the occasion of the United Nations General Assembly Special > Session on Drugs in New York on June 8-10, 1998, we seek your > leadership in stimulating a frank and honest evaluation of global > drug control efforts. From StanSqncrs at aol.com Mon Jun 8 16:01:42 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Mon, 8 Jun 1998 16:01:42 -0700 (PDT) Subject: Campaign Against Global War on Drugs Message-ID: In a message dated 6/8/98 5:34:38 PM Central Daylight Time, hedges at infonex.com writes: << And Marijuana remains California's number one cash crop as long as it is illegal... documented way back when by Dukmejian's (sp) agriculture secretary, whom he fired after the report. The cops cite you, confiscate it and smoke it, and everyone's happy because they're all making $480 per ounce from the end consumer on this crazy gene-engineered greenbud designed, catalogued, and bred by the University of California biology departments (esp. Santa Cruz). If it were legal, tobacco shops would stock joints for a tenth the price... they need new markets with the stricter tobacco legislation; maybe there's a lobby. I watched Dennis Peron battle it out with some meat-fisted guy from the Sherrifs' orgs in Congress. The cop went on about how "if we decriminalize marijuana, marijuana would no longer be illegal" >> It's illegal because of 1 reason. The "Know-nothings" have control of the illegal market. It's how they invade the bands. They create a dry spell, and then they come around offering free/cheap smoke, gain the trust of the band, and then they say - 'Say, could I create a little official webpage for you? You need to be on the net anyway (the big lie). I'll take care of it all for you.' Stan From user at ybecker.ribbetnet.cc Mon Jun 8 16:14:09 1998 From: user at ybecker.ribbetnet.cc (user at ybecker.ribbetnet.cc) Date: Mon, 8 Jun 1998 16:14:09 -0700 (PDT) Subject: Talk to me. Message-ID: Dear Friend; Whether it is a soft talking Country Gal or a hard talking Dominatrix.... At "Exotic Whispers" we strive to satisfy everyone.... We have the largest & sexiest selection of Models, Dancers, Housewives, & Single Women. Call 011-592-565-093 Call now and let our receptionist connect you with a WOMAN or WOMEN of your choice. For Adults ONLY. The SERVICE IS FREE......JUST YOUR LD CHARGES. Talk To ME Live.............I Aim To Please!!!!!!!!! Call 011-592-565-093 From user at e-bizness.com Tue Jun 9 01:50:04 1998 From: user at e-bizness.com (user at e-bizness.com) Date: Tue, 9 Jun 1998 01:50:04 -0700 (PDT) Subject: BULK EMAIL SERVER IS UP! Message-ID: <93904039291232@hsd_hypothesis.com> ATTENTION ONLINE ENTRAPRENEUR! OUR BULK EMAIL SERVERS ARE UP! YOU CAN BE SENDING BULK EMAIL TO THOUSANDS OF POTENTIAL CUSTOMERS WITH OUR SMTP RELAY CONNECTION! OUR NETWORK STRIPS OUT YOUR IP ADDRESS SO YOUR LOCAL ISP WILL NEVER EVER KNOW! BULLETPROOF WEBHOSTING AND POP ACCT AVAILABLE AT $245.00 MONTHLY + $150 SETUP SMTP IS AVAILABLE AT $245.00 MONTHLY + SETUP OR GET THE COMPLETE PACKAGE OF POP3 EMAIL, SMTP, AND BULLETPROOF WEBHOSTING FOR ONLY $395.00 + 300.00 SETUP TAKE ACTION! CALL NOW! ACCOUNTS ARE AVAILABLE IMMEDIATELY! PLEASE CALL 1-905-714-7510 FOR MORE INFO! WEB MARKETING NETWORK From cuceke80 at sprintmail.com Tue Jun 9 06:50:32 1998 From: cuceke80 at sprintmail.com (IRA & 401K APPROVED! REPLACE YOUR CD'S!) Date: Tue, 9 Jun 1998 06:50:32 -0700 (PDT) Subject: GET 1% to 6% PER MONTH! Forget the Bank!!!!!!!! Message-ID: <19980609193YAA41826@post.ibm.net> GET YOUR MONEY OUT OF THE BANK OR LOW INTEREST INVESTMENTS AND INTO OUR HIGH INTEREST INVESTMENT! Funds are totally liquid. You can make deposits or withdrawls from your account. You get a monthly statement. Our average return over the last five years is 58%. Our worst year was 43%. Our best year was 102%. You pay no commissions, no fees and it's at no cost to you to open an account. This is IRA approved and 401K approved. To have information mailed call 954-421-2376. All responses will be confidential, and will not be sold or passed on to others. I have no clients who have lost any of their principal. From billp at nmol.com Tue Jun 9 12:41:35 1998 From: billp at nmol.com (bill payne) Date: Tue, 9 Jun 1998 12:41:35 -0700 (PDT) Subject: NOTICE OF APPEALs Message-ID: <357D8F35.536A@nmol.com> Tuesday 6/9/98 1:10 PM Lawyers Morales and I met for lunch today to discuss legal strategies. Morales is scheduled for a court hearing on Thursday. Therefore, it is time to increase the pressure. These cases are not going away. A fellow from Washington DC visited me some months ago. The fellow told me that LOTS of people fighting with the IRS are watching this pro se lawsuit seen at http://www.jya.com/whp052898.htm. Reason I was told is that the IRS is using lawyers to go after taxpayers. Taxpayers NOW feel that either they have to pay what the IRS DEMANDS OR get a lawyer to fight the IRS. Hiring a lawyer is usually uneconomical. And an ineffective way to fight the US government. Readers of jya.com want to learn how to do pro se lawsuits EFFECTIVELY. Morales and I are, of course, showing how to do pro se lawsuits effectively and inexpensively. Morales and I are experienced at WINNING appeals at the Tenth Circuit. http://jya.com/whp-10usca.htm But we have yet to address the problem of Tenth Circuits awarding the win to Sandia when, in fact, Sandia lost on the common technicality of not filing its Brief of the Appellees on time. Sandia did not request an enlargement of time in both our cases. In my case Sandia falsified the certificate of service. Tenth Circuit rules forbid stamping FILED on late briefs where permission to file late is not requested at least five days prior to the deadline date. We will be getting around to filing criminal complaint affidavits on the judges and clerks involved. At the right time, of course. But the time has come for Morales and I to file attached NOTICE OF APPEALs. We really should settle these unfortunate cases before matters get WORSE. Later bill UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW MEXICO William H. Payne ) Arthur R. Morales ) ) Plaintiffs, ) ) v ) CIV NO 97 0266 ) SC/DJS ) Lieutenant General Kenneth A. Minihan, USAF ) Director, National Security Agency ) National Security Agency ) ) Defendant ) NOTICE OF APPEAL Santiago E. Campos MEMORANDUM OPINION AND ORDER FILED 98 APR 30 AM 11:45 1 COMES NOW plaintiffs Payne and Morales [Plaintiffs] to exercise their rights under the Federal Rules of Appellate Procedure http://www.ca5.uscourts.gov/docs/frap-iop.htm FRAP 4. APPEAL AS OF RIGHT--WHEN TAKEN http://www.ca5.uscourts.gov/docs/frap-iop.htm#4 a) Appeal in a Civil Case. (1) Except as provided in paragraph (a)(4) of this Rule, in a civil case in which an appeal is permitted by law as of right from a district court to a court of appeals the notice of appeal required by Rule 3 must be filed with the clerk of the district court within 30 days after the date of entry of the judgment or order appealed from; but if the United States or an officer or agency thereof is a party, the notice of appeal may be filed by any party within 60 days after such entry. If a notice of appeal is mistakenly filed in the court of appeals, the clerk of the court of appeals shall note thereon the date when the clerk received the notice and send it to the clerk of the district court and the notice will be treated as filed in the district court on the date so noted. 2 Defendant Minihan is officer of the United States. 3 Plaintiff�s appeal A NOW, THEREFORE, IT IS ORDERED that sua sponte, Defendant is DEEMED by the Court to be the NSA, and not Lt. Gen. Kenneth A. Minihan. Future captions for this case should reflect this change. B IT IS FURTHER ORDERED that Defendant's Motion to Dismiss Plaintiff Morales is GRANTED. C IT IS FURTHER ORDERED that Plaintiff's Motion for Summary Judgment Based on Evidence from Admissions is DENIED as MOOT. seen at http://jya.com/whp043098.htm to the Tenth Circuit Court of Appeals. Respectfully submitted, William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 Arthur R. Morales 1024 Los Arboles NW Albuquerque, NM 87107 Pro se litigants CERTIFICATE OF SERVICE I HEREBY CERTIFY that a copy of the foregoing memorandum was mailed to Lieutenant General Kenneth A. Minihan, USAF, Director, National Security Agency, National Security Agency, 9800 Savage Road, Fort George G. Meade, MD 20755-6000 and hand delivered to Jan E Mitchell, Assistant US Attorney, 9 Floor, Bank of America Building, 4th and Tijeras, ABQ, NM 87102 this Wednesday June 10, 1998. 2 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW MEXICO William H. Payne ) ) Plaintiff, ) ) v ) CIV NO 97 0266 ) SC/DJS ) National Security Agency ) ) Defendant ) NOTICE OF APPEAL from Santiago E. Campos MEMORANDUM OPINION AND ORDER FILED May 21, 1988 11:35 1 COMES NOW plaintiff Payne [Plaintiff] to exercise his rights under the Federal Rules of Appellate Procedure http://www.ca5.uscourts.gov/docs/frap-iop.htm FRAP 4. APPEAL AS OF RIGHT--WHEN TAKEN http://www.ca5.uscourts.gov/docs/frap-iop.htm#4 a) Appeal in a Civil Case. (1) Except as provided in paragraph (a)(4) of this Rule, in a civil case in which an appeal is permitted by law as of right from a district court to a court of appeals the notice of appeal required by Rule 3 must be filed with the clerk of the district court within 30 days after the date of entry of the judgment or order appealed from; but if the United States or an officer or agency thereof is a party, the notice of appeal may be filed by any party within 60 days after such entry. If a notice of appeal is mistakenly filed in the court of appeals, the clerk of the court of appeals shall note thereon the date when the clerk received the notice and send it to the clerk of the district court and the notice will be treated as filed in the district court on the date so noted. 2 Defendant NSA is an agency of the United States. 3 Plaintiff appeals NOW, THEREFORE, IT IS ORDERED that Plaintiff's Motion to Amend should be, and is hereby, DENIED. seen at http://jya.com/whp052198.htm to the Tenth Circuit Court of Appeals. Respectfully submitted, William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 Pro se litigant CERTIFICATE OF SERVICE I HEREBY CERTIFY that a copy of the foregoing memorandum was mailed to Lieutenant General Kenneth A. Minihan, USAF, Director, National Security Agency, National Security Agency, 9800 Savage Road, Fort George G. Meade, MD 20755-6000 and hand delivered to Jan E Mitchell, Assistant US Attorney, 9 Floor, Bank of America Building, 4th and Tijeras, ABQ, NM 87102 this Wednesday June 10, 1998. 2 From hello at asianet.co.th Tue Jun 9 13:58:58 1998 From: hello at asianet.co.th (hello at asianet.co.th) Date: Tue, 9 Jun 1998 13:58:58 -0700 (PDT) Subject: This is fun!!! Message-ID: <3.0.5.32.19980610010242.007cf180@classic.asianet.co.th> Hi, Would you like to send someone a letter from Bangkok ? Well, you can! Put the letter to be remailed in a larger envelope with U.S.$3 cash and I will post it from Bangkok bearing a Bangkok postmark to any country in the world. If you want the letter to be registered then enclose U.S.$4 cash. I will pay the postage from the enclosed fee. The letter must be lightweight air- mail only containing not more than 2 sheets of writing paper. Here's the address... Snailer P.O. Box 3, Bang Or, 10704, Bangkok, Thailand. ... Please register your mail to me. A must for secret lovers. Great for practical jokes and pranksters. Inform your boss what you think about his ideas. Tell your ex-wife/husband you're living in Bangkok. Go on, give it a try it's great fun. You can put as many envelopes in the larger one as you like but you must enclose the fee for each remailed item. The 10th one goes free! Mail to be remailed is sent the same day I receive it unless you specify a date for it to be remailed. No rcords kept and you are completely anonymous to me so don't put your name and address on any of the envelopes. Have fun!!! *********** From manager at musicblvd.com Tue Jun 9 15:57:34 1998 From: manager at musicblvd.com (http://MusicBLVD.com/) Date: Tue, 9 Jun 1998 15:57:34 -0700 (PDT) Subject: MUSIC BOULEVARD'S SUMMER BLOWOUT SALE! Message-ID: <3.0.32.19980609153459.0079d430@207.67.22.140> Music Boulevard is having a Summer Blowout Sale in celebration of our new look! You'll find everything at the lowest prices of the year. As a special bonus, shipping is FREE when you buy three items or more when shipped within the U.S. Come explore the new and enhanced version of Music Boulevard. It�s faster than ever, easier to find the music you love, and now even more convenient to make a purchase. Take this opportunity to buy all of those items that never seem to go on sale anywhere...ever! Every CD, Cassette, Video, T-shirt, LP, and Import is now available at a reduced price. Remember, This sale will last for only a limited time, so visit Music Boulevard right away to take advantage of our low prices and great selection. You�ll love the new Music Boulevard. http://www.musicblvd.com/cgi-bin/tw/2161_0_main.txt TO UNSUBSCRIBE: To unsubscribe from this mailing list, send an email to: remove-musicblvd at sparklist.com and you will be automatically removed from this list. From billp at nmol.com Tue Jun 9 16:00:35 1998 From: billp at nmol.com (bill payne) Date: Tue, 9 Jun 1998 16:00:35 -0700 (PDT) Subject: FILED 98 JUN-9 PM 3:13 Message-ID: <357DBE05.6960@nmol.com> Tuesday 6/9/98 4:29 PM John Young J Orlin Grabbe Attached is FILED UNITED STATES DISTRICT COURT DISTRICT OF NEW MEXICO 98 JUN-9 PM 3:13 Robert M. March Clerk, ALBUQUERQUE NOTICE OF APPEAL. Morales will sign and I will file our joint appeal tomorrow. Morales showed me an e-mail he received from Gilmore http://www.cygnus.com/~gnu/. Gilmore apparently is not interested in pursuing a joint NSA fee waiver lawsuit. The public CAN UNDERSTAND a federal agency squandering their tax dollars on a project which did not work out for the government. Public key chips. Likewise, the public can understand how the government killed Iranians. http://jya.com/whpfiles.htm I conducted a survey on NON-TECHNICAL people to see if they understood what the government did to Iran. Everyone I talked to understood. Trying to get much subtler with crypto with the public or even judges might not work. Judges or the public might give the government the benefit of the doubt on the NATIONAL SECURITY/SECRECY issue. We will see about this. National Security Agency Court Cases May 27, 1998 http://www.jya.com/nsa-cases.htm Later bill UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW MEXICO William H. Payne ) ) Plaintiff, ) ) v ) CIV NO 97 0266 ) SC/DJS ) National Security Agency ) ) Defendant ) NOTICE OF APPEAL from Santiago E. Campos MEMORANDUM OPINION AND ORDER FILED May 21, 1988 11:35 1 COMES NOW plaintiff Payne [Plaintiff] to exercise his rights under the Federal Rules of Appellate Procedure http://www.ca5.uscourts.gov/docs/frap-iop.htm FRAP 4. APPEAL AS OF RIGHT--WHEN TAKEN http://www.ca5.uscourts.gov/docs/frap-iop.htm#4 a) Appeal in a Civil Case. (1) Except as provided in paragraph (a)(4) of this Rule, in a civil case in which an appeal is permitted by law as of right from a district court to a court of appeals the notice of appeal required by Rule 3 must be filed with the clerk of the district court within 30 days after the date of entry of the judgment or order appealed from; but if the United States or an officer or agency thereof is a party, the notice of appeal may be filed by any party within 60 days after such entry. If a notice of appeal is mistakenly filed in the court of appeals, the clerk of the court of appeals shall note thereon the date when the clerk received the notice and send it to the clerk of the district court and the notice will be treated as filed in the district court on the date so noted. 2 Defendant NSA is an agency of the United States. 3 Plaintiff appeals NOW, THEREFORE, IT IS ORDERED that Plaintiff's Motion to Amend should be, and is hereby, DENIED. seen at http://jya.com/whp052198.htm to the Tenth Circuit Court of Appeals. Respectfully submitted, William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 Pro se litigant CERTIFICATE OF SERVICE I HEREBY CERTIFY that a copy of the foregoing memorandum was mailed to Lieutenant General Kenneth A. Minihan, USAF, Director, National Security Agency, National Security Agency, 9800 Savage Road, Fort George G. Meade, MD 20755-6000 and hand delivered to Jan E Mitchell, Assistant US Attorney, 9 Floor, Bank of America Building, 4th and Tijeras, ABQ, NM 87102 this Tuesday June 9, 1998. 2 From 2ancesca9 at net.kitel.co.kr Tue Jun 9 16:36:43 1998 From: 2ancesca9 at net.kitel.co.kr (2ancesca9 at net.kitel.co.kr) Date: Tue, 9 Jun 1998 16:36:43 -0700 (PDT) Subject: hi you Message-ID: <199806092552RAA52171@abcd456.5.26.7> !!!!! YES YOUR XXXX PASSWORD AWAITS YOU !!!!!! > To get your password... Just: Click Here ................ ..................//  From paul at cryptography.com Tue Jun 9 17:57:15 1998 From: paul at cryptography.com (Paul Kocher) Date: Tue, 9 Jun 1998 17:57:15 -0700 (PDT) Subject: Differential Power Analysis Message-ID: <199806100055.RAA07091@proxy3.ba.best.com> Information is now available online about three related attacks we have developed at Cryptography Research: Simple Power Analysis, Differential Power Analysis, and High-Order Differential Power Analysis. The basic idea of the attacks is that the power consumption of a device (such as a smartcard) is statistically correlated to the operations it performs. By monitoring the power usage (or electromagnetic radiation, etc.) during cryptographic operations, it is possible to obtain information correlated to the keys. The collected data is then analyzed to actually find the keys. The three attacks use increasingly sophisticated analysis methods. We have implemented the attack against a large number of smartcards, and have found all to be vulnerable. At this point, we do not believe that any smartcards on the market are immune to these analysis techniques. There is now an initial summary on Differential Power Analysis on our web page at http://www.cryptography.com/dpa, and more information will be put on the website as it becomes available. A condensed text version is attached below. At this point, it's fine to talk about this with anyone and to forward this message. Anything you can do to keep discussion of this technically accurate would be much appreciated. Regards, Paul Kocher --------------------------------------------------------------------- Introduction: Power Variation Integrated circuits are built out of individual transistors, which act as voltage-controlled switches. Current flows across the transistor substrate when charge is applied to (or removed from) the gate. This current then delivers charge to the gates of other transistors, interconnect wires, and other circuit loads. The motion of electric charge consumes power and produces electromagnetic radiation, both of which are externally detectable. Therefore, individual transistors produce externally observable electrical behavior. Because microprocessor logic units exhibit regular transistor switching patterns, it is possible to easily identify macro-characteristics (such as microprocessor activity) by the simple monitoring of power consumption. DPA type attacks perform more sophisticated interpretations of this data. Simple Power Analysis (SPA) In SPA attacks, an attacker directly observes a system's power consumption. The amount of power consumed varies depending on the microprocessor instruction performed. Large features such as DES rounds, RSA operations, etc. may be identified, since the operations performed by the microprocessor vary significantly during different parts of these operations. At higher magnification, individual instructions can be differentiated. SPA analysis can, for example, be used to break RSA implementations by revealing differences between multiplication and squaring operations. Similarly, many DES implementations have visible differences within permutations and shifts (e.g., the PC1 permutation or rotates of the C and D registers), and can thus be broken using SPA. While Cryptography Research found many smartcards to be vulnerable to SPA analysis, it is not particularly difficult to build SPA-resistant devices. The figure above [see web site] shows SPA monitoring from a single DES operation performed by a typical smartcard. The upper trace shows the entire encryption operation, including the initial permutation, the 16 DES rounds, and the final permutation. The lower trace is a detailed view of the second and third rounds. Differential Power Analysis (DPA) DPA is a much more powerful attack than SPA, and is much more difficult to prevent. While SPA attacks use primarily visual inspection to identify relevant power fluctuations, DPA attacks use statistical analysis and error correction techniques to extract information correlated to secret keys. Implementation of a DPA attack involves two phases: Data collection and data analysis. Data collection for DPA may be performed as described previously by sampling a device's power consumption during cryptographic operations as a function of time. For DPA, a number of cryptographic operations using the target key are observed. The following steps provide an example of a DPA attack process for technical readers. (More detailed information will follow in the near future.) The following explanation presumes a detailed knowledge of the DES algorithm. 1. Make power consumption measurements of the last few rounds of 1000 DES operations. Each sample set consists of 100000 data points. The data collected can be represented as a two- dimensional array S[0...999][0...99999], where the first index is the operation number and the second index is the sample. For this example, the attacker is also assumed to have the encrypted ciphertexts, C[0...999]. 2. The attacker next chooses a key-dependent selection function D. In this case, the selection function would have the form D(Ki,C), where Ki is some key information and C is a ciphertext. For the example, the attacker's goal will be to find the 6 bits of the DES key that are provided as the input to the DES S box 4, so Ki is a 6-bit input. The result of D(Ki,C) would be obtained by performing the DES initial permutation (IP) on C to obtain R and L, performing the E expansion on R, extracting the 6-bit input to S4, XORing with Ki, and using the XOR result as the input to the standard DES S4 lookup operation. A target bit (for example, the most significant bit) of the S result is selected. The P permutation is applied to the bit. The result of the D(Ki,C) function is set to 0 if the single-bit P permutation result and the corresponding bit in L are equal, and otherwise D(Ki,C) yields 1. 3. A differential average trace T[0...63][0...99999] is constructed from the data set S using the results of the function D. In particular: [See web site for formula] 4. The attacker knows that there is one correct value for Ki; other values are incorrect. The attack goal is to identify the correct value. In the trace T[i][0...99999] where i=Ki, D(i,C[k]) for any k will equal the value of the target bit in L of the DES operation before the DES F function result was XORed. When the target device performed the DES operations, this bit value was stored in registers, manipulated in logic units, etc. -- yielding detectable power consumption differences. Thus, for the portions of the trace T[i=Ki] where that bit was present and/or manipulated, the sample set T[i] will show power consumption biases. However, for samples T[i != Ki], the value of D(i,C[k]) will not correspond to any operation actually computed by the target device. As a result, the trace T[i] will not be correlated to anything actually performed, and will average to zero. (Actually, T[i != Ki] will show small fluctuations due to noise and error that is not statistically filtered out, and due to biases resulting from statistical properties of the S tables. However, the largest biases will correspond to the correct value of Ki.) 5. The steps above are then repeated for the remaining S boxes to find the 48 key bits for the last round. The attack can then be repeated to find the previous round's subkey (or the remaining 8 bits can be found using a quick search.) While the effects of a single transistor switching would be normally be impossible to identify from direct observations of a device's power consumption, the statistical operations used in DPA are able to reliably identify extraordinarily small differences in power consumption. The figure below [see web site] is a DPA trace from a typical smartcard, showing the power consumption differences from selecting one input bit to a DES encryption function used as a random number generator. (The function of D was chosen to equal the value of plaintext bit 5.) The input initial permutation places this bit as part of the R register, affecting the first-round F function computation and results. Round 2 effects (due to the use of counter mode) are also strong. The trace was produced using 1000 measurements, although the signals would be discernable with far fewer. High-Order Differential Power Analysis (HO-DPA) While the DPA techniques described above analyze information across a single event between samples, high-order DPA may be used to correlate information between multiple cryptographic suboperations. Naive attempts to address DPA attacks can introduce or miss vulnerabilities to HO-DPA attacks. In a high-order DPA attack, signals collected from multiple sources, signals collected using different measuring techniques, and signals with different temporal offsets are combined during application of DPA techniques. Additionally, more general differential functions (D) may be applied. More advanced signal processing functions may also be applied. The basic HO-DPA processing function is thus a more general form of the of the standard DPA function, for example: [see web site for formula] Today HO-DPA are primarily of interest to system implementers and researchers, since no actual systems are known that are vulnerable to HO-DPA that are not also vulnerable to DPA. However, DPA countermeasures must also address HO-DPA attacks to be effective. Solving the Problems Cryptography Research has undertaken a substantial development effort to understand hardware security issues and their countermeasures. Cryptography Research has pending patents directed to the technologies and techniques below. DPA and related attacks span the traditional engineering levels of abstraction. While many previously-known cryptanalytic attacks (such as brute force) can be analyzed by studying cryptographic algorithms, DPA vulnerabilities result from transistor and circuit electrical behaviors which propagate to expose logic gates, microprocessor operation, and software implementations. This ultimately compromises the cryptography. Techniques for addressing DPA and related attacks can be incorporated at a variety of levels: Transistor: No feasible alternatives to semiconductors are available today, but alternate computation technologies (such as pure optical computing) may exist in the future. Cryptography Research has developed gate-level logic designs that leak substantially less information. Circuit, Logic, Microprocessor, and Software: In physically large systems, well-filtered power supplies and physical shielding can make attacks infeasible. For systems with physical or cost constraints, Cryptography Research has developed hardware and software techniques that include ways of reducing the amount of information leaked, introducing noise into measurements, decorrelating internal variables from secret parameters, and temporally decorrelating cryptographic operations. In applications where attackers do not have physical possession of the device performing cryptographic operations, such techniques can be effective. However, because externally-monitorable characteristics remain fundamentally correlated to cryptographic operations, we do not recommend these approaches as a complete solution for applications where attackers might gain physical possession of devices. Software and Algorithms: The most effective solution is to design and implementing cryptosystems with the assumption that information will leak. Cryptography Research has developed approaches for securing existing cryptographic algorithms (including RSA, DES, DSA, Diffie- Hellman, ElGamal, and Elliptic Curve systems) to make systems remain secure even though the underlying circuits may leak information. In cases where the physical hardware leaks excessively, the leak reduction and masking techniques are also required. _____________________________________________________________________ Paul Kocher President, Cryptography Research Tel: 415-397-0123 (FAX: -0127) 870 Market St., Suite 1088 E-mail: paul at cryptography.com San Francisco, CA 94102 _____________________________________________________________________ Paul Kocher President, Cryptography Research Tel: 415-397-0123 (FAX: -0127) 870 Market St., Suite 1088 E-mail: paul at cryptography.com San Francisco, CA 94102 From gwb at gwb.com.au Tue Jun 9 19:38:49 1998 From: gwb at gwb.com.au (Global Web Builders) Date: Tue, 9 Jun 1998 19:38:49 -0700 (PDT) Subject: Media lies exposed Message-ID: <1.5.4.32.19980610022819.00b397f4@mail.pronet.net.au> G'day One Nation supporters in NSW Channel 9 has embarked on a blatant campaign of misinformation against One Nation over the last two weeks. The timing in the lead up to the Queensland State election and the resulting impact on voters cannot be ignored by ANY Australian who believes in freedom of speech and the democracy that we hold so dear. Ray Martin exposed: http://www.gwb.com.au/un.html 60 Minutes discredited: http://www.gwb.com.au/60.html Below is a copy of an article that appeared in Perth's Sunday times recently. GWB Scott Balson Judge says no to black state by Joe Poprzeonzy A former Chief Justice of the Australian High Court has urged that any claims by activists for the creation of a separate Aboriginal nation or independent black states be rejected. Sir Harry Gibbs said Arnhein Land, parts of central Australia,, north west WA, islands in the Torres Strait or off northern Australia would be targeted for Aboriginal independence. In a keynote address yesterday at a Perth meeting of the influential conservative group, the Samuel Griffith Society, he said separate laws were emerging in Australia to cover black and white Australians. "There is no doubt that any claims by the Aborigional peoples to determine their own political status, and to assert a right to sovereignty or independence, must be rejected as contrary to the interests of Australia as a whole," Sir Harry said. "Just as any attempt to put the Aboriginal peoples outside the Australian nation must be firmly opposed, so should any attempt to grant statehood, or any degree of autonomy to any particular group or Aboriginal people. "It would obviously be impracticable... to grant sovereign or dominant power to the Aboriginal people in areas such as country towns in which persons entirely of European descent were as numerous as the descendants of the Aboriginal people, many of whom would themselves have had European ancestors. "Experience elsewhere has shown that associations of States, Federal or otherwise, do not endure when one state is composed of persons distinctly different in race, religion or culture from those of another. "The future existence of Australia would be put at risk if statehood or any form of autonomy were granted to small communities chosen on the grounds of race in areas of great strategic importance to this country." Sir Harry who was Chief Justice of Australia between 1981 and 1987 said some people were arguing that there was a right of self-determination within countries. He said groups were working within the UN for the development of such doctrines. From hugh at toad.com Wed Jun 10 02:48:05 1998 From: hugh at toad.com (Hugh Daniel) Date: Wed, 10 Jun 1998 02:48:05 -0700 (PDT) Subject: CYPHERPUNKS INVADE BERKELEY! June 98 Physical Meeting Announcement Message-ID: <199806100948.CAA04922@toad.com> June's meeting will be at Soda Hall in Berkeley, near Hearst&LeRoy. There's a map at http://www.berkeley.edu/campus_map/maps/ABCD345.html Ian has reserved the 4th floor lounge and the adjacent patio in Soda Hall on the UC Berkeley campus for the June 13 meeting. There's power, whiteboard, and Metricom coverage in the room. If there are computer demos needed, we can go down the hall to my office. The biggest problem will be parking; Ian is having the staff here look in to that, but he may need to know _in advance_ who's going to need parking permits. Otherwise, you'll have to pop out every so often to feed the meter. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From net138 at mail.domain-serv.com Wed Jun 10 03:31:13 1998 From: net138 at mail.domain-serv.com (net138 at mail.domain-serv.com) Date: Wed, 10 Jun 1998 03:31:13 -0700 (PDT) Subject: Don't Risk Losing That Great Domain Name! Message-ID: <199806100952.CAA05729@outlook.domain-serv.com> ********************************************************************* Don't Risk Losing That Great Domain Name For Your Personal Or Business Use. ********************************************************************* Register your Domain Name for a one time fee of $35.00. Planet Net's Domain Registration Services will not only register your domain name, but for no monthly charge, allow you to use the Planet Net Name Service. When you are ready to post your web site or use your domain for mail, The decision is up to you; select another website hosting company or Host with Planet Net. We'll even waive the set-up fees. Also available are packages with custom "under construction" pages and mail services allowing you to use your new domain for e-mail. Planet Net, the Internet's premier webmasters resource, offers high performance Website Hosting and Dedicated Servers. Lightning fast 30 MB virtual web hosting packages starting at $19.99/Month. Reseller packages with domain hosting as low as $10 /month All packages include bundles of free webmaster tools. Sign-up before June 30, 1998 and receive up to 3 Free months of web site hosting. If you would like to check the availability of your domain name or learn more about Planet Net type the following address in your web browser. http://www.serveramerica.com See You On The Net!! From StanSqncrs at aol.com Wed Jun 10 03:54:22 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Wed, 10 Jun 1998 03:54:22 -0700 (PDT) Subject: Moderator Nazi Update! Message-ID: <537518a2.357e659f@aol.com> Cypherpunks, I may've found a 3rd picture of my "Moderator Nazi". I have it posted here with the others at - http://members.aol.com/WhtsAMetaU/ofir.html I'd like expert opinion from the Cypherpunks (and any FBI agents that may happen to be lurking the list :-), actually, ESPECIALLY any FBI agents that may be working the list ;-) ) as to whether you think it's the same person. Look at it as if he's losing weight over the years. Write me in private if you wish, and thanks in advance! Stan From 2ncesca9 at net.kitel.co.kr Wed Jun 10 09:51:16 1998 From: 2ncesca9 at net.kitel.co.kr (2ncesca9 at net.kitel.co.kr) Date: Wed, 10 Jun 1998 09:51:16 -0700 (PDT) Subject: hello hello !! Message-ID: <199806102819IAA55011@abcd456.246.250.46> !!!!! YES YOUR XXXX PASSWORD AWAITS YOU !!!!!! > To get your password... Just: Click Here ................ ..................// From billp at nmol.com Wed Jun 10 13:54:36 1998 From: billp at nmol.com (bill payne) Date: Wed, 10 Jun 1998 13:54:36 -0700 (PDT) Subject: Second Notice of Appeal FILED Message-ID: <357EF1F0.6569@nmol.com> Wednesday 6/10/98 2:34 PM John Young The second attached NOTICE OF APPEAL was stamped FILED UNITED STATES DISTRICT COURT DISTRICT OF NEW MEXICO 98 JUN 10 AM 9:52 Robert M. March Clerk, ALBUQUERQUE I put stamped copies of both in the mail to you. The government only MAYBE understands FORMAL actions. Informal actions, like letters etc, go into the waste paper basket. Even formal actions such as the FOIA, PA, lawsuit, and criminal complaint affidavit the government will try to BLACK HOLE. While, naturally, we would like to settle this unfortunate matter so that we can all get on to more constructive pursuits, it appears that we will be doing a FORMAL ACTION at least TWICE through the Tenth Circuit court of appeals. Later bill UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW MEXICO William H. Payne ) Arthur R. Morales ) ) Plaintiffs, ) ) v ) CIV NO 97 0266 ) SC/DJS ) Lieutenant General Kenneth A. Minihan, USAF ) Director, National Security Agency ) National Security Agency ) ) Defendant ) NOTICE OF APPEAL Santiago E. Campos MEMORANDUM OPINION AND ORDER FILED 98 APR 30 AM 11:45 1 COMES NOW plaintiffs Payne and Morales [Plaintiffs] to exercise their rights under the Federal Rules of Appellate Procedure http://www.ca5.uscourts.gov/docs/frap-iop.htm FRAP 4. APPEAL AS OF RIGHT--WHEN TAKEN http://www.ca5.uscourts.gov/docs/frap-iop.htm#4 a) Appeal in a Civil Case. (1) Except as provided in paragraph (a)(4) of this Rule, in a civil case in which an appeal is permitted by law as of right from a district court to a court of appeals the notice of appeal required by Rule 3 must be filed with the clerk of the district court within 30 days after the date of entry of the judgment or order appealed from; but if the United States or an officer or agency thereof is a party, the notice of appeal may be filed by any party within 60 days after such entry. If a notice of appeal is mistakenly filed in the court of appeals, the clerk of the court of appeals shall note thereon the date when the clerk received the notice and send it to the clerk of the district court and the notice will be treated as filed in the district court on the date so noted. 2 Defendant Minihan is officer of the United States. 3 Plaintiffs appeal A NOW, THEREFORE, IT IS ORDERED that sua sponte, Defendant is DEEMED by the Court to be the NSA, and not Lt. Gen. Kenneth A. Minihan. Future captions for this case should reflect this change. B IT IS FURTHER ORDERED that Defendant's Motion to Dismiss Plaintiff Morales is GRANTED. C IT IS FURTHER ORDERED that Plaintiff's Motion for Summary Judgment Based on Evidence from Admissions is DENIED as MOOT. seen at http://jya.com/whp043098.htm to the Tenth Circuit Court of Appeals. Respectfully submitted, William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 Arthur R. Morales 1024 Los Arboles NW Albuquerque, NM 87107 Pro se litigants CERTIFICATE OF SERVICE I HEREBY CERTIFY that a copy of the foregoing memorandum was mailed to Lieutenant General Kenneth A. Minihan, USAF, Director, National Security Agency, National Security Agency, 9800 Savage Road, Fort George G. Meade, MD 20755-6000 and hand delivered to Jan E Mitchell, Assistant US Attorney, 9 Floor, Bank of America Building, 3rd and Tijeras, ABQ, NM 87102 this Wednesday June 10, 1998. 2 From nobody at REPLAY.COM Wed Jun 10 14:00:48 1998 From: nobody at REPLAY.COM (Anonymous) Date: Wed, 10 Jun 1998 14:00:48 -0700 (PDT) Subject: backdoor trojan in ICKill Message-ID: <199806102100.XAA27780@basement.replay.com> ----Forwarded text-------------------------------------------------- Subject: backdoor trojan in ICKill Date: Sun, 7 Jun 1998 19:44:28 -0400 From: Bachrach To: BUGTRAQ at NETSPACE.ORG First off, I'm not 100% sure if this is the apropriate forum for this since it's not really a weakness, but rather a programmer who is putting backdoors into some programs. Then again technically that's an exploits... Oh I don't know. If this is the wrong place then I apologize profusely for the waste of bandwidth and plead ignorance, but here goes: Well, chances are none of you guys have ever used this program, or even heard of it, but there are alot (35,000) of people who have. I originally downloaded it becasue I've been researching a lot of the weaknesses in the ICQ protocol, (which has become easier as time has gone on. :)) Anyway, after you run it, (ICKill), it creates a file in the directory called 1.exe that acts as a fake explorer. 1.exe accesses your regedit database, and copies itself to windows/system. It changes the regedit so that the fake one will run on startup. It acts mostly the same as the normal explorer with one very crucial execption. It contacts a host (I still can't figure out which one), and executes the commands that are embedded within a text file on the computer. Anyone see it yet? Backdoor city. I contacted the author (who left his e-mail address in the readme), and he's the one who explained th backdoor thing. He also told me a few other things that made me write up to this group. He said that he had gotten almost 35,000 different people's systems calling up his computer at one point; essentuially he has backdoors to 35,000 systems accross the globe. When I asked him why he would go through all the trouble to do this he gave me two reasons: 1. IF (and he emphasized the if) he was a hacker he could use a couple of other people's computers as hops when hacking into a system. Kind of nasty for the sysadmin trying to trace a breaking huh? 2. To quote him "And the backdoors can auto-uptade themselves.. so Imagine I can code a virus like backdoor... Whoaaa! This will be like THAT internet worm.." 3. He also said "Imagine also.. 35,000 backdoored (yeah, I reached this number) connections pinging or SYN flooding some server.." Well if anyone out there is using or has ever used ICKill then get rid of it. I have actually set up a page on this to both inform people and explain how to get rid of all traces of the program that I currently am able to at http://members.tripod.com/~hakz/ICQ/index.html That site also has all of the letters I wrote to him and he wrote to me if you want to see the entire things. It's also got some other info I couldn't fit into this message, including all of the mistakes the author made (guess he needed better beta testing). My last question is this: if one person has backdoors into thousands of computer systems, doesn't that pose some sort of risk to the interent community as a whole? There's one person who's been saying that I should notify the FBI about this. As you can see decided to start here first. From zooko at xs4all.nl Wed Jun 10 15:23:36 1998 From: zooko at xs4all.nl (Zane Lewkowicz) Date: Wed, 10 Jun 1998 15:23:36 -0700 (PDT) Subject: [SPAM] No really. It _is_ spam. It's spam, i tell you. You've been warned! Message-ID: <199806102223.AAA20590@xs2.xs4all.nl> From: incognito at incognito.com Date: Thu, 11 Jun 1998 To: (Recipient list suppressed) Subject: This is fun!!! Hi, Would you like to send someone a letter from Bangkok? Well, you can! Put the letter to be remailed in a larger envelope with US$3 cash and I will post it from Bangkok bearing a Bangkok postmark to any country in the world. If you want the letter to go registered then enclose US$4 cash. I will pay the postage from the enclosed fee. The letter must be lightweight air-mail only containing not more than 2 sheets of writing paper. Here's the address... Incognito P.O. Box 3, 10704, Bang Orr, Bangkok, Thailand. ... Please register your mail to me. - -------------------------------- A must for secret lovers. Great for practical jokes and pranksters. Inform your boss what you think about her/his ideas. Tell your ex-wife/husband you're living in Bangkok. Go on, give it a try it's great fun. You can put as many envelopes in the larger one as you like but you must enclose the fee for each remailed item. The 10th letter goes free! Here's another way... 1. Send US$10 cash and I'll send you three picture postcards of various places in Thailand. I send them to you and you write them out and post back to me for remailing. Or... 2. Enclose a slip of paper with the US$10 giving details of names and addresses and messages to go on the three postcards. Mail to be remailed is sent the same day it is received unless you specify a date for it to be remailed. No records kept and you are completely unknown to me so don't put your name and address on any of the envelopes. Please send a copy of this email to your friends. Have fun!!! *********** ------- End of Forwarded Message From StanSqncrs at aol.com Wed Jun 10 23:53:31 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Wed, 10 Jun 1998 23:53:31 -0700 (PDT) Subject: Nobody Report Message-ID: <3b5db7e4.357f7ec6@aol.com> So 'Nobody' (Tim May) has joined FreeGroup. Of course, shortly after that he revealed himself (in multiple fuckups) and he tried to cause a big ruckus, but that's no big deal. Actually, the alias that he joined the group under seems to be pretty nice guy (when he's not abusing the addressing. ;-) ) So, all's well that ends well, or is it, Tim? [BIG GRIN!] Stan, FreeGroup - "Just Say It!" http://members.aol.com/WhtsAMetaU/FreeGroup.html From properties at hotmail.com Thu Jun 11 06:01:58 1998 From: properties at hotmail.com (properties at hotmail.com) Date: Thu, 11 Jun 1998 06:01:58 -0700 (PDT) Subject: BUSINESS OPPORTUNITY Message-ID: <306724452//JHGREW101> IF YOU ARE NOT MAKING IN THE HIGH (6) FIGURES, REPLY WITH YOUR FAX NUMBER . OFFSHORE TRUST HIRING AGENTS TO MARKET GUARNTEED HIGH INTEREST TO THE CLIENT AND AGENTS. WE HAVE AGENTS MAKING IN EXCESS $1,000,000.00 PER YEAR NOT WORKING FULL TIME. YOU CAN HIRE OTHER AGENTS ALONE AND EARN IN THE (6) FIGURES BY JUST RECEIVING THE 4% OVERRIDE ON THE RECRUITED AGENTS BUSINESS. YOU ARE 100% PROTECTED BY HAVING THE RECRUITED AGENT SIGN THE APPLICATION AND YOU ALSO SIGN IT WITH HIM AS THE RECRUITER AND YOU AS THE RECRUITER SEND IN THE APPLICATION .ANY ONE OUTSIDE OF THE USA PLEASE SEND ALONG WITH YOUR FAX NUMBER, YOUR COUNTRY CODE. THANKS From E.J.Koops at kub.nl Thu Jun 11 08:22:48 1998 From: E.J.Koops at kub.nl (Bert-Jaap Koops) Date: Thu, 11 Jun 1998 08:22:48 -0700 (PDT) Subject: Crypto Law Survey updated Message-ID: <920DAEE2DA7@frw3.kub.nl> I have just updated my survey of existing and envisaged cryptography laws and regulations. See the Crypto Law Survey at http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm This update includes: -update on Wassenaar (to be revised), EU (proposal for new dual-use regulation; Copenhagen hearing; ETSI rejects RH; law-enforcement policy paper), Birma (domestic regulation), Brazil (no regulation plans), Germany (no regulation before elections), Kazakhstan (domestic controls), Malaysia (CA's must decrypt during search), Pakistan (regulation on sale and use), Spain (export), Sweden (export), US (Karn; Junger; new version Kerrey-McCain; Gore letter) - URLs added to EU (conditional access regulation), US (BXA Annual Report; Junger page) I have also started a mailing list to announce updates, to which you can subscribe by sending a message to with subject "subscribe CLS-update". Kind regards, Bert-Jaap --------------------------------------------------------------------- Bert-Jaap Koops tel +31 13 466 8101 Center for Law, Administration and facs +31 13 466 8149 Informatization, Tilburg University e-mail E.J.Koops at kub.nl -------------------------------------------------- Postbus 90153 | This world's just mad enough to have been made | 5000 LE Tilburg | by the Being his beings into being prayed. | The Netherlands | (Howard Nemerov) | --------------------------------------------------------------------- http://cwis.kub.nl/~frw/people/koops/bertjaap.htm --------------------------------------------------------------------- From gnu at toad.com Thu Jun 11 12:16:50 1998 From: gnu at toad.com (John Gilmore) Date: Thu, 11 Jun 1998 12:16:50 -0700 (PDT) Subject: President's Export Council Subcommittee on Encryption: June 22 Message-ID: <199806111916.MAA25195@toad.com> [It might be interesting for DC-area cypherpunks to visit and see what they're doing. This council was appointed to advise the Commerce Dept and the President about export of encryption. --gnu] President's Export Council Subcommittee on Encryption Meeting June 22, 1998 Ronald Reagan Building, 1300 Pennsylvania Ave. NW, Washington DC Conference Room Hemisphere A Agenda 9.00 Opening Remarks Chair of the Subcommittee Public Comments 9.30 BXA Updates William Reinsch 10.00 Legislative Panel Briefing unpublished as to who will be doing the briefing 11.00 Closed Session 4.00 Open to public Rm 4832 Commerce Department Briefing by each of the 3 Working Groups on the topic 4.45 End From jya at pipeline.com Thu Jun 11 12:33:27 1998 From: jya at pipeline.com (John Young) Date: Thu, 11 Jun 1998 12:33:27 -0700 (PDT) Subject: AF Docs on Comsec and Intel Message-ID: <199806111933.PAA05189@dewdrop2.mindspring.com> The USAF offers hundreds of documents at its Electronic Publications site: http://afpubs.hq.af.mil/elec-products/pubs-pages/ We've mirrored listings for dozens of docs in two categories: Communications and Information: http://www.jya.com/af-33-pubs.htm Intelligence: http://www.jya.com/af-14-pubs.htm And, in case there's difficulty accessing, we've mirrored: "Instruction on the Operation of the STU-III": http://www.jya.com/33020900.pdf (534K PDF) "Cryptographic Access": http://www.jya.com/33021000.pdf (129K PDF) "Emission Security": http://www.jya.com/33020300.pdf (296K PDF) "Controlled Access Program": http://www.jya.com/33022900.pdf (170K PDF) "Sources of Intelligence": http://www.jya.com/af-intel.htm From nicholas at doitnow.com Thu Jun 11 20:22:38 1998 From: nicholas at doitnow.com (rocker) Date: Thu, 11 Jun 1998 20:22:38 -0700 (PDT) Subject: Masterkey Message-ID: <000901bd95b1$143660e0$0c2bd3cf@nick> Hello, � ��� I have been trying for the last 3 months trying to get a copy of masterkey. I read an artical you put on eff.org about masterkey, and how you used it. I was wondering if you could tell me were to go and get masterkey or if you could send it to me vie E-MAIL or just what. � ������������������������������������������� W/B ������������������������������������������� Rocker From bill.stewart at pobox.com Thu Jun 11 21:28:56 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 11 Jun 1998 21:28:56 -0700 (PDT) Subject: FWD: backdoor trojan in ICKill In-Reply-To: <199806102100.XAA27780@basement.replay.com> Message-ID: <3.0.5.32.19980611174656.008163d0@popd.ix.netcom.com> At 11:00 PM 6/10/98 +0200, a remailer user forwarded a message From: Bachrach about a major security backdoor in ICKill, a utility that apparently augments or hangs around ICQ - it's a little-documented feature designed into the system rather than a bug or unexpected behaviour. More information is at > http://members.tripod.com/~hakz/ICQ/index.html ... >My last question is this: if one person has backdoors into thousands of >computer systems, doesn't that pose some sort of risk to the interent >community as a whole? There's one person who's been saying that I should >notify the FBI about this. As you can see decided to start here first. Don't tell the FBI - they'll just want to use it themselves. :-! Is there some way to locate and reach ICKill users directly? Do they show up on ICQ in some useful manner? (I don't use either of the products....) Directly notifying them could help the problem, or at least generate a number of emails to the author who put the feature in there. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From DarkKnight at Elitehackers.org Thu Jun 11 23:04:32 1998 From: DarkKnight at Elitehackers.org (Dark Knight) Date: Thu, 11 Jun 1998 23:04:32 -0700 (PDT) Subject: FWD: backdoor trojan in ICKill In-Reply-To: <3.0.5.32.19980611174656.008163d0@popd.ix.netcom.com> Message-ID: > At 11:00 PM 6/10/98 +0200, a remailer user forwarded > a message From: Bachrach > about a major security backdoor in ICKill, a utility that > apparently augments or hangs around ICQ - it's a little-documented > feature designed into the system rather than a bug or unexpected behaviour. > More information is at > > http://members.tripod.com/~hakz/ICQ/index.html > .... > >My last question is this: if one person has backdoors into thousands of > >computer systems, doesn't that pose some sort of risk to the interent > >community as a whole? There's one person who's been saying that I should > >notify the FBI about this. As you can see decided to start here first. > > Don't tell the FBI - they'll just want to use it themselves. :-! > > Is there some way to locate and reach ICKill users directly? > Do they show up on ICQ in some useful manner? > (I don't use either of the products....) Directly notifying them > could help the problem, or at least generate a number of > emails to the author who put the feature in there. Well the way I see it the author of ICKill told the company that puts out ICQ that you have this problem and you need to fix it.. The way he's looking at it is fix this because it's a problem. They did not fix it after his requests to have them fix this so he shared it. I don't think he did anything wrong in this case. Any way like the FBI could figure out how to use it I don't give them that much credit as it is. |)ark |(night DEFINITION. Windows 95: n. 32 bit extensions and a graphical shell for a 16 bit patch to an 8 bit operating system originally coded for a 4 bit microprocessor, written by a 2 bit company, that can't stand 1 bit of competition. Http://www.EliteHackers.org/DarkKnight From gwb at gwb.com.au Fri Jun 12 00:15:58 1998 From: gwb at gwb.com.au (Global Web Builders) Date: Fri, 12 Jun 1998 00:15:58 -0700 (PDT) Subject: Live coverage of Qld State Elections Message-ID: <1.5.4.32.19980612070530.00a09700@mail.pronet.net.au> Dear One Nation supporter in NSW, I am delighted to inform you that One Nation now has its own domain. Check out: http://www.onenation.com.au To follow the Qld State election live tomorrow night take the Qld State Election link and then the "LIVE" coverage link. Shortcut: http://www.gwb.com.au/onenation/qldstate/june13 The new IRC details will be put up tomorrow night. Look forward to catching up with you on-line.... GWB Scott Balson From lists at mailbuggy.com Fri Jun 12 04:50:58 1998 From: lists at mailbuggy.com (lists at mailbuggy.com) Date: Fri, 12 Jun 1998 04:50:58 -0700 (PDT) Subject: 1,500,000 EMAIL ADDRESSES - $15 !!! ALL FRESH! Message-ID: <989.283923.142588 lists@mailbuggy.com> HERE IT IS!! The earnings pontential you have been looking for! We will provide you with 1.5 MILLION EMAIL ADDRESSES FOR ONLY $15. These are all fresh addresses with no duplications. They are all sorted and ready to be mailed. This is the best deal anywhere today for email lists! Imagine selling a product for only $10 and getting only a 1/100 response. That's $150,000!!! Money making plans, reports, lists, jewelry, art, etc. Whatever you wish to sell! People are making millions of dollars right now by doing the same thing! That is why you get so much email from people selling you their product....it works! These 1.5 Million email addresses are yours to keep, so you can use them over and over and they come on disk or by email....your choice. If you do not have a program capable of sending bulk email please note it on your order form and we will show you where you can download one for free. We will also show you how you can avoid using your ISP's smtp mail server for mailing by using software that turns your personal computer into your very own personal mail server! Simply print out this completed order form and send it to us along with your check or money order made payable to: F.T.W.I. for only $15. We also accept Visa and Mastercard. Send addresses via (circle one): EMAIL MAIL (add $3 for shipping and handling) Name: _____________________________ Street Address: ________________________City: _______________ State: ________________Zip:_____________ Phone number:__________________________ Email:_______________________________ Returned checks are subject to $25 NSF Fee Fill in the following if you are paying with a credit card: Circle one: VISA MASTERCARD Name as it appears on the card: __________________________ Card number: ______________________________ Expiration Date: ___/___ Signature: ____________________________ Send your order and payment to: F.T.W.I. 4019 Goldfinch, Ste. J San Diego, CA 92103 From tsandwich at hotmail.com Fri Jun 12 07:06:39 1998 From: tsandwich at hotmail.com (The Sandwich) Date: Fri, 12 Jun 1998 07:06:39 -0700 (PDT) Subject: Newbie PGP question Message-ID: <19980612140606.2770.qmail@hotmail.com> I have a file encrypted with PGP version 2.6.2. Is there a way to view ALL the (public) keys that were used to encrypt the message... therefore showing which of Private keys can be used to decrypt it? ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From whgiii at invweb.net Fri Jun 12 07:26:26 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Fri, 12 Jun 1998 07:26:26 -0700 (PDT) Subject: Newbie PGP question In-Reply-To: <19980612140606.2770.qmail@hotmail.com> Message-ID: <199806121431.JAA074.07@geiger.com> -----BEGIN PGP SIGNED MESSAGE----- In <19980612140606.2770.qmail at hotmail.com>, on 06/12/98 at 07:06 AM, "The Sandwich" said: >I have a file encrypted with PGP version 2.6.2. Is there a way to view >ALL the (public) keys that were used to encrypt the message... >therefore showing which of Private keys can be used to decrypt it? If you have PGP 2.6.x and you run PGP from the commandline: c:> pgp.exe If no keys are available in the secring.pgp file to decrypt the message then PGP will display all the keys the file is encrypted with. - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html - --------------------------------------------------------------- Tag-O-Matic: How do you make Windows faster? Throw it harder! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNYE7v49Co1n+aLhhAQFABAQAkIxiYhrfC9XmkyQ9Z+2zCdljFTmPwLKT G4LieJdW8SbBDxn45A5bPLTdrCR7PmRguOFi54u+PouR3BEfT1319j7LltJmNjRX 7CFyGjjiQFoLDg4c0w2B0A6zxGRFahUKWdekAcxgY/4emmfPoINEuZ2voEb6uIsb a6bRRj+7qdE= =P/8j -----END PGP SIGNATURE----- From listmaster at extensis.com Fri Jun 12 09:33:05 1998 From: listmaster at extensis.com (listmaster at extensis.com) Date: Fri, 12 Jun 1998 09:33:05 -0700 (PDT) Subject: Extensis Mask Pro--Now with FREE PhotoAnimator Message-ID: Extensis Mask Pro-The Best-Selling Masking Plug-in for Adobe Photoshop http://products.extensis.com/maskpro_P/ If you think professional-quality Masking is a complex, time-consuming process� Think again. Think Mask Pro. SPECIAL OFFER: Order Mask Pro for $299.95 and get PhotoAnimator FREE! (a $99 value) Mask Pro is the award-winning Photoshop plug-in that slashes the time it takes to create high-quality masks-with results that satisfy even the most demanding professional. Just ask MacUser: "Mask Pro is lightning fast, easy to learn, and must be ranked among the year's top plug-ins". But you be the judge. The Advantage? Color matching. Mask Pro's innovative color matching technology lets you decide which colors you want to keep and which ones you don't. Mask Pro does the rest. Using a color eyedropper, simply select which colors to keep and which ones to drop. Then use Mask Pro's Magic Brush to wipe away the unwanted colors. The Magic Brush removes the drop colors you selected, leaving a perfect mask-every time. You have complete control. Select color thresholds, edge softness, brush sizes, and more. With the zoom, pan and navigator window controls, you can easily move around in any image. And, with the unlimited undo/redo, you are free to experiment as much as you like. The precision and speed of Extensis Mask Pro cuts masking projects down to size. To order, get information, or download a FREE demo, Please visit: http://products.extensis.com/maskpro_P/ SPECIAL OFFER: Order Mask Pro for $299.95 and get PhotoAnimator FREE! (a $99 value) Mask Pro is available for both Mac and Windows and is 100% compatible with Photoshop 3.05, 4.0 & 5.0. To order by phone: 1-800-796-9798 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ PS. We have made every effort to ensure this message is being sent only to people who have expressed interest in Extensis products. If we have sent this to you in error, please accept our apologies and reply with REMOVE in the subject line for automatic exclusion from future communications. If you know someone who would like to be on our mailing list have them send an email to listmaster at extensis.com with ADD in the subject line and their email address in the body. From arcinc at usaor.net Fri Jun 12 10:24:02 1998 From: arcinc at usaor.net (ARC Staffing) Date: Fri, 12 Jun 1998 10:24:02 -0700 (PDT) Subject: Position Message-ID: <3581646C.D2569F4A@usaor.net> Sorry to intrude on everyone, but I'm looking to fill a position in the Northern Virginia area. I'm looking for a secure messaging engineer, dealing heavily in S/MIME and/or PGP. It is a very llucrative spot for the person with the right qualifications. If anyone could help me, I would appreciate it. Nate Stanton ARC Staffing 412-422-1159 arcinc at usaor.net P.S. If this is out of line, let me know, and I'll apolizgize profusely. From nobody at privacy.nb.ca Fri Jun 12 15:00:08 1998 From: nobody at privacy.nb.ca (Joseph 'Anonymous' Howe) Date: Fri, 12 Jun 1998 15:00:08 -0700 (PDT) Subject: Position In-Reply-To: <3581646C.D2569F4A@usaor.net> Message-ID: <2c9eb8084c133e9e90937dfe2b72d83e@privacy.nb.ca> On Fri, 12 Jun 1998 13:25:00 -0400 ARC Staffing wrote: >Sorry to intrude on everyone, but I'm looking to fill a position in the >Northern Virginia area. I'm looking for a secure messaging engineer, >dealing heavily in S/MIME... Isn't that a double negative? Hee, hee! -+DiGiTaL+- From mscompia at microsoft.com Fri Jun 12 15:53:05 1998 From: mscompia at microsoft.com (mscompia at microsoft.com) Date: Fri, 12 Jun 1998 15:53:05 -0700 (PDT) Subject: Information From The Microsoft Personal Information Center Message-ID: <0be172752220c68UPIMSSMTPSYS08@msn.com> Here is your password you requested from the Microsoft Personal Information Center at http://register.microsoft.com/regwiz/personalinfo.asp. Password: writecode If you continue to have access problems or want to report other issues, please contact us through the Write Us button at the top of any Microsoft page. From tonya at e-web2.net Fri Jun 12 23:18:17 1998 From: tonya at e-web2.net (tonya at e-web2.net) Date: Fri, 12 Jun 1998 23:18:17 -0700 (PDT) Subject: Your Adult Website Password Message-ID: <199806130618.XAA15554@toad.com> This message is for adults 21+ only. If you are not 21+ or do not wish to view adult images please delete this message. ============================================================== Looking For Live Hidden Camera Video? Looking For 23 Live Girl Feeds? Looking For A Site That Won't Charge you To Chat With the Ladies? Looking For A Site That Won't Break the Bank? http://www.e-web2.net/tonya/ Love Tonya ================================================================ From nycfood at prontomail.com Sat Jun 13 04:14:50 1998 From: nycfood at prontomail.com (nycfood at prontomail.com) Date: Sat, 13 Jun 1998 04:14:50 -0700 (PDT) Subject: Free Gourmet Food Message-ID: <199806131114.EAA11496@toad.com> THE MOST DELICIOUS FOOD ON THE INTERNET IS AT NEW YORK CITY GOURMET FOOD Your name may be selected to receive a free gourmet food gift. Just visit, http://www.usaserve.net/nycfoods, and make a complete entry into the Guest Book. Please write JUNE GIFTS in the comment box and, if your name is one of three selected your gift will arrive by express messenger. Make a purchase during your and visit you may also receive, just in time for the outdoor season, a copy of one of America's best Barbeque cook books, LICENSE TO GRILL. Please write JUNE GIFTS in the comment box of your order. http://www.usaserve.net/nycfoods is offering free gourmet food gifts each month but, you must sign the Guest Book on or after the first day of each month to be eligible. To be deleted from the mail list, please respond with remove in the subject line and press the reply button. From maxinux at bigfoot.com Fri Jun 12 16:21:44 1998 From: maxinux at bigfoot.com (Max Inux) Date: Sat, 13 Jun 1998 07:21:44 +0800 Subject: FBI Case Files on the Web (fwd) Message-ID: Well, here is some more information about FOIA FBI Files being put on the web, check out the story at http://www.seattletimes.com/news/nation-world/html98/file_061298.html Then go check out the files they've got on the web so far if you're interested (alphabetical index) ... http://www.fbi.gov/foipa/alpha.htm -- Max Inux (MaxInux at bigfoot.com) UIN: 207447, http://khercs.dyn.ml.org Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59 Or Kinky sex makes the world go round- Christie: Your in my sig too ^^ If Cryptography is outlawed, only outlaws will have cryptography ^^ From derok at caryys.com Sat Jun 13 13:56:24 1998 From: derok at caryys.com (derok at caryys.com) Date: Sat, 13 Jun 1998 13:56:24 -0700 (PDT) Subject: mach 101111 Message-ID: <0a0b21151200d68UPIMSRGSMTP05@msn.com> ALL YOU DO IS ADVERTISE THIS 800 NUMBER! THAT'S ALL!! $100 goes to you for EVERY sale that the company closes! Does the idea of making at least $1,000 per week beginning your 2nd week of doing business excite you? How about never having to sell a thing to your customer and never having to talk to ANYONE to make money? I don't know how this could get any easier. EVERY aspect of selling or talking to someone is DONE COMPLETELY by the company! The number one home based business for the 2nd year in a row, Fortune 5000 is a member of the Better Business Bureau and the U.S. Chamber of Commerce. WHAT THIS BUSINESS WILL DO FOR YOU: * Handles all your calls, closes your sales, and sends you WEEKLY commission checks! * It pays you a $100 commission (that's over 50% of the total sale) for EVERY sale. CHECKS put $$$ in your pocket in less than your first week or two... Quick commission earnings build and maintain motivation. ALL YOU DO IS ADVERTISE the toll-free number and your ID number. * You can get STARTED TODAY. Just advertise the business toll-free number with your ID # and let this business CLOSE YOUR SALES every day...They do all the work and YOU GET PAID FOR IT! * You may advertise any way you choose: Bulk E-Mail, Flyers, Classifieds, Postcards, etc. Suppose you use bulk E-Mail, as I am: 100,000 E-Mails with a 1/10th of a percent (0.1%) sales rate at $100 per sale nets $10,000... not too bad. There is nothing else out there that will provide you with an immediate income beginning THIS WEEK with minimal effort. Before you call, I want you to think about the quality of the live operators handling your call. I am convinced you will not find a better team of closers for your own personal sales. You will clearly understand what I am talking about once you call. PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!! 1-800-811-2141 You will be asked for ID #55107 when you call. (Live operators are available from 8 AM-10 PM CST Monday through Saturday and will be able to answer any questions you may have.) Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949, 888-446-6951 or 888-731-3457 (all toll free). To be removed, please press reply and type "Remove" From lawyer at XUDI.aol.com Sat Jun 13 16:14:23 1998 From: lawyer at XUDI.aol.com (lawyer at XUDI.aol.com) Date: Sat, 13 Jun 1998 16:14:23 -0700 (PDT) Subject: THIS WILL CHANGE YOUR LIFE -AFUX Message-ID: <199806132314.QAA20638@toad.com> cypherpunks Read this it will change your life. If you are not interested please excuse me for interrupting your day and just hit delete and I do apologize for any inconvenience. This is a letter I received, many, many, many times, and just deleted, but finally I said to myself what the heck I'll give it a try. To my amazement DOLLAR BILLS just keep coming in everyday! >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> Greetings I am a retired attorney, and about two years ago a man came to me with a letter. The letter he brought me is basically the same as the letter in front of you now. He asked me to verify the fact that this letter was legal. I advised him to make a small change in the letter and it would be 100% legal. When I first read the letter, I thought it was some off-the-wall idea to make money. I was curious about the letter, so I asked him to keep me updated as to his results. About two months later he called to tell me that he had received over $800,000 in cash! I didn't believe him so he asked me to try the plan and see for myself. I followed the instructions exactly and mailed out 200 letters. Sure enough, the money started coming! It came slowly at first, but after three weeks I was getting more than I could open in a day. I kept a precise record and after about three months my earnings were $868,439. I decided to try the letter again, but this time I sent 500 letters out. Well, three months later I had totaled $2,344,178.00!!! I just couldn't believe it. I met my old client for lunch to find out how this exactly works. He told me that there were a few similar letters going around. What made this one different is the fact that there are six names on the letter, not five like most others. That fact alone resulted in far more returns. The other factor was the advice I gave him in making sure the whole thing was perfectly legal, since no one wants to risk doing anything illegal. I bet by now you are curious about what little change I told him to make. To be legal, anyone sending a dollar must receive something in return. So when you send a dollar to each of the six names on the list, you must include a slip of paper saying, "Please put me on your mailing list" and include your name, mailing address, and email address. This is the key to the program! The item you will receive for a dollar you send to the six names below, is this letter and the right to earn thousands. Follow the simple instructions below exactly, and in less than three months you could receive over $800,000. A) Immediately send US $1 to each of the six people on the list below. Wrap the dollar in a note saying,"Please add me to your mailing list" and include your name, mailing address, and email address. 1) HEPALTA - 16406 - 117 Avenue, EDMONTON, Ab. Canada T5M3W2 1) Fred Ball - 1092 Adobe Canyon Rd., Kenwood, California 95452 2) G.W. Smith - 7082 Woolworth Rd., Shreveport, Louisiana 71129 3) T. Perdue 130 Dalzell St. Shreveport, Louisiana 71104 4) S.Hawryluk 5520 Bellechasse, Montreal,Quebec.Canada H1T-2B8 5) Raymond Lal, P. O. Box 1122. Regina. Sk.Canada, S4P 3B4 6) D. Dilley, P.O. Box 551, Wathena, KS 66090 B) Remove the name next to #1 on the list and move the rest of the names up one position. Then place your name in the #6 spot. This is best done by saving to a text file and editing it yourself and saving the new edited copy. Or type a new list and glue it over the old one. C) You can mail your new letter out in two ways: 1) Through the U.S. Postal Service or 2) through e-mail. This letter has been proven perfectly legal for both ways as long as you follow the above instructions, because you're purchasing membership in an exclusive mailing list. To mail this out over the internet, you can browse through areas and find people to send this to all the time. All you have to do is cut and paste email Addresses wherever you are on the Internet. Remember, it doesn't cost anything to mail on the Internet. Or you can get a bulk email service to mail it out in large volumes for you. One that we recommend is: Progressive Internet Communications Co specializing in targeted and bulk mailings (Very reasonable. Call for pricing.) (407) 956-1151 P.O. Box 100512, Palm Bay, FL. 32910-0512. If you are going to use the traditional U.S. Postal Service to do this program, you will want to order a minimum 200 names from a mailing list company. For the most effective for these lists are: Advon Distributors ($28 / 200 names) P.O. Box B-11 Shelly, ID 83274 (800) 992-3866. *Keep in mind- there is no limit to the amount of names you can send out. The more names you send, the more money you'll make. We strongly encourage you to mail this letter to family, friends and relatives as well.* D) Be sure to send out at least 200. You should receive over $800,000. E) Keep a copy of this letter and all the names you receive. Mail it Out again in about 6 months. But mail it to the addresses you received with each dollar. It will work again, only much better. THIS IS A SERVICE AND IS 100% LEGAL ! (Refer to title 18, Section 1302 & 1342 of the U.S. Postal and Lottery Laws). Assume for example you get a 7.5% return rate, which is very conservative. My first attempt was about 9.5% and my second time was over 11%. 1)When you mail out 200 letters, 15 people will send you $1 2)Those 15 mail out 200 letters, 225 people will send you $1 3)B29Those 225 mail out 200 letters, 3,375 people will send you $1 4)Those 3,375 mail out 200 letters, 50,625 people will send you $1 5)Those 50,625 mail out 200 letters, 759,375 people will send you $1 6)At this point your name drops off the list at earnings of $813,615.00! It works every time, but how well depends on how many letters you send out. In the example above, you mailed out 200 letters, if you mailed out 500 letters, you would have received $2,006,917!! Check the math yourself, I want you to, but I guarantee it is correct! With this kind of return, you've got to try it. Try it once and you will do it again!!! Just make sure you send a dollar to each of the six names on the list with a note to be added to their mailing list. Together we will all prosper!!!! PS You've read this far, so let me ask you one simple question: Q. What do you have to lose?? A. Only $6 What you can gain is an income, like the example in this letter. Small Risk, Small Expense, HUGE Potential Return!!! What do you have to lose? I invite you to join our mailing list today!!! THANK YOU AND I KNOW YOU WILL BE FINANCIALLY REWARDED.______________________________________________________ D. Dilley . Attorney at law From billp at nmol.com Sat Jun 13 18:47:05 1998 From: billp at nmol.com (bill payne) Date: Sat, 13 Jun 1998 18:47:05 -0700 (PDT) Subject: JUN 12’98 Message-ID: <35832AE3.2331@nmol.com> Saturday 6/13/98 7:08 PM John Young Got an envelope size 9x1/4 x 11 7/8 in the mail today postmarked ALBUQUERQUE NM JUN 12�98 from U.S. Department of Justice United States Attorney District of New Mexico POB 607 Albuquerque, NM 87103 Official Business Penalty for Private use $300. My guess is about 4-7 page. Paper clip at lower right side. If last letter from Mitchell is any indication of rational behavior, then my guess that this will eclipse the former. http://jya.com/usa052098.htm But I did not open it. This is a weekend. I have principles. NO envelope was received from court in response to http://jya.com/whp052898.htm I will fax contents of U.S. Department of Justice envelope as soon as we open it. We must ALL keep a good sense of humor. A mathematician, physicist, and engineer we all asked to calculate the volume of a red rubber ball. The mathematician measured the diameter, then solved a triple integral to find the volume. The physicist submerged the red rubber ball in a vessel of water to measure its displacement. The engineer looked it up in his red rubber ball handbook. http://jya.com/da/whpda.htm Later bill http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html From olive369 at hotmail.com Sat Jun 13 23:57:36 1998 From: olive369 at hotmail.com (olive369 at hotmail.com) Date: Sat, 13 Jun 1998 23:57:36 -0700 (PDT) Subject: Your Friends Will Want To See These! Message-ID: Attention! Warning! Adults Only! Warning! Adults Only! If you are under 21 years of age, or not interested in sexually explicit material... please hit your keyboard delete button now and please excuse the intrusion. To REMOVE your name from our mailing list, send us email with REMOVE in the subject line. You need not read any further! Available NOW for only $9.95! Next 10 Days Only! WORLD RECORD SEX! Be There! See It Now On Video! Unbelievable ...But True! You Won't Believe Your Eyes!!! [As Seen on the Howard Stern Show] "The World's Biggest Gang Bang" See sexy Annabel Chong as she sets the world Gang Bang Record in this fantastic video documentary that chronicles her 24 hour sexathon with 251 men engaging in sexual intercourse and oral sex with her! Don't worry, you won't have to stay up 24 hours to watch it all. We've selected only the most exciting and red hot scenes for you...all in breathtaking living color with plenty of extreme close-ups! This video is guaranteed to knock your socks off and leave you breathless! You've never seen anything like it! Annabel takes on five men at a time! 90 minutes! Order Today! Only $9.95 plus $3 shipping and handling [Total $12.95]. "GANG BANG II" The Record Breaker!!! Starring Jasmin St. Claire! See Beautiful and Voluptious Jasmin St. Claire shatter Annabel's gang bang record by taking on 300 men in one 24 hour sex session! You won't believe your eyes at all the hot firey action that you will see as the new world record is established before your eyes as Jasmin takes on five men at a time for sexual intercourse and oral sex! Your friends will break down your door to see this video! You'll be the most popular guy in town! The action is truly unreal and you will see the best of it in living life-like color! Order Today and see Jasmin break the record! 90 minutes. Only $9.95 plus $3 shipping and handling [total $12.95]. Also Available... The Uncensored Authentic Underground... Pamela Anderson Lee & Tommy Lee Sex Video Tape! Everyone is talking about this exciting video! See Pam and Tommy engaging in sexual intercourse and oral sex in the car, on the boat and much, much more! A real collectors video! 30 minutes. Only $9.95 plus $3 shipping and Handling [total $12.95] "Tonya Harding Wedding Night Sex Video" Now see the beautiful Ice Skating Shame of the Olympics Tonya Harding engaging in sexual intercourse and oral sex on her wedding night with husband Jeff Gillooly! This "Bad Girl" is Hot! Don't miss this video! 30 minutes. Only $9.95 plus $3 shipping and handling [total $12.95] "Traci...I Love You" Starring Traci Lords Now see the most beautiful and popular porn star in her last adult video before she hit the big time! It's the blockbuster of the year...sensual...fiery and exposive! Traci Lords in her most erotic and controversial film ever! Don't Miss It! 90 minutes. Only $9.95 plus $3 shipping and handling [total $12.95] EMAIL SPECIAL! ORDER ANY FOUR VIDEOS AND GET THE FIFTH ONE FREE!!! Your order will be shipped via First Class Mail. All Shipments in plain unmarked wrapper. For Priority Mail - Add $5 For Overnight Express - add $15 You can order by Phone, Fax, Mail or Email. We accept all Major Credit Cards and checks by phone or fax. Visa - MasterCard - American Express - Discover 10 Day Money Back Guarantee! We know that you will be pleased with these Videos! To Email your order - DO NOT HIT REPLY ON YOUR KEYBOARD Send email to our special email address below: zena456 at juno.com [Note: If you order by email and do not receive an email acknowledgement within 24 hours, please phone our office at 718-287-3800] Phone our office 9am to 10 pm [eastern time] [718] 287-3800 to Order By Phone for FASTEST SERVICE! We can accept your credit card or check by phone Fax Your Order 24 hours per day to [718] 462-5920 You can fax your credit card information or your check Order by mail by sending $12.95 per video, cash, check, money order or major credit card [Visa, MasterCard, American Express or Discover] to TCPS, INC. 4718 18th Ave. Suite 135 Brooklyn, NY 11204 Make Checks & Money Orders Payable to TCPS, Inc. New York State Residents Please Add 85 cents for Sales Tax per Video! You must be over 21 years of age to order and give us your date of birth with your order! The Following Order Form is for Your Convenience! ............................................................................................................. Please ship me the following video tape[s]! Qty___________Annabel Chong "World's Biggest Gang Bang" Qty__________"Gang Bang II" Jasmin St. Claire Qty___________"Pamela & Tommy Lee Sex Video Tape" Qty_________ "Tonya Harding Wedding Night Sex Video Tape" Qty__________"Traci I Love You" Traci Lords at $9.95 each plus $3.00 for shipping and handling per tape [$12.95 per video or "SPECIAL $51.80 for ALL FIVE"! Credit Card #______________________________Exp Date___ I hereby represent that I am over 21 years of age. My date of birth is_________________________________ Signature______________________________________________ Ship to: Name_______________________________________ Address____________________________________________ City________________________State___________Zip________ Area Code and Home Phone [ ]___________________________ Fax # [ ]______________________________________________ Email Address___________________________________________ To remove your name from our mailing list, send us an email with remove in the subject line. This is a one time offer and you should not hear from us again! FOREIGN ORDERS -Add $15us if you desire Air Parcel Post Shipment. We ship all over the world. By deleting your unwanted E-Mail you waste one keystroke, yet by throwing away paper mail you waste our planet! SAVE THE TREES and support internet E-Mail instead of paper mail! [C] Copyright TCPS 1998 From wingsaffiliate at neworleans.org Sun Jun 14 02:24:02 1998 From: wingsaffiliate at neworleans.org (wingsaffiliate at neworleans.org) Date: Sun, 14 Jun 1998 02:24:02 -0700 (PDT) Subject: Aviation Internet Marketer Message-ID: <989.283923.115890 wingsaffiliate@neworleans.org> To: Aviation Internet Marketer From: Sgt. Hack, CEO, U.S. Wings, Inc. Succeed by association with PILOT SHOPS, the hot new Aviation Affiliate Opportunity from U.S.WINGS INC. U.S.Wings, Inc. is featured in the new, McGraw Hill book due out September 1: "StrikingItRich.com: Profiles of 23 Incredibly Successful Websites...That You've Probably Never Heard Of" by Jaclyn Easton Foreword by Jeff Bezos, Founder & CEO, Amazon.com, Inc. Become a PILOT SHOPS Affiliate today and I'll send you an autographed copy of the new book at my cost after September 1. The U.S Wings PILOT SHOPS affiliate program pays you 8.1/3 % on all sales referred from your site. All you have to do is display the GOLD WINGS logo and PILOT SHOPS link (below) on your main page! There's no risk and no cost. Your ongoing income could be significant. The PILOT SHOPS offers an extensive line of genuine leather jackets, peacoats and aviation ball caps. A line of Aviation theme T-shirts and computer mouse pads will be added in the next few weeks with plans to expand all lines as time progresses. Please check it out. >HREF="http://www.mustangone.com/uswings/pilotshop/govtissue.mv?A SSOCIATE_ID"> Come shop at the... U.S. Wings Pilot Shop, Aviation leather goods, 
caps,
t-shirts and more! Get started now and profit by association in the success in U.S. Wings, Inc. Become a U.S. Wings PILOT SHOPS Affiliate today. No cost. No risk. It's easy! Simply REPLY with the information requested below. U.S. WINGS PILOT SHOPS ~ Affiliate Application ~ _X_ YES! I wish to become a U.S Wings Pilot Shop Affiliate. _ _ Sorry. I cannot participate at this time. Company name: Contact name: Address: City: State/Province: Postal code: Country: URLs of your web sites: E-mail address of contact: Phone with area code: Comments / Questions: Upon receiving your PILOT SHOPS application, U.S. Wings will email you an Associate ID which is to be substituted into the HTML source code in the indicated position as described above... that's it! It's too easy. Entry into the PILOT SHOPS will ONLY be through GOLD WINGS links on associates' web pages. There will be no other direct access to the site! Get started now and begin sharing in U.S. Wings' phenomenal success. Best regards, Sgt. Hack, CEO U.S. Wings, Inc. Pilot Shops Internet Affiliate Program .. P.s. I hope you enjoyed reading about our new PilotShops. However, if you'd rather not receive any future notices from US Wings, please send an e-mail message to mailto:no_no_thanku at mailexcite.com with DELETE in the Subject to be immediately removed from any future US Wings Aviation offerings. Thank you. av 89-t 13-6 c_2 d-5 From schneier at counterpane.com Sun Jun 14 06:01:20 1998 From: schneier at counterpane.com (Bruce Schneier) Date: Sun, 14 Jun 1998 06:01:20 -0700 (PDT) Subject: Twofish (our AES Submission) is Available Message-ID: <199806141301.IAA20051@mixer.visi.com> Twofish, the block cipher we have submitted to NIST's AES competition, is on the web. Please see http://www.counterpane.com/twofish.html for details, including description, analysis, source code, and test vectors. Other AES submissions will presumably be made public as the weeks progress, although NIST will not publish the submissions until the August meeting. See the NIST website at http://csrc.nist.gov/encryption/aes/aes_home.htm for more details. Bruce ********************************************************************** Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590 http://www.counterpane.com From jya at pipeline.com Sun Jun 14 08:09:15 1998 From: jya at pipeline.com (John Young) Date: Sun, 14 Jun 1998 08:09:15 -0700 (PDT) Subject: Childlove and Feds Message-ID: <1.5.4.32.19980614150621.006a81f4@pop.pipeline.com> The NYT today has a long piece on phone hackers, "The Good. The Bad. The Geeks." With focus on a a few in New York City: Mantis, Wicked, Bell Boy, Vertigo, et al. Mantis admits working with LEAs in catching pedophiles and phreakers (note link) who do not abide the "Hacker Ethic" of doing no harm, only "helping society" by exposing security weaknesses. Not all Feds and phreakers agree that pedophobic Feds and teeny-cute phreaks help society, although the pedophilic Agency allegedly abusing the adorable phreaker for its come-on entrapment had "no comment" to its online childlove racketeering and profiteering, sort of like the NYT's art spiegel comic today. http://www.nytimes.com Our clone: http://jya.com/gbg.htm From replies444 at juno.com Sun Jun 14 11:05:30 1998 From: replies444 at juno.com (replies444 at juno.com) Date: Sun, 14 Jun 1998 11:05:30 -0700 (PDT) Subject: A Unique Email Advertisement Message-ID: <199806141805.LAA09023@toad.com> HELLO The following information is not meant to spam or upset anyone, that is why we include Advertisement in the subject line to give you an option to delete before you open the message. We are a Reliable Internet Company that does full Internet Marketing. Whatever your needs to market your business or product, A.I.M. can help you achieve your success. Please do not treat this as just another piece of junk mail, we are Aimed to your success. A.I.M. was established in 1994 and has helped many people on the Internet market their business and products successfully. We do not sell random bulk email lists, nor do we advertise Adult Sites or Chain Letters. Right now the largest form of communication is done through the Internet, and 1998 will be another record breaking year. There are over 60 million people that have Internet access world wide, and that number continues to rise at a rate of over 40,000 per month. The best way to market any product or service is through the Internet, and random bulk mail is not the way to go. You may ask, why am I sending you this ONE piece of email; to get my information out so that others can follow the same practices of Internet advertising. The Internet community would benefit from direct advertising! Now you ask what can we offer you..... CUSTOM TARGETED EMAIL ADDRESSES No matter what your target is, we can compile a great list for you of people or businesses that are interested in what you offer. Say, for instance, you would like to send a newsletter out to people interested in MLM; we can compile a list for you of people currently involved in MLM. If you would like a list of people looking for a business opportunity, we can compile that list for you. You tell us your target; we will compile that list. We can even target your list geographically. example...If your business is selling CD�s, and your company is based in NY; we can gather a list of people in NY interested in CD�s. We have a client that is involved in MLM, who asked us to target 1000 opportunity seekers to start. To his surprise he got 7 new people in his downline from just that one mailing. Another client wanted to send a letter out to birdwatchers. We targeted 5000 birdwatchers for him; and he, also, became a very happy client of ours. We have targeted.. investors, businesses, International addresses,women, men, age groups, cites, states, doctors, lawyers, etc.... Some of our clients are getting results of 1-40%. Targeted mailings start at $50 per thousand, and we can offer you a better price at higher quantities. Complete Pricing for Targeted Email 1000 targeted email addresses $50 for us to email $50=$100 2000 targeted email addresses $85 for us to email $85=$170 5000 targeted email addresses $250 (no charge for us to email) 10000 targeted email addresses and we mail $500 100000 targeted email addresses and we mail $1,000 1 million guaranteed targeted email addresses and we mail $5,000 We offer a guarantee that our lists will be targeted to your topic. We keep a master file on all of our clients so if you order again you will never get any duplicate addresses from us EMAILING We can do the email for you and have all of the replies come directly to your email address. If you prefer to do the mailing yourself, we sell email software as well. Here is a few: Rapid Fire Mail Server....Turns Your Computer into a mail server $495.00 (free demo) Stealth Mass Mailer...Sends out email at a rate of 100,000+ per hour $395.00(free demo) Mail Pusher....The newest in Bulk Email Software (great program) $300.00 (free demo) OTHER SERVICES OFFERED BY A.I.M. WEBSITE MARKETING PACKAGE We can place your website to the top of any given search engine. Our best results come from Infoseek. Guarantee top 10 listing. $300.00 first month $300.00 every month there after COMPLETE WEB MARKETING PACKAGE (1) Targeted Emails in the amount of 200,000 per week (2) Posting your website to BBS (Internet Bulletin Board Systems Related to your topics) (3) URL links to other sites related to your topics (3) Newsgroup Postings (1000) per month (4) Banner Ads to related subject searches (5) Website Submissions to the search engines with a guaranteed 1st page placement to Infoseek and submissions to the other top 8 as well as 400 other search engines All of the postings, submissions, banner ad and URL advertising will be done with your reply email address so that you have a copy of every placement and you know where your ads are on the Internet. Total price for complete marketing package $2500.00 per month IF YOU have a business, product, or just want to get your information out; you have no need to look any further. A.I.M. is here to help!! Now as you can see we are a full service company, and we can help you with any of your advertising needs. Please call us toll free at 1-800-942-7913 today! We look forward to hearing from you and are happy to answer any questions that you may have. Once again, we give you our guarantee that this is the only piece of email that you receive from us. We wish you success now and in the future! Again our toll free number is 800-942-7913 our fax # 732-367-2229 We accept...Visa/MasterCard/American Express or check by fax Thank you From PAWS at 12930.com Sun Jun 14 11:44:13 1998 From: PAWS at 12930.com (PAWS at 12930.com) Date: Sun, 14 Jun 1998 11:44:13 -0700 (PDT) Subject: PAWS Across the NET for Success Message-ID: <061298>

We have your name on our safe email list.  If this reaches you in error
please send removal requests to rm0021 at irst-max.net.  Your name will
immediately be removed from our list with our sincere apology for the 
intrusion.

 * * * P.A.W.S. * * * People Across the World Succeeding * * *
 
 FREE TO JOIN!!  We Help You Build Your Matrix!!!!!
 
 How about a group of people joining together to recruit and 
 market.  A group determined to make money. A group where no 
 one is at the advantage. And no one is at a disadvantage. 
 Everyone pays the same and earns the same. This is one of
 the most compelling business opportunities you will find on
 the internet today.

 97% of all MLM'ers fail to reach their financial goal. They
 never earn the kind of money they intended to when they got
 into their business. More often they lose money because the
 average person only sponsors 2.5 people. They end up spending
 more than they make and the only ones who make money are 
 those who join at the top.

 We feel we have found a way to change that.  People helping
 people is our philosophy.  We heard and we created the PAWS
 Association!! If you are a caring, individual and have a 
 desire to help others by also helping yourself, please email
 us with "more info" in the subject line and your email address 
 in the body.  Send it to:  paws-4-u-info at autoresponder.freeyellow.com

You will receive an immediate reply.










From gwb at gwb.com.au  Sun Jun 14 14:53:52 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Sun, 14 Jun 1998 14:53:52 -0700 (PDT)
Subject: Pauline Hanson deceived - Toyota need to know
Message-ID: <1.5.4.32.19980614214444.00718f6c@mail.pronet.net.au>


Dear One Nation supporter in NSW

It is with great sadness that I have to alert you, yet again, to the
unethical behaviour of Channel 9's 60 MINUTES programme. This follows the
programme "A CALL TO ARMS" on 7th June in which they tried, without
foundation, to link One Nation to "US extremist militia" just days before
the state election.

See: http://www.gwb.com.au/60.html

Last night a segment on 60 MINUTES featured One Nation and an extensive
interview between Paul Lyneham and Pauline Hanson. 

Her appearance made a liar of her as she is on the record as saying that she
would not again be interviewed by 60 MINUTES.

Pauline Hanson told me this morning, 

QUOTE:

"There was no mention about my interview with Paul Lyneham being for 60
Minutes. The programme approached me a couple of weeks ago and I turned them
down. I feel deceived by 60 Minutes."

"I was shocked when I saw my interview with Lyneham appearing on Sixty
Minutes last night. 60 Minutes know that I do not want to appear on their
programme." 

END QUOTE.

This behaviour cannot be helpful to the excellent reputation of their major
sponsor Toyota.

You may contact them at

toyota at spike.com.au

Please take a moment to tell them how you feel about these issues.

GWB




Scott Balson






From cabletv at 208.4.7.8  Sun Jun 14 15:04:11 1998
From: cabletv at 208.4.7.8 (cabletv at 208.4.7.8)
Date: Sun, 14 Jun 1998 15:04:11 -0700 (PDT)
Subject: CABLE BOX DESCRAMBLERS
Message-ID: <989.283923.817969 cabletv@208.4.7.8>


To be removed from our mailing list please reply with "REMOVE" in the subject 
line.

Cable T.V. Descramblers, Converters, And Accessories for sale. We carry cable 
descramblers for all major name brand cable boxes used by cable companies.  All 
units are compeletly automatic and digital, and there are no complicated 
programing involved, Just hookup and enjoy the latest technology in cable tv 
equipments.

We carry high quality units at low prices, prices start as low as $129 and up.  
All of our products are backed by:

30 DAYS MONEY BACK GARAUNTEE.
ONE YEAR WARRANTY.
FULL TECHNICAL SUPPORT.

For more information, pictures and prices or to order visit our
web site at http://208.4.7.8/intersales.cc/cabletv or 
http://users.replinets-max.com/rm0232

P.S. Respond and purchase your cable TV descrambler within 10 days of reciept of 
this email and get a free gift with your perchase.($40 value).  
 
 
 
 
 
 
 
 
 
 
 
 
 





From schneier at counterpane.com  Sun Jun 14 16:06:56 1998
From: schneier at counterpane.com (Bruce Schneier)
Date: Sun, 14 Jun 1998 16:06:56 -0700 (PDT)
Subject: Twofish soruce code outside the U.S.
Message-ID: <199806142306.SAA00045@mixer.visi.com>


It's time to play the dumb export control game.

I have to take steps to prevent non-US and non-Canadian persons from downloading the Twofish source.

However, if someone outside the US manages to get their hands on the Twofish source from my website and puts it up on their website, please let me know.

I would like very much to link to it, so others can get the Twofish code.

Thanks,
Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
                                            http://www.counterpane.com






From schneier at counterpane.com  Sun Jun 14 17:00:43 1998
From: schneier at counterpane.com (Bruce Schneier)
Date: Sun, 14 Jun 1998 17:00:43 -0700 (PDT)
Subject: Converting my Twofish PostScript file to pdf
Message-ID: <199806150000.TAA06546@mixer.visi.com>


We have been unable to do this.  We've tried, a few times, and failed miserably.

If anyone has the correct tools to do a clean conversation from Postscript into pdf, please do so and send me the pdf file.  I will post it.

Thanks,
Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
                                            http://www.counterpane.com






From realtor at electronicpromotion.com  Sun Jun 14 19:32:36 1998
From: realtor at electronicpromotion.com (realtor at electronicpromotion.com)
Date: Sun, 14 Jun 1998 19:32:36 -0700 (PDT)
Subject: REALTOR.com Specials!!
Message-ID: <199806150232.TAA16422@toad.com>


RealSelect Offers Tremendous Savings
On The Official NAR Web Site - http://www.REALTOR.com

IT'S ALL ABOUT LEADS...

Does the thought of unlimited classified advertising to over 3 million consumers interest you?  Would you like to market yourself and all of your listings on the world's largest website, REALTOR.com?  RealSelect is offering you a home page and upgrade 
special that can't be beat!  Save $100 off the regular retail price!  You can't afford to miss this special! The normal retail value is $374 for all of our SIMPLE Tools and setup, but
for only $274, you can have a years worth of the newest technology in
generating qualified leads for only $5 per week!    *Available only to
first year subscribers - offer valid through 6/30/98

REMEMBER, THIS PROGRAM IS ALL ABOUT GENERATING LEADS FOR YOU!
Click here to ORDER NOW!  http://www.realtor.com/marketing/home.htm
(To receive this special pricing YOU MUST ENTER BILLING CODE SP5098.)
� OR-
Using your Internet browser,
1.	Type http:// www.REALTOR.com in the address window;
2.	Once at the REALTOR.com home page, click on the blue "Internet Marketing" button located on the left hand side of the REALTOR.com web page;
3.	Select "Create Agent Simple" or "Create Office Simple";
4.	Then follow the easy steps to make big $$$ with REALTOR.com!
(To receive this special pricing YOU MUST ENTER BILLING CODE SP5098.)
� OR-
If you have any questions or need help in getting started then respond to this e-mail or fax us at (619) 291-3553.  We will personally contact you to assist.
� Don't miss this fantastic offer!! Promotion ends June 30, 1998! --

To Remove your email address from future announcements regarding REALTOR.COM specials, reply with "remove" as the subject line and you will immediately be taken off the list.









From hjfdujf at juno.com  Sun Jun 14 20:17:41 1998
From: hjfdujf at juno.com (hjfdujf at juno.com)
Date: Sun, 14 Jun 1998 20:17:41 -0700 (PDT)
Subject: A Unique Email Advertisement
Message-ID: <>


HELLO
The following information is not meant to spam or upset anyone, that is why we include
Advertisement in the subject line to give you an option to delete before you open the
message. We are a Reliable Internet Company that does full Internet Marketing. 
Whatever your needs to market your business or product, A.I.M. can help you achieve
your success. Please do not treat this as just another piece of junk mail, we are Aimed to
your success.

A.I.M. was established in 1994 and has helped many people on the
Internet market their business and products successfully.  We do not sell random bulk
email lists, nor do we advertise Adult Sites or Chain Letters.

Right now the largest form of communication is done through the Internet, and 1998 will
be  another record breaking year.  There are over 60 million people that have Internet
access world wide, and that number continues to rise at a rate of over 40,000 per month. 
The best way to market any product or service is through the Internet, and random bulk
mail is not the way to go.  You may ask, why am I sending you this ONE piece of email;
to get my information out so that others can follow the same practices of Internet
advertising.  The Internet community would benefit from direct advertising!

Now you ask what can we offer you.....

CUSTOM TARGETED EMAIL ADDRESSES
No matter what your target is, we can compile a great list for you of people or businesses
that are interested in what you offer. Say, for instance, you would like to send a newsletter
out to people interested in MLM; we can compile a list for you of people currently
involved in MLM.  If you would like a list of people looking for a business opportunity,
we can compile that list for you. You tell us your target; we will compile that list.  We can
even target your list geographically.
example...If your business is selling CD�s, and your company is based in NY; we can
gather a list of people in NY interested in CD�s.  We have a client that is involved in
MLM, who asked us to target 1000 opportunity seekers to start.  To his surprise he got 7
new people in his downline from just that one mailing.  Another client wanted to send a
letter out to birdwatchers.  We targeted 5000 birdwatchers for him; and he, also, became a
very happy client of ours. We have targeted.. investors, businesses, International
addresses,women, men, age groups, cites, states, doctors, lawyers, etc....

Some of our clients are getting results of 1-40%.  Targeted mailings start at $50 per
thousand, and we can offer you a better price at higher quantities.

Complete Pricing for Targeted Email

1000 targeted email addresses $50 for us to email $50=$100
2000 targeted email addresses $85 for us to email $85=$170
5000 targeted email addresses $250 (no charge for us to email)
10000 targeted email addresses and we mail $500
100000 targeted email addresses and we mail $1,000
1 million  guaranteed targeted email addresses and we mail $5,000
We offer a guarantee that our lists will be targeted to your topic.  We keep a master file on
all of our clients so if you order again you will never get any duplicate addresses from us

EMAILING
We can do the email for you and have all of the replies come directly to your email
address.  If you prefer to do the mailing yourself, we sell email software as well.
Here is a few:
Rapid Fire Mail Server....Turns Your Computer into a mail server $495.00 (free demo)
Stealth Mass Mailer...Sends out email at a rate of 100,000+ per hour $395.00(free demo)
Mail Pusher....The newest in Bulk Email Software (great program) $300.00 (free demo)


OTHER SERVICES OFFERED BY A.I.M.

WEBSITE MARKETING PACKAGE

We can place your website to the top of any given search engine. Our best results come
from Infoseek.
Guarantee top 10 listing.
$300.00  first month  $300.00 every month there after

COMPLETE WEB MARKETING PACKAGE

(1) Targeted Emails in the amount of 200,000 per week
(2) Posting your website to BBS (Internet Bulletin Board Systems Related to your topics)
(3)  URL links to other sites related to your topics
(3) Newsgroup Postings (1000) per month
(4)  Banner Ads to related subject searches
(5) Website Submissions to the search engines with a guaranteed 1st page placement to
Infoseek and submissions to the other top 8 as well as 400 other search engines

All of the postings, submissions, banner ad and URL advertising will be done with your
reply email address so that you have a copy of every placement and you know where your
ads are on the Internet.


Total price for complete marketing package $2500.00 per month

IF YOU have a business, product, or just want to get your information out; you have no
need to look any further.  A.I.M.  is here to help!!  

Now as you can see we are a full service company, and we can help you with any of your 
advertising needs.

Please call us toll free at 1-800-942-7913 today!


We look forward to hearing from you and are happy to answer any questions that you may
have.  Once again, we give you our guarantee that this is the only piece of email that you
receive from us. We wish you success now and in the future!

Again our toll free number is 800-942-7913
our fax # 732-367-2229

We accept...Visa/MasterCard/American Express or check by fax

Thank you










From hjfdujf at juno.com  Sun Jun 14 20:17:41 1998
From: hjfdujf at juno.com (hjfdujf at juno.com)
Date: Sun, 14 Jun 1998 20:17:41 -0700 (PDT)
Subject: A Unique Email Advertisement
Message-ID: <>


HELLO
The following information is not meant to spam or upset anyone, that is why we include
Advertisement in the subject line to give you an option to delete before you open the
message. We are a Reliable Internet Company that does full Internet Marketing. 
Whatever your needs to market your business or product, A.I.M. can help you achieve
your success. Please do not treat this as just another piece of junk mail, we are Aimed to
your success.

A.I.M. was established in 1994 and has helped many people on the
Internet market their business and products successfully.  We do not sell random bulk
email lists, nor do we advertise Adult Sites or Chain Letters.

Right now the largest form of communication is done through the Internet, and 1998 will
be  another record breaking year.  There are over 60 million people that have Internet
access world wide, and that number continues to rise at a rate of over 40,000 per month. 
The best way to market any product or service is through the Internet, and random bulk
mail is not the way to go.  You may ask, why am I sending you this ONE piece of email;
to get my information out so that others can follow the same practices of Internet
advertising.  The Internet community would benefit from direct advertising!

Now you ask what can we offer you.....

CUSTOM TARGETED EMAIL ADDRESSES
No matter what your target is, we can compile a great list for you of people or businesses
that are interested in what you offer. Say, for instance, you would like to send a newsletter
out to people interested in MLM; we can compile a list for you of people currently
involved in MLM.  If you would like a list of people looking for a business opportunity,
we can compile that list for you. You tell us your target; we will compile that list.  We can
even target your list geographically.
example...If your business is selling CD�s, and your company is based in NY; we can
gather a list of people in NY interested in CD�s.  We have a client that is involved in
MLM, who asked us to target 1000 opportunity seekers to start.  To his surprise he got 7
new people in his downline from just that one mailing.  Another client wanted to send a
letter out to birdwatchers.  We targeted 5000 birdwatchers for him; and he, also, became a
very happy client of ours. We have targeted.. investors, businesses, International
addresses,women, men, age groups, cites, states, doctors, lawyers, etc....

Some of our clients are getting results of 1-40%.  Targeted mailings start at $50 per
thousand, and we can offer you a better price at higher quantities.

Complete Pricing for Targeted Email

1000 targeted email addresses $50 for us to email $50=$100
2000 targeted email addresses $85 for us to email $85=$170
5000 targeted email addresses $250 (no charge for us to email)
10000 targeted email addresses and we mail $500
100000 targeted email addresses and we mail $1,000
1 million  guaranteed targeted email addresses and we mail $5,000
We offer a guarantee that our lists will be targeted to your topic.  We keep a master file on
all of our clients so if you order again you will never get any duplicate addresses from us

EMAILING
We can do the email for you and have all of the replies come directly to your email
address.  If you prefer to do the mailing yourself, we sell email software as well.
Here is a few:
Rapid Fire Mail Server....Turns Your Computer into a mail server $495.00 (free demo)
Stealth Mass Mailer...Sends out email at a rate of 100,000+ per hour $395.00(free demo)
Mail Pusher....The newest in Bulk Email Software (great program) $300.00 (free demo)


OTHER SERVICES OFFERED BY A.I.M.

WEBSITE MARKETING PACKAGE

We can place your website to the top of any given search engine. Our best results come
from Infoseek.
Guarantee top 10 listing.
$300.00  first month  $300.00 every month there after

COMPLETE WEB MARKETING PACKAGE

(1) Targeted Emails in the amount of 200,000 per week
(2) Posting your website to BBS (Internet Bulletin Board Systems Related to your topics)
(3)  URL links to other sites related to your topics
(3) Newsgroup Postings (1000) per month
(4)  Banner Ads to related subject searches
(5) Website Submissions to the search engines with a guaranteed 1st page placement to
Infoseek and submissions to the other top 8 as well as 400 other search engines

All of the postings, submissions, banner ad and URL advertising will be done with your
reply email address so that you have a copy of every placement and you know where your
ads are on the Internet.


Total price for complete marketing package $2500.00 per month

IF YOU have a business, product, or just want to get your information out; you have no
need to look any further.  A.I.M.  is here to help!!  

Now as you can see we are a full service company, and we can help you with any of your 
advertising needs.

Please call us toll free at 1-800-942-7913 today!


We look forward to hearing from you and are happy to answer any questions that you may
have.  Once again, we give you our guarantee that this is the only piece of email that you
receive from us. We wish you success now and in the future!

Again our toll free number is 800-942-7913
our fax # 732-367-2229

We accept...Visa/MasterCard/American Express or check by fax

Thank you










From replynow at mail.com  Sun Jun 14 23:37:17 1998
From: replynow at mail.com (replynow at mail.com)
Date: Sun, 14 Jun 1998 23:37:17 -0700 (PDT)
Subject: The One Stop - Music Shop
Message-ID: <989.283923.714193 replynow@mail.com>


Dear Webmaster,

We would like to offer your company an opportunity to host an 
ALAMO "MIRROR" site in exchange for a 10% commission on all 
musical instrument sales generated by your company. Alamo 
supplies all brands and models directly to the local markets 
worldwide, for LESS cost than any buyer can purchase the same 
product(s) locally. 


We propose the following:

1) URGENT REPLY REQUESTED!!! If you are interested be our 
exclusive agent in your area, then E-mail us ASAP so we will 
let other respondents know that your territory has been 
alocated to your company. Totally there will be over 200 
countries and territories represented, including all 50 
American states.

mailto:reply-now at highpro.com?Subject=ALAMO_MIRROR_SITES

NOTE! Agents will be accepted on a first come-first serve basis.

2) Please reply ASAP to us with the following information

   a) Homepage URL
   b) E-mail Address
   c) URL of your ALAMO MIRROR SITE
   d) E-mail address of your ALAMO REPRESENTATIVE/WEBMASTER

mailto:reply-now at highpro.com?Subject=ALAMO_MIRROR_SITES

3) We will E-mail our website to you in ZIPPED FORMAT (1MB). 

4) Please alter all contact E-mail addresses and company 
information to yours so that visitors to your site will 
contact you DIRECTLY. If relevant, please translate our 
site in to your local language.

5) Load all files onto your local server and E-mail us 
when it's up! We will notify ALL other mirrors sites of 
your addition!

MUSICAL INSTRUMENT ORDER PROCESS 

All incoming enquiries should be forwarded to us for processing. 
Copies of our replies will be sent to you. Buyers will be 
invoiced by us directly, copied to you. Once we receive their 
payment, we will credit your account. Commission will be paid to 
all agents monthly.

PLEASE NOTE! IMPORTANT!!!

Once we establish the Cybermall NEXT MONTH, EVERYTHING will 
be automated so you will NOT need to DO ANYTHING in-line to 
generate order. Therefore, you just need to develop the market 
locally OFF LINE (FAX, PHONE, MAIL).

MUTUAL BENEFITS 

1) We are the ONLY Musical Instrument Cybershop that delivers 
EVERYTHING in the Industry. Custom orders! OEM! ALL famous 
brands and types of instruments, etc. We have THE LARGEST 
SELECTION at the MOST COMPETITIVE PRICES. Why? We sell 
factory direct WORLDWIDE, and all our marketing is on-line, 
therefore we have virtually NO OVERHEAD. Saving time, money, 
and resources! Consumers save 10-60% on purchases through us.

2) The average instrument costs US$2,000, so commissions 
will normally average US$200 per instrument, so returns on 
your investment should be generated very quickly.

3) Alamo is fully established in the music industry 
worldwide as the leader in DIRECT MARKETING MUSICAL 
INSTRUMENTS WORLDWIDE. So, your MIRROR site will 
instantaneously linked to our global network of millions 
of prospect buyers. We will provide you with all the 
necessary marketing needed to effect various local marketing 
drives. WE DO THE REST!  Ie. Daily processing, on-line 
marketing, and transactions. Our elite promotions will 
generate sufficient traffic through your site.

4) We will provide you with various marketing materials, 
data, and databases for you to utilize to promote your site 
on and off line. We will register your site in up to 1,000 
Search Engines, and in multiple keyword categories, and in 
high priority.

5) Once all of the 300+ worldwide agents have been implemented,
we will open a ON-LINE CYBERMALL whereby buyers wil be able to 
go to ANY MIRROR SITE and make purchases via Credit Cards and 
all information and processing will be automated.

BACKGROUND INFORMATION

Our Homepage is one of the most visited music sites on the 
web. The Alamo Group has developed various Internet Marketing 
softwares that are perhaps the most powerful lead generating 
tools on the Net. We have built up a database of over 3.5 
million prospective clients that are interested in purchasing 
musical instruments. 

We look forward to assisting you to become prosperous agents. 
Thank you very much for your attention to the above matters!

Kindest regards,

Gerald A. Alleva
President

************************************************************
*    _ _      _            _ _      _ _    _ _    _ _ _    *
*   /   \    | |          /   \    |   \  /   |  /  __  \  *
*  / /_\ \   | |         / /_\ \   | |\ \/ /| | /  /  \  \ *
* / _ _ _ \  | |_ _ _   / _ _ _ \  | | \__/ | | \  \__/  / *
*/_/     \_\ |_ _ _ _| /_/     \_\ |_|      |_|  \_ _ _ /  *
*                                                          *
*               "THE ONE-STOP MUSIC SHOP"                  *
************************************************************
*                                   ,-all brands/models    *
*             _ _ _                /|-lowest prices        *
* |\___ALAMO__|_|_|_(__TRADE LTD._/ |-large inventory      *
* |/----//---[!|!|!]-----\\-------\ |-fast service         *
*       [| (G|E|R|A|L|D) |]        \|-all credit cards     *
*       \\=(A|L|L|E|V|A)=//         '-high traffic site    *
*        \\__|*|*|*|____// -100% satisfation guaranteed    *
*            [_]_[_]                                       *
*                                                          *
*  mailto:reply-now at highpro.com?Subject=ALAMO_MIRROR_SITES *
*          Telephone/Fax: (852) 2987-9273                  *
*             BOOKMARK our HOMEPAGE NOW                    *
*               http://www.alamohk.com                     *
************************************************************
 
 
 
 
 
 
 
 
 
 
 





From info at digfrontiers.com  Sun Jun 14 23:52:54 1998
From: info at digfrontiers.com (info at digfrontiers.com)
Date: Sun, 14 Jun 1998 23:52:54 -0700 (PDT)
Subject: Digital Frontiers Newsletter #2 - Correction
Message-ID: <199806150652.BAA10668@nero.interaccess.com>


Digital Frontiers Newsletter #2
-------------------------------
Thank you for your interest in Digital Frontiers web optimization
products. This email is to inform you of some recent changes to our
product lineup. If you don't want to receive future mailings, our
apologies -- please reply to info at digfrontiers.com. 

We apologize if you have received more than one copy of this newsletter - we're trying to improve our list management software, but are still working out the kinks.

*** 10% Off on all HVS Products! ***
------------------------------------
In a blatant ploy to get you off the golf course/beach and back in front of your computer optimizing your web graphics (just kidding), we're offering a 10% discount across our entire product line until July 15. There's never been a better time to purchase the award-winning HVS series.

*** HVS Animator Version 1.03 ***
---------------------------------
Version 1.03 of HVS Animator has just been released for Macintosh. This new version includes the ability to set exact loop counts. We expect the Windows version to be available within a few days. For your free download please visit our website at http://www.digfrontiers.com.

*** NEW! HVS ColorGIF 2.0/HVS Animator Pro Bundle ***
-----------------------------------------------------
HVS Animator Pro, the GIF animation editor/optimizer that contains the same size-squeezing technology as HVS GIFCruncher, can now be purchased with HVS ColorGIF 2.0 for only $145. Also, The HVS Toolkit Pro, which includes HVS ColorGIF 2.0, HVS JPEG, and HVS Animator Pro, is available for only $208.

If you already own HVS ColorGIF 2.0, if you register you can upgrade to HVS Animator Pro for $49. Both can be purchased via our secure commerce server at:

 http://www.digfrontiers.com/purchase.html 

*** Reviews ***
---------------
In the June issue of PC Graphics & Video, HVS optimization stacks up quite favorably against higher-profile (and more expensive) offerings from Adobe, Macromedia, and others. Take a look. By the way - they misprinted the price at $599 for our Toolkit Pro - its actually $208!

Andy King, a leading industry analyst and Managing Editor of Mecklermedia's webreference.com, looks at HVS ColorGIF 2.0 in a detailed article on color reduction. Go to http://www.webreference.com/dev/graphics/reduce.html.

*** HVS GIFCruncher Update ***
------------------------------
The response to HVS GIFCruncher, our free GIF optimization service, has been overwhelming. The reports we're getting indicate that GIFCruncher users are thrilled with the results. We have had enough load that the current server is getting bogged down at times. So we're moving HVS GIFCruncher to a fast new server - we expect to be online by late June. If you haven't tried GIFCruncher yet, give it a spin - it can reduce the size of your GIFs by 50% or more - http://www.digfrontiers.com/gcrunch.html. Currently, all enabled HVS GIFCruncher features are free so everyone can get acquainted with the service and the excellent results it can produce. We will be transitioning to a fee basis for Custom and Batch operations in a few weeks, but basic operations will remain free. 

On a related note, we've had many requests for a desktop version of HVS GIFCruncher. We're working on it now, and expect it to be ready in a few weeks - if you would like to be included on an early release list, please let us know at info at digfrontiers.com. 

The HVS GIFCruncher Webmaster Version is available now, and can automatically process an entire local, FTP or HTTP directory -- or an entire site -- and optimize all the GIFs that it finds using award-winning HVS optimization algorithms. Details are at http://www.digfrontiers.com/gc_wv_faq.html.

Thanks for your time and keep conserving bandwidth with HVS products! 

-----------------
Digital Frontiers
1019 Asbury Ave.
Evanston, IL 60202
847-328-0880 voice
847-869-2053 fax
info at digfrontiers.com
http://www.digfrontiers.com





From tcmay at got.net  Sun Jun 14 11:33:19 1998
From: tcmay at got.net (Tim May)
Date: Mon, 15 Jun 1998 02:33:19 +0800
Subject: Childlove and Feds
In-Reply-To: <1.5.4.32.19980614150621.006a81f4@pop.pipeline.com>
Message-ID: 



At 8:06 AM -0700 6/14/98, John Young wrote:

>Not all Feds and phreakers agree that pedophobic Feds
>and teeny-cute phreaks help society, although the pedophilic
>Agency allegedly abusing the adorable phreaker for its
>come-on entrapment had "no comment" to its online
>childlove racketeering and profiteering, sort of like the
>NYT's art spiegel comic today.

I was scanning the dial on my shortwave radio recently and landed on Radio
Havana. I was thinking about how in many countries (presumably including
Cuba)  it's a thought crime to tune in to banned broadcasts.

And we in the West unctuously decry this.

But are we all that different?

Suppose "Radio Pedophilia" started broadcasting on 6223 KHz. Fill in the
details on program content, etc.

By any reading of the various child pornography laws in the U.S. merely
_listening_ to such a broadcast would be a felony. Of this this there can
be no doubt.

Were such a station to exist (which it does not), I would expect FCC and
FBI, with NSA SIGINT assistance, would use technical means to isolate who
was tuned to this station and then bust in the doors.

The only difference with the Sovs and Cubans and Berkeleyites would be the
reasons the broadcasts were illegal to listen to.

--Tim May

"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Licensed Ontologist              | black markets, collapse of governments.







From StanSqncrs at aol.com  Mon Jun 15 02:59:49 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Mon, 15 Jun 1998 02:59:49 -0700 (PDT)
Subject: The I.R.S.
Message-ID: <4b63593f.3584f05d@aol.com>


Cypherpunks, I've tied a bunch of stuff together on the big conspiracy I've
discovered, think you'll find the additions interesting.  If you want to know
why popular music sucks, my page basicly shows you why.

Thanks for listening,

Stan
======
'The MOST Important Music Page on the Net!'
http://members.aol.com/whtsametu/camel/





From jya at pipeline.com  Mon Jun 15 05:33:27 1998
From: jya at pipeline.com (John Young)
Date: Mon, 15 Jun 1998 05:33:27 -0700 (PDT)
Subject: Prepare Y2K
Message-ID: <199806151233.IAA10510@camel7.mindspring.com>


NYT Magazine, June 14, 1998:

PREPARE YE 

This will make for a gloomy five days, but from June 29 to 
July 3 disaster experts from all over will convene in 
Russellville, Ark., to talk about "Principles and Practice 
of Disaster Relief and Recovery." 

Sessions cover: How to create an emergency mass mortuary, 
toxic-waste cleanups and dealing with nuclear meltdown. 

Vernie R. Fountain, of the Fountain National Academy of 
Professional Embalming Skills in Springfield, Mo., will 
discuss "identification of the dead" after natural and 
man-made disasters. 

Natural disasters have killed 181 people this year in the 
United States; there have been more than 600 tornadoes. 

Are we in jinxed times? "It's been a pretty good year so 
far, not a lot of terrorism," says Matthew Blais, a 
nuclear-terrorism expert. "But there are a lot of crazy 
people out there, saving up for the big one. You never 
know when." 

---






From schneier at counterpane.com  Mon Jun 15 06:15:21 1998
From: schneier at counterpane.com (Bruce Schneier)
Date: Mon, 15 Jun 1998 06:15:21 -0700 (PDT)
Subject: I have the Twofish paper in pdf; thanks
Message-ID: <199806151315.IAA08574@mixer.visi.com>


You can stop sending me new versions.

Thanks,
Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems     Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN  55419      Fax: 612-823-1590
                                            http://www.counterpane.com






From reply664 at yahoo.com  Mon Jun 15 07:19:38 1998
From: reply664 at yahoo.com (reply664 at yahoo.com)
Date: Mon, 15 Jun 1998 07:19:38 -0700 (PDT)
Subject: FREE PHONESEX (664)410-4332
Message-ID: <199806151420.KAA15493@unix.asb.com>


Dear Sir/Madam:

Due to our 1 year aniversary,  we are giving you a FREE treat!
For the next month you can call the number below and have FREE PHONESEX!
The first two hours of any of your calls in the next month will be

***** ABSOLUTELY FREE!!  NO QUESTIONS ASKED! *****

so pick up the phone and call (664)410-4332 NOW!

our girls are hot, young, blond, horny and want to play with you NOW!

CALL  (664)410-4332 NOW!!






From mscompia at microsoft.com  Mon Jun 15 11:18:21 1998
From: mscompia at microsoft.com (mscompia at microsoft.com)
Date: Mon, 15 Jun 1998 11:18:21 -0700 (PDT)
Subject: Information From The Microsoft Personal Information Center
Message-ID: <023bf4617180f68UPIMSSMTPSYS08@msn.com>


Here is your password you requested from the Microsoft Personal Information Center at http://register.microsoft.com/regwiz/personalinfo.asp.

Password: writecode

If you continue to have access problems or want to report other issues, please contact us through the Write Us button at the top of any Microsoft page.






From StanSqncrs at aol.com  Mon Jun 15 15:31:43 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Mon, 15 Jun 1998 15:31:43 -0700 (PDT)
Subject: Response to Anon.
Message-ID: 


Nobody writes - << Hi Stan - 
I think your link you referenced above is incorrect (but I found it anyway).  
You might want to try using 
http://members.aol.com/whtsametau/camel instead.

Thanks for posting the link, but you have raised some questions.  During an 
interview with Gilmour/Waters, they said that the album "The Wall" was about a
"wall of reality" between the band and Pink Floyd's fans (these are their 
words EXACTLY). >>

Obviously, because of your next obvservation, I find this to be incredible.


<< I find it interesting that you also emulate a "Wall Of 
Reality" and use Pink Floyd's music to back it up.  You seem to be giving 
mixed signals - in Pink Floyd's case, a "Wall Of Reality" would be a BAD 
thing.  I wasn't sure what message you were trying to get out. >>

Also - <<  Also, wasn't the whole point of Pink Floyd's The Wall to 
"tear down the wall"?  You are sending some conflicting 
messages.  You might want to re-think your strategy. >>


My big mistake there, was to allow supposed Floyd sites on.  I've been
thinking about that very thing and will be making changes to that ring (or
I'll be destroying it).  I appreciate your constructive criticism, thanks!
Remember, I created that wall before I knew about the I. R. S..  I also have
many changes that need to be done to What's A Meta U (and What's It 2 U?),
they'll have to wait a little longer as well, I now have a more important
page.

Stan 





From afriend at plato.qi3.com  Tue Jun 16 03:01:31 1998
From: afriend at plato.qi3.com (afriend at plato.qi3.com)
Date: Tue, 16 Jun 1998 03:01:31 -0700 (PDT)
Subject: hello
Message-ID: <219806133963VAA14895@hotmail.com>



SAY GOOD-BYE TO AOL TIMERS AND ELIMINATE YOUR FRUSTRATION FOREVER!! 
  Are you tired of the "AOL Timers" interrupting your time on the internet? Are
  you looking for something to solve this problem? HOW MANY TIMES HAVE YOU:
  Stepped out of the room to go to the bathroom to find out you have been kicked off AOL.
  Then you have a hard time getting back on!! Or, you were downloading a file and AOL kicks
  you offline. Then it takes forever to do it all over again!! This "SOFTWARE PROGRAM"
  dismisses the "idle" and 46-minute "stayonline" messages that AOL uses to annoy the hell out
  of its members. Once you install the software, you do nothing but enjoy being on AOL.
  Before I had this program installed, I had to reboot when this happened. It is a small memory
  resident program (actual disk size is 119KB - IBM Compatible only). The timer hits the
     buttons automatically when they come up. THIS "SOFTWARE PROGRAM" WILL BE
     EMAILED AS SOON AS WE RECEIVE YOUR ORDER (Not for MAC Users). 

     HOW TO ORDER YOUR TIMER 
     This program sells for $5. Send a check, money order, or cash to: Aaron McKay
     21111 hwy 140 E. Dairy OR, 97625
     Name:_______________________________________________________________________________________________
     Street Address:__________________________________________
     City:_____________________________________________State:__________
     ZipCode:____________ Area Code & Phone:__________________________
     EMAIL:___________________________









From rah at shipwright.com  Tue Jun 16 08:21:51 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Tue, 16 Jun 1998 08:21:51 -0700 (PDT)
Subject: icomputing: "Naive Realism"
Message-ID: 




"Cryptoanarchist" makes it to the printed word.  Can an OED entry be far
behind? :-).

Of course, it dawns on me that she might mean "cryptoanarchist", below, in
the same way that Vidal called Buckley a "cryptofascist"...

Cheers,
Bob Hettinga

"Web doyenne?"

----------

http://www.zdnet.com/icom/content/columns/1998/05/techno.realists/index.html
[Image]
  [ZDNet]               [Click here for Microsoft Daily News.]
                                        [Image]

                             [Try out ZD Internet Magazine]

                                                                   [
                                                           Commentaries
                                                           ]

                                                           May
                                                           11,
                                                           1998

                                                           Naive
                                                           Realism:
                                                           Taking
                                                           on
                                                           the
                                                           Technorealists

                                                           Practical
                                                           development
                                                           of
                                                           the
Internet comes from doing
practical things.

By Angela Gunn

The technorealist manifesto,
in case you missed it, is a
pompous version of the "Why
The Internet Isn't Evil"
speech you give to your mom's
bridge club.

Unleashed back in March, the
"manifesto" was authored by many people who just a year or two ago were
blathering about the world-changing, paradigm-shifting, cryptoanarchist Net,
scaring your mom's bridge club so thoroughly that, well, they asked you if
the Internet was evil.

Drop by the technorealism site and read this document. Sign it if you like.
Just don't expect it to make any difference to you or yours.

The manifesto is a simplistic summation of points most of us inside the
industry already know from years of experience, thought, and online
discussion. And for those outside the industry, it's all but
incomprehensible.

The whole thing stinks of college-student libertarianism, except for the
part about government having an important role to play on the electronic
frontier (a point that galled several actual Libertarians and college
students, as evidenced by their parody sites).

And it's frivolous. Development of the Internet as a practical entity comes
from the doing of practical things with the Internet. The programmer
laboring to improve customer access to a tech-support database, the site
producer working to streamline her site's design, the people who gave us
online ticket ordering and package tracking and hotel reservations--these
are the people who will convince the rest of the world that the Net is
worthwhile and important.

And in the battle to shape the Net, the genuine visionaries, theorists, and
even the political analysts have already taken the field. By assuming the
mantle of public debate, the too-fabulous New Media in-crowd behind the
manifesto has done a disservice to those of us in for the long haul.

Put another way, this fashionable cyber-asceticism is bad news to those
actually involved with technology--condescending in assuming that those in
the trenches can't understand the ramifications of what they do, oblivious
in assuming that there's anything fresh in the manifesto, and irresponsible
in not crafting a document that provides a genuine foundation for
discussion; that is, a real manifesto.

And that's what is really galling: they blew a good opportunity. This vague,
random document doesn't lay groundwork for discussing the real social issues
confronting technologists, creators, consumers, and citizens.

The real battle--to bring the Net to its rightful, humble, ubiquitous place
in the world's social, political, and economic life--has little to do with
manifesto pronouncements such as "We are technology 'critics' in the same
way, and for the same reasons, that others are food critics, art critics, or
literary critics."

The public is best brought onto the battlefield by careful, informed,
comprehensible discourse; these "critics" haven't even drawn up a readable
map of the countryside.

Don't let this single-mast ship of fools sail away with the discussion. They
have no authority (intellectual, moral, or otherwise) to dictate the terms
of debate, especially since their manifesto makes such a mess of it. That
debate belongs to you and me and the rest of the industry--and your mom's
bridge club--at least as much as it does to these
Siskel-and-Ebert-come-latelies.

But don't forget: when you're done amusing yourself with the technorealists'
down-the-middle drive for pundit spots in Harper's, The Nation, and the Utne
Reader, you've got a lot of work to do to build the real Internet.

Web doyenne Angela Gunn has been covering the Internet and its culture for
nine years. Send e-mail to agunn at zd.com.

Send us your questions and comments about the Internet Computing MegaSite.

                 [Navigate the Internet Computing MegaSite]

                                   [Image]
-----------------
Robert A. Hettinga
Philodox Financial Technology Evangelism
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Philodox: , e$: 
               






From telco at telco.it  Tue Jun 16 15:41:41 1998
From: telco at telco.it (Telco Telefonia)
Date: Tue, 16 Jun 1998 15:41:41 -0700 (PDT)
Subject: Telephone security - Greetings from Italy
Message-ID: <001101bd9948$f32316a0$ede53ec3@mauro>


Hi.
We are looking for resellers, visit us.
This is a message of promotion and information; you belong to a list whose
adherent we think to have interested in the telephone security and the
telephone market.
Best regards
Dario MARLIA - President  TELCO Telefonia
dmarlia at telco.it

Home page : http://www.telco.it
Home page Security Telephone Products: http://www.telco.it/security
Home page Telephone Equipments: http://www.telco.it/telephony
Home page Computer Telephone Integration (CTI): http://www.telco.it/computer
Home page Italian Decorator Phones: http://www.telco.it/telephones

To let be canceled by the list it is simple, is enough to re-send (forward)
this message to: deleteme at telco.it

*********************************************
company:        TELCO Telefonia srl
address:          via dei Metalmeccanici, 53
city:                CAPEZZANO Camaiore/Lucca
country:          ITALY
zip:                 55040-i
Tel:                +39(0)584 969608 - 969654 - 969621
Fax :              +39(0)584 969637 - 969672
e-mail:            telco at telco.it
visit us at        http://www.telco.it
*********************************************






From Mshall at aol.com  Tue Jun 16 18:44:03 1998
From: Mshall at aol.com (Mshall at aol.com)
Date: Tue, 16 Jun 1998 18:44:03 -0700 (PDT)
Subject: gjhyjfg
Message-ID: <11ce60ed.35873618@aol.com>


ghjkgjfj





From ATU5713 at compuserve.com  Wed Jun 17 04:35:58 1998
From: ATU5713 at compuserve.com (Alan Tu)
Date: Wed, 17 Jun 1998 04:35:58 -0700 (PDT)
Subject: Please update this
Message-ID: <199806170913_MC2-407F-35CC@compuserve.com>


Hi all,

First of all, since I am not subscribed to the list, please reply to my
address atu5713 at compuserve.com

You know, there is a program written in the Euphoria programming language
that helps in chaining remailers.  It also works with PGP.  Before I try
it, however, I want to know if the remailers in the .ini file are still
operating.  Would someone please tell me if the following remailers are
still operating.  * means that the remailer supports encryption by pgp.

        hh at pmantis.berkeley.edu
        hh at cicada.berkeley.edu
        hh at soda.berkeley.edu
        nowhere at bsu-cs.bsu.edu
        remail at tamsun.tamu.edu
        remail at tamaix.tamu.edu
*       ebrandt at jarthur.claremont.edu
*       hal at alumni.caltech.edu
*       remailer at rebma.mn.org
*       elee7h5 at rosebud.ee.uh.edu
*       phantom at mead.u.washington.edu
*       hfinney at shell.portal.com
*       remailer at utter.dis.org
        00x at uclink.berkeley.edu
*       remail at extropia.wimsey.com

thanks in advance.

--Alan
 





From fay16 at msn.com  Wed Jun 17 06:07:49 1998
From: fay16 at msn.com (free)
Date: Wed, 17 Jun 1998 06:07:49 -0700 (PDT)
Subject: FREE TRIAL MEMBERSHIP
Message-ID: <19980617525OAA44566@post.nwnet.co.uk>


THE LATEST IN ADULT TECHNOLOGY!!!

BRAND NEW XXX ADULT SITE

FREE TRIAL MEMBERSHIP

Please visit the latest in Live Video Conferencing.
1000 channels of hardcore!! Live rooms!!! Young dancers!!!
Large picture gallery! Thousands of pictures!! Come and visit our site for
a great experience.

http://206.165.153.5/best/zx2/index.html
****************************************
****************************************





From ATU5713 at compuserve.com  Wed Jun 17 07:06:06 1998
From: ATU5713 at compuserve.com (Alan Tu)
Date: Wed, 17 Jun 1998 07:06:06 -0700 (PDT)
Subject: Invalid reference
Message-ID: <199806171143_MC2-407E-7D24@compuserve.com>


The chain program I referred to earlier is not, repeat not, as far as I
know, written in Euphoria.  I don't know what led me to think that.

--Alan
  





From jdobruck at kki.net.pl  Wed Jun 17 08:10:25 1998
From: jdobruck at kki.net.pl (Jan)
Date: Wed, 17 Jun 1998 08:10:25 -0700 (PDT)
Subject: Crypto Books/Archive
Message-ID: <3587F42C.53275B32@kki.net.pl>


Greetings,

I wish to inquire where I can buy books about cryptography. If these
bookstores are located somewhere in Europe then it would be a little
more convenient for me, if not, then that's not too much of a problem.
Thanks in advance.

I'm working on my archive, although the reason why there hasn't been
anything new for a while is because I'm doing preparation courses in
math and physics for the Warsaw University of Technology. However,
I'll have something new on there soon. The reason why there isn't
anything great at the moment is because I'm a lousy worker, so I can't
be rushed.

I have this idea bout making a cryptography program that will encrypt
pictures. I know that you can do this with PGP, but I mean it in a
little different way. What I want to do is this: You have opened a
picture in, ACDSee for example, and you want some of the picture only
for a certain person. So you chose that part of the picture, encrypt
it, and send it to the person you want. What do you guys think?

Sincerely yours,
Jan





From www at dejanews.com  Wed Jun 17 09:41:21 1998
From: www at dejanews.com (www at dejanews.com)
Date: Wed, 17 Jun 1998 09:41:21 -0700 (PDT)
Subject: Deja News Registration Confirmation
Message-ID: <199806171819.NAA00836@x7.dejanews.com>



Welcome to My Deja News!

You have registered for My Deja News using the email address:
cypherpunks at toad.com. If you did not register for My Deja News, 
please ignore this message.

To enable you to post messages on Deja News, we must confirm 
your email address. This allows us to minimize "spam" and other
problems. To confirm your email address, visit the following Web
page:

http://www.dejanews.com/ec.xp/Zf6ae0a36706f3c065455878ce0a7f9a65e952de

If your email software supports it, you can simply click on the
link. Since this Web page address (URL) is quite lengthy, however,
you may find it necessary to copy the entire URL and paste it into
your Web browser.

As a reminder, your username is jahminh and your password 
is tonite.  You may wish to keep this email to refer to in 
case you forget.

If you have any questions about My Deja News, please refer to the
Help page at http://www.dejanews.com/help/help_regstr.shtml

Thanks,
Deja News






From storm at uit.net  Wed Jun 17 09:52:05 1998
From: storm at uit.net (Jason)
Date: Wed, 17 Jun 1998 09:52:05 -0700 (PDT)
Subject: Crypto Books/Archive
Message-ID: <006101bd9a1d$29071120$a460a0d1@jason.kc1.net>


> I have this idea bout making a cryptography program that will encrypt
> pictures. I know that you can do this with PGP, but I mean it in a
> little different way. What I want to do is this: You have opened a
> picture in, ACDSee for example, and you want some of the picture only
> for a certain person. So you chose that part of the picture, encrypt
> it, and send it to the person you want. What do you guys think?

Jan,


 I can't say that I full understand what you're doing, or maybe I just don't
see why you're doing it. If you mean that you want to take part of a picture
and encrypt it and send it to someone, couldn't you just crop the desired
section of the image out and save it as a different file, then encrypt it
via PGP, etc. I don't see how encrypting part of a picture is any different
than, say.. cutting part of a text file out and saving it to another file
and encrypting that portion of it. That isn't to say that if you had some
new form of encryption that it wouldn't be worth exploring, only that I tend
to question the originality or usefulness (relative to current, widely
available crypto technology) of your concept. Maybe you could explain it in
more detail to us.

...Jason Sloderbeck
stom at uit.net
Plasmic Computer Systems








From jdobruck at kki.net.pl  Wed Jun 17 13:55:17 1998
From: jdobruck at kki.net.pl (Jan)
Date: Wed, 17 Jun 1998 13:55:17 -0700 (PDT)
Subject: Cypherpunk on IRC
Message-ID: <35882DF4.18A9D0C6@kki.net.pl>


Greetings...

So where are you people on IRC? it would be nice to talk more directly
bout crypto ideas....

Jan





From haxor_401 at juno.com  Wed Jun 17 13:57:41 1998
From: haxor_401 at juno.com (OoOoOoO OoOoOoO)
Date: Wed, 17 Jun 1998 13:57:41 -0700 (PDT)
Subject: No Subject
Message-ID: <19980617.165512.6918.1.HaXoR_401@juno.com>


What is the command to recieve this list in DIGEST form.?

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]





From jdobruck at kki.net.pl  Wed Jun 17 15:09:06 1998
From: jdobruck at kki.net.pl (Jan)
Date: Wed, 17 Jun 1998 15:09:06 -0700 (PDT)
Subject: Crypto Books/Archive
In-Reply-To: <006101bd9a1d$29071120$a460a0d1@jason.kc1.net>
Message-ID: <35883F39.954C5B5D@kki.net.pl>


Jason wrote:
> 
> > I have this idea bout making a cryptography program that will encrypt
> > pictures. I know that you can do this with PGP, but I mean it in a
> > little different way. What I want to do is this: You have opened a
> > picture in, ACDSee for example, and you want some of the picture only
> > for a certain person. So you chose that part of the picture, encrypt
> > it, and send it to the person you want. What do you guys think?
> 
> Jan,

Greetings,
 
>  I can't say that I full understand what you're doing, or maybe I just don't
> see why you're doing it. If you mean that you want to take part of a picture
> and encrypt it and send it to someone, couldn't you just crop the desired
> section of the image out and save it as a different file, then encrypt it
> via PGP, etc. I don't see how encrypting part of a picture is any different
> than, say.. cutting part of a text file out and saving it to another file
> and encrypting that portion of it. That isn't to say that if you had some
> new form of encryption that it wouldn't be worth exploring, only that I tend
> to question the originality or usefulness (relative to current, widely
> available crypto technology) of your concept. Maybe you could explain it in
> more detail to us.
> 
> ...Jason Sloderbeck
> stom at uit.net
> Plasmic Computer Systems

The idea is like with the plug-in for Pegasus Mail. You don't need to
go to PGP encrypt the message and then send it. You can do that right
through the Pegasus Mail. Same idea with my program. Would make it a
little faster instead of encrypting your piece of picture in many
steps you can do it with one push of a button.

Another thing. You're right. You can cut the piece of picture you want
to encrypt and then encrypt that little piece. But if you want to send
the whole image, and make that little piece invisible to everyone else
but the sender... this is what I'm getting at. If someone still
doesn't understand, I'll try again later.

Sincerely yours,
Jan





From StanSqncrs at aol.com  Wed Jun 17 17:51:34 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Wed, 17 Jun 1998 17:51:34 -0700 (PDT)
Subject: One last time
Message-ID: <9be137bf.3588643d@aol.com>


Sorry about buggin' you guys so much on this, but I think I have a final piece
of the puzzle together.  It's amazing how well all the pieces fit.  I think
now the big task is to keep it on-line (and promotion - spread the word!).

If you weren't convinced before, this should do it.  Check it out again,

Stan,

http://members.aol.com/whtsametau/camel/index.htm






From lreed at west.cscwc.pima.edu  Wed Jun 17 20:31:50 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Wed, 17 Jun 1998 20:31:50 -0700 (PDT)
Subject: SweatHog Log -- SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C7DB7.A54F7F00.23@west.cscwc.pima.edu>


SweatHog Log -- SPACE ALIENS HIDE M DRUGS!!!
---------------------------------------------

[Austin Nutly News--LoneBeerState]IT WAS THE tURKEbASTE
of times, it was the LiverWurst of times...
Bob Wills Beer and Lone Star Music. Captain BeefJerky and
the Lost Bozo Band opening for Jerry Jeff Garcia and the
DreadFul Drunks at the Split Lip Saloon. Knocking back
shots of Townsend's Treacherous Treat at Amaretto World
HindQuarters. Mom Nelson declaring C.J. Parker to be her
illegitimately adopted son, making him a half-nelson and
making him live in the basement of the outhouse behind 
Willie's Fool Hall.

A million degrees in the shade and TruthMongrel sitting in
the truck in the parking lot of the HEB Central Market Cafe
while Toto was inside drinking cold beer and asking the
barmaid what type of wine goes with TruckRoasted PuppyDog.
Drinking West Texas ChugWater...


Austin CypherPunks gathered around a couple of tables in 
the beer garden, the BigRedBook unflapping in the breeze
and serving as a standard to rally together a handful of
anarchist frontiers(wo)men to prepare to stand as the lone
outpost against the mighty Digital Army of Santa AnnaChrist
in his War Against The Digitally United States of Terra.
JimBob Choate drawing a line in the sand...
Most of the CypherPunks crossed that line--the bar was on
the other side of it--but they came back.

A strange, deranged desperado appearing out of nowhere to
announce that someone had nuked DC, and he wanted to ask
them a few questions, then sitting down and babbling in a
nonsensical manner in order to distract their attention 
while he played footsie with the blonde sitting across from
him, until she finally left, in disgust.
WeBeastMaster JimBob waiting until only the StewedGuy and
the Disparate Stranger were left before passing along the
SecretMessageThatHadNoMeaning from Declan McCullagh. The
Dissipating Strangler fading into the mist with a bottle
of red wine tucked under his arm.

Lieutenant JimBob Choate, Army of Dog-Digital Division &
MeatSpace Multiplication, feeling a shiver go down his spine
as he walked slowly to his vehicle, heard a TruthMongrel
howling in the distance, and realized that 'red wine' goes
with TruckRoasted PuppyDog.]


  MenInTheShadows unable to find the second VirtualNuclear
Device claimed to have been planted in a pubic building
eleven KILLometers from MongerItaVille--wondering if their
first mistake hadn't been to threaten a six-year old child
and his mother with deportation from Canada if they continued
to involve themselves in the battle for Medicare in Saskatchewan.
  For almost a half-century thereafter, the child had been a
thorn in their side, seemingly breaking every rule in the book,
violating everything that anal-retentive WhiteCanadianImmigrants
held sacred as they strove to promote the Rule of (White)Law
in the Great White Snort. Despite their many failed attempts
to imprison him, ususally succeeding only in harrassing him
and causing him great personal loss and expense, they had never
before had to fear for their own lives and the safety of their
families, but now all that had changed...

  An elite, secretive cabal of Mounties gathered around a table
reviewing the security implications of a hidden file being found
on their computer system which had the same name as the file
on the floppy disk left at the site of the first VirtualNuclear
Device found in a public building eleven KILLometers from
MongerItaVille.
  Silence in the room as each of them heard, in their own mind,
the screams of the Author as they resounded through the Analogue
Reality of his home in Bienfait, through the Digital Reality of
MongerItaVille, and through the MeatSpace DigiZeros on a dozen
or more Canadian Government computer systems.
  "OU WANT TO FUCK WITH *CHILDREN*? OU WANT TO STEAL M NEPHEWS'
COMPUTERS? OU WANT TO FILE FALSE CHARGES ON M NEIGHBOR'S FUTURE
LITTLE GLUE-SNIFFER, OU NAZI RATFUCKERS?
  "THE *MEATSPACE* REVOLUTION IS *NOW*!!!!"


  The Author may be bluffing, of course, but could they really 
afford to take that chance?
  HeOrShe had offered them "pole position" on receiving the key
that the BackDoor Boogie (TM) was being played in to provide a
soundtrack to the RCMP Musical Ride taking place on Trojan Horses
ridden by DigitalAnarchists throughout Canadian Government computer
systems.

  The offer was simple enough...return all of the stolen computers
to the possession of Human Gus-Peter and the RCMP would get the
checkered flag in the race against finding their digital security
breach...if there, in fact, *was* one...
  The 'clues' of its existence were rather vague, though startling,
and they could conceivably be the result of collusion on a part of
the Author's widespread Inner Circle, which undoubtedly included
more than a few people with access to secure Canadian Government
computer systems.
  Of course, the phrase 'pole position' implied that there were
others in the race who the Author could bless with the checkered
flag if they were the first to provide Human Gus-Peter with a
state-of-the-art portable multi-media computer such as the one
that had been stolen from the Author, but the Mounties were
reluctant to suffer the loss of face that would be involved in
rectifying the consequences of their own illegal and heavy-handed
acts of oppression and repression.

  The Mounties knew that they were, to a certain extent, vulnerable,
having actively promoted the persecution of a mentally unstable
individual at a time when his medications were running low, in the
hope that he would explode in a manner that would cause him to
perform actions which he could be legally held accountable for.
It wouldn't look good, however, if it came out that the Mounties
themselves were taking the precaution of wearing bullet-proof vests
for their own protection during their attempts to provoke the
Author to actions of raging insanity, while leaving the children of
the community vulnerable to the MeatSpace actions of a violent
psychotic currently writing the "Bienfait Nutly News 'KILL THE
CHILDREN' Special."


  The RCMP had failed to intercept the computer disks and audio
tapes that the Author had mailed to Declan McCullagh from Montana,
but the Netly News journalist had not yet received them, so it
seemed that *someone* had intercepted them.
  Every indication was that there was only a single copy of the
material the Author had stashed south of the 49th parallel just
before his computers were confiscated, but there was no telling,
for sure. Besides, the Mounties had confiscated the voice-activated
tape recorder they found on their last illegal entry to his home,
and the audio tapes he had could conceivably be of one of the
American intelligence agents monitoring his residence, such as
the retired Air Force Intelligence officer who had become rather
friendly with him at the CoalDust Saloon.]
  It was a shame that the Author had found and destroyed the
'evidence' they had planted in his truck shortly before he 
skipped the country, but the 'evidence' they had 'found' after
his departure would suffice. The reference to the *second*
VirtualNuclearDevice was troubling, however, since its existence,
if real, could result in the whole operation blowing up in their
face.

  Nonetheless, the Mounties considered it better to lose a few
citizens, or even a whole town, than to lose face, and the
Author's modus operandi was to provide fair warning before the
date and time of his nefarious activities, so the Mounties were
confident that they could follow in the footsteps of the BATF and
arrange to be conveniently gone when the shit hit the fan.

  Then they would have that ShitDisturbingMonster dead to rights...








From jdobruck at kki.net.pl  Thu Jun 18 04:13:09 1998
From: jdobruck at kki.net.pl (Jan)
Date: Thu, 18 Jun 1998 04:13:09 -0700 (PDT)
Subject: Cypherpunks/IRC
Message-ID: <3588F701.46627B60@kki.net.pl>


Greetings,

I go to #cypherpunks and it says that I create the room. Where the
heck is the room?

Jan





From gowry at IBS-GmbH.net  Thu Jun 18 05:19:32 1998
From: gowry at IBS-GmbH.net (Gowrynath Sivaganeshamoorthy)
Date: Thu, 18 Jun 1998 05:19:32 -0700 (PDT)
Subject: Cypherpunks/IRC
In-Reply-To: <3588F701.46627B60@kki.net.pl>
Message-ID: <19980618141915.A13879@stadtleben.de>


Du - Jan - hast am Thu, Jun 18, 1998 at 01:16:17PM +0200 folgendes zum Thema "Cypherpunks/IRC" geschrieben:
| Greetings,
| 
| I go to #cypherpunks and it says that I create the room. Where the
| heck is the room?
| 
| Jan

I think you need to say which net. IRCnen, DALnet, EFnet, UNDERnet ?

bye,

Gowry

-- 
	=>Gowrynath Sivaganeshamoorthy     		      Administration <
	=>IBS GmbH Hamburg		   	      	Ph: +49 40 668649 11 <
	=>Friedrich-Ebert-Damm 202a	  	      	Fx: +49 40 668649 49 <
	=>22047 Hamburg / Germany	       Ripe: IZAX / InterNic: GS6450 <
	=>Key fingerprint = E3 E2 28 FA A5 03 87 95  A2 6F EE 00 9F BB CE 21 <





From video at streetparty.org  Thu Jun 18 05:48:42 1998
From: video at streetparty.org (video at streetparty.org)
Date: Thu, 18 Jun 1998 05:48:42 -0700 (PDT)
Subject: Win this video!
Message-ID: <199806181228.IAA14928@ncc.uky.edu>


Video from
STREET PARTY '98 - UK WILDCAT STYLE
http://www.angelfire.com/biz/web201c5/index.html






From martybishop at yahoo.com  Thu Jun 18 05:52:03 1998
From: martybishop at yahoo.com (Martin Bishop)
Date: Thu, 18 Jun 1998 05:52:03 -0700 (PDT)
Subject: TheCodex's D.I.R.T. surveillance software
Message-ID: <19980618125041.28878.rocketmail@send1a.yahoomail.com>


I have come across a webpage at

http://www.thecodex.com/dirt.html

that describes a so-called D.I.R.T. (Data Interception by Remote
Transmission) software enabling the attacker (be it a criminal or
police or govt.) to remotely keep a close eye on everything that't
going on on the target PC. I can pretty much imagine how it works once
it's installed but what I'd like to know is *how* it gets installed on
the target computer?
I would also appreciate any info about the product from people with
first hand experience, since I intend to do an in-depth research for
one of the European Governments.

Thanks in advance!

Rgds,

Martin Bishop




_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com






From jya at pipeline.com  Thu Jun 18 05:52:22 1998
From: jya at pipeline.com (John Young)
Date: Thu, 18 Jun 1998 05:52:22 -0700 (PDT)
Subject: Senators Challenge Crypto Policy
Message-ID: <199806181252.IAA06378@camel14.mindspring.com>


[Congressional Record: June 17, 1998 (Senate)]

                               ENCRYPTION

  Mr. LOTT. Mr. President, I rise today out of concern for our nation's
computer and electronic industries. As you are well aware, the
Administration's

[[Page S6438]]

export policies prohibit American companies from selling state-of-the-
art encryption technology abroad without recovery keys and back door
access. Encryption is a series of mathematical formulas that scramble
and unscramble data and communications. It is used to thwart computer
hackers, industrial and foreign espionage agents, and criminals from
gaining access to and reading sensitive personal, business, and
military communications. The higher the bit-key length, the more
difficult it is for unauthorized persons to break the code. Technically
advanced encryption ensures that an individual's medical, financial,
business, personal records and electronic-mail cannot be accessed
without their consent. The Administration is now promoting the
deployment of recovery keys so designated third parties would be able
to access and share with law enforcement the computer data and
communications of American citizens without their knowledge. Currently,
government mandated key escrow is not required and is opposed by the
computer industry, privacy advocates, legal scholars, and by many
members of Congress.

  Mr. LEAHY. While current law does not mandate any key recovery, the
current Administration, just as past Administrations, uses the export
control regime to ``dumb down'' the encryption available for widespread
integration into high-tech products intended for both domestic use and
for export to foreign customers. Export regulations in place now are
being used expressly to coerce the development and use of encryption
products capable of giving law enforcement surreptitious access to
plaintext by conditioning the export of 56-bit DES encryption on
development of key recovery features.

  These regulations are scheduled to sunset in December 1998, at which
time export of even 56-bit strength encryption will no longer be
permitted. I understand that the Administration is already undertaking
discussions with industry on what will happen upon sunset of these
regulations. I have long contended that taking unilateral steps will
not resolve this issue, but instead could delay building the consensus
we so urgently need. This issue simply cannot by resolved by Executive
fiat.

  Mr. ASHCROFT. Mr. President, I have been involved in the debate
regarding encryption technology and privacy for more than three years
now. In the course of that time I have not seen any real attempt by the
White House to resolve this problem. In fact, over the course of that
time the Administration has moved further from negotiation by taking
increasingly extreme positions on this critical national issue.

  Mr. CRAIG. Mr. President, as you have heard, current U.S. policy
allows only encryption below the 56-bit key length to be sold abroad.
For a long time now, software companies have argued that this level of
encryption is so low it provides little security for the information
being transmitted over the ``super highway.'' This policy also states
that, in the production of encryption stronger than 56-bit, software
companies must provide some type of ``backdoor'' access to ensure law
enforcement can decode encrypted material.

  Addressing this from an economic perspective, customers--especially
foreign customers--are unwilling to purchase American encryption
products with backdoors and third-party access. This is particularly
true since they can buy stronger encryption overseas from either
foreign-owned companies or American owned companies on foreign soil
without these invasive features.

  Mr. WYDEN. Since coming to the Senate, I have worked side-by-side
with Senators Burns, Ashcroft, Leahy and others on the critical issue
of encryption. Our common goal has been to craft a policy that puts the

United States squarely out front of the crypto-curve, rather than locks
us permanently behind it. A one-size-fits-all government policy simply
won't work in this digital era. We all recognize and acknowledge the
legitimate needs of law enforcement and the national security
communities, but tying the hands of America's high technology industry
in the process will serve neither those needs, nor the national
interest in maintaining our competitive edge in the fiercely
competitive global marketplace. It's time to move forward with
comprehensive encryption reform legislation.

  Mr. BURNS. I would like to point out that the government's plan for
encryption--whether they call it ``key escrow'' or ``key recovery'' or
``plaintext access''--simply won't work. Eleven of the world's most
prominent computer security experts have told us government mandated
key recovery won't work because it won't be secure, as explained in a
study published this week by the Center for Democracy and Technology.
Key escrow also won't work because it will cost billions, as revealed
in a recent study published by the Business Software Alliance. We have
also been told that the kind of system the Administration wants is not
technically feasible. Additionally, constitutional scholars testified
that government mandated key escrow, third party recovery probably
violates the Bill of Rights.

  Mr. LOTT. Even though a national recovery system would be technically
unfeasible, costly, and violates an individual's privacy rights, the
Administration continues to require key escrow as a precondition for
relaxing America's encryption policy. Again, Mr. President, I would
point out that state-of-the-art encryption is available in the
international marketplace without key recovery and without backdoor
access. This backdoor door requirement is simply backward thinking
policy. It does not make sense to hold the computer industry hostage to
force the creation of such an unworkable system.

  Mr. BURNS. The Majority Leader is absolutely right. We do not need
experts to tell us key recovery will not work. All that is needed is a
little common sense to understand that no one will buy systems with
backdoor access. Criminals will not escrow their keys and terrorists
will find keyless systems from America's foreign competitors. There is
nothing we can do to stop undesirables from using strong, unescrowed
encryption.

  Mr. LOTT. Even though advanced encryption products are widely
available across the globe, the White House continues to stall
Congressional and industry attempts to reach a sensible market oriented
solution to the nation's outdated encryption export regime. This
stonewalling tactic will only cede even more of our nation's technology
market to foreign competitors and America will lose forever its ability
to sell encryption technology at home and abroad.

  It is time to change America's export policy before it is too late.
If the Administration will not do what is right, reform its export
regime, then Congress must enact encryption reform during this session.

  Mr. LEAHY. The Majority Leader is correct that reform of our
encryption policy is needed. The Attorney General came to the Hill in
March and asked for a legislative moratorium on encryption matters.
This request was made because the Administration wanted to talk with
the information technology industry about developing means for law
enforcement to gain surreptitious access to plaintext scrambled by
strong encryption. According to eleven of the world's leading
cryptographers in a report reissued on June 8, the technical risks and
costs of such backdoors ``will exacerbate, not alleviate, the potential
for crime and information terrorism'' for America's computer users and
our critical infrastructures.

  In the Senate we have a name for debate that delays action on
legislative matters. We call it a filibuster. On encryption policy, the
Administration has been willing to talk, but not to forge a real

solution. That amounts to a filibuster. The longer we go without a
sensible policy, the more jobs will be lost, the more we risk eroding
our privacy rights on the Internet, and the more we leave our critical
infrastructures vulnerable.

  Mr. BURNS. We can readily see that the current U.S. policy on
encryption jeopardizes the privacy of individuals, the security of the
Internet, and the competitiveness of U.S. industry. We have been
debating this issue since the Administration's introduction of the ill-
fated Clipper chip proposal over five years ago. Yet no substantial
change in Administration policy has taken place. It is time for us to
take action.

  I first introduced comprehensive encryption reform legislation in the

[[Page S6439]]

form of the Pro-CODE bill over two years ago, then reintroduced it in
this Congress with the cosponsorship of the Majority Leader, Senators
Ashcroft, Leahy, Wyden, and others. Along with Senators Ashcroft,
Leahy, and others, I am also an original cosponsor of the E-PRIVACY
bill, which would foster the use of strong encryption and global
competitiveness. We have held numerous hearings on the issue. Yet
despite the increasingly desperate drumbeat of criticism from industry,
individuals, and privacy groups, from across the political spectrum,
the Administration's policy has remained fundamentally unchanged.

  Mr. LEAHY. Since the hearing I chaired in May 1994 on the
Administration's ``Clipper Chip'' proposal, the Administration has
taken some steps in the right direction. Clipper Chip is now dead, and
the Administration has transferred authority over the export of
encryption products from the State Department to the Commerce
Department, as called for in legislation I introduced in the last
Congress with Senators Burns, Wyden and others. Furthermore, the
Administration has permitted the export of up to 56-bit DES encryption,
at least until the end of this year. But these actions are simply not
enough for our high-tech industries to maintain their leading edge in
the global marketplace.

  Mr. ASHCROFT. Our technology companies need to be able to compete
effectively. Without reasonable export laws our technology sector will
be seriously harmed. More encryption companies will leave the country
so they are free to sell their products around the globe as well as
within the United States. Make no mistake, the market will not be
denied. Today, robust encryption products from Canada, Japan, Germany
and elsewhere are being sold on the world market. You have heard of the
companies that are manufacturing and selling encryption. They are
Nortel, Nippon and Seimens. These are not upstart companies. They are
substantial players on the international scene, and they offer
encryption products that are technically and financially competitive
with those produced in the U.S.

  Mr. LOTT. That's right. In fact, a recent survey conducted by Trusted
Information Systems found that hundreds of foreign companies sell over
600 encryption products from 29 countries. It is even possible to
download some of the strongest technology available, 128-bit key length
encryption, off of the Internet. Clearly, America's policy of
restricting the sale of American encryption software and hardware has
not impacted the availability and use of this technology throughout the
globe.

  No one disputes the fact that the development and use of robust
encryption worldwide will continue with or without U.S. business
participation. What is particularly disturbing to me is that export
controls, instead of achieving their intended purpose, have only served
to deny America's premier computer industry the opportunity to compete
on a level playing field with foreign competitors. Costing our economy
and our nation billions of dollars and the loss of countless American
jobs in the process. Given the wide availability of encryption
technology, continuing to restrict U.S. access to foreign markets makes
no sense.

  Mr. ASHCROFT. That is absolutely correct. The Administration's
encryption policy is, in effect, a tax on American consumers. We owe it

to these customers and the innovators in the software industry to
reform this encryption policy now. From the birth of the United States,
this country has been a world leader in innovation, creativity,
entrepreneurship, vision and opportunity. Today all of these American
attributes are on display in our technology sector. Whether in
telecommunications, or computer hardware or software, the United States
has maintained a leadership position because of the opportunities
afforded to people with the vision, determination and responsibility to
reach for their highest and best. We must work diligently to ensure
that ample opportunities are maintained in this country for our
technology sector to continue to thrive and innovate. If companies are
stifled and cannot compete, then the people, the ideas, the jobs, and
the economic growth will simply go elsewhere.

  Mr. BURNS. In the computer business these days, they talk about
``Internet time.'' In the Internet industry, where product life cycles
can be as low as 6 months, the world changes rapidly. Yet we have been
debating this issue for over five years now, while America's sensitive
communications go unsecured, our critical information infrastructures
go unprotected, and our electronic commerce jobs get shipped overseas.
It is time for the Congress to act.

  Mr. ASHCROFT. If this issue is not resolved, and resolved soon, we
will lose this industry, we will lose our leadership position in
technology, and our national security will suffer. We have a choice to
make as policy makers--do we allow our companies to compete
internationally or do we force them, by our antiquated and ill-
conceived government policy, to move overseas. We cannot simply ignore
the reality that robust encryption exists in the international
marketplace now. Instead, we must allow our companies to compete, and
do so now. We cannot allow extraneous issues to stand in the way of
remedying the deficiencies with our current approach to encryption. We
must recognize that keeping the encryption industry on American shores
is the best way to ensure national security. We would not think of
allowing all our defense industries to move abroad. By the same token,
we should not force the encryption industry abroad through outdated
policies. Simply put, strong encryption means a strong economy and a
strong country. This concern is just one of the many reasons we need to
pass effective encryption legislation this year and just one of the
reasons that Senator Leahy and I recently drafted the E-PRIVACY bill,
S. 2067.

  Mr. LEAHY. I join with my colleagues from both sides of the aisle in
calling for passage of good encryption legislation that promotes
computer privacy, fosters the global competitiveness of our high-tech
industries, and encourages the widespread use of strong encryption as
an online crime prevention and anti-terrorism tool. The E-PRIVACY bill
that I have sponsored with Senator Ashcroft, Senator Burns and others,
satisfies these goals. Prompt Senate consideration of encryption
legislation is sorely needed to protect America's economy and security.

  Mr. CRAIG. Mr. President, the E-PRIVACY bill seeks to protect
individual privacy, while at the same time addressing national security
and law enforcement interests. It would also modernize export controls
on commercial encryption products.

  The E-Privacy Act specifically addresses the concerns of law
enforcement. First and foremost, it makes it a crime to intentionally
use encryption to conceal incriminating communications or information.
It also provides that with an official subpoena, existing wiretap
authority can be used to obtain communications decryption keys/
assistance from third parties.

  Mrs. MURRAY. Mr. President, I want to thank Senator Leahy, Senator
Burns and Senator Ashcroft as well as Senator Lott and Senator Daschle
for their work and leadership on the issue of encryption. I am proud to
be an original cosponsor of S. 2067, the E-PRIVACY Act.


  This is my sixth year as a member of the Senate and the sixth year I
have advocated for reasonable legislation on encryption. Sadly, the
Administration has not been a constructive player in this debate. It is
time for the United States to acknowledge that we no longer exclusively
control the pace of technology. Purchasers around the world can
download software off of the Internet from any country by simply
accessing a website. Foreign purchasers have turned to Russian, German,
Swiss and other foreign vendors for their encryption needs.

  Washington state and American companies deserve the opportunity to
compete free from unreasonable government restrictions. Their role in
the international marketplace should be determined by their ingenuity
and creativity rather than an outdated, ineffectual system of export
controls. The time to act is now. I urge the Senate to consider the E-
PRIVACY Act at the earliest opportunity.

  Mr. BURNS. The basic facts remain the same. People need strong,
unescrowed encryption to protect themselves online in the information

[[Page S6440]]

age. Law enforcement has legitimate concerns about the spread of this
technology, and we must work to provide them the tools and expertise
they need to keep up with advances in encryption technology. We cannot
stop time, however. The genie is out of the bottle. As Bill Gates, the
CEO of Microsoft, recently said, ``Encryption technology is widely
available outside the United States and inside the United States, and
that's just a fact of life.''

  Mr. CRAIG. With the rapid expansion of the ``super highway'' and
Internet commerce it is crucial we bring encryption legislation to the
forefront. A secure, private and trusted national and global
information infrastructure is essential to promote citizens' privacy
and economic growth.

  Mr. BURNS. As my colleagues recognize, technically advanced and
unobtrusive encryption is fundamental to ensuring the kind of privacy
Americans will need and desire in the years to come. Congress must
choose a future where individuals and companies will have the tools
they need to protect their privacy, not a future where people fear the
use electronic commerce because they have no security.

  I commend the Majority Leader, Senators Ashcroft, Leahy, Craig,
Wyden, and Murray for their vision and bipartisan leadership on this
issue. I hope that Congress will be able to move forward with real
encryption reform legislation that protects the privacy and security of
Americans in the Information Age, before it is too late.

  Mr. LOTT. I think it is worth repeating to my colleagues that the
Administration's approach to encryption makes no sense. It is not good
policy. Continuing to restrict the foreign sale of American encryption
technology that is already available abroad, or will soon be available,
is anti-business, anti-consumer, anti-jobs, and anti-innovation.

  The time for a change in America's export regime is long overdue.
Unfortunately, the Administration continues to support its outmoded and
competition-adverse encryption control policy. That is why this
Congress needs to find a legislative solution to this issue.

  If America's export controls are not relaxed now, then Congress
places in peril our entire technology industry. Not just those
companies that create and market encryption products and services, but
virtually every company involved in the development and sale of
computer hardware and software. Congress cannot and will not put
America's entire technological base at risk for an ineffective and
outmoded export policy on encryption.

                          ____________________








From jya at pipeline.com  Thu Jun 18 06:20:49 1998
From: jya at pipeline.com (John Young)
Date: Thu, 18 Jun 1998 06:20:49 -0700 (PDT)
Subject: Tim's views on the racial problem in America
In-Reply-To: <199806180256.EAA13151@basement.replay.com>
Message-ID: <199806181320.JAA04879@camel14.mindspring.com>


These bland-info-overloaded days, Blanc:

   The Center of Attention = the Eccentric

You will not be visible, listened to, or read online 
unless you got something deeply offensive to 
say, quote, report, swear to god to, degrading of
self and others, litigable, libellous, insulting, vulgar, 
prohibited by multiple laws, violative of fairness and 
decency, newsworthy, or a well-thought-out alternative 
to sheepledom, Joe Sixdom, PC, MC, Real Identity,
the Tax Code, unequal distribution of wealth, straight
sex, kinky sex, fat, diet, exercise, sloth, grammatical 
rigor, speaking in unknown tongues, numeracy, 
science, art, politics, religion, quantum computing,
nanotech, borderlessness, Y2K, the talk shows,
the amazing future of the Internet.

The center is gone for good, cry a tear, then bravely affirm:
good riddance to Ptolemaic centricity. Normalcy is now para.
Listen to what your teeth are picking up from the spectrum
transmitting to the inner ear bone: the spheres whistling
Dixie in the dark.

Tim's telling what the quarks are whispering.

Tim's an oddball wizard, we're all bank-shot eccentrics, 
no home on earth, we the intergalactic outcasts gumming
the dried teat once unemptiable: faith, self, clan, country,
ideology, bye, bye (white male) American pie.

There's one Rosebud refuge left: the US Senate/Bohemian
Club.






From jdobruck at kki.net.pl  Thu Jun 18 06:44:32 1998
From: jdobruck at kki.net.pl (Jan)
Date: Thu, 18 Jun 1998 06:44:32 -0700 (PDT)
Subject: FLMASK
Message-ID: <35891A89.64D37B5F@kki.net.pl>


Greetings,

This is the address of flmask... if you're intrested.
Side note: In my program I want to use PGP.
http://www.igat.com/flmask/home_e.htm
Sincerely yours,
Jan





From fiy83 at unipa.it  Thu Jun 18 10:51:28 1998
From: fiy83 at unipa.it (fiy83 at unipa.it)
Date: Thu, 18 Jun 1998 10:51:28 -0700 (PDT)
Subject: Check this out, It's worth a look
Message-ID: <199806182489ZAA56214@202.1.230.110>



Wayward Teens

They Can't Keep Their Damn Clothes On!!!

We've Captured It On Film, and We're Giving It Away!

For The Next Two Weeks Only!!!

Come To,   http://209.84.246.106/amateur/

You can also copy and paste the above URL.  



 7





From coy60 at ohrid.cca.vu.nl  Thu Jun 18 11:05:40 1998
From: coy60 at ohrid.cca.vu.nl (coy60 at ohrid.cca.vu.nl)
Date: Thu, 18 Jun 1998 11:05:40 -0700 (PDT)
Subject: Returns You Have Asked For
Message-ID: <199806184210PAA51746@176.61.121.1>


 
America's largest monopoly shattered!!!!!
New growth market 2 1/2 times size of telephone industry 
Now open to general public.
Over 50% returns. IRA approved.
More details and short video presentation here

http://205.134.183.46/fpc/alt.html





o





From hippyman at alltel.net  Thu Jun 18 11:47:30 1998
From: hippyman at alltel.net (hippyman)
Date: Thu, 18 Jun 1998 11:47:30 -0700 (PDT)
Subject: TheCodex's D.I.R.T. surveillance software
Message-ID: <199806181847.NAA29802@client.alltel.net>


At 07:50 AM 6/18/98 , you wrote:
>I have come across a webpage at
>
>http://www.thecodex.com/dirt.html
>
>that describes a so-called D.I.R.T. (Data Interception by Remote
>Transmission) software enabling the attacker (be it a criminal or
>police or govt.) to remotely keep a close eye on everything that't
>going on on the target PC. I can pretty much imagine how it works once
>it's installed but what I'd like to know is *how* it gets installed on
>the target computer?
>I would also appreciate any info about the product from people with
>first hand experience, since I intend to do an in-depth research for
>one of the European Governments.

Why don't you contact the owner and ask him how it works?  Posting to
cypherpunks and asking questions about it seems a bit unusual.  Smells like
a spam.  

You're name wouldn't be Spyking, would it? 

hippyman 
ICQ: 11517383
PGP Fingerprint: E3C3 35C8 0FD9 6F36 2ADD 0541 B58C F6BD D347 BD0A
Public Key: http://keys.pgp.com:11371/pks/lookup?op=get&search=0xD347BD0A





From nmarion at ibm.net  Thu Jun 18 13:17:26 1998
From: nmarion at ibm.net (Nissa Marion)
Date: Thu, 18 Jun 1998 13:17:26 -0700 (PDT)
Subject: Crypto Books/Archive
In-Reply-To: <006101bd9a1d$29071120$a460a0d1@jason.kc1.net>
Message-ID: <3.0.5.32.19980618161329.00578d60@pop3.ibm.net>


>But if you want to send
>the whole image, and make that little piece invisible to everyone else
>but the sender... this is what I'm getting at. 

Man.. that would make it pretty useless to the receiver, now, wouldn't it?







From nmarion at ibm.net  Thu Jun 18 13:30:43 1998
From: nmarion at ibm.net (Nissa Marion)
Date: Thu, 18 Jun 1998 13:30:43 -0700 (PDT)
Subject: Cypherpunks/IRC
In-Reply-To: <3588F701.46627B60@kki.net.pl>
Message-ID: <3.0.5.32.19980618162751.0058a6c0@pop3.ibm.net>


At 01:16 PM 6/18/98 +0200, you wrote:
>Greetings,
>
>I go to #cypherpunks and it says that I create the room. Where the
>heck is the room?
>
>Jan
>


Are you using EFnet? Because that is what was suggested to you, and I just
tried it and it was indeed there... There were only two people (maybe bots)
there, but it did certainly exist.






From jdobruck at kki.net.pl  Thu Jun 18 15:07:49 1998
From: jdobruck at kki.net.pl (Jan)
Date: Thu, 18 Jun 1998 15:07:49 -0700 (PDT)
Subject: Cypherpunks/IRC
In-Reply-To: <3.0.5.32.19980618162751.0058a6c0@pop3.ibm.net>
Message-ID: <3589906A.BA926D9@kki.net.pl>


Greetings,

I tried EFNet and there was noone there. That's the reason why I was
so frustrated... I'll try a few more time and tell relate what
happened.
Jan out.

Nissa Marion wrote:
> 
> At 01:16 PM 6/18/98 +0200, you wrote:
> >Greetings,
> >
> >I go to #cypherpunks and it says that I create the room. Where the
> >heck is the room?
> >
> >Jan
> >
> 
> Are you using EFnet? Because that is what was suggested to you, and I just
> tried it and it was indeed there... There were only two people (maybe bots)
> there, but it did certainly exist.





From jdobruck at kki.net.pl  Thu Jun 18 15:15:23 1998
From: jdobruck at kki.net.pl (Jan)
Date: Thu, 18 Jun 1998 15:15:23 -0700 (PDT)
Subject: Crypto Books/Archive
In-Reply-To: <006101bd9a1d$29071120$a460a0d1@jason.kc1.net>
Message-ID: <35899234.D45BFABA@kki.net.pl>


Nissa Marion wrote:
> 
> >But if you want to send
> >the whole image, and make that little piece invisible to everyone else
> >but the sender... this is what I'm getting at.
> 
> Man.. that would make it pretty useless to the receiver, now, wouldn't it?

Greetings,

The thing is, the receiver can decode it because he knows his
passphrase so only he will see the image and noone else. It's like
like PGP only with pictures, not plaintext. But if you guys think the
idea is stupid, I'll scrach it.
Jan out.





From maxinux at bigfoot.com  Thu Jun 18 18:40:50 1998
From: maxinux at bigfoot.com (Max Inux)
Date: Thu, 18 Jun 1998 18:40:50 -0700 (PDT)
Subject: Cypherpunks/IRC
In-Reply-To: <3589906A.BA926D9@kki.net.pl>
Message-ID: 


We are there on EfNet (#cypherpunks), most of the time nuge and I
atleast, and LuckyG comes in on occasion, aswell as others. I am Working
on securing the channel a bit now...

Billy

-- Max Inux (MaxInux at bigfoot.com) UIN: 207447, http://khercs.dyn.ml.org
Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59
Or Kinky sex makes the world go round- Christie: Your in my sig too
^^ If Cryptography is outlawed,  only outlaws will have cryptography ^^

 

On Fri, 19 Jun 1998, Jan wrote:

> 
> Greetings,
> 
> I tried EFNet and there was noone there. That's the reason why I was
> so frustrated... I'll try a few more time and tell relate what
> happened.
> Jan out.






From blancw at cnw.com  Thu Jun 18 22:32:02 1998
From: blancw at cnw.com (Blanc)
Date: Thu, 18 Jun 1998 22:32:02 -0700 (PDT)
Subject: Tim's views on the racial problem in America
In-Reply-To: <3.0.5.32.19980617231318.0086ad00@cnw.com>
Message-ID: <3.0.5.32.19980618221716.00895b60@cnw.com>


John Young wrote:

>The center is gone for good, cry a tear, then bravely affirm:
>good riddance to Ptolemaic centricity. Normalcy is now para.
>Listen to what your teeth are picking up from the spectrum
>transmitting to the inner ear bone: the spheres whistling
>Dixie in the dark.
............................................

I know just what you mean, JYA.

	"He took his vorpal sword in hand;
	Long time the manxome foe he sought - 
	So rested he by the Tumtum tree,
	And stood awhile in thought.

    ..
Blanc





From owner-cypherpunks  Fri Jun 19 02:12:04 1998
From: owner-cypherpunks (owner-cypherpunks)
Date: Fri, 19 Jun 1998 02:12:04 -0700 (PDT)
Subject: Never Recieve Junk Mail Again!
Message-ID: <199806190911.CAA17416@toad.com>


    Wouldn't it be great to never get junk e-mail again? Well, No one can make you that promise 
unfortunetly....but you can Profit from junk e-mail.There's an old saying "If you can't beat 
em..join em!" You can make incredible money sending your own mass e-mails. If you own 
your own business or have a product or idea to sell , then you probably know that all 
advertising works..it's just a question of whether it's cost effective or not. What could be more 
cost effective that a ZERO cost of adverising? If you sent out 500,000 e-mails which would 
take you only a few minutes to set your computer up to do,and you only recieved one half of 
one percent responce..that would be 2500 people responding to your ad. And the cost to do it 
was NOTHING. Junk e-mail is here to stay, the U.S Congress in their infinite wisdom has 
recently passed legislation legitimizing mass e-mail. So wouldn't it be nice to laugh every time 
you recieve a piece of junk e-mail from someone because you'll know for every one you 
recieve ,you're sending out hundreds of  thousands. If your computer is sitting idle while you're 
at work or play...your crazy! You could be earning money while your asleep,at work or out 
having fun. It's not like you have to sit there and watch it run!
     So why isn't every one doing it. Well, your local internet service provider spent lots of money 
installing filtering equiptment to keep out this so called junk e-mail and in fact for years there's 
been sort of a fun little war going on between the junk e-mail software writers and the internet 
serrvice provider filter software writers to see who could out smart who.The end result is that 
sending mass e-mails legally has become an art . But it's really all about knowing the secrets 
and having the right software.
      AVATAR Publishing is offering you the type of expertise and support that would take you 
years to learn.We know all the secrets (obviously or you wouldn't be reading this would you?) 
and we have the software to deliver to most of the internet service providers. So her's the 
offer... AVATAR is offering you a mass e-mail starter kit complete with step by step instructions 
on how to get sarted sending out mass e-mail...a current explanation of what's legal and not 
legal...how to extract e-mail addresses from the internet ...how to get targeted e-mail 
addresses...a FREE trial version of the most effective mass e-mail software program ever 
developed...a list of bulk e-mail friendly internet service providers....a complete explaination of 
the secrets of how to legally get your mail through the filtering and why it works....and finally a 
real telephone number so you can have technical support and keep updated on new 
developments in the mass e-mail community.The total cost of this kit is only  $29 
    If you would like to stop having you computer sit idle while your at work or asleep and start 
having it make money for you  .....   Send $29  to AVATAR Publishing
                                                                                  832 Colorado Blvd.
                                                                                  Los Angeles,Ca 90041 

If you would like to be removed from our e-mail list ,send a written request to the above 
address







From thall322 at mci2000.com  Fri Jun 19 03:22:41 1998
From: thall322 at mci2000.com (thall322 at mci2000.com)
Date: Fri, 19 Jun 1998 03:22:41 -0700 (PDT)
Subject: Earn $100 every time OUR phone rings...
Message-ID: <199806191022.EAA00619@crotalus.gates.com>



ALL YOU DO IS ADVERTISE THIS 800 NUMBER! THAT'S ALL!! 

$100 goes to you for EVERY sale that the company closes!

Does the idea of making at least $1,000 per week beginning your 2nd week of 
doing business excite you? 

How about never having to sell a thing to your customer and never having 
to talk to ANYONE to make money? I don't know how this could get any easier.

EVERY aspect of selling or talking to someone is DONE COMPLETELY by the company!  

The number one home based business for the 2nd year in a row, Fortune 5000 
is a member of the Better Business Bureau and the U.S. Chamber of Commerce.

WHAT THIS BUSINESS WILL DO FOR YOU:

* Handles all your calls, closes your sales, and 
  sends you WEEKLY commission checks! 

* It pays you a $100 commission (that's over 50% of the total sale)
  for EVERY sale. CHECKS put $$$ in your pocket in less than your first 
  week or two... Quick commission earnings build and maintain motivation. 
  ALL YOU DO IS ADVERTISE the toll-free number and your ID number. 

* You can get STARTED TODAY. Just advertise the business toll-free 
  number with your ID # and let this business CLOSE YOUR SALES every day...
  They do all the work and YOU GET PAID FOR IT! 

* You may advertise any way you choose: Bulk E-Mail, Flyers, Classifieds, 
  Postcards, etc. Suppose you use bulk E-Mail, as I am: 100,000 E-Mails
  with a 1/10th of a percent (0.1%) sales rate at $100 per sale nets 
  $10,000... not too bad.

There is nothing else out there that will provide you with an immediate income 
beginning THIS WEEK with minimal effort.

Before you call, I want you to think about the quality of the live 
operators handling your call. I am convinced you will not find 
a better team of closers for your own personal sales.  You will 
clearly understand what I am talking about once you call.  

PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!!

1-800-811-2141

You will be asked for ID #50030 when you call.

(Live operators are available from 8 AM-10 PM CST Monday through Saturday and 
will be able to answer any questions you may have.)

Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949, 888-446-6951
or 888-731-3457 (all toll free). 






From boshko at uni-svishtov.bg  Fri Jun 19 05:08:44 1998
From: boshko at uni-svishtov.bg (Bozhidar V Bozhinov)
Date: Fri, 19 Jun 1998 05:08:44 -0700 (PDT)
Subject: e-cash
Message-ID: <358A544E.A0DCE57A@uni-svishtov.bg>

Dear Sirs,

This is Mr. Bozhinov from the D. Tsenov Academy of Economics writing.
I am at the present time a Ph. D. student at the Department of Finance
in the framework of The Academy.
Through Internet saw in the Web site that you are work in the aria of
e-money.
Unfortunately, at the moment in Bulgaria there are a few academitions,
when are working in this problem. That�s why I would like to ask you for
more information about this problem.
I�d be very grateful if you might recommend me or send me some materials
concerning this question.
Look forward hearing from you soon.

Yours faithfully,

Mr. B. Bozhinov, Ph. D. Student
D. Tsenov Academy of Economics



begin:          vcard
fn:             Bozhidar Bozhinov
n:              Bozhinov;Bozhidar
org:            Tsenov Academy of Economics
adr:            2 Em. Chakarov Str;;51 Cherni Vrah Str.;Svishtov;Lovech;5250;Bulgaria
email;internet: boshko at uni-svishtov.bg
title:          PhD Student
tel;work:       +359-631-22721-250
x-mozilla-cpt:  ;0
x-mozilla-html: FALSE
version:        2.1
end:            vcard





From coax_k at beavisandbutthead.com  Fri Jun 19 05:58:22 1998
From: coax_k at beavisandbutthead.com (Judd Howie)
Date: Fri, 19 Jun 1998 05:58:22 -0700 (PDT)
Subject: IRC #cypherpunks
Message-ID: <025001bd9b83$2cd4b340$e8cf15a5@irix>


A cypherpunks channel has also been set up on the Austnet IRC network

irc.austnet.org and then /map for your closest server

/join #cypherpunks

that's where we are in the southern hemisphere anyway


GBH
  






From billp at nmol.com  Fri Jun 19 13:05:27 1998
From: billp at nmol.com (bill payne)
Date: Fri, 19 Jun 1998 13:05:27 -0700 (PDT)
Subject: US attorney MOTION TO REMAND
Message-ID: <358AC3B0.7357@nmol.com>


Friday 6/19/98 1:42 PM

John Young

Morales and I met for lunch.

I just finished documents referencing the two Tenth circuit
docket sheets you posted on our cases.

http://jya.com/whp-10usca.htm
http://www.jya.com/arm061298.htm

Zeitgeist again.  We are moving to the Tenth circuit AGAIN.

http://www.jya.com/whp061098.htm
http://www.jya.com/whp060998.htm

Morales is going to come over review, then we will send you AND
ABOUT EVERY Member of Congress A COPY.

Mitchell's attempt for the in camera ex parte meeting with the court
may have failed.  Thanks to you and Orlin.  And, consequently, some
upset Members of Congress.

http://www.jya.com/whp052898.htm

I, of course, DENY I called judge Santiago Campos a FASCIST PIG.
Try searching for PIG.

That is likely the reason Mitchell phoned this morning to say she going
to file to remand the first FOIA [algorithms] request to NSA.

Later
bill







From support at abcproperty.com  Fri Jun 19 14:24:32 1998
From: support at abcproperty.com (Support)
Date: Fri, 19 Jun 1998 14:24:32 -0700 (PDT)
Subject: Invitation FreshSite.com
Message-ID: <358ad70a.0@news.provide.net>


New Invitation

FreshSite is a free service that offers the latest news on top rated Internet
downloadable shareware, freeware and evaluation software. Allowing you
to be the first ones to download and test drive fresh made software and
the latest updates!

Check it out at:  







From CTIA_Daily_News at tour.unitymail.com  Fri Jun 19 16:24:52 1998
From: CTIA_Daily_News at tour.unitymail.com (CTIA Daily News)
Date: Fri, 19 Jun 1998 16:24:52 -0700 (PDT)
Subject: CTIA Daily News From WOW-COM - June 19, 1998
Message-ID: <199806191700.MAA22741@mailstrom.revnet.com>



================================
Welcome to the second day of the CTIA
Daily News From WOW-COM.  Please click
on the icon for the most important news in
wireless communications today.
================================



From gwb at pronet.net.au  Fri Jun 19 16:54:58 1998
From: gwb at pronet.net.au (Global Web Builders)
Date: Fri, 19 Jun 1998 16:54:58 -0700 (PDT)
Subject: Pauline Hanson's One Nation newsletter - June 1998 update
Message-ID: <1.5.4.32.19980619234519.0070b2d0@mail.pronet.net.au>


Issue 2.1, June 1998

----------------------------------------------------------------------------
PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the
mailing list please say "REMOVE" in the subject line and return this message
in the body.
----------------------------------------------------------------------------

G'day One Nation supporters in NSW

New quick access to One Nation home page NOW live!!!

http://www.onenation.com.au

----------------------------

Queensland State Election:
=========================
This is our first communication since last week's Queensland State Election.

See archive of live coverage: http://www.gwb.com.au/onenation/qldstate/june13

One Nation has secured an amazing 11 seats (out of 89) with 23% of the
primary vote. (Compare this to the Nationals 23 seats on just 15% of the
primary vote!)

See: http://www.ecq.qld.gov.au/ecq/98summary.html

In the latest news it now appears likely that One Nation will support the
Coalition to ensure a stable government in Queensland - although this is not
yet finalised and the support of two independents, Liz Cunningham and Peter
Wellington still have to be secured.

------------------------------------

Unofficial One Nation daily newspaper:
=====================================

The anotd (Australian National News of the Day) - Australia's oldest on-line
saily newspaper provides reader feedback and information on Pauline Hanson
and One Nation.

The paper at:

http://www.gwb.com.au/gwb/news/daily.html

has an archive for subscribers going back to October 1995.

Negotiations are currently underway to make this paper available by "fax
back" - initially on a weekly basis. This will allow anyone with a fax to
get a weekly summary of issues being discussed faxed to them.

------------------------------------

Web Ring:
========

The One Nation web site now has a web ring listing about 20 One Nation
sites. If you wish to add a One Nation site please use the "add a web site"
link. 

All additions to the web ring are moderated and GWB's decision on whether or
not to link you is final. You are of course welcome to just carry the web
ring banner and links at:

http://www.gwb.com.au/onenation/ring1.html

Thanks to Peter for his help on this.

A number of historic One Nation web sites including the April 1997 launch in
Ipswich and Hanson's speeches are currently available from the web ring.

-------------------------------------

The power of email:
==================

I have been informed by the ABC Radio National's "Background Briefing" that
they will be talking about the power of email tomorrow (Sunday at 9.10am).

Apparently the action taken by many One Nation supporters in expressing
their concern to 60 Minutes sponsor, Toyota, about the programmes behaviour
towards Pauline Hanson and One Nation was very effective and will be raised
during the ABC report.

To all those who participated thank you. I trust you all got the standard
Toyota response broadcast in the middle of last week.

I am aware that the support shown has served its purpose for the time being
and I hope that 60 Minutes shows more balance in future or we will be
obliged to call on your support again.

See: http://www.gwb.com.au/60.html

for background on the 60 Minutes segment "A CALL TO ARMS".

----------------------------------

Federal Election:
================

One Nation's Federal Election web site is currently under development.

See: http://www.gwb.com.au/onenation/federal

----------------------------------

GWB



Scott Balson






From hippyman at alltel.net  Fri Jun 19 21:16:26 1998
From: hippyman at alltel.net (hippyman)
Date: Fri, 19 Jun 1998 21:16:26 -0700 (PDT)
Subject: TheCodex's D.I.R.T. surveillance software
Message-ID: <199806200416.XAA17936@client.alltel.net>


At 09:29 PM 6/19/98 , you wrote:

>>>I have come across a webpage at
>>>
>>>http://www.thecodex.com/dirt.html
etc...
>>Why don't you contact the owner and ask him how it works?  Posting to
>>cypherpunks and asking questions about it seems a bit unusual.  Smells like
>>a spam.  
>>
>>You're name wouldn't be Spyking, would it? 
etc...

>Mine is and I didn't post it... I got the same request privately... from
>this person... I am not trying to sell it ... especially to a European
>government...

My wrong, then. 

I enjoy your list and didn't really think you spam another mailing list in
such a fashion as I was interpreting, but I thought I'd sniff it out anyway.

My apologies for the accusation. 

hippyman 
ICQ: 11517383
PGP Fingerprint: E3C3 35C8 0FD9 6F36 2ADD 0541 B58C F6BD D347 BD0A
Public Key: http://keys.pgp.com:11371/pks/lookup?op=get&search=0xD347BD0A





From proff at iq.org  Sat Jun 20 11:40:35 1998
From: proff at iq.org (Julian Assange)
Date: Sat, 20 Jun 1998 11:40:35 -0700 (PDT)
Subject: AUcrypto mailinglist
Message-ID: <19980620184014.22630.qmail@iq.org>



With things starting to heat up here in Australia (DoD/DSD has
recently taken to making some exceptionally nasty noises about
prosecuting Eric Young, Tim Hudson and the rest of the Australian
CryptoMozilla team). I'd like to remind everyone who's interested in
aussie/nz crypto issues of the aucrypto mailing list.

                    _   _   _  ____ ______   ______ _____ ___
                   / \ | | | |/ ___|  _ \ \ / /  _ \_   _/ _ \
                  / _ \| | | | |   | |_) \ V /| |_) || || | | |
                 / ___ \ |_| | |___|  _ < | | |  __/ | || |_| |
                /_/   \_\___/ \____|_| \_\|_| |_|    |_| \___/

                      Australasian & Pacific Cryptography

               mail the word "subscribe" to aucrypto-request at suburbia.net

                                     or

              mail the word "subscribe" to aucrypto-d-request at suburbia.net
                            (AUCRYPTO weekly digest)


WHEN YOU HAVE SUBSCRIBED
------------------------

    Send in a brief synopsis of who you are and why you are interested
    in AUCRYPTO as your first message to the list (this helps
    to stimulate discussion and debate as well as provide a sense
    of the AUCRYPTO community). As a [small] example:

      "Hello AUCRYPTO! My name is Sara Harding. I'm a technical services
       officer working at the AFP (Australian Federal Police), specialising
       in cryptogrpahic issues."

SUBSCRIBING
-----------

Send mail to:

        aucrypto-request at suburbia.net
or
        aucrypto-d-request at suburbia.net (AUCRYPTO digest)

with the subject or body of:

        subscribe

UN-SUBSCRIBING
-------------

Send mail to:

        aucrypto-request at suburbia.net
or
        aucrypto-d-request at suburbia.net (AUCRYPTO digest)

with the subject or body of:

        unsubscribe aucrypto

POSTING
-------

To send a message to the list, address it to:

        aucrypto at suburbia.net

Messages under 700 bytes in size will not be accepted. Send your
one-liners to nobody at nowhere.org.

REPLYING
--------

If you are replying to a message already on the AUCRYPTO list using
your mail programs reply facility you may have to change the reply
address to aucrypto at suburbia.net. This is because the AUCRYPTO mailing
list program is configured to have return replies sent the author
in order to avoid receiving the replies of misconfigured "vacation"
programs which automatically send email saying "I've gone to the
moon for two weeks to hunt rare bits".

ARCHIVES
--------

Monthly back issues of aucrypto since January 96 are available from:

        ftp://suburbia.net/pub/mailinglists/aucrypto

You can also instruct the mailing list processor to automatically scan and
retrive messages from the archive. It understands the following commands:

        get filename ...
        ls directory ...
        egrep case_insensitive_regular_expression filename ...
        maxfiles nnn
        version

        Aliases for 'get': send, sendme, getme, gimme, retrieve, mail
        Aliases for 'ls': dir, directory, list, show
        Aliases for 'egrep': search, grep, fgrep, find

        Lines starting with a '#' are ignored.
        Multiple commands per mail are allowed.
        Setting maxfiles to zero will remove the limit (to protect you against
        yourself no more than maxfiles files will be returned per request).
        Egrep supports most common flags.

        Examples:
        ls vomume96 (for aucrypto digest)
        ls latest (the latest directory containes the archived messages)
        get latest/12
        egrep some.word latest/*

TECHNICAL
---------

The list processor software is based on the excellent Procmail/Smartlist
by Stephen R. van den Berg  with
some minor extensions by Julian Assange .





From lreed at west.cscwc.pima.edu  Sat Jun 20 12:10:55 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sat, 20 Jun 1998 12:10:55 -0700 (PDT)
Subject: No Subject
Message-ID: <009C7FCD.1E9A1520.1@west.cscwc.pima.edu>


RIP - SPACE ALIENS HIDE M DRUGS!!!
___________________________________


  The ReptiliansInBlack and the MenInTheShadows were arguing
vehemently over the best path to take in order to maintain
effective damage control over the increasingly wide-spread
danger posed by the known and unknown actions of the Author. 
Regardless, in the end, they all had to answer to Gomez...

  In the days preceeding the Terry Nichols verdict, they had
managed to divert the Author's attention by murdering his 
aunt in Nevada, Missouri, forcing him to abandon Denver in
the middle of the night to drive to her funeral.
  They had managed to find and destroy the TRIN VirtualNuclear
Diskette Bombs the Author had left at various federal government
buildings in the previous few days, but their agent in Cape
Girardo indicated that the Author also claimed to have planted
the TRIN VNDB's among members of the Nichols jury. Was this
another one of the Author's disinformation tactics, or was
their own double agent at Bureau42 actually a triple agent,
helping to obscure the Author's trail of FUD after his having
lost the Watchers in both Denver and Nevada?
  When the RIP's and the MIS's were notified by Captain Button's
former superiors that the Author had been discovered roaming his
old haunts in Tucson, the BlackBaggers who inventoried his truck
found postcards purchased in Branson, Oklahoma City and Waco. Not
a good sign...


  When the Author posted the 'SweatHog Log' of the SAHMD
manuscripts from Linda Lou Reeds Pima College account, it
was taken as a sign that HeOrShe was once again ready to
jump to another location, and was again challenging the
Watchers to track him. After he led them directly to his
current SafeHouse in Tucson, however, it became clear that
he was once again taunting them by revealing another clue
in the ongoing battle to discover the true extent and/or
existence of the alleged underground computer society known
as the Circle of Eunuchs.
  It wasn't until they met in Tucson with the US Air Force
intelligence officer from Bienfait that the ReptiliansInBlack
and the MenInTheShadows realized the horrendous implications
of the 'clue' that the Author was rubbing their noses in...

  "Bob and Polly McWilliams, sons named Trevor and Rory."
the Flying Spook told those gathered around the conference
table at the back of the Blue Saguaro. "They're friends of
Mark, the owner." he said, causing great consternation among
the various spooks participating in the dinner and drinks
TruthMonger Rap Session taking place--apparently in the
heart of enemy territory.
  As if on cue, the owner approached their table, to inquire
as to the suitability of the food, drinks and service.Y\j
owner, nonchalantly, adding, "I haven't seen you since the
Club Car...are you bugging our conversation?"

  The owner of the Blue Saguaro laughed and winked slyly,
replying, "Not tonight. There's no band, so it's the sound
man's night off..."
  The assorted crew of Casper's Cousins, as they liked to
think of themselves, each began replaying in his or her own
mind the contents of their preceeding conversations, much to
the amusement of Mark and his old pal, the Flying Spook.
  "Tomorrow's edition..." the Flying Spook told his compatriots,
handing each of them a computer printout of the Bienfait Nutly
News. "I'm the new editor-in-chief." He turned and walked away
with the owner, talking over old times...







From lreed at west.cscwc.pima.edu  Sat Jun 20 12:11:59 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sat, 20 Jun 1998 12:11:59 -0700 (PDT)
Subject: Reptilians In Black - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C7FCD.50DF5860.3@west.cscwc.pima.edu>


RIP - SPACE ALIENS HIDE M DRUGS!!!
___________________________________


  The ReptiliansInBlack and the MenInTheShadows were arguing
vehemently over the best path to take in order to maintain
effective damage control over the increasingly wide-spread
danger posed by the known and unknown actions of the Author. 
Regardless, in the end, they all had to answer to Gomez...

  In the days preceeding the Terry Nichols verdict, they had
managed to divert the Author's attention by murdering his 
aunt in Nevada, Missouri, forcing him to abandon Denver in
the middle of the night to drive to her funeral.
  They had managed to find and destroy the TRIN VirtualNuclear
Diskette Bombs the Author had left at various federal government
buildings in the previous few days, but their agent in Cape
Girardo indicated that the Author also claimed to have planted
the TRIN VNDB's among members of the Nichols jury. Was this
another one of the Author's disinformation tactics, or was
their own double agent at Bureau42 actually a triple agent,
helping to obscure the Author's trail of FUD after his having
lost the Watchers in both Denver and Nevada?
  When the RIP's and the MIS's were notified by Captain Button's
former superiors that the Author had been discovered roaming his
old haunts in Tucson, the BlackBaggers who inventoried his truck
found postcards purchased in Branson, Oklahoma City and Waco. Not
a good sign...


  When the Author posted the 'SweatHog Log' of the SAHMD
manuscripts from Linda Lou Reeds Pima College account, it
was taken as a sign that HeOrShe was once again ready to
jump to another location, and was again challenging the
Watchers to track him. After he led them directly to his
current SafeHouse in Tucson, however, it became clear that
he was once again taunting them by revealing another clue
in the ongoing battle to discover the true extent and/or
existence of the alleged underground computer society known
as the Circle of Eunuchs.
  It wasn't until they met in Tucson with the US Air Force
intelligence officer from Bienfait that the ReptiliansInBlack
and the MenInTheShadows realized the horrendous implications
of the 'clue' that the Author was rubbing their noses in...

  "Bob and Polly McWilliams, sons named Trevor and Rory."
the Flying Spook told those gathered around the conference
table at the back of the Blue Saguaro. "They're friends of
Mark, the owner." he said, causing great consternation among
the various spooks participating in the dinner and drinks
TruthMonger Rap Session taking place--apparently in the
heart of enemy territory.
  As if on cue, the owner approached their table, to inquire
as to the suitability of the food, drinks and service.Y\j
owner, nonchalantly, adding, "I haven't seen you since the
Club Car...are you bugging our conversation?"

  The owner of the Blue Saguaro laughed and winked slyly,
replying, "Not tonight. There's no band, so it's the sound
man's night off..."
  The assorted crew of Casper's Cousins, as they liked to
think of themselves, each began replaying in his or her own
mind the contents of their preceeding conversations, much to
the amusement of Mark and his old pal, the Flying Spook.
  "Tomorrow's edition..." the Flying Spook told his compatriots,
handing each of them a computer printout of the Bienfait Nutly
News. "I'm the new editor-in-chief." He turned and walked away
with the owner, talking over old times...







From lreed at west.cscwc.pima.edu  Sat Jun 20 12:12:53 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sat, 20 Jun 1998 12:12:53 -0700 (PDT)
Subject: Bienfait Reptilian News - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C7FCD.710F1760.7@west.cscwc.pima.edu>


RIP/BNN - SPACE ALIENS HIDE M DRUGS!!!
_______________________________________

Bienfait Nutly News--Desert Storm / Texas Tornado Special:
[BNN-Tucson, Arizona--THE 'FOUR CORNERS' SEARCH FOR A PAIR OF
Certified CopKillers took a bizarre twist today, when it was
learned that the Author of SPACE ALIENS HIDE M DRUGS was
apparently serving merely as a diversionary decoy for LEA's
involved in the search, while an unknown compatriot was busy
either providing clandestine supply support for the pair, or
perhaps even arranging transportation for the suspects to a
safehouse located outside of the search area.
  Under cross-examination by a variety of LEA/Spooks, the 
RCMP involved in setting up the Author on a variety of charges
under the Criminal Code Of Canada admitted that they had been
holding back evidence suggesting that the Author was not acting
alone in his TRIN VirtualNuclear Diskette Bomb Soft Target
World Tour. Newspapers dated after the Author's flight to
semi-safety south of the forty-ninth parallel were found at
the scene of the first VirtualNuclear Device discovered by
the Royal Canadian Mounted Police at the Court House eleven
KILLometers from MongerItaVille, home of the Bienfait Nutly
News, where the Author was scheduled to be railroaded into
serving a four-year sentence for 'Failure To Appear' on the
'Dog At Large' charges trumped up by local Bienfait officials
under RCMP direction.

  "There were two different sets of newspapers dated after
the Author's flight from Canada found at the scene of the
First VirtualNuclear Device." an RCMP official foolishly
revealed to the Flying Spook assigned by the US Air Force
to investigate the Author, never considering that the agent
may have been 'turned' by the Circle of Eunuchs into a
secret ally. "We traced the placement of one of the sets
of newspapers to the Author's nephew, Human Gus-Peter, who
had been promised a new state-of-the-art computer in return
for helping to obstrufucate the details behind the placement
of the TRIN VNDB Device. The second set of newpapers, from
an earlier date, were obviously placed by an unknown entity,
working in collusion with the Author from the beginning."

  The Flying Spook, in his first action as the new editor-
in-chief of the Bienfait Nutly News, informed the RCMP that
the Author, after mailing evidence of RCMP illegal activity,
collusion and conspiracy to a Time/Netly News reportwhore
from Sidney, Montana, had holed up at the Way Station in
Gillette, Montana, for a few days, proceeding south only
after meeting with a shadowy figure who had given one of
the local residents of the homeless shelter a handful of
Canadian coins when asked for spare change.
  The Flying Spook also suggested that the Author's travel
schedule, seemingly laying an interrupted trail through
the HeartLand of paramilitary activity on the way to theYT
targets along the way, was actually a diversionary tactic
designed to divert attention from the movements of his
conspiratorial compatriot--rumored to be a long-time active
member of the Circle of Eunuchs and CyphperPunks Disturbed
Male LISP, as well as a recent inductee into the Army of
Dog.

  The new Editor-In-Chief of the Bienfait Nutly News also
revealed that his investigation into the alleged connection
of the NuclearBomberAdulteress in Minot, North Dakota, and
the ButtonBomberJoyRider from Tucson, Arizona, to the
Circle of Eunuchs and Army of Dog had turned up a variety
of startling facts, despite the Flying Spook's failure to
include those facts in his official report.
  Among those facts are the following:


EveryBody Wants To Go To Soviet Heaven, But No One Wants To Spy:

  It took the Flying Spook only a few weeks to verify hard links
between the Author and a variety of single, double and triple
agents ranging from Scotland to the Middle East--from the 1800's
to the 1990's.
  The Author's background had been invesigated previously, to
little avail, and the Flying Spook was mystified as to how
apparently competent investigators could fail to realize that
the key to covert and subversive links very often lie in the
history of the women 'behind the throne', so to speak.
  Elanor Roosevelt, Lady Byrd Johnson, Nancy Reagan...even
Casper's Cousins unfamiliar with the course of history should
be able to see the implication implied by these recent examples
of the Hidden Hands Of Destiny working through the wives of
those serving as the front men for the true movers and shakers
in society.

  The Zippo lighter bearing the crest of the Naval Guided
Missle School carried by the Author had long been dismissed
as an insignificant detail by a long string of investigators
who crossed paths with HimOrHer at various times and places.
  It was the family history of Polly McWilliams that allowed
the Flying Spook to bring together a wide range of seemingly
individual 'coincidences' into a logical, coherent pattern.

  Clifden Albert Banner:
  Polly McWilliam's brother. A former B-52 bomber pilot with
connections to both the NuclearBomberAdulteress and the
ButtonBomberJoyRider provided the Flying Spook with his first
hard connection between the Author and Armed Forces personnel
suspected of having Circle of Eunuchs connections.
  Major Banner's military history working at top levels of
the Strategic Air Command, as well as with the Joint Chiefs
of Staff at the Pentagon provided the Flying Spook with an
immediate RedFlag that suggested even the remotest connectionYT
what would be found upon further investigation.
  It therefore came as no surprise to find that, after having
put in place a wide variety of possible co-conspirators within
the Armed Forces network, Major Banner retired to become a
Senior Engineering Specialist-Mission Planning System, in the
New England Operations Field Office of GDE Systems, a major
military contractor.
  Neither was it a surprise that Major Banner's specialty
was...computers.


  Jane Banner:

  Polly McWilliam's sister. Heavily involved as a programmer,
for Nortel, with highly sensitive work in an area of the
joint US/Chinese encryption program that was suspected to
have strong covert connections to the CypherPunks and the
Circle of Eunuchs.


  Earl David Banner:
  Polly McWilliam's father. A Boston Globe Journalist who 
had been privy to the most secret of secrets in a comprehensive
array of social circles ranging from the Roosevelts and the
Kennedys to Cardinal Cushing and the Lords of Lourdes.
  Earl Banner's Anglican heritage was in seeming contrast to
his Catholic connections until the Flying Spook discovered
the close connection between the Author's Catholic lineage
through the French Norris clan on his mother's side and the
Catholic lineage of the McWilliams clan to which Polly's
husband, Bob, was a vital link.


  Moyra Banner:
  Polly's McWilliam's mother. Grew up in Montreal and met
her future husband through  sources closely connected to
the Bartonian Metaphysical Society and what was later to
become the Solar Temple Cult--both of which were organizations
with close connections to the Author and David Humisky, a
shadowy figure who had stunned the Canadian Military by
engineering a quick end to a student military-game project
designed to provide information and data on the capability
of military neophytes engaging in spontaneous war games.


  Alan McKenzie:
  Polly McWilliams' great-grandfather. Driven with his family
from the Isle of Lewis, in Scotland, by the Laird, as a result
of his subversive political connections to a Welsh mining rebel
named Bennett, whose grandson, Leslie James Bennett, would rise
out of one of the 'Little Moscows' in South Wales, serving as
a bastion of the British Labour Party, to become the Chief of
the Russian Desk for the RCMP's Security Service, before beingYT
with connections to fellow Red Caspers McClean and Kim Philby.


  Terry Dee:
  A long-time friend and confidante of Bob and Polly 
McWilliams, as well as a shadowy presence in the life of
the Author's decade-long lover in Austin and Tuscon.
  The Flying Spook had originally researched his connection
to the Author as a result of Dee's work for various American
spook agencies during his travels in the Middle East, and
was stunned to discover the close links between Dee's
ancestors--the O'Days--and the Author's great-grandfather,
Clarence Day, whose progeny in Mountain Home, Idaho, once
again completed the Circle between the Author and Major Clif
Banner, as well as filling in the Author's connection to
the Naval Guided Missle School and a wide variety of
suspected Circle of Eunuchs initiates employed at sensitive
military and secret government laboratory sites around
the world.


  Merna Brown:
  The Author's first wife. A member of the Bartonian Metaphysical
Society, and whose father had proved to be a vital link in the
connection between the socialist New Democratic Party of Tommy
Douglas and the suspected Russian agent, James Leslie Bennett.
  Merna Brown had eventually turned up in Ontario in a government
position ideally suited for providing financial and personal
history support for a number of individuals drifting back and
forth between the Solar Temple, Elohim City, Waco and San Diego,
changing identities as they went.


  Dave Foreman:
  The Flying Spook found it interesting that the Author had
appeared to have absolutely no contact with Dave Foreman or
any of the Earth First subversives in Arizona during HisOrHer
time there, yet seemed to be involved in advising and training
a wide variety of those connected to Earth First in various
areas of the country, particularly in Northern California.
  Hidden deep within the mountains of files kept on those who
marched in protests at the LizardMore Lavoratory was a note
which attributed authorship of a song, "We're Going To Take
It Sitting Down," a banner tune for a Berkeley radical group
named La Palomas, to one C.J. Parker, who was also known to
have authored "Don't Blame Me, I Voted For The Monkey."


  Black Elk:
  Equally intriguing was the Author's close connection to a
wide variety of Rainbow Family members thoughout the US and
Canada. While the Author seemingly remained unaware of his
connection to the group, many of the Rainbow Family were notYT
enormous amount of covert support during his wide travels.
  ears of investigation failed to discover the link until
the Flying Spook engaged the Author in WarStories (TM) at
the CoalDust Saloon in Bienfait, and heard a tale about 
HimOrHer joining an oddball van full of misfits including
hippies, college athletes and a Catholic priest, on a trip
to a mountain top in Colorado to await the fulfillment of
the vision written of in "Black Elk Speaks."
  HeOrShe told of the Catholic priest smuggling an ounce of
hashish across the border, shoved up his butt, screwing the
Catholic girls on the trip, and then absolving them, and 
carrying a mountain of liquor up the mountain on his back,
a Herculean task which made him a legend among those at
the gathering who considered a spiritual journey to be
incomplete without a jigger of earthly spirits to ease
their passage.
  The Author told of rising in the middle of the night to
relieve himself of excess spirits and falling into one of
the slit-trench crappers that had been dug for the occassion,
swearing like a trooper as he climbed out, only to fall into
another, and yet another, with the whole gathering laughing
riotously in the dark at the Fool In The Stool, as he called
himself. He had little idea that not only did the whole
gathering know who he was the next day (even though he 
pretended ignorance of the whole affair), but that the story
of his folly had become one of the legends told by the
original members of the Rainbow Family which was born at
the gathering.


  Ken Sleight:
  Government efforts to investigate an alleged underground
railroad for a variety of outlaws, desperados and radicals,
including a trail of SafeHouses and HideOuts throughout
the western US, invariably led to one or another of passages
in and out of the Four Corners area.
  The Author and Utah outfitter Ken Slight were often found
to be operating in close proximity without ever seeming to
have confirmable direct contact. Interestingly, they both
seemed to have contact with a large number of the same
people involved in environmental and survivalist arenas,
including Bob Mason, of Durango, although under an assumed
name.


  XS4ALL:
  InterNet Free Terra both hosted the banned website during
their censorship troubles with the the German government, and
helped a variety of other sites set up mirror sites around the
same time. One of the causes of XS4ALL's troubles was the
publication of how-to tips on derailing trains.
  Although it was confirmed that the Author's travel schedule
coincided with a number of railway 'accidents', including theYT
in the vicinity of Saskatoon, no positive links to HisOrHer
involvement could be established. The Flying Spook's recent
investigation, however, turned up the fact that a variety of
those hosting mirrors of the XS4ALL website had travel 
schedules which coincided with that of the Author at the
times of several railway 'accidents', although, once again,
no positive link between the individuals could be established.



Synchronincidence:
  Time is a trick to keep suspicious minds from positively
connecting Taoist subversive criminal radicals to the events
for which they are obviously responsible.
  Space is a trick to keep Taoist subversive criminal radical
coconspirators from being positively linked together when it
is in the best interests of the government to claim that they
are acting alone.
  Paranoia is a trick to keep non-Taoist subversive criminal
radicals from realizing that most LEAs are real Lamers (TM),
and that the only thing one needs to be paranoid of is paranoia,
itself (it's a vicious cycle...).
  Guilt is a trick to keep psychotic sociopath subversive
criminal radicals from killing everyone at once, so that there
is still someone left to plot against them.


DISCLAIMER!!!
_____________

  The Bienfait Nutly News makes no pretensions of operating
as an ethical and responsible news source for individuals
whose cerebral synapse circuits remain unaffected by moon
phases and solar sunspot activity.
  We accept no responsibility for explaining how the 
translation of Reptilians In Black into an RIP acronym
can go unnoticed by the editor until the end of the piece,
or how a well-researched article can somehow seem to peter
out into a meaningless morass of inconsequential facts and
details.
  Hell, we don't even know what the right-square bracket
is *really* called...]





From jya at pipeline.com  Sat Jun 20 13:44:02 1998
From: jya at pipeline.com (John Young)
Date: Sat, 20 Jun 1998 13:44:02 -0700 (PDT)
Subject: The End of Secrecy
Message-ID: <199806202043.QAA00585@dewdrop2.mindspring.com>


From: "The End of Secrecy," by Ann Florini, Foreign Policy, 
Summer, 1998:

   http://jya.com/teos.htm  (39K)

IMF managing director Michel Camdessus has explained, openness 
and transparency are now economic issues, not solely political 
ones:

  As more and more evidence has come to light about the 
  adverse consequences of governance problems on economic 
  performance--among them, losses in government revenue, 
  lower quality public investment and public services, 
  reduced private investment, and the loss of public 
  confidence in government--a broader consensus has 
  emerged on the central importance of transparency and 
  good governance in achieving economic success.

Most officials in Asia seem to have accepted the virtues 
of transparency, at least in the economic field. Singaporean 
senior minister Lee Kuan Yew, stressing the importance of 
transparency in a country's financial system, recently told 
Vietnamese prime minister Phan Van Khai: "In an age of 
information technology, instant communications and computers, 
if you try to hide, you are in trouble." 

[And:]
               The Entomopter Cometh

One of the most unusual MIT designs on the drawing board is a 
four-inch-long, insect-like craft dubbed "the entomopter," 
equipped with legs for crawling through buildings or ventilation 
ducts, and flapping wings for airborne reconnaissance.

Nevertheless, no matter how small, efficient, or cost-effective 
surveillance hardware becomes, there will always be limits to 
what technology can accomplish. Indeed, it is a double-edged 
sword--witness the polemics in Washington and on the Web over 
who, if anyone, should regulate electronic encryption. From 
untappable communications to pixel-by-pixel photo and video 
editing, technology is often as good at hiding secrets as it 
is at revealing them. Without a norm of transparency, technology 
will continue to protect private information as well as ferret 
it out.

-----








From 104367.2728e at compuserve.com  Sat Jun 20 14:52:49 1998
From: 104367.2728e at compuserve.com (104367.2728e at compuserve.com)
Date: Sat, 20 Jun 1998 14:52:49 -0700 (PDT)
Subject: INVESTMENT FRAUD:  Learn how to detect and avoid!
Message-ID: <199806200754.AAA28433@fw.uswnvg.com>



Did you know that YOU could be one of MILLIONS of people who are victims
of investment fraud each year??  

Did you know that SCAM ARTISTS have defrauded people JUST LIKE YOU for
more than $10 BILLION This Year?? 

CLICK HERE ----> http://www.FraudReview-IESC.com <---- TO KEEP YOUR MONEY

If you are absolutely certain it could never be you, the fraudster starts
with a big advantage.  Investment fraud generally happens to people who
think it could never happen to them.  Learn how to avoid investment fraud,
visit http://www.FraudReview-IESC.com

BEFORE YOU INVEST - LEARN THE FACTS

Investment Evaluative Services Corporation has compiled a desktop reference
entitled "Inside the World of Investment Fraud, Scams and Deceptive
Practices".  

It is easy to read, concise and contains the investment phrases, terms, and
conditions that an investor should KNOW and AVOID!  It also contains
citations that will inform the investor of not only what investments should
be avoided, but why.  (Learn more at http://www.FraudReview-IESC.com)
 
If terms like Asset Managed Programs, Bank Debentures, High Yield/Low Risk,
Leveraged Funds, and Top 25 Banks are in your investment portfolio, you may
already be a victim of investment fraud!

If terms like Bank Guarantees of 106%, Blocked Funds Letter,  Safe Keeping
Receipt, and Trading Programs are not familiar to you, you may shortly
become a victim of investment fraud!

To learn more about Investment Evaluative Services Corporation products and
services, please continue on to our home page
http://www.FraudReview-IESC.com 
or call our toll free number  1(888)596-0956.






From 336688zs at mci.com  Sat Jun 20 19:56:24 1998
From: 336688zs at mci.com (336688zs at mci.com)
Date: Sat, 20 Jun 1998 19:56:24 -0700 (PDT)
Subject: Need a Computer??  No Money Down!!
Message-ID: <199806210156.DAA30468@cassiopea.it>


            
            

...BRAND NEW PENTIUM II... ..COMPUTER.. ..NO MONEY DOWN... ...EARN HUGE INCOME.... only serious inquiries only! (for more information & application leave your name, fax & phone #)

More info: put "COMPUTER" in subject area and mailto: fwd617 at mycomsoftware.net Click Here From company98 at yahoo.net Sun Jun 21 00:01:22 1998 From: company98 at yahoo.net (Company98) Date: Sun, 21 Jun 1998 00:01:22 -0700 (PDT) Subject: $36000 in 14 Weeks Message-ID: <419.435967.00088171company98@yahoo.net> Hi My name is Jacqueline McCormack and I would like to show you how easy it is to really make a lot of money. I wouldn't be wasting my time doing this if I didn't know this system works,and all the money you invest is less than an evening at the movies for two. Anyone surely can afford that. I received a letter just like the one your reading now from a lady name Karren Liddel and the rest is history. Here is the email I received and judge for yourself if this will work or not. This is truly the one path I've found to financial freedom. Thanks for your time Jacque ================================================================= I Never Thought I'd Be the One Telling You This: I Actually Read a Piece of E-Mail & I'm Going to Europe on the Proceeds! Hello! My name is Karen Liddell; I'm a 35-year-old mom, wife, and part-time accountant. As a rule, I delete all unsolicited "junk" e-mail and use my account primarily for business. I received what I assumed was this same e-mail countless times and deleted it each time. About two months ago I received it again and, because of the catchy subject line, I finally read it. Afterwards, I thought , "OK, I give in, I'm going to try this. I can certainly afford to invest $20 and, on the other hand, there's nothing wrong with creating a little excess cash." I promptly mailed four $5 bills and, after receiving the reports, paid a friend of mine a small fee to send out some e-mail advertisements for me. After reading the reports, I also learned how easy it is to bulk e-mail for free! I was not prepared for the results. Everyday for the last six weeks, my P.O. box has been overflowing with $5 bills; many days the excess fills up an extra mail bin and I've had to upgrade to the corporate-size box! I am stunned by all the money that keeps rolling in! My husband and I have been saving for several years to make a substantial down payment on a house. Now, not only are we purchasing a house with 40% down, we're going to Venice, Italy to celebrate! I promise you, if you follow the directions in this e-mail and be prepared to eventually set aside about an hour each day to follow up (and count your money!), you will make at least as much money as we did. You don't need to be a wiz at the computer, but I'll bet you already are. If you can open an envelope, remove the money, and send an e-mail message, then you're on your way to the bank. Take the time to read this so you'll understand how easy it is. If I can do this, so can you! GO FOR IT NOW!! Karen Liddell The following is a copy of the e-mail I read: $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ This is a LEGAL, MONEY-MAKING PHENOMENON. PRINT this letter, read the directions, THEN READ IT AGAIN !!! You are about to embark on the most profitable and unique program you may ever see. Many times over, it has demonstrated and proven its ability to generate large amounts of cash. This program is showing fantastic appeal with a huge and ever-growing on-line population desirous of additional income. This is a legitimate, LEGAL, money-making opportunity. It does not require you to come in contact with people, do any hard work, and best of all, you never have to leave the house, except to get the mail and go to the bank! This truly is that lucky break you've been waiting for! Simply follow the easy instructions in this letter, and your financial dreams will come true! When followed correctly, this electronic, multi-level marketing program works perfectly...100% EVERY TIME! Thousands of people have used this program to: - Raise capital to start their own business - Pay off debts - Buy homes, cars, etc., - Even retire! This is your chance, so don't pass it up! ----------------------------------------------------------------- ----------------- OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC MULTI-LEVEL MARKETING PROGRAM ----------------------------------------------------------------- ----------------- Basically, this is what we do: We send thousands of people a product for $5.00 that costs next to nothing to produce and e-mail. As with all multi-level businesses, we build our business by recruiting new partners and selling our products. Every state in the U.S. allows you to recruit new multi- level business online (via your computer). The products in this program are a series of four business and financial reports costing $5.00 each. Each order you receive via "snail mail" will include: * $5.00 cash * The name and number of the report they are ordering * The e-mail address where you will e-mail them the report they ordered. To fill each order, you simply e-mail the product to the buyer. THAT'S IT! The $5.00 is yours! This is the EASIEST electronic multi-level marketing business anywhere! FOLLOW THE INSTRUCTIONS TO THE LETTER AND BE PREPARED TO REAP THE STAGGERING BENEFITS! ******* I N S T R U C T I O N S ******* This is what you MUST do: 1. Order all 4 reports shown on the list below (you can't sell them if you don't order them). * For each report, send $5.00 CASH, the NAME & NUMBER OF THE REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR RETURN POSTAL ADDRESS (in case of a problem) to the person whose name appears on the list next to the report. * When you place your order, make sure you order each of the four reports. You will need all four reports so that you can save them on your computer and resell them. * Within a few days you will receive, via e-mail, each of the four reports. Save them on your computer so they will be accessible for you to send to the 1,000's of people who will order them from you. 2. IMPORTANT-- DO NOT alter the names of the people who are listed next to each report, or their sequence on the list, in any way other than is instructed below in steps "a" through "d" or you will lose out on the majority of your profits. Once you understand the way this works, you'll also see how it doesn't work if you change it. Remember, this method has been tested, and if you alter it, it will not work. a. Look below for the listing of available reports. b. After you've ordered the four reports, replace the name and address under REPORT #1 with your name and address, moving the one that was there down to REPORT #2. c. Move the name and address that was under REPORT #2 down to REPORT #3. d. Move the name and address that was under REPORT #3 down to REPORT #4. e. The name and address that was under REPORT #4 is removed from the list and has NO DOUBT collected their 50 grand. Please make sure you copy everyone's name and address ACCURATELY!!! 3. Take this entire letter, including the modified list of names, and save it to your computer. Make NO changes to the instruction portion of this letter. 4. Now you're ready to start an advertising campaign on the WORLDWIDE WEB! Advertising on the WEB is very, very inexpensive, and there are HUNDREDS of FREE places to advertise. Another avenue which you could use for advertising is e-mail lists. You can buy these lists for under $20/2,000 addresses or you can pay someone a minimal charge to take care of it for you. BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY! 5. For every $5.00 you receive, all you must do is e-mail them the report they ordered. THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS! This will guarantee that the e-mail THEY send out, with YOUR name and address on it, will be prompt because they can't advertise until they receive the report! ------------------------------------------ AVAILABLE REPORTS ------------------------------------------ ***Order Each REPORT by NUMBER and NAME*** Notes: - ALWAYS SEND $5 CASH FOR EACH REPORT - ALWAYS SEND YOUR ORDER VIA FIRST CLASS MAIL - Make sure the cash is concealed by wrapping it in at least two sheets of paper - On one of those sheets of paper, include: (a) the number & name of the report you are ordering, (b) your e-mail address, and (c) your postal address. _________________________________________________________________ REPORT #1 "HOW TO REORGANIZE YOUR TIME TO ACCOMMODATE A HOME BASED BUSINESS" ORDER REPORT #1 FROM: COMPANY98 3941 E. CHANDLER BLVD SUITE 106-142 PHOENIX, AZ 85044 _________________________________________________________________ REPORT #2 "MAJOR CORPORATIONS AND E-MAIL" ORDER REPORT #2 FROM: ACY 3800 DEWEY AVE #298 ROCHESTER, NY 14616 _________________________________________________________________ REPORT #3 "SOURCES FOR THE BEST MAILING LISTS" ORDER REPORT #3 FROM: BUSINESS RESEARCH ASSOCIATES 459 COLUMBUS AVE, SUITE#504 NEW YORK, NY 10024 _________________________________________________________________ REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS" ORDER REPORT #4 FROM: BASQUIAT PO BOX 1963 EVANSTON, IL 60204 _________________________________________________________________ ----------------------------------------------------------------- --------------------------------- HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$ ----------------------------------------------------------------- --------------------------------- Let's say you decide to start small just to see how well it works. Assume your goal is to get 10 people to participate on your first level. (Placing a lot of FREE ads on the Internet will EASILY get a larger response.) Also assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline members. Follow this example to achieve the STAGGERING results below. 1st level--your 10 members with $5...........................................$50 2nd level--10 members from those 10 ($5 x 100)..................$500 3rd level--10 members from those 100 ($5 x 1,000)..........$5,000 4th level--10 members from those 1,000 ($5 x 10,000)...$50,000 THIS TOTALS ----------->$55,550 Remember friends, this assumes that the people who participate only recruit 10 people each. Think for a moment what would happen if they got 20 people to participate! Most people get 100's of participants! THINK ABOUT IT! Your cost to participate in this is practically nothing (surely you can afford $20). You obviously already have an Internet connection and e-mail is FREE!!! REPORT#3 shows you the most productive methods for bulk e-mailing and purchasing e-mail lists. Some list & bulk e-mail vendors even work on trade! About 50,000 new people get online every month! *******TIPS FOR SUCCESS******* * TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and follow the directions accurately. * Send for the four reports IMMEDIATELY so you will have them when the orders start coming in because: When you receive a $5 order, you MUST send out the requested product/report to comply with the U.S. Postal & Lottery Laws, Title 18,Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code, also Code of Federal Regs. vol. 16, Sections 255 and 436, which state that "a product or service must be exchanged for money received." * ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE. * Be patient and persistent with this program. If you follow the instructions exactly, the results WILL undoubtedly be SUCCESSFUL! * ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED! *******YOUR SUCCESS GUIDELINE******* Follow these guidelines to guarantee your success: If you don't receive 10 to 20 orders for REPORT #1 within two weeks, continue advertising until you do. Then, a couple of weeks later you should receive at least 100 orders for REPORT #2. If you don't, continue advertising until you do. Once you have received 100 or more orders for REPORT #2, YOU CAN RELAX, because the system is already working for you, and the cash will continue to roll in! THIS IS IMPORTANT TO REMEMBER: Every time your name is moved down on the list, you are placed in front of a DIFFERENT report. You can KEEP TRACK of your PROGRESS by watching which report people are ordering from you. If you want to generate more income, send another batch of e-mails and start the whole process again! There is no limit to the income you will generate from this business! NOTE: If you need help with starting a business, registering a business name, how income tax is handled, etc., contact your local office of the Small Business Administration (a Federal agency) for free help and answers to questions. Also, the Internal Revenue Service offers free help via telephone and free seminars about business taxes. *******T E S T I M O N I A L S******* This program does work, but you must follow it EXACTLY! Especially the rule of not trying to place your name in a different position, it won't work and you'll lose a lot of potential income. I'm living proof that it works. It really is a great opportunity to make relatively easy money, with little cost to you. If you do choose to participate, follow the program exactly, and you'll be on your way to financial security. Sean McLaughlin, Jackson, MS My name is Frank. My wife, Doris, and I live in Bel-Air, MD. I am a cost accountant with a major U.S. Corporation and I make pretty good money. When I received the program I grumbled to Doris about receiving "junk mail." I made fun of the whole thing, spouting my knowledge of the population and percentages involved. I "knew" it wouldn't work. Doris totally ignored my supposed intelligence and jumped in with both feet. I made merciless fun of her, and was ready to lay the old "I told you so" on her when the thing didn't work... well, the laugh was on me! Within two weeks she had received over 50 responses. Within 45 days she had received over $147,200 in $5 bills! I was shocked! I was sure that I had it all figured and that it wouldn't work. I AM a believer now. I have joined Doris in her "hobby." I did have seven more years until retirement, but I think of the "rat race" and it's not for me. We owe it all to MLM. Frank T., Bel-Air, MD I just want to pass along my best wishes and encouragement to you. Any doubts you have will vanish when your first orders come in. I even checked with the U.S. Post Office to verify that the plan was legal. It definitely is! IT WORKS!!! Paul Johnson, Raleigh, NC The main reason for this letter is to convince you that this system is honest, lawful, extremely profitable, and is a way to get a large amount of money in a short time. I was approached several times before I checked this out. I joined just to see what one could expect in return for the minimal effort and money required. To my astonishment, I received $36,470.00 in the first 14 weeks, with money still coming in. Sincerely yours, Phillip A. Brown, Esq. Not being the gambling type, it took me several weeks to make up my mind to participate in this plan. But conservative that I am, I decided that the initial investment was so little that there was just no way that I wouldn't get enough orders to at least get my money back. Boy, was I surprised when I found my medium-size post office box crammed with orders! For awhile, it got so overloaded that I had to start picking up my mail at the window. I'll make more money this year than any 10 years of my life before. The nice thing about this deal is that it doesn't matter where in the U.S. the people live. There simply isn't a better investment with a faster return. Mary Rockland, Lansing, MI I had received this program before. I deleted it, but later I wondered if I shouldn't have given it a try. Of course, I had no idea who to contact to get another copy, so I had to wait until I was e-mailed another program...11 months passed then it came...I didn't delete this one!...I made more than $41,000 on the first try!! D. Wilburn, Muncie, IN This is my third time to participate in this plan. We have quit our jobs, and will soon buy a home on the beach and live off the interest on our money. The only way on earth that this plan will work for you is if you do it. For your sake, and for your family's sake don't pass up this golden opportunity. Good luck and happy spending! Charles Fairchild, Spokane, WA ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO FINANCIAL FREEDOM!!! When you are ready for a bulk e-mailer call Smith International at 352-629-7695. They do good work. You can send an e-mail to their autoresponder at popcorn at mfi.net. Just click on the blue letters and enter the words "Bulk Email Info" in the Subject Line and in the body of the letter and then click on the Send Now button. All remove requests sent to the above address will receive an autoresponded informational flyer. E-mail addresses are recorded at that site. They were charging only $210 for 100,000 TRUE AOL addresses. From moneyhelp at mymail.com Sun Jun 21 11:30:12 1998 From: moneyhelp at mymail.com (moneyhelp at mymail.com) Date: Sun, 21 Jun 1998 11:30:12 -0700 (PDT) Subject: Get the MONEY You Need Message-ID: <199805280419.AAA07839> GET THE MONEY YOU NEED RIGHT NOW! Here's your chance to... > Eliminate Credit Card Debt! > Escape from High Monthly Payments! > Get Relief and Have the Money You Need! > Cash in Your Pocket Usually within 7 to 14 days! > Make Home Improvements You've Always Wanted! > Take the Vacation You Deserve! How? Simply CLICK HERE TO VISIT OUR WEBSITE! or type or cut & paste: http://www.canus.net/amcap/146.html in your browser Would you like money for... ~ A New Car? ~ College Tuition? ~ Taxes? ~ Consolidate Your Credit Cards? ~ A Dream Vacation? ~ Home Improvements? Now It Can Be Yours! What are you waiting for? For a FREE evaluation please visit our website by... CLICKING HERE (http://www.canus.net/amcap/146.html) or type or cut & paste: http://www.canus.net/amcap/146.html in your browser Especially if you're a homeowner, we can help you. Try us! From jya at pipeline.com Mon Jun 22 06:16:20 1998 From: jya at pipeline.com (John Young) Date: Mon, 22 Jun 1998 06:16:20 -0700 (PDT) Subject: Jim Bell Violation Update Message-ID: <199806221316.JAA04953@dewdrop2.mindspring.com> Jim Bell was released on parole on April 20, but may be about to be rearrested for parole violation, and may not yet know the cops are coming to reviolate: http://jya.com/jdb062198.htm From ptrei at securitydynamics.com Mon Jun 22 06:42:55 1998 From: ptrei at securitydynamics.com (Trei, Peter) Date: Mon, 22 Jun 1998 06:42:55 -0700 (PDT) Subject: Eric Young: Zimmerman redux? Message-ID: Date: 20 Jun 1998 18:40:14 -0000 From: Julian Assange To: ukcrypto at maillist.ox.ac.uk With things starting to heat up here in Australia (DoD/DSD has recently taken to making some exceptionally nasty noises about prosecuting Eric Young, Tim Hudson and the rest of the Australian CryptoMozilla team). I'd like to remind everyone who's interested in aussie/nz crypto issues of the aucrypto mailing list. Australasian & Pacific Cryptography mail the word "subscribe" to aucrypto-request at suburbia.net From shamrock at netcom.com Sun Jun 21 17:19:11 1998 From: shamrock at netcom.com (Lucky Green) Date: Mon, 22 Jun 1998 08:19:11 +0800 Subject: #cypherpunks open Message-ID: <3.0.2.32.19980621170237.00942410@netcom4.netcom.com> #cypherpunks is open on EFnet. -- Lucky Green PGP encrypted mail preferred "I do believe that where there is a choice only between cowardice and violence, I would advise violence." Mahatma Gandhi From billp at nmol.com Mon Jun 22 13:22:10 1998 From: billp at nmol.com (bill payne) Date: Mon, 22 Jun 1998 13:22:10 -0700 (PDT) Subject: Judicial Misconduct at Tenth Circuit Court of Appeals Message-ID: <358EB07D.2EFD@nmol.com> Monday 6/22/98 1:02 PM Senate Judiciary Committee http://www.senate.gov/committee/judiciary.html Republicans Orrin G. Hatch, Utah, Chairman senator_hatch at Hatch.senate.gov Strom Thurmond, South Carolina senator at thurmond.senate.gov Charles E. Grassley, Iowa chuck_grassley at grassley.senate.gov Arlen Specter, Pennsylvania senator_specter at specter.senate.gov Fred Thompson, Tennessee senator_thompson at thompson.senate.gov Jon Kyl, Arizona info at kyl.senate.gov Mike DeWine, Ohio senator_dewine at dewine.senate.gov John Ashcroft, Missouri john_ashcroft at ashcroft.senate.gov Spencer Abraham, Michigan michigan at abraham.senate.gov Jeff Sessions, Alabama Democrats Patrick J. Leahy, Vermont senator_leahy at leahy.senate.gov Edward M. Kennedy, Massachusetts senator at kennedy.senate.gov Joseph R.Biden, Jr., Delaware senator at biden.senate.gov Herb Kohl, Wisconsin senator_kohl at kohl.senate.gov Dianne Feinstein, California senator at feinstein.senate.gov Russell D. Feingold, Wisconsin russell_feingold at feingold.senate.gov Richard Durbin, Illinois dick at durbin.senate.gov Robert Torricelli, New Jersey senator at torricelli.senate.gov Purpose of this e-mail is to give written proof of criminal judicial misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and Judges Moore, Barrett, Weis and help get this matter settled. Thursday March 30, 1995 I wrote Tenth Circuit clerk Hoecker to request a copy of the docket sheets for case 94-2205 Payne v. Sandia Corporation, et al Hoecker did not answer my letter. On Tuesday March 5,1996 I wrote Judge Lucius D. Bunton to ask his help to get a copy of the docket sheets. No response. On Monday September 23, 1996 Arthur R Morales and I wrote Henry A. Politz, Chief Judge U.S. Court of Appeals - Fifth Circuit to ask his help to get a copy of the docket sheets of my case and Morales� Tenth Circuit case 95-2204. Tenth Circuit also refused to send Morales copies of docket sheets for his case. Politz is Bunton's boss. No response. Friday May 30, 1997 I wrote Antonin Scalia to get this help to get a copy of the docket sheets. No response. 5 May 1998 citizen John Young finds docket sheets on Source: PACER, U.S. Court of Appeals, 10th Circuit, 1-800-279-9107 and posts them on Internet at http://jya.com/whp-10usca.htm Docket as of April 10, 1998 0:05 am Proceedings include all events. 94-2205 Payne v. Sandia Corporation, et al shows that I filed my Brief of the Appellant on 2/19/95. 2/23/95 [835344] Appellant's brief filed by William H. Payne. Original and 7 copies. c/s: y. Served on 2/19/95 Oral argument? pro se. Appellee/Respondent's brief due 3/24/95 for Thomas P. Wright, for Robert Surran, for Paul A. Stokes, for Mary J. Stang, for Tommy A. Sellers, for Craig A. Searls, for Albert Narath, for Preston B. Herrington, for Peter S. Hamilton, for Roger L. Hagengruber, for James R. Gosler, for Harold L. Folley, for Robert L. Ewing, for C. William Childers, for Harvey J. Brewster, for Sandia Corporation (mbm) mbm writes "Appellee/Respondent's brief due 3/24/95" Sandia had sent me a copy of its brief by 3/28/96. I filed attached MOTION TO GRANT PLAINTIFF-APPELLANT'S DEMANDS ON BASIS THAT DEFENDANT-APPELLEES FAILED TO FILE BRIEF WITHIN 30 DAYS SPECIFIED BY FEDERAL RULE OF APPELLATE PROCEDURE 31 on Tuesday the 28th day of March, 1995 My February 28 MOTION at the Tenth Circuit is filed WITHOUT notice of service logged. 4/4/95 [845484] Appellant's motion filed by Appellant William H. Payne [94-2205] to grant appellant's demands on basis that appellees' failed to file timely brief. Original and 3 copies c/s: y (mbm) In 1995 FRAP 25 (a) stated "[b]riefs shall be deemed filed on the day of mailing if the most expeditious form of delivery by mail, excepting special delivery, is used." FRAP 25 has been changed by 1998 to http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a Since I mailed Appellant's motion filed by Appellant William H. Payne [94-2205] to grant appellant's demands on basis that appellees' failed to file timely brief on 3/28/98, it is likely Sandia's lawyer Friedman received it 3/29/95. Tenth Circuit logs 3/30/95 [844759] Appellee's brief filed by Sandia Corporation, Harvey J. Brewster, C. William Childers, Robert L. Ewing, Harold L. Folley, James R. Gosler, Roger L. Hagengruber, Peter S. Hamilton, Preston B. Herrington, Albert Narath, Craig A. Searls, Tommy A. Sellers, Mary J. Stang, Paul A. Stokes, Robert Surran, Thomas P. Wright. Original and 7 copies. c/s: y. Served on 3/27/95 Oral Argument? y (appellant is pro se) Appellant's optional reply brief due 4/13/95 for William H. Payne (mbm) Federal Rule of Appellate Procedure [FRAP] 26 (c) states (c) Additional Time after Service. When a party is required or permitted to act within a prescribed period after service of a paper upon that party, 3 calendar days are added to the prescribed period unless the paper is delivered on the date of service stated in the proof of service. http://www.ca5.uscourts.gov/docs/frap-iop.htm#26c While the Tenth Circuit ASSERTS Appellees� brief was, in fact, served on 3/27/95 evidence given below points to the brief was served, in fact, on 3/29/95. I allege that Friedman affixed a false date of service to Sandia's brief. I WAS NEVER PROPERLY SERVED. I wrote Wednesday March 29, 1995 Dan Friedman Simons, Cuddy & Friedman Pecos Trail Office Compound 1701 Old Pecos Trail POB 4160 Santa Fe, NM 87502-4160 505-988-4476 505-984-1807 FAX Dear Lawyer Friedman: Today at 14:00 hours I found a green and white about 9x13 inch envelope in our mail box at my home. Mailing label indicated that the envelope came from your firm. CONFIDENTIAL was stamped on the mailing label. I wrote "Received at 14:00 hours on W 3/29/95 with no POSTMARK OR STAMP by W. H. Payne" at the bottom of the envelope. There was no STAMP OR POSTAGE METER LABEL or POSTMARK on the envelope. Therefore, I gave the envelope to US Postal Service supervisor Mel at 14:49 hours today at the Postal Receiving station at 9904 Montgomery, NW in Albuquerque. Mel has a copy of the cover of the envelope with Mel's note written on it. Mel told me the post office was going to return the envelope to your firm for proper mailing. I ask: 1 What did this envelope contain? Please identify the documents precisely. 2 If any Certificates of Service were included in the envelope, then what were the dates affixed to these documents? 3 Who placed this envelope in our mail box? Lawyer Friedman: It appears you missed an important filing date. And are in the process of attempt to correct your failure. But may be using illegitimate methods to conceal your failure. Please respond as soon as possible so that we all may discover what has happened here." ... Lawyer Friedman did not respond to the above letter. But Friedman did mail me Appellees� brief many days later in envelope showing TRUE MAILING date. Certificate of service on received Appellees� brief did not reflect postmark date. 10th Cir. R. 25.4 in 1995 page 62 reads Papers not accepted for filing. -- The clerk shall not file papers that do not comply with the Federal Rules of Appellate Procedure and these rules See 10thCir. R. 42.1 But Tenth Circuit clerks Fisher and Hoecker despite my protests and submission of evidence may have stamped FILED on Sandia's IMPROPERLY SERVED Appellee/Respondent's brief according to the Federal Rules of Appellate Procedure. Laywer Friedman FALSIFIED THE CERTIFICATE OF SERVICE. Friedman DID NOT MAIL ME "Served on 3/27/95." d) Proof of Service; Filing. A paper presented for filing shall contain an acknowledgment of service by the person served or proof of service in the form of a statement of the date and manner of service, of the name of the person served, and of the addresses to which the papers were mailed or at which they were delivered, certified by the person who made service. Proof of service may appear on or be affixed to the papers filed. When a brief or appendix is filed by mailing or dispatch in accordance with Rule 25(a)(2)(B), the proof of service shall also state the date and manner by which the document was mailed or dispatched to the clerk. http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a Crime apparently committed by Hoecker and Fisher is � 1017. Government seals wrongfully used and instruments wrongfully sealed Whoever fraudulently or wrongfully affixes or impresses the seal of any department or agency of the United States, to or upon any certificate, instrument, commission, document, or paper or with knowledge of its fraudulent character, with wrongful or fraudulent intent, uses, buys, procures, sells, or transfers to another any such certificate, instrument, commission, document, or paper, to which or upon which said seal has been so fraudulently affixed or impressed, shall be fined under this title or imprisoned not more than five years, or both. http://www.law.cornell.edu/uscode/18/1017.shtml Despite my protests of judicial misconduct Judges Moore, Barrett, Weis award decision to Sandia 10/6/95 [890055] Order filed by Judges Moore, Barrett, Weis "...All outstanding motions are denied..." (found in Order & Judgment of 10/6/95) [879579-1] Parties served by mail. (pdw) when these judges should not have had Appellees� brief before them. Then in an apparently attempt to conceal what happened 10/6/95 [890076] NOTE: THIS ENTIRE CASE IS SEALED. Terminated on the Merits after Submission Without Oral Hearing; Judgment Affirmed; Written, Signed, Unpublished. Moore, authoring judge; Barrett; Weis. [94-2205] (pdw) I WON MY APPEAL, pro se, ON A TECHNICALITY but judges Judges Moore, Barrett, Weis awarded the win to Sandia Labs! Members of Congress, judicial misconduct in this matter has been well-documented. Court records filed with the Tenth Circuit. But CURRENTLY under seal. Lawyers involved in this matter attempt to use the legal strategy of IGNORE and STONEWALL to attempt to deny me justice. Ignoring and stonewalling by lawyers forced Morales and me to seek visibility so lawyers could no longer ignore and stonewall. Lawyer attitude apparently is that they ignore rules of civil procedure or even the law so long as their actions are invisible to public scrutiny. Visibility was achieved by suing the National Security Agency which revealed even more judicial misconduct http://www.jya.com/whp052898.htm. I would like to settle all matters involved with this unfortunate cyrpto-related matter, which includes criminal violations of the Privacy Act. DOE lawyer Steve Dillingham asked me to prepare a settlement offer in 1994. I wrote a settlement letter May 22, 1994 to Dillingham. Nothing happened. June 11, 1998 I made several modifications to my 1994 settlement letter and sent it e-mail to Robert Nordhaus, Chief Counsel, DOE. I ask that you 1 help with settlement of my six-year-old since I won my appeal at the Tenth Circuit, 2 investigate Tenth Circuit case 94-2205 Payne v. Sandia Corporation, et al to bring the guilty to justice. Sincerely william payne 505 292 7037 I am not reading e-mail http://jya.com/whpfiles.htm http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html Coauthor Lewis in the above is one of my former MS and PhD students in computer science. http://www.friction-free-economy.com/ Monday 6/22/98 1:04 PM Members of Congress Purpose of this e-mail is to give written proof of criminal judicial misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and Judges Anderson, Barrett, Logan and request a congressional investigation. After several years, with Payne, of trying to get Tenth Circuit to send docket sheets from my case, citizen John Young http://www.jya.com/index.htm locates docket sheets and posts them Morales Case Dockets 10th USCA June 12, 1998 on Internet at http://www.jya.com/arm061298.htm. Source: Online records Tenth Circuit Court of Appeals via PACER GENERAL DOCKET FOR Tenth Circuit Court of Appeals Court of Appeals Docket #: 95-2204 Filed: 9/29/95 Nsuit: 3440 Morales v. Sandia National Lab. Appeal from: United States District Court for the District of New Mexico I filed 11/9/95 [898274] Appellant's brief filed by Arthur R. Morales. Original and 2 copies. c/s: y. Served on 11/7/95. Oral argument? pro se. Appellee's brief due 12/11/95 for Sandia National Lab. (pdw) Sandia files its FIRST ATTEMPT at 12/11/95 [905033] Appellee's deficient brief filed by Sandia National Lab.. Appellee's corrected brief due 12/21/95 for Sandia National Lab. additional copies received 12/11/95. (fg) Tenth Circuit court clerk Patrick Fisher writes Wells on December 11, 1995 concerning Sandia's deficient brief [C]orrections, however made, must be accompanied by proof of service upon all other parties to the appeal. ... and issues 12/14/95 [905975] FIRST notice of rules violation for Deborah D. Wells for Appellee Sandia National Lab. (sls) Wells submits 12/21/95 [907974] Appellee's brief filed by Sandia National Lab.. Original and 7 copies. c/s: y. Served on 12/20/95 Oral Argument? n Appellant's optional reply brief due 1/8/96 for Arthur R. Morales (mbm) but DOES NOT serve me with a copy. Wells later admits in 2/1/96 [917660] Response filed by Sandia National Lab. Appellant/Petitioner motion to clarify Original and 3 copies. c/s: y response Null Relief Code (fg) Certificate of Service date 30th day of January, 1996, [h]ad Appellant simply made a phone call to the Tenth Circuit, he could have established that the Defendant-Appellee's corrected brief was indeed filed on a timely basis, ... I protested by filing 1/3/96 [909965] Appellant's motion "for the Court to Grant Appeal" filed by Appellant Arthur R. Morales [95-2204]. Original and 3 copies. c/s: y. (pdw) 1/3/96 [909966] Appellant's motion "for New Trial" filed by Appellant Arthur R. Morales [95-2204]. Original and 3 copies. c/s: y. (pdw) 1/3/96 [909967] Appellant's motion "to Discipline Defendant-Appellee" filed by Appellant Arthur R. Morales [95-2204]. Original and 3 copies. c/s: y. (pdw) because Sandia did not properly serve me in violation of Fisher's December 11, 1995 order. The Tenth Circuit court of appeals should NOT, by its own rules, filed Appellee's brief filed by Sandia National Lab.. Original and 7 copies. c/s: y. Served on 12/20/95 10th Cir. R. 25.4 in 1995 page 62 reads Papers not accepted for filing. -- The clerk shall not file papers that do not comply with the Federal Rules of Appellate Procedure and these rules See 10thCir. R. 42.1 And is doubtful whether court clerk Fisher had any authority under appellate procedure to permit Wells to correct her deficient brief. Rather Sandia's brief did not comply with with Federal Rules of Appellate Procedure and should have been summarily rejected for filing. I WON, pro se, my appeal to the Tenth circuit on a technicality but Judges Anderson, Barrett, Logan awarded the win to Sandia Labs. 4/2/96 [932848] Order filed by Judges Anderson, Barrett, Logan denying parties' motions for general relief(found in Order and Judgment of 4/2/96)--"...During the course of this appeal, the parties have filed various motions for dismissal, summary grant, and sanctions. We find no merit to any of these motions, and they are [920851-1] Parties served by mail. (pdw) by accepting and judging on a documents which was not permitted to be before the court by its own rules. Judicial misconduct in my case has been well-documented as it is in Payne's case. Payne and I speculate that similar judicial misconduct may have occurred at the Tenth Circuit. Sandia lawyer Robert J Park wrote me a settlement letter on Feb 18, 1998. I filled in the blanks and made minor handwritten chages and returned it on February 22, 1998. But my offer has not yet been accepted. I ask that you 1 help have my settlement offer accepted, 2 investigate judicial misconduct in case 95-2204 and punish the guilty. Some citizens can only express such frustrations with the US court system with violence. I seek change by legal reform. Sincerely Arthur R Morales 505 345 1381 From CTIA_Daily_News at tour.unitymail.com Mon Jun 22 14:24:44 1998 From: CTIA_Daily_News at tour.unitymail.com (CTIA Daily News) Date: Mon, 22 Jun 1998 14:24:44 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - June 22, 1998 Message-ID: <199806222114.QAA21599@revnet4.revnet.com> ======================================== Welcome to today's edition of the CTIA Daily News from WOW-COM. Please click on the icon for the most important news in wireless communications today. ======================================== From privsoft at ix.netcom.com Mon Jun 22 16:19:07 1998 From: privsoft at ix.netcom.com (Steve Orrin) Date: Mon, 22 Jun 1998 16:19:07 -0700 (PDT) Subject: Verisign & NAI Join Forces, PGP out the door? Message-ID: <199806222317.SAA04853@dfw-ix5.ix.netcom.com> To all: Word is the PGP is being dropped as a standard and NAI converting over to x.509 throughout product line. However the info is vague wnough to mean alot of things:) sorrin NETWORK ASSOCIATES AND VERISIGN PARTNER TO PROVIDE INTEROPERABLE 6/22/98 13:18 Digital Certificate Solutions to Millions of Users Worldwide Partnership Provides Customers Choice of Leading Certificate Formats, Enabling Widespread Secure Internet Business Transactions MOUNTAIN VIEW and SANTA CLARA, Calif., June 22 /PRNewswire/ -- VeriSign, Inc. (Nasdaq: VRSN), and Network Associates (Nasdaq: NETA), today announced a broad reaching partnership to enable cross product support and promotion of each company's digital certificate-based security solutions. This partnership will provide customers with a flexible security solution that encompasses best-of-breed products and technologies -- enabling secure global electronic commerce and business-to-business communications on a larger scale than ever before. With this announcement, Network Associates and VeriSign can tap into the world's largest community of certificate holders made up of over one thousand five hundred enterprises and nearly nine million individuals throughout the world. This integration of the world's leading certificate technologies will enable businesses to utilize their choice of certificate formats while conducting secure Internet transactions such as: exchanging secure e-mail, establishing virtual private networks, and authorized access to confidential corporate data. Network Associates and VeriSign customers will now be able to establish combined PKI solutions covering the complete lifecycle of certificates from issuance and usage through renewal, expiration, or revocation. The first commercial offering from this collaboration will be interoperable between the Gauntlet GVPN product and VeriSign OnSite for IPSEC, which will be available in the third quarter. In the fourth quarter VeriSign's OnSite service and toolkit will be enhanced to issue DSA X.509 certificates in addition to its RSA X.509 certificates, and Network Associates' Net Tools Secure, including their industry leading PGP encryption products, will be updated to request and use either type of certificate. "By joining the two largest players in the industry to ensure that our customers' security applications are seamlessly compatible, we are fueling the growth of electronic commerce and secure communications on the Internet," said Peter Watkins general manager of the Net Tools Secure division at Network Associates. "We are pleased to offer VeriSign as our preferred provider of digital certificate services. Together, we are the only two companies to support the full range of certificate standards -- giving customers the power of choice when implementing their open, certificate-based security solutions." "We are extremely pleased to work with Network Associates to bring enterprise customers a clear best-of-breed solution," said Stratton Sclavos, president and CEO of VeriSign. "With this partnership, users of Network Associates' desktop and server encryption applications can simply obtain their choice of digital certificates to establish a fully functional, interoperable PKI through the use of OnSite." "The announcement from VeriSign and Network Associates is a win-win situation for Information Systems (IS) decision makers," said Jim Hurley, director of information security at Aberdeen Group, a Boston-based IS market-research, consulting and analysis firm. "One supplier helps IS managers by managing risk while the other helps IS managers by enabling safe interconnections with suppliers, partners and customers for mission business-procedures. Interoperable and seamless support between these supplier's products is the kind of partnership that IS executives will reward." VeriSign OnSite, a state of the art digital certificate solution that enables organizations to quickly and easily establish themselves as a certificate authority, is available today for client and server digital certificates and will be available for IPSec digital certificates in the third quarter. VeriSign OnSite pricing begins at $4995 for 1000 client certificates. Network Associates' Net Tools Secure suite is the industry's most comprehensive set of security products encompassing enterprise encryption, authentication, intrusion detection, audit analysis, anti-virus, firewall, global virtual private network and network vulnerability assessment. Net Tools Secure is available now and is priced at $49 per user for 5000 users. Network Associates, Inc. With headquarters in Santa Clara, California, Network Associates, Inc., formed by the merger of McAfee Associates and Network General, is a leading supplier of enterprise network security and management solutions. Network Associates' Net Tools Secure and Net Tools Manager offer best-of-breed, suite-based network security and management solutions. Net Tools Secure and Net Tools Manager suites combine to create Net Tools, which centralizes these point solutions within an easy-to-use, integrated systems management environment. For more information, Network Associates can be reached at 408-988-3832 or on the Internet at http://www.nai.com. VeriSign, Inc. is the leading provider of digital certificate solutions used by enterprises, Web sites and consumers to conduct secure communications and transactions over the Internet and private networks. VeriSign's Digital IDs and Secure Server IDs are available through the company's Web site at http://www.verisign.com. VeriSign's E-Commerce Solutions are used by enterprises to deploy complete Public Key Infrastructure (PKI) solutions for intranets, extranets, and large-scale electronic commerce applications, and are available through VeriSign regional account representatives or through VeriSign resellers. For more information visit VeriSign's Web site at http://www.verisign.com. SOURCE Network Associates, Inc. -0- 06/22/98 /CONTACT: Nathan Tyler of Copithorne & Bellows, 415-975-2223, for Network Associates; or Kelly Ryan of VeriSign, 650-429-3424/ /Company News On-Call: http://www.prnewswire.com or fax, 800-758-5804, ext. 124004/ /Web site: http://www.verisign.com http://www.nai.com/ (NETA VRSN) CO: Network Associates, Inc.; VeriSign, Inc. ST: California IN: CPR MLM SU: PDT -0- (PRN) Jun/22/98 13:03 EOS (PRN) Jun/22/98 13:03 86  -0- (PRN) Jun/22/ 98 13:18 From privsoft at ix.netcom.com Mon Jun 22 16:20:14 1998 From: privsoft at ix.netcom.com (Steve Orrin) Date: Mon, 22 Jun 1998 16:20:14 -0700 (PDT) Subject: Entrust goes Public Message-ID: <199806222319.SAA04946@dfw-ix5.ix.netcom.com> > Entrust filed to go public. -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00000.bin Type: application/octet-stream Size: 302 bytes Desc: "ENTRUST TECHNOLOGIES INC (Internet Shortcut)" URL: From 43348928 at 30267.com Mon Jun 22 16:54:26 1998 From: 43348928 at 30267.com (Nicole) Date: Mon, 22 Jun 1998 16:54:26 -0700 (PDT) Subject: Just for You Message-ID: <199342143263123.GXGT24348@default>


Hi...

This message is meant for Adults over the age of 21, If you have received this message in error, please delet it now and accept our appologies.

I would like to tell of about this great sex site on the web, offering everything you will ever desire.

It has live sex chat and a live sex xhow from Amsterdam.

Go and check it out.

http://www.sex4u.net/

Love 

Anna









From msew+ at andrew.cmu.edu  Mon Jun 22 17:23:58 1998
From: msew+ at andrew.cmu.edu (Martin C Sweitzer)
Date: Mon, 22 Jun 1998 17:23:58 -0700 (PDT)
Subject: export Laws regarding less than 40 bit encryption
In-Reply-To: 
Message-ID: 


Can anyone point me to a document that clearly states the laws governing
the export of software with less than 40 bits worth of encryption. 

The ITAR made my head hurt.  (damn lawyers)



thanks

msew






From lreed at west.cscwc.pima.edu  Mon Jun 22 17:32:39 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Mon, 22 Jun 1998 17:32:39 -0700 (PDT)
Subject: Blood Sausage -- SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C818C.71EFAE40.1@west.cscwc.pima.edu>


BloodSausage HogLog - SPACE ALIENS HIDE M DRUGS!!!
___________________________________________________

"The lives of Frank, Gambino, Morel and Serafini ended on 
the gallows of Montreal's Bordeaux Jail on October 24,
1924. Valentino and Davis had their executions commuted
at the last minute."

"No one claimed Frank, Gambino and Valentino were among
the half-dozen gunmen who ambushed the bank car, but
prosecutorn R.L. Calder argued they were still guilty of
murder because of the organized nature of the crime."

~Excerpts from "Blood Brothers" by Peter Edwards.


  MeTheSheeple was glad to learn that these vile, criminal
scumbags, fingered by the person who had actually planned
and committed the crime, were held accountable for the
actions alleged to them by the gang-leader whose life was
spared in return for ratting out alleged coconspirators.
  I was particularly happy because I knew that the same
high standards of justice would undoubtedly be applied to
the criminal scum within the Canadian Justice System under
whose PigSkin Umbrella the Montreal Mobsters ruled the
streets and the citizens who walked them.

"Testimony at the Frank robbery trial showed that police
routinely sipped coffee with hoods and that Montreal's
finest had been tipped off to the armoured car hold-up
well in advance, but did nothing."

  Supreme Court of Canada Justice Louise Coderre (with a
left-handed frog-tongue over the first 'e') said, "Vice
has spread itself across the city with an ugliness that
seemed assured of impunity."

  Rather than bore you with all of the details behind the
criminal scumbag PigsWithBadgesAndGuns being also found
'GUILT OF MURDER BECAUSE OF THE ORGANIZED NATURE OF THE
CRIME', I will just skip ahead in the book and report on
the final outcome of  JUSTICE 
in the case of the police and city officials discovered
to have greased the wheels of organized crime in their
activities of drug dealing, robbery, murder, etc.
  Hmmm....nope...nada....maybe...nope...nope...

  Surprise, surprise! It seems that, following the
Coderre probe, "nothing happened that seriously
threatened the criminals' take. The name of Cadiex 
Street was changed to de Bullion Street after a New
ork play made the old name notorious, but along the 
same pavement the same crimes continued."

  Those without my cynical psychological make-up will
undoubtedly be able to supply you with reasons as to
just why the local citizens felt extremely 'served and
protected' when they came to after being mugged and saw
the new street signs, however, I will merely take a short
break, here, have a good dump, and wipe my butt with yet
another page of the Criminal Code of Canada.


And Silk Badges..?:

"I know who the real public enemies are. But they are
men who have the respect of the public; men who wear
silk hats, who are apparently of standing in the 
community."
~1930's Montreal MobBuster, J.J. Penverne
 (with no frog-licks in his name...)

  Peter Edwards provides the standard journalistic
explaination as to how "The term 'Mafia,' in its truest
form, refers only to organized crime in western Sicily."
and explains how it has been expanded to encompass any
pair of teenagers throwing a rock through a window, as
long as one of them has an Italian name.
  He neglects to explain, as some journalists do, that
the word "Mafia" is becoming increasingly generic, now
including the 'Lebanese Mafia', the 'Columbian Mafia',
etc.
  *All* journalists, however, seem unable to explain why
they continue to avoid naming the continuing organized forces
of armed domination over citizens of *all* ethnic groups the
'Government Mafia'...

  "Blood Brothers" is not the first book to point out that
at the heart of the "honoured society of Calabria" lies the
concept of "omerta" (with a right-handed strand of spaghetti
over the 'a').
  Nor is it the first book to fail to point out that omerta's
"double code of conduct that set different moral codes for 
dealings with those inside and outside one's family circle"
applies not only to Officially Recognized Criminal ScumBag
Organizations, but also to almost every 'gang' larger than
a Cult Of One from the PTA to the CIA to the USA. 
  'Omerta' decrees that when the president of the PTA molests
a child, when the head of the CIA commits treason, when the
president of the USA declares that US citizens will continue
to face imprisonment for exporting the same strength of
encryption that their government is sharing with Communist
China, that a street somewhere be renamed, while everything
else continues on pretty much as before.


  Don't hold your breath waiting for mainstream journalists
to upset the BadAppleCart by referring to the 'PTA Mafia' when 
they deem that your child should be forced to attend school with
a child who can murder them by biting them, while teaching
them that you are a dangerous psycho because of your gun
ownership; or to the 'FBI Mafia' when they murder a mother and
child in attempts to cover their previous unannounced, botched
armed assault on a citizen being charged with civil crimes in
an attempt to persuade him to invent crimes against his friends,
whether they were Jewish or not; or to the 'Government Mafia'
when they spend millions of dollars investigating and/or charging
Phil Zimmerman, Bill Clinton, Bill Gates, Jim Bell, knowing that
the bottomless taxpayer pockets funding their legally unjustified
harassment will guarantee at least moderately successful results,
even if the end result is dropping the matter when the multi-
million dollar stench begins blowing back toward DC.
  Do not expect mainstream journalists to refer to the 'ASPCA
Mafia' when they release a hastily composed 'history' of 
TruthMongrel as a rabid, sharp-toothed, human baby conniseur,
after HeOrShe is cut down by FBI gunfire on Mayonaisse Mountain
during attempts to arrest the Author on 'Dog At Large' charges
filed by the Royal Canadian Mounted Police in Bienfait, Sask.


Silk? We Don't Need No Stinking Silk...:
  The multi-facted PigsEar WebSites that are increasingly
being turned into InterNet Cult of One SilkPurses through
the increasingly efficient and powerful shareware digital
bread-slicers available to Jane and Joe Sheeple in their
quest to serve either God, Mammon, Dog or Mammy, according
to their prediliction, have the capacity, if uncensored 
and uncontrolled, of allowing the individual to rekindle
the creative spark of individuality that reminds them that
the word 'WE' should only be used by Kings, Priests, and
people with tapeworms.
  People with the ability to think for themselves; people
who know that if Timothy McVeigh was really the 'Muenster'
that the mainstream media claimed, then he would have been
in the 'Adams Family' movie; people who demand to know if
Monica Lewinski has a 'bent' pussy; people with conspiring
minds, who want to 'snow'; people who are not afraid to
stand up and cheer for the Officially Recognized BadGuys
on 'Cops' and 'World's Scariest Innocent Bystander
Threatening Police Chases'; people watching 'World's Dumbest
Criminals' who slap their forehead and say, "I hate it when
that happens..."
  People who read the Bienfait Nutly News.






From CTIA_Daily_News at tour.unitymail.com  Mon Jun 22 22:49:41 1998
From: CTIA_Daily_News at tour.unitymail.com (CTIA Daily News)
Date: Mon, 22 Jun 1998 22:49:41 -0700 (PDT)
Subject: CTIA Daily News From WOW-COM - June 22, 1998
Message-ID: <199806230545.AAA07698@revnet4.revnet.com>



========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon for the
most important news in wireless communications today.
========================================



From jya at pipeline.com  Tue Jun 23 05:49:03 1998
From: jya at pipeline.com (John Young)
Date: Tue, 23 Jun 1998 05:49:03 -0700 (PDT)
Subject: Jim Bell Rearrested
Message-ID: <199806231248.IAA16982@camel8.mindspring.com>


JY note: The message below has not been authenticated. The writer claimed
no knowledge of the arrest at the time I spoke with him, which was 
after the date and time of the arrest given in the message. It's
possible he was withholding the information for publication or by
request of confidentiality. The message may be a forgery written
after seeing the messages at http://jya.com/jdb062198.htm. The IRS
has sent spam concerning Jim Bell before: http://jya.com/irs-spam.htm.

From: Anonymous 3
Date: Mon, 22 Jun 1998 23:31:33 EDT
To: jya at pipeline.com
Subject: Jim Bell and anon

John: 

This is [a journalist] whom you called today about Bell. He was
arrested at his parents' home in Vancouver Monday about 1:07 a.m. PDT by five
federal marshals in two cars. The agents went in with guns drawn and came out
with Bell's elderly parents, with whom they talked for a while. A few minutes
later, they brought out Jim, who was handcuffed in front, dressed in a blue T-
shirt and slacks. He was put in the back of a red Jeep, and then leg chained
by an agent. (I tried to ask one of the agents if Jim was going to be taken
directly to Tacoma - my assumption - but the agent was a typical marshals
service jerk and just told me to stay away.)

Jim was in the backseat for about 20 minutes and then two agents came out and
drove him away - after one agent accidentally set off the Jeep "wa-wa" siren -
...just as TV arrived. the other three agents remained in the house, looking
for "evidence," i assume.

I expect him to appear before a federal magistrate in Tacoma tomorrow
morning. His federal defender still has not been provided any paper by the
govt.

so, now yr up to date.

on another matter, I was curious abt the anonymous info sent you. i've been
trying to get an anon remailer for some time, but have been unsuccessful. got
any tips, advice or help?			








From rah at shipwright.com  Tue Jun 23 08:47:20 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Tue, 23 Jun 1998 08:47:20 -0700 (PDT)
Subject: Jim Bell Rearrested
In-Reply-To: <199806231248.IAA16982@camel8.mindspring.com>
Message-ID: 



So, is this in reference to his purported request to get access to
computers after his release?

Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga
Philodox Financial Technology Evangelism
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Philodox: , e$: 
               






From pircher at informatik.tu-muenchen.de  Tue Jun 23 10:02:41 1998
From: pircher at informatik.tu-muenchen.de (Alex `Taker` Pircher)
Date: Tue, 23 Jun 1998 10:02:41 -0700 (PDT)
Subject: Anonymicer
Message-ID: <358FDF49.4AC1@informatik.tu-muenchen.de>


Protect your Privacy for FREE!

http://anonymicer.home.ml.org/
(or http://anonymicer.home.pages.de/)

* Surf anonymously         -  http://anonymicer.home.ml.org/
* Send anonymous Emails    -  http://anonymicer.home.ml.org/email/
* Post anonymous Messages
  into Newsgroups          -  http://anonymicer.home.ml.org/news/

Fast - Easy - Free

Greetz,
 Taker

 pircher at informatik.tu-muenchen.de





From CTIA_Daily_News at tour.unitymail.com  Tue Jun 23 10:42:49 1998
From: CTIA_Daily_News at tour.unitymail.com (CTIA Daily News)
Date: Tue, 23 Jun 1998 10:42:49 -0700 (PDT)
Subject: CTIA Daily News From WOW-COM
Message-ID: <199806231737.MAA29674@revnet4.revnet.com>



========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon for the
most important news in wireless communications today.
========================================



From jya at pipeline.com  Tue Jun 23 10:49:37 1998
From: jya at pipeline.com (John Young)
Date: Tue, 23 Jun 1998 10:49:37 -0700 (PDT)
Subject: Jim Bell Rearrested 2
In-Reply-To: <199806231248.IAA16982@camel8.mindspring.com>
Message-ID: <199806231749.NAA16701@dewdrop2.mindspring.com>


The message about Jim's rearrest yesterday is confirmed,
except the time of arrest was 1:07 PM, not AM. The reporter
went by Jim's house after confirming that a bust was scheduled
and waited for the action.

Jim's been taken from Vancouver, WA, where he lives with his
parents, to either Spokane or Seattle, for a hearing before
a magistrate on the alleged parole violation. Jim's public
defender is on the matter.

No information on Jim's alleged violation, although the reporter
says supposedly there's a long list of prohibitions including one 
against going near a federal facility, "even a mailbox." 

Someone's trying to a get a copy of the list which should be 
public information.

Jim's appeal with the Ninth Circuit Court is presumably for 
reduction of the onerous prohibitions which may have
been made sever enough that he could be hauled in
whenever publicity is needed in the lucrative fight against 
"terrorism of the American people," a fever for funding that's 
feeding bucks into the bottomless pockets of US Justus 
Terrorists coming to call.








From jya at pipeline.com  Tue Jun 23 12:10:31 1998
From: jya at pipeline.com (John Young)
Date: Tue, 23 Jun 1998 12:10:31 -0700 (PDT)
Subject: NSA Declassifies Algos
Message-ID: <199806231910.PAA29551@dewdrop2.mindspring.com>


Thanks to Ed Roback, NIST:


http://www.defenselink.mil/news/Jun1998/b06231998_bt316-98.html

DoD Press Release, June 23, 1998:

No. 316-78
IMMEDIATE RELEASE
June 23, 1998
(703)695-0192(media)
(703)697-5737(public/industry)

           ENCRYPTION FORMULAS DECLASSIFIED

The Department of Defense today announced the decision by the 
National Security Agency to declassify both the Key Exchange 
Algorithm and the SKIPJACK encryption algorithm used in the 
FORTEZZA(tm) personal computer card. FORTEZZA(tm) provides 
security at the desktop in the Defense Message System and other 
DoD applications. This marks the first time that the NSA has 
declassified such information and made it commercially available. 

This declassification is an essential part of the Department of 
Defense's efforts to work with commercial industry in developing 
reasonably priced computer protection products. This 
declassification decision will enable industry to develop software 
and smartcard based security products, which are interoperable 
with FORTEZZA(tm). The availability of such products will enhance 
the protection of DoD's sensitive but unclassified and critical 
non-mission communications. 

The decision to release SKIPJACK (an 80 bit encryption algorithm 
that is not extensible to higher key lengths) and KEA (a 1024 bit 
key exchange algorithm) is restricted to these particular 
algorithms, and does not apply to other classified NSA algorithms. 
The SKIPJACK and KEA algorithms and their source codes have been 
declassified pursuant to Executive Order 12958. 

Vendors interested in obtaining more information on this matter 
should contact the National Security Agency Public Affairs Office 
at 301-688-6524. 

[End]

-----

Note: We called NSA Public Affairs who said that more information 
will be available tomorrow afternoon on NIST's Web site (no specific 
URL):

   http://www.nist.gov

In the meantime NSA will respond to faxed questions; send to:

   Vanessa Talieri
   Office of Public Affairs
   National Security Agency
   Fax: 301-497-2844







From jkthomson at bigfoot.com  Tue Jun 23 12:13:08 1998
From: jkthomson at bigfoot.com (jkthomson)
Date: Tue, 23 Jun 1998 12:13:08 -0700 (PDT)
Subject: PGPdisk for win95/98?
Message-ID: <3.0.3.32.19980623121806.006ce848@dowco.com>


	



	Great, so I finally get around to checking PGP's betaweb, and to my
amazement, they finally have a beta version of PGPdisk for 95.  Too bad it
claims that I need to contact a sales rep, and when I follow their link, I
get nothing that would really point me in the right direction.  Any of you
manage to get your hands on a copy? 

	Currently, I am using bestcrypt NP with blowfish.  I am a little concerned
with this however, As I have never seen a crypto-review of the software,
and their website is not too forthcoming with technical details, or known
attacks.  Does anyone have information (or horror stories) from using
bestcrypt? 



---------------------------------------------------------------
 james 'keith' thomson        ICQ:746241
 jkthomson:  C181 991A 405C EAFB 2C46  79B5 B1DC DB78 8196 122D
 http://www.bigfoot.com/~ceildh            at pgp.mit.edu
---------------------------------------------------------------

You can lead a man to slaughter, but you can't make him think.
================================================================





From bogus@does.not.exist.com  Tue Jun 23 12:15:45 1998
From: bogus@does.not.exist.com ()
Date: Tue, 23 Jun 1998 12:15:45 -0700 (PDT)
Subject: Creating Wealth In America
Message-ID: <199806232650RAA53408@adv01.ieighty.net>


Creating Wealth in America

>From the desk of Robert Allen, The Author of 2 Mega Best-Sellers, Nothing Down
 and Creating  Wealth in America

San Diego, California 
 11:29 P.M.

"I can't sleep until I get this off my chest."

"I'm extremely frustrated".

Odds are that nine out of ten people who receive this letter will discard it without a second thought.  Yet, I know that I have discovered a secret that could change your financial life forever!  And I'm willing to share it with you for FREE.

     Do you want to end your money pressures forever?
     Do you want to double your income?
     Do you want to build an extra stream of income quickly?

If you answered yes, then let me show you how you can begin living your dreams, this year before it's too late.  I'll get right to the point.

As it says on the letterhead, my name is Robert Allen.  I'm famous for my two #1 New York Times best-selling books.  Nothing Down and Creating Wealth in America.  There are lots of millionaires who credit their success to one of my books or seminars.  So when I share this secret with you, I want you to know that I've done my homework.  Here it comes.

I have discovered what I believe is the perfect home-based business.

Although I'm well known for real-estate investment books and seminars, this new business has absolutely nothing to do with real-estate.  In fact, it's much easier and far less risky.  It involves:

-No employees
-Little risk
-Little start up cash
-It's so simple, anyone can do it

You could be earning $1,000 a week in as little as 90 days.  One person I know went from zero to $3,000 a week in 60 days.  That's $150,000 a year extra, hassle-free income!

In my 20 years of research, I can honestly say, "I've never seen a faster, easier way to create a stream of income".

I know this sounds too good to be true.  Frankly, I didn't believe it myself at first.  Finally, I agreed to check it out.  As a test, I selected a small group of people and introduced them to this incredible opportunity.  Almost immediately, many of them started earning profits.  Within a week, many were earning incomes of $4,000 per month in net cash flow.  Now, some of them are cashing checks for $3,000 a week.  And this is just the beginning!  Their earning potential could be unlimited!

Would you like to learn how to do that?  I'd love to show you how.  But only if you're interested enough to make one telephone call.  The number to call immediately is 1-888-267-4455.  It's a 3-minute, 24-hour recorded message.  This may be the answer you have been seeking.

Warmly,

Robert G. Allen

P.S.  I want to show you how to create extra streams of income quickly,
      Go to the phone and call now 1-888-267-4455.


// 






From maxinux at bigfoot.com  Tue Jun 23 13:55:40 1998
From: maxinux at bigfoot.com (Max Inux)
Date: Tue, 23 Jun 1998 13:55:40 -0700 (PDT)
Subject: PGPdisk for win95/98?
In-Reply-To: <3.0.3.32.19980623121806.006ce848@dowco.com>
Message-ID: 


No horror stories of bestcrypt, but I hear that PGPdisk is damn dope,
except for two things.  The crypto 'file/partition/whatever' is static in
size, not dynamic, and it does _not_ use your pgp key.. But it looks like
it should still be neat.. I still like CFS for  linux :-)

-- Max Inux (MaxInux at bigfoot.com) UIN: 207447, http://khercs.chipware.net 
Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59
Or Kinky sex makes the world go round- Christie: Your in my sig too
^^ If Cryptography is outlawed,  only outlaws will have cryptography ^^

 

On Tue, 23 Jun 1998, jkthomson wrote:

> 
> 	
> 
> 
> 
> 	Great, so I finally get around to checking PGP's betaweb, and to my
> amazement, they finally have a beta version of PGPdisk for 95.  Too bad it
> claims that I need to contact a sales rep, and when I follow their link, I
> get nothing that would really point me in the right direction.  Any of you
> manage to get your hands on a copy? 
> 
> 	Currently, I am using bestcrypt NP with blowfish.  I am a little concerned
> with this however, As I have never seen a crypto-review of the software,
> and their website is not too forthcoming with technical details, or known
> attacks.  Does anyone have information (or horror stories) from using
> bestcrypt? 
> 
> 
> 
> ---------------------------------------------------------------
>  james 'keith' thomson        ICQ:746241
>  jkthomson:  C181 991A 405C EAFB 2C46  79B5 B1DC DB78 8196 122D
>  http://www.bigfoot.com/~ceildh            at pgp.mit.edu
> ---------------------------------------------------------------
> 
> You can lead a man to slaughter, but you can't make him think.
> ================================================================
> 






From maxinux at bigfoot.com  Tue Jun 23 13:55:44 1998
From: maxinux at bigfoot.com (Max Inux)
Date: Tue, 23 Jun 1998 13:55:44 -0700 (PDT)
Subject: Verisign & NAI Join Forces, PGP out the door? (fwd)
Message-ID: 


This is what I was able to find out about the Verisign/NAI partnership.

-- Max Inux (MaxInux at bigfoot.com) UIN: 207447, http://khercs.chipware.net 
Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59
Or Kinky sex makes the world go round- Christie: Your in my sig too
^^ If Cryptography is outlawed,  only outlaws will have cryptography ^^

 

---------- Forwarded message ----------
Date: Tue, 23 Jun 1998 10:22:26 -0700
From: Jon Callas 
To: Max Inux , Sean_Paswater at nai.com
Cc: chip at chipware.net, jon at pgp.com
Subject: Re: Verisign & NAI Join Forces, PGP out the door? (fwd)

At 08:10 PM 6/22/98 -0700, Max Inux wrote:
   Chip and Jon:
   
   Chip:  Have any insight into this or is this gonna be like the TIS scare
   w/ Key Escrow?
   
   Jon:  Since Chip will probably end up asking you or some of the other
   higher ups if he is unsure, Is there any truth to this story, or is this
   TIS #2?
   
The tale is true -- it's the *interpretation* that's bogus. PGP is not out
the door. PGP will be doing X.509 too. There's not a lot of difference
between an X.509 certificate and a PGP key signature. They do the same
thing. What you'll be able to do is have Verisign sign your key. The first
steps of this are coming this fall -- you'll be able to drop an X.509 cert
into your keyring and it will magically transform itself into a PGP key. At
first, you'll only be able to use it with TLS (a.k.a. SSL), which is also
coming this fall. 

	Jon



-----
Jon Callas                                  jon at pgp.com
CTO, Total Network Security                 3965 Freedom Circle
Network Associates, Inc.                    Santa Clara, CA 95054
(408) 346-5860                              
Fingerprints: D1EC 3C51 FCB1 67F8 4345 4A04 7DF9 C2E6 F129 27A9 (DSS)
              665B 797F 37D1 C240 53AC 6D87 3A60 4628           (RSA)






From shamrock at cypherpunks.to  Tue Jun 23 16:11:27 1998
From: shamrock at cypherpunks.to (Lucky Green)
Date: Tue, 23 Jun 1998 16:11:27 -0700 (PDT)
Subject: Verisign & NAI Join Forces, PGP out the door? (fwd)
In-Reply-To: 
Message-ID: 


The primary difference between X.509v3 vs. PGP keys is one of format, not
of function. There is nothing you can do in native PGP key format that you
can't do in X.509.

However, many companies mandate keys to be kept in X.509 format
for compatibility reasons (you can then put the key on a smartcard, etc.).
What this move will mean is that PGP will make further inroads into the
corporate world and that strong crypto will be used more widely.

Standardization is a Good Thing.

--Lucky

On Tue, 23 Jun 1998, Max Inux wrote:

> This is what I was able to find out about the Verisign/NAI partnership.
> 
> -- Max Inux (MaxInux at bigfoot.com) UIN: 207447, http://khercs.chipware.net 
> Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59
> Or Kinky sex makes the world go round- Christie: Your in my sig too
> ^^ If Cryptography is outlawed,  only outlaws will have cryptography ^^
> 
>  
> 
> ---------- Forwarded message ----------
> Date: Tue, 23 Jun 1998 10:22:26 -0700
> From: Jon Callas 
> To: Max Inux , Sean_Paswater at nai.com
> Cc: chip at chipware.net, jon at pgp.com
> Subject: Re: Verisign & NAI Join Forces, PGP out the door? (fwd)
> 
> At 08:10 PM 6/22/98 -0700, Max Inux wrote:
>    Chip and Jon:
>    
>    Chip:  Have any insight into this or is this gonna be like the TIS scare
>    w/ Key Escrow?
>    
>    Jon:  Since Chip will probably end up asking you or some of the other
>    higher ups if he is unsure, Is there any truth to this story, or is this
>    TIS #2?
>    
> The tale is true -- it's the *interpretation* that's bogus. PGP is not out
> the door. PGP will be doing X.509 too. There's not a lot of difference
> between an X.509 certificate and a PGP key signature. They do the same
> thing. What you'll be able to do is have Verisign sign your key. The first
> steps of this are coming this fall -- you'll be able to drop an X.509 cert
> into your keyring and it will magically transform itself into a PGP key. At
> first, you'll only be able to use it with TLS (a.k.a. SSL), which is also
> coming this fall. 
> 
> 	Jon
> 
> 
> 
> -----
> Jon Callas                                  jon at pgp.com
> CTO, Total Network Security                 3965 Freedom Circle
> Network Associates, Inc.                    Santa Clara, CA 95054
> (408) 346-5860                              
> Fingerprints: D1EC 3C51 FCB1 67F8 4345 4A04 7DF9 C2E6 F129 27A9 (DSS)
>               665B 797F 37D1 C240 53AC 6D87 3A60 4628           (RSA)
> 
> 


-- Lucky Green  PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"






From gwb at gwb.com.au  Tue Jun 23 19:18:29 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Tue, 23 Jun 1998 19:18:29 -0700 (PDT)
Subject: QANTAS discriminates against Pauline Hanson's One Nation
Message-ID: <1.5.4.32.19980623195854.00d302f4@mail.pronet.net.au>


Dear One Nation supporter in NSW,

Qantas has banned coverage of Pauline Hanson and One Nation from inflight news.

Qantas has effectively censored Channel 9's inflight coverage of Australian
news and has, in effect, implied that there is something "distasteful" about
Mrs Hanson and her political party.

The action allegedly follows a complaint by a QANTAS staff member about
coverage of Mrs Hanson being offensive to Indonesian passengers on an
international flight.

Pauline Hanson's political adviser, Mr David Oldfield, said it was
"disgraceful, un-Australian activity asking Channel 9 to be political
censors on behalf of Qantas.

"Everything that is said publicly, people should have the right to judge for
themselves whether something matters or doesn't," he said.

"But it certainly isn't up to any airline or anyone else to decide that
legitimate
public debate isn't to be viewed."

If you feel rightfully outraged by this act of censorship by Qantas (the
Australian Airline) please contact them by email:

qantasmedia at qantas.com.au 

I would encourage you to take a moment to express how you feel about this issue.

Finally, please note Ansett have not undertaken censorship of this sort.

GWB




Scott Balson






From nobody at remailer.ch  Tue Jun 23 19:42:15 1998
From: nobody at remailer.ch (Anonymous)
Date: Tue, 23 Jun 1998 19:42:15 -0700 (PDT)
Subject: Banning privacy: A radical proposal
Message-ID: <19980624011241.15925.qmail@hades.rpini.com>




This came from Yahoo/ZDNet. Mr. Pappas suggests that we just ban anonymity
and privacy to "protect the children." Now where have I heard that before?
And yet again, the "Ethical Hackers Against Pedophilia" raise their heads,
no pun intended.

>Banning privacy: A radical proposal 
>
>By Charles Pappas 
>June 22, 1998 
>Yahoo! Internet Life 
>
>Copyright (c) 1998 ZDNet
>
>Privacy and anonymity are our most cherished tenets of online life. A
>need so immense that Marc Rotenberg of the Electronic Privacy
>Information Center declared that we might need a kind of Department of
>Privacy. He's not alone: 72 percent of surfers think there should be new
>laws to protect their privacy. 
>
>It's a radical, 180-degree turn to take, but...what if we're all wrong?
>What if this belief that privacy + anonymity = social good has become as
>self-destructive and delusional as a drunk who thinks one more scotch
>will make him feel better? 
>
>Like Marley's ghost, privacy may be coming back to haunt us. And that
>ghost's name is pedophilia. How bad is it? Disguised as a 13-year-old, I
>was directly propositioned on AOL in fewer than 10 minutes on each of
>six separate attempts. I entered a chat room--usually called something
>like "x9x10x11" or even "JonBenet Ramsey" (code words that alert
>pedophiles where to swarm)--and waited for the assaults to start. 
>
>Even when I didn't enter a chat room, the offers kept coming in from
>pedophiles prowling for victims. One wanted to send me pictures of
>himself. Another asked for a phone number. "I want to do my daughter,"
>one confessed to me. Later, when I searched for their screen names, they
>had all disappeared into the anonymous electronic mist. 
>
>AOL monitors kids' chat rooms continuously. (Parents can also set the
>AOL software so their children can't use chat rooms.) "We have a
>zero-tolerance policy when it comes to anything illegal," assures AOL
>spokeswoman Tricia Primrose. "We have about 8,000 monitors scanning up
>to 19,000 chat rooms, message boards, member profiles, and other areas.
>When we get any kind of complaint, we immediately check it out. And
>we're working with the FBI, customs, and other officials." 
>
>It's not just AOL, of course. Child molesters "operate on every avenue
>of the Net," says PhotonRain (not his real name) of Ethical Hackers
>Against Pedophilia, a group that aids law enforcement in combating child
>pornography. "WWW, newsgroups, IRC, ICQ, FTP servers..." 
>
>We already know it's widespread and easy to encounter. But how often
>have we heard--and parroted--the party line that problems on the Net
>just reflect real-world problems, no more and no less? Holland slays
>that sacred lamb: "The amount of pedophilia on the Net is extremely
>disproportional to...society as a whole. They hide behind the anonymity
>the Net offers. And they are aware of the small odds against being
>caught." 
>
>Ruben Rodriguez, director of the Exploited Child unit for the National
>Center for Missing & Exploited Children (NCMEC), concurs: "The Net is so
>anonymous that molesters are very comfortable on it. They can go in and
>hunt kids down, and attempt five or six seductions at the same time." 
>
>"Let's face it," says a New York State investigator who requests
>anonymity, "the Net's anonymity enables the sickness. In a couple of
>hours I could easily get 2,000 pictures if I wanted, including the Baby
>Rape series," a popular collection of pedophilia photos whose name is
>horrifyingly self-explanatory. 
>
>In recent weeks, U.S. authorities have helped nab 60 online molesters,
>while the FBI reports that its 3-year-old Innocent Images
>investigation--an online task force identifying predators--has resulted
>in 184 convictions. An impressive stat, but less than confidence
>inspiring when research suggests the average child molester will have
>more than 70 victims throughout his lifetime. 
>
>At the same time we splash sex offenders' names online, our lawmakers
>weigh in with proposed privacy law after privacy law. "No one wants to
>give up privacy," says NCMEC's Rodriguez, whose organization now runs a
>CyberTipline for leads on the sexual exploitation of children. "But what
>do you do when your laws and protections are turned against you?
>Something's got to give." 
>
>But what? Our conventional wisdom that privacy is worth any risks? Just
>touching this petrified opinion will get me slapped with a swastika--but
>as philosopher Arthur Schopenhauer said, "All truth passes through three
>stages. First, it is ridiculed. Second, it is violently opposed. Third,
>it is accepted as being self-evident." 
>
>To be continued--that's for certain. 
>
>Copyright (c) 1998 ZDNet. All rights reserved.






From whgiii at invweb.net  Wed Jun 24 01:01:05 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Wed, 24 Jun 1998 01:01:05 -0700 (PDT)
Subject: Banning privacy: A radical proposal
In-Reply-To: <19980624011241.15925.qmail@hades.rpini.com>
Message-ID: <199806240806.DAA022.63@geiger.com>


-----BEGIN PGP SIGNED MESSAGE-----

In <19980624011241.15925.qmail at hades.rpini.com>, on 06/24/98 
   at 01:12 AM, Anonymous  said:

>This came from Yahoo/ZDNet. Mr. Pappas suggests that we just ban
>anonymity and privacy to "protect the children." Now where have I heard
>that before? And yet again, the "Ethical Hackers Against Pedophilia"
>raise their heads, no pun intended.

To hell with the children!!

If we need anything in this country it is a good supply of hemp rope so
whenever one of these control freaks tries to wipe their ass with the
Constitution under the guise of "saving the children" they are immediately
dragged out by their heals and lynched on the spot!!

If they are so anxious to "save the children" why don't they ban all
automobiles? I don't have exact figures but I am sure 1,000's of children
die and 10,000's are injured every year in auto accidents. I am sure that
Detroit and the oil industry might have a few words against it not to
mention 100 million angry motorist.

And if they really want to save some children why don't they shut down the
multi-billion dollar infanticide industry known as abortion. Why are these
medical hacks allowed to do to children what they would be jailed for
doing to a dog? Perhaps because it serves nicely with the elitist goals of
population control (need to keep the number of niggers, bean pickers, and
white trash down to a controllable number) not to mention that their
pockets are well lined by the hacks.

If they were truly operating on moral principals one would think they
would go after that which causes the greatest harm to the most children.
But of course they don't. They have no more morality than a bitch in heat.
Their "save the children" bit is just a pre-emptive trump against any
opposition (how can you not be for saving children!!).

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: I'm an OS/2 developer...I don't NEED a life!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNZCziI9Co1n+aLhhAQFCJgQAms7GyayB9pF3OMDHIrT+5Dp8TvXlkTRh
HBifHyMhTTnOIfsRryhXzgdM+20ALIVzWat0KSjnpW26e/JRnuIEnAN3B1pYcfVy
P//irI9EbVhAnYWt5hSwhxEOhZxYwUas+tUw7vKXioiK3LQw8iigWvs9HhP16Gpu
y+P+XpPxpxs=
=Nd63
-----END PGP SIGNATURE-----







From attila at hun.org  Wed Jun 24 05:50:19 1998
From: attila at hun.org (attila)
Date: Wed, 24 Jun 1998 05:50:19 -0700 (PDT)
Subject: abortion [was: Banning privacy: A radical proposal]
In-Reply-To: <199806240806.DAA022.63@geiger.com>
Message-ID: 


On Wed, 24 Jun 1998, William H. Geiger III wrote:

> And if they really want to save some children why don't they shut down the
> multi-billion dollar infanticide industry known as abortion. Why are these
> medical hacks allowed to do to children what they would be jailed for
> doing to a dog? Perhaps because it serves nicely with the elitist goals of
> population control (need to keep the number of niggers, bean pickers, and
> white trash down to a controllable number) not to mention that their
> pockets are well lined by the hacks.
> 
    no, abortion does not serve the interests of limiting the
    "undesirables" to meet elitist population control ideas.  quite
    the opposite --the various machinations of the extremeist
    conservative [bowel] movement and depriving of abortion funds 
    has meant that abortion is available only to the haves. same
    result in U.S. foreign policy which excludes not only abortion
    services from foreign aid disbursement, but also birth control.

    so, the population of "bean pickers, niggers, and white trash"
    increases relative to the desired "white" population --rather
    dramatically --"elitist" families have negative population
    growth; several of the others have factors as high as 300%.

    personally, I am against abortion-- however, I'll be damned if
    I would deny anyone else either the right or the means to make
    that personal decision. it is not a question of morality; it is
    a fundamental right to freedom of choice unencumbered by an
    increasingly invasive federal government --the first Bitch can
    take her Global Village into her house, not mine.

	attila out...

__________________________________________________________________________
    go not unto usenet for advice, for the inhabitants thereof will say:
      yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__

    To be a ruler of men, you need at least 12 inches....
    There is no safety this side of the grave.  Never was; never will be.







From jya at pipeline.com  Wed Jun 24 06:56:40 1998
From: jya at pipeline.com (John Young)
Date: Wed, 24 Jun 1998 06:56:40 -0700 (PDT)
Subject: Skipjack Up
Message-ID: <199806241356.JAA30765@camel8.mindspring.com>


John,

The files are up, and hopefully all working OK.  See


http://csrc.nist.gov/encryption/skipjack-kea.htm

Ed Roback







From billp at nmol.com  Wed Jun 24 07:16:59 1998
From: billp at nmol.com (bill payne)
Date: Wed, 24 Jun 1998 07:16:59 -0700 (PDT)
Subject: nation's most secretive spy agency
Message-ID: <35910972.913@nmol.com>

Wednesday 6/24/98 8:03 AM

Glave

I am reading http://www.wired.com/news/news/technology/story/13215.html

I recevied a motion from US Assistant Attorney Mitchell yesterday
in the mail.  I haven't read it yet.

Mitchell phoned on f 6/19.  

Mitchell told me she is moving to remand FOIA ALGORITHM request to NSA.

I made a copy of the materials I received and sent them to John Young.

I attach a copy of Morales and my complaint to the senate judiciary
committee.  This e-mail explains more about our interest in NSA.
VISIBILITY.

I do not have much interest in crypto.

One of my problems is a REVERSE cyrpto problem.  Trying to get people to
read
my geek books and obscure binary results.

I MERELY BUILT CRYPTO DEVICES FOR NSA.  

And took a poke at NSA for trying to screw-up Sandia/DOE projects with
bad crypto algorithm and implementation advice. 
http://jya.com/da/whpda.htm
Especially in http://jya.com/da/whpda.htm#apps

NSA has NO SENSE OF HUMOR.

Pseudorandom numbers are close enough to crypto that I understand what
the crypto people are doing.

Morales and I want our money and out of this mess.

Best

Sincerely

http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

Looks like we succeeded in getting others to read about the gfsr!

In fact, Knuth included the gfsr on page 32 of his books series Art of 
Computer Programming: Vol 2 Seminumerical algorithms.

This likely accounts for 

http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html

Coauthor Lewis in the above is one of my former MS and PhD students in
computer science.

http://www.friction-free-economy.com/


Subject: 
        Judicial Misconduct at Tenth Circuit Court of Appeals
  Date: 
        Mon, 22 Jun 1998 13:29:01 -0600
  From: 
        bill payne 
    To: 
        art morales , senator_hatch at Hatch.senate.gov, senator at thurmond.senate.gov,
        chuck_grassley at grassley.senate.gov, senator_specter at specter.senate.gov, 
senator_thompson at thompson.senate.gov,
        info at kyl.senate.gov, senator_dewine at dewine.senate.gov, john_ashcroft at ashcroft.senate.gov, 
michigan at abraham.senate.gov,
        senator_leahy at leahy.senate.gov, senator at kennedy.senate.gov, senator at biden.senate.gov, 
senator_kohl at kohl.senate.gov,
        senator at feinstein.senate.gov, russell_feingold at feingold.senate.gov, dick at durbin.senate.gov, 
senator at torricelli.senate.gov
    CC: 
        steve dillingham <" Steven.Dillingham"@hq.doe.gov>, Robert Nordhaus <" 
Robert.Nordhaus"@hq.doe.gov>, mrgall at ix.netcom.com,
        jy at jya.com, art morales , federico pena <" Federico.F.Pena"@hq.doe.gov>, 
RJPARK at sandia.gov,
        cypherpunks at toad.com, ukcrypto at maillist.ox.ac.uk


Monday 6/22/98 1:02 PM

Senate Judiciary Committee
http://www.senate.gov/committee/judiciary.html

Republicans

Orrin G. Hatch, Utah, Chairman   senator_hatch at Hatch.senate.gov
Strom Thurmond, South Carolina   senator at thurmond.senate.gov
Charles E. Grassley, Iowa   chuck_grassley at grassley.senate.gov
Arlen Specter, Pennsylvania   senator_specter at specter.senate.gov
Fred Thompson, Tennessee   senator_thompson at thompson.senate.gov
Jon Kyl, Arizona   info at kyl.senate.gov
Mike DeWine, Ohio   senator_dewine at dewine.senate.gov
John Ashcroft, Missouri   john_ashcroft at ashcroft.senate.gov
Spencer Abraham, Michigan   michigan at abraham.senate.gov
Jeff Sessions, Alabama

Democrats

Patrick J. Leahy, Vermont   senator_leahy at leahy.senate.gov
Edward M. Kennedy, Massachusetts   senator at kennedy.senate.gov
Joseph R.Biden, Jr., Delaware   senator at biden.senate.gov
Herb Kohl, Wisconsin   senator_kohl at kohl.senate.gov
Dianne Feinstein, California   senator at feinstein.senate.gov
Russell D. Feingold, Wisconsin   russell_feingold at feingold.senate.gov
Richard Durbin, Illinois   dick at durbin.senate.gov
Robert Torricelli, New Jersey   senator at torricelli.senate.gov

Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Moore, Barrett, Weis and help get this matter settled.

Thursday March 30, 1995 I wrote Tenth Circuit clerk Hoecker to request a
copy of the docket sheets for case 94-2205  Payne v. Sandia Corporation,
et al

Hoecker did not answer my letter.

On Tuesday March 5,1996 I  wrote  Judge Lucius D. Bunton to ask his help
to get a copy of the docket sheets.  No response.

On Monday September 23, 1996 Arthur R Morales and I wrote  Henry A.
Politz, Chief Judge U.S. Court of Appeals - Fifth Circuit to ask his
help to get a copy of the docket sheets of my case and Morales� Tenth
Circuit case 95-2204.

Tenth Circuit also refused to send Morales copies of docket sheets for
his case.

Politz is Bunton's boss.  No response.

Friday May 30, 1997 I wrote Antonin Scalia to get this help to get a
copy of the docket sheets.  No response.

5 May 1998 citizen John Young finds docket sheets on

    Source: PACER, U.S. Court of Appeals, 10th Circuit, 1-800-279-9107

and posts them on Internet at http://jya.com/whp-10usca.htm

  Docket as of April 10, 1998 0:05 am
  Proceedings include all events.
  94-2205  Payne v. Sandia Corporation, et al

shows that I filed my Brief of the Appellant on 2/19/95.

2/23/95     [835344] Appellant's brief filed by William H. Payne.
            Original and 7 copies.   c/s: y. Served on 2/19/95  Oral
            argument? pro se. Appellee/Respondent's brief due 3/24/95
            for Thomas P. Wright, for Robert Surran, for Paul A.
            Stokes, for Mary J. Stang, for Tommy A. Sellers, for Craig
            A. Searls, for Albert Narath, for Preston B. Herrington,
            for Peter S. Hamilton, for Roger L. Hagengruber, for James
            R. Gosler, for Harold L. Folley, for Robert L. Ewing, for
            C. William Childers, for Harvey J. Brewster, for Sandia
            Corporation (mbm)

mbm writes "Appellee/Respondent's brief due 3/24/95"

Sandia had sent me a copy of its brief by 3/28/96.

I filed  attached MOTION TO GRANT PLAINTIFF-APPELLANT'S DEMANDS ON BASIS
THAT DEFENDANT-APPELLEES FAILED TO FILE BRIEF WITHIN 30 DAYS SPECIFIED
BY FEDERAL RULE OF APPELLATE PROCEDURE 31 on Tuesday the 28th day of
March, 1995

My February 28 MOTION at the Tenth Circuit is filed WITHOUT notice of
service logged.

4/4/95       [845484] Appellant's motion filed by Appellant William H.
             Payne [94-2205] to grant appellant's demands on basis that
             appellees' failed to file timely brief. Original and 3
             copies  c/s: y (mbm)

In 1995 FRAP 25 (a) stated  "[b]riefs shall be deemed filed on the day
of mailing if the 
most expeditious form of delivery by mail, excepting special delivery,
is used."

FRAP 25 has been changed by 1998 to
http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a

Since I mailed Appellant's motion filed by Appellant William H.  Payne
[94-2205] to grant appellant's demands on basis that appellees' failed
to file timely brief on 3/28/98, it is likely Sandia's lawyer Friedman
received it 3/29/95.

Tenth Circuit logs

3/30/95      [844759] Appellee's brief filed by Sandia Corporation,
             Harvey J. Brewster, C. William Childers, Robert L. Ewing,
             Harold L. Folley, James R. Gosler, Roger L. Hagengruber,
             Peter S. Hamilton, Preston B. Herrington, Albert Narath,
             Craig A. Searls, Tommy A. Sellers, Mary J. Stang, Paul A.
             Stokes, Robert Surran, Thomas P. Wright. Original and 7
             copies. c/s: y. Served on 3/27/95  Oral Argument? y
             (appellant is pro se) Appellant's optional reply brief due
             4/13/95 for William H. Payne (mbm)

Federal Rule of Appellate Procedure [FRAP] 26 (c) states

  (c) Additional Time after Service. When a party is required or
permitted to act within a      prescribed period after service of a
paper upon that party, 3 calendar days are added to the     prescribed
period unless the paper is delivered on the date of service stated in
the proof of   service. 

  http://www.ca5.uscourts.gov/docs/frap-iop.htm#26c

While the Tenth Circuit ASSERTS Appellees� brief was, in fact, served on
3/27/95
evidence given below points to the brief  was served, in fact, on
3/29/95.  

I allege that Friedman affixed a false date of service to Sandia's
brief.

I WAS NEVER PROPERLY SERVED.  I wrote

          Wednesday March 29, 1995

          Dan Friedman
          Simons, Cuddy & Friedman
          Pecos Trail Office Compound
          1701 Old Pecos Trail
          POB 4160
          Santa Fe, NM 87502-4160
          505-988-4476
          505-984-1807 FAX

          Dear Lawyer Friedman:

          Today at 14:00 hours I found a green and white about 9x13
          inch envelope in our mail box at my home.

          Mailing label indicated that the envelope came from your
          firm.  CONFIDENTIAL was stamped on the mailing label.

          I  wrote "Received at 14:00 hours on W 3/29/95 with no
          POSTMARK OR STAMP by W. H. Payne" at the bottom of the
          envelope.

          There was no STAMP OR POSTAGE METER LABEL or 
          POSTMARK on the envelope.

          Therefore, I gave the envelope to US Postal Service
          supervisor Mel at 14:49 hours today at the Postal Receiving
          station at 9904 Montgomery, NW in Albuquerque.  Mel has a
          copy of the cover of the envelope with Mel's note written on
          it.

          Mel told me the post office was going to return the envelope
          to your firm for proper mailing.

          I ask:

         1    What did this envelope contain?  Please identify
              the documents precisely.

         2    If any Certificates of Service were included in the
              envelope, then what were the dates affixed to these
              documents?

         3    Who placed this envelope in our mail box?

         Lawyer Friedman:  It appears you missed an important filing
         date.  And are in the process of attempt to correct your
         failure.  But may be using illegitimate methods to conceal
         your failure.

         Please respond as soon as possible so that we all may
         discover what has happened here." ...

Lawyer Friedman did not respond to the above letter.

But Friedman did mail me Appellees� brief many days later in envelope
showing TRUE MAILING date.  Certificate of service on received
Appellees� brief
did not reflect postmark date.

10th Cir. R. 25.4 in 1995 page 62 reads
  
  Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
  with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1

But Tenth Circuit clerks Fisher and Hoecker despite my protests and
submission of
evidence may have stamped FILED on Sandia's IMPROPERLY SERVED 
Appellee/Respondent's brief according to the Federal Rules of Appellate
Procedure.

Laywer Friedman FALSIFIED THE CERTIFICATE OF SERVICE.   

Friedman DID NOT MAIL ME "Served on 3/27/95."

d) Proof of Service; Filing. A paper presented for filing shall contain
an acknowledgment of service by the   person served or proof of service
in the form of a statement of the date and manner of service, of the
name of the person served, and of the addresses to which the papers were
mailed or at which they were delivered, certified by the person who made
service. Proof of service may appear on or be affixed to the papers
filed. When a brief or appendix is filed by mailing or dispatch in
accordance with Rule 25(a)(2)(B), the proof of service shall also state
the date and manner by which the document was mailed or dispatched to
the clerk.

  http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a
  
Crime apparently committed by Hoecker and Fisher is

� 1017. Government seals wrongfully used and instruments wrongfully
sealed 

Whoever fraudulently or wrongfully affixes or impresses the seal of any
department or agency of the United States, to or upon any certificate,
instrument, commission, document, or paper or with knowledge of its
fraudulent character, with wrongful or fraudulent intent, uses, buys,
procures, sells, or transfers to another any such certificate,
instrument, commission, document, or paper, to which or upon which said
seal has been so fraudulently affixed or impressed, shall be fined under
this title or imprisoned not more than five years, or both. 
http://www.law.cornell.edu/uscode/18/1017.shtml

Despite my protests of judicial misconduct Judges Moore, Barrett, Weis
award decision to Sandia

10/6/95      [890055] Order filed by Judges Moore, Barrett, Weis
             "...All outstanding motions are denied..." (found in Order
             & Judgment of 10/6/95) [879579-1]  Parties served by mail.
             (pdw)

when these judges should not have had Appellees� brief before them.

Then in an apparently attempt to conceal what happened

10/6/95     [890076]  NOTE: THIS ENTIRE CASE IS SEALED. Terminated on
            the Merits after Submission Without Oral Hearing; Judgment
            Affirmed; Written, Signed, Unpublished. Moore, authoring
            judge; Barrett; Weis. [94-2205] (pdw)

I WON MY APPEAL, pro se, ON A TECHNICALITY but judges Judges Moore,
Barrett, Weis
awarded the win to Sandia Labs!

Members of Congress, judicial misconduct in this matter has been
well-documented.  Court records
filed with the Tenth Circuit.  But CURRENTLY under seal.

Lawyers involved in this matter attempt to use the legal strategy of
IGNORE and STONEWALL to
attempt to deny me justice.  

Ignoring and stonewalling by lawyers forced Morales and me to seek
visibility so lawyers
could no longer ignore and stonewall.

Lawyer attitude apparently is that they ignore rules of civil procedure
or even the law so long
as their actions are invisible to public scrutiny.

Visibility was achieved by suing the National Security Agency which
revealed even more judicial misconduct http://www.jya.com/whp052898.htm.

I would like to settle all  matters involved with this unfortunate
cyrpto-related matter,
which includes criminal violations of the Privacy Act.

DOE lawyer Steve Dillingham asked me to prepare a settlement offer in
1994.  I wrote a
settlement letter  May 22, 1994 to Dillingham.  Nothing happened.

June 11, 1998 I made several modifications to my 1994 settlement letter
and sent it e-mail
to Robert Nordhaus, Chief Counsel, DOE.

I ask that you

1  help with settlement of my six-year-old since I won my appeal at the
Tenth Circuit,
2  investigate Tenth Circuit case 94-2205  Payne v. Sandia Corporation,
et al to bring
   the guilty to justice.

Sincerely

william payne

505 292 7037  I am not reading e-mail

http://jya.com/whpfiles.htm
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html

Coauthor Lewis in the above is one of my former MS and PhD students in
computer science.

http://www.friction-free-economy.com/



Monday 6/22/98 1:04 PM

Members of Congress

Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Anderson, Barrett, Logan and request a congressional
investigation.

After several years, with Payne, of trying to get Tenth Circuit to send
docket sheets from my case,
citizen John Young  http://www.jya.com/index.htm  locates docket sheets
and posts them
    
  Morales Case Dockets 10th USCA                    June 12, 1998

on Internet at http://www.jya.com/arm061298.htm.

  Source: Online records Tenth Circuit Court of Appeals via PACER 

  GENERAL DOCKET FOR
  Tenth Circuit Court of Appeals

  Court of Appeals Docket #: 95-2204                           Filed:
9/29/95
  Nsuit: 3440
  Morales v. Sandia National Lab.
  Appeal from: United States District Court for the District of New
Mexico

I filed

11/9/95     [898274] Appellant's brief filed by Arthur R. Morales.
            Original and 2 copies.   c/s: y. Served on 11/7/95.  Oral
            argument? pro se. Appellee's brief due 12/11/95 for Sandia
            National Lab. (pdw)

Sandia files its FIRST ATTEMPT at

12/11/95   [905033] Appellee's deficient brief filed by Sandia
           National Lab.. Appellee's corrected brief due 12/21/95 for
           Sandia National Lab.  additional copies received 12/11/95.
           (fg)

Tenth Circuit court clerk Patrick Fisher writes Wells on December 11,
1995
concerning Sandia's deficient brief

  [C]orrections, however made, must be accompanied by proof of service
  upon all other parties to the appeal. ...

and issues

12/14/95   [905975] FIRST notice of rules violation for Deborah D.
           Wells for Appellee Sandia National Lab. (sls)

Wells submits

12/21/95    [907974] Appellee's brief filed by Sandia National Lab..
            Original and 7 copies.   c/s: y. Served on 12/20/95  Oral
            Argument? n Appellant's optional reply brief due 1/8/96 for
            Arthur R. Morales (mbm)

but DOES NOT serve me with a copy.

Wells later admits in

2/1/96        [917660] Response filed by Sandia National Lab.
              Appellant/Petitioner motion to clarify   Original and 3
              copies.  c/s: y response Null Relief Code (fg)

Certificate of Service date 30th day of January, 1996,

  [h]ad Appellant simply made a phone call to the Tenth Circuit, he
could
  have established that the Defendant-Appellee's corrected brief was
indeed
  filed on a timely basis, ...

I protested by filing

1/3/96       [909965] Appellant's motion "for the Court to Grant
             Appeal" filed by Appellant Arthur R. Morales [95-2204].
             Original and 3 copies.  c/s: y. (pdw)

1/3/96       [909966] Appellant's motion "for New Trial" filed by
             Appellant Arthur R. Morales [95-2204]. Original and 3
             copies.  c/s: y. (pdw)

1/3/96       [909967] Appellant's motion "to Discipline
             Defendant-Appellee" filed by Appellant Arthur R. Morales
             [95-2204]. Original and 3 copies.  c/s: y. (pdw)

because Sandia did not properly serve me in violation of Fisher's
December
11, 1995 order.

The Tenth Circuit court of appeals should NOT, by its own rules, filed
Appellee's brief filed by Sandia National Lab..  Original and 7
copies.   
c/s: y. Served on 12/20/95

10th Cir. R. 25.4 in 1995 page 62 reads
  
  Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
  with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1

And is doubtful whether court clerk Fisher had any authority under
appellate procedure
to permit Wells to correct her deficient brief.  

Rather Sandia's  brief did not comply with with Federal Rules of
Appellate Procedure and should have been summarily rejected for filing.

I WON, pro se, my appeal to the Tenth circuit on a technicality but
Judges Anderson, Barrett, Logan
awarded the win to Sandia Labs.

4/2/96        [932848] Order filed by Judges Anderson, Barrett, Logan
              denying parties' motions for general relief(found in Order
              and Judgment of 4/2/96)--"...During the course of this
              appeal, the parties have filed various motions for
              dismissal, summary grant, and sanctions. We find no merit
              to any of these motions, and they are [920851-1] Parties
              served by mail. (pdw)

by accepting and judging on a documents which was not permitted to be
before the court by
its own rules.

Judicial misconduct in my case has been well-documented as it is in
Payne's case.

Payne and I speculate that similar judicial misconduct may have occurred
at the Tenth Circuit.

Sandia lawyer Robert J Park wrote me a settlement letter on Feb 18,
1998.

I filled in the blanks and made minor handwritten chages and returned it
on February 22, 1998.  

But my offer has not yet been accepted.

I ask that you

1  help have my settlement offer accepted,
2  investigate judicial misconduct in case 95-2204 and punish the
guilty.

Some citizens can only express such frustrations with the US court
system with violence.

I seek change by legal reform.

Sincerely

Arthur R Morales
505 345 1381




From CustomNews at INTMAIL.TURNER.COM  Wed Jun 24 07:36:53 1998
From: CustomNews at INTMAIL.TURNER.COM (CustomNews at INTMAIL.TURNER.COM)
Date: Wed, 24 Jun 1998 07:36:53 -0700 (PDT)
Subject: New Features @ CNN Custom News
Message-ID: <199806241410.KAA11366@belize>


Hello and thanks for using CNN Custom News.  As part of our
commitment to make the best personalized news service even
better, CNN and Oracle have recently added two great new
features to Custom News at http://cnn.com/CustomNews:


>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
KEEP AN EYE ON YOUR FAVORITE CATEGORY!
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

This latest feature allows you to choose one category that will
always appear at the top of your personal picks when you check
Custom News.

For instance, if U.S.:Government:Presidential is your favorite
category, you don't have to go to the U.S. page to see it...put
it front and center on your personal homepage.

To select your favorite category, visit your Custom Profile
page at:

http://CustomNews.CNN.com/cnews/pna_cust.customize#Favorite

and use the drop down box to make your choice. Push the 'done'
button and that's it!


>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
WE'VE ADDED YET ANOTHER SOURCE:  PR NEWSWIRE
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

The addition of PR Newswire to Custom News provides even deeper
business content and improved tracking of particular companies.
The latest press releases are available to you almost as soon as
they hit the wire.

Now, you'll be able to track even more of the latest news
regarding your specific companies of interest!


>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
WHAT IF I'VE FORGOTTEN MY PASSWORD?
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>*<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

If you have not used the service in a while or are on a new
computer, you may need to enter your user name and password.
If you can remember your user name, but forgot your password,
the system will prompt you with the reminder message you
created at the time of registration. The reminder will appear
directly above your login name.

If you have forgotten both your user name and password, simply
open a new account with our QuickStart Profile option.  It's
fast and easy to start using CNN Custom News again!



Thanks for your time.  If you haven't already, come by
CNN.com/CustomNews and check out the improved Custom News
service.

Sincerely,

The CNN Custom News Team
http://CNN.com/CustomNews


=============================================================
If you would rather not receive future updates about Custom News
features and events, please go to
http://CustomNews.CNN.com/cnews/pna_auth.register and
uncheck the "new Custom News features" checkbox.

If you cannot access the above page, but would like to be
unsubscribed from this list, please go to
http://CNN.com/EMAIL/customnews/ and enter your e-mail address.

Please DO NOT reply to this e-mail address.






CNN Interactive email id:11339101041640714





From jf_avon at citenet.net  Wed Jun 24 07:46:39 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Wed, 24 Jun 1998 07:46:39 -0700 (PDT)
Subject: Fwd: Re: Banning privacy: A radical proposal
Message-ID: <199806241458.KAA01546@cti06.citenet.net>


==================BEGIN FORWARDED MESSAGE==================
>From: "Jean-Francois Avon" 
>To: "William H. Geiger III" 
>Date: Wed, 24 Jun 1998 10:38:12 -0500
>Reply-To: "Jean-Francois Avon" 
>Priority: Normal
>X-Mailer: PMMail 98 Standard (2.00.1500) For Windows 95 (4.0.1111)
>MIME-Version: 1.0
>Content-Type: text/plain; charset="iso-8859-1"
>Content-Transfer-Encoding: 7bit
>Subject: Re: Banning privacy: A radical proposal
>

On Wed, 24 Jun 1998 00:38:06 -0500, William H. Geiger III wrote:

>
>And if they really want to save some children why don't they shut down the
>multi-billion dollar infanticide industry known as abortion. Why are these
>medical hacks allowed to do to children what they would be jailed for
>doing to a dog? Perhaps because it serves nicely with the elitist goals of
>population control (need to keep the number of niggers, bean pickers, and
>white trash down to a controllable number) not to mention that their
>pockets are well lined by the hacks.

Hey William, that's called "woman freedom to choose".  Woman right precedes the
baby-that-might-be rights for she is the sine-qua-none condition for the baby-who-might-be
to
exist.

But it is only *very* rarely that I disagree with you...  ;-)

Ciao

jfa

Definition:  FACISM: n.:  a political and economic movement, strongly nationalistic,
magnifying the rights of the state as opposed to those of the individual, in which
industry, though remaining largely under private ownership, and all administrative
political units, are controlled by a strong central government.
        -------------------------------------------------
"One of the ordinary modes by which tyrants accomplish their purpose, without resistance,
is by disarming the people and making it an offense to keep arms".  - Joseph Story, U.S.
Supreme Court Justice.
        -------------------------------------------------
"1935 will go down in history! For the first time a civilized nation has full gun
registration! Our streets will be safer, our police more efficient, and the world will
follow our lead in the future!"
					-Adolf Hitler, April 1935
        -------------------------------------------------

PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C



===================END FORWARDED MESSAGE===================


Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Soci�t� d'Importation Lt�e
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C







From attila at hun.org  Wed Jun 24 09:11:11 1998
From: attila at hun.org (attila)
Date: Wed, 24 Jun 1998 09:11:11 -0700 (PDT)
Subject: Banning privacy: A radical proposal
In-Reply-To: <199806241458.KAA01546@cti06.citenet.net>
Message-ID: 


On Wed, 24 Jun 1998, Jean-Francois Avon wrote:

> On Wed, 24 Jun 1998 00:38:06 -0500, William H. Geiger III wrote:
> 
> >And if they really want to save some children why don't they shut down the
> >multi-billion dollar infanticide industry known as abortion. Why are these
> >medical hacks allowed to do to children what they would be jailed for
> >doing to a dog? Perhaps because it serves nicely with the elitist goals of
> >population control (need to keep the number of niggers, bean pickers, and
> >white trash down to a controllable number) not to mention that their
> >pockets are well lined by the hacks.
> 
> Hey William, that's called "woman freedom to choose".  Woman right precedes the 
> baby-that-might-be rights for she is the sine-qua-none condition for the baby-who-might-be 
> to exist.
>
    as I said, I am personally against abortion, but your point is
    absolutely correct: it is "the freedom to chose" on the part of
    the woman who must carry the _potential_ child to term  --and,
    yes, the woman is the 'sine qua non' condition.

    what the absolutists in the Right to Life movements do not
    understand, and refuse to accept, is that they have _no_ God
    given right to tell another what they can or can not do that
    does not _directly_ infringe on their own rights; as a
    consequence, the fanatics believe they have the God given
    right to legislate morality --and then there are back alley
    coat hanger abortions where the nascent mother is placed
    at an unacceptable risk.

    and, there is nothing sadder than an unwanted, often fatherless, 
    child.

	attila out...

and you better believe the following are indisputable truths....

> Definition:  FACISM: n.:  a political and economic movement, strongly nationalistic, 
> magnifying the rights of the state as opposed to those of the individual, in which 
> industry, though remaining largely under private ownership, and all administrative
> political units, are controlled by a strong central government.
>         -------------------------------------------------
> "One of the ordinary modes by which tyrants accomplish their purpose, without resistance, 
> is by disarming the people and making it an offense to keep arms".  - Joseph Story, U.S. 
> Supreme Court Justice.
>         -------------------------------------------------
> "1935 will go down in history! For the first time a civilized nation has full gun 
> registration! Our streets will be safer, our police more efficient, and the world will 
> follow our lead in the future!"  
> 					-Adolf Hitler, April 1935
>         -------------------------------------------------
__________________________________________________________________________
    go not unto usenet for advice, for the inhabitants thereof will say:
      yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__

    To be a ruler of men, you need at least 12 inches....
    There is no safety this side of the grave.  Never was; never will be.







From Hua at teralogic-inc.com  Wed Jun 24 09:35:21 1998
From: Hua at teralogic-inc.com (Ernest Hua)
Date: Wed, 24 Jun 1998 09:35:21 -0700 (PDT)
Subject: OCR'ed versions of Skipjack docs
Message-ID: <413AC08141DBD011A58000A0C924A6D52C357C@MVS2>


Anyone have an OCR'ed version of this?  These PDF's look like scanned or
faxed images.

Ern

	-----Original Message-----
	From:	John Young [SMTP:jya at pipeline.com]
	Sent:	Wednesday, June 24, 1998 6:53 AM
	To:	cypherpunks at toad.com
	Subject:	Skipjack Up


	John,

	The files are up, and hopefully all working OK.  See


	http://csrc.nist.gov/encryption/skipjack-kea.htm

	Ed Roback






From schneier at counterpane.com  Wed Jun 24 10:33:31 1998
From: schneier at counterpane.com (Bruce Schneier)
Date: Wed, 24 Jun 1998 10:33:31 -0700 (PDT)
Subject: Comments on "Encryption is Key to Securing Data" 22 Jun 98
Message-ID: <4.0.1.19980624120317.00e447b0@mail.visi.com>


This note is to comment on your article,  "Encryption is Key to Securing Data," that appeared in the 22 Jun 98 issue of InternetWeek.  I'm not sure where to start.  Almost every statement made in the copy is erroneous.  (There was an error when I tried to download the article from your website, so I will retype.  Apologies for minor typos.)

Encryption is Key to Securing Data
by Dayna DelMonico

"Although encryption terminology can make even the most technically astute user cringe, encryption is fairly simple."  

I agree, although the rest of this article seems to prove me wrong.  

"It's the process of scambling and unscrambling information."

Partly.  It's confidentially (what you said above--making sure secret things stay secret), integrity (making sure data doesn't get modified in transit), authentication (the digital analogue of a signature), and non-repudiation (making sure someone can't say something and then later deny saying it).  Cryptography is a lot more than simple encryption.

"Encryption products showed up when MIS managers adopted two basic encryption technologies from the federal government: private and public-key encryption."

Nothing correct here.  The Federal government has no public-key cryptography standards; MIS managers have nothing to adopt from the Federal government.  You might be thinking of DES, a symmetric encryption algorithm.  (More on this confusion below.)  In any case, commercial use of cryptography products has developed completely independently from government interference.  In fact, things like export control and key escrow are making it harder to buy secure commercial products, not easier.

"With private key encryption, the sends and recieve are the holders and use the same key (algorithm) to secure information."

No.  First off, private-key encryption is a bad term; use "symmetric encryption."  Second, I'm not sure what they are the holders of.  With symmetric encryption, both the sender and the receiver must have the same key; that may be what you mean.  In any case, the key and the algorithm are completely seperate.  This is one of the cornerstones of post-Medieval cryptography.

"With public key encryption, senders and receivers hold a commonly used public key, with an additional private key held only by specific institutions."

Not even close.  With public-key encryption, each receiver has a public key and a private key.  The public key is published.  The private key is held, in secret, by the receiver.  To send a message to someone, the sender gets the public key form some public database and uses it to encrypt the message.  The receiver uses his private key to decrypt it.  There are no specific institutions that have additional private keys, unless you are thinking about key escrow systems (which are related, but not the same).

"To protect systems from the loss of the key, many vendors offer assymetric encypion, which uses two keys."

Sort of.  Assymetric encryption is the same as public-key encryption (just another word), and there are two keys.  But the reason for using public-key encryption is not to prevent the loss of a key, but to facilitate key management.  (With symmetric encryption, both the sender and receiver have to share a key.  How this sharing takes place can be very complicated.)

"Users can choose from products based on various schemes.  Beware, however, that even stronger encryption methods are on the horizon and destined for the next generation of encryption products.  The National Institute of Standards and Technology (NIST) is expected to complete and Advanced Encryption Standard (AES) by the end of the year."

Even NIST has said that AES will not be finalized before 2000.  And AES is just a new symmetric algorithm; it has nothing to do with public-key cryptography.

"The new standard wil luse a 128-bit block size, with key lengths of 128-, 192-, and 256-bits, as opposed to the current 64-bit blocks with 56-bit key standard."

True.  The current standard is DES.

"RSA Data Security also has proposed its own algorithm to content for the new AES standard."

Sort of.  NIST has solicited proposals for algorithms.  Fifteen groups submitted, including RSA Data Security.  RSADSI is competing with other groups--Cylink, IBM, Entrust, Counterpane Systems, NTT, etc--not with NIST.  NIST does not hav an algorithm.

"RSA's extensions to DES, RC4 and RC5 implement multiple keys as well as digital signatures."

Many mistakes here.  RSADSI submitted RC6 to the AES process, which uses many ideas from RC5.  It has nothing to do with DES or RC4.  I'm not sure why multiple keys is something to talk about; as I said above, every algorithm post the Middle Ages uses multiple keys.  And digital signatures have nothing to do with the AES process.  AES is a  new symmetric encryption algorithm; digital signatures are done with public key cryptography.  They are different.

"Another contender is Blowfish II."

I submitted this algorithm.  We called it Twofish, but some early press reports called it Blowfish II.

"The Blowfish scheme, often referred to as PGP (Pretty Good Privacy), lets the sending and receiving computers negotiate a complex number."

First, Blowfish is never referred to as PGP.  Blowfish is a symmetric encryption algorithm.  PGP is an email security product.  PGP could have decided to use Blowfish, but it used IDEA and CAST instead.  Those are two different encrytpion algorithms.  And neither PGP, nor Blowfish, nor anything else discussed to or alluded to in this article, involve sending and receiving computers negotiating complex numbers.

"That number is used to scamble the transmission and unscramble the data that is received."

What you mean to say, I think, is that PGP uses public-key cryptography for key exchange.  The sender uses the reciver's public key to encrypt a session key, and that session key is used to encrypt the email message.

"For more on encryption and encryption products, a buyer's first stop should be the International Computer Security Association.  This ICSA is an independent organization that tests and certifies security products."

ICSA is a private for-profit company, despite what the name implies.  And while they do do some testing and certifying of security products, they do not test or certify encryption products.

Honestly, I can't believe this article made it into print.  Don't you have editors?

Bruce Schneier
President, Counterpane Systems
Author, Applied Cryptography
http://www.counterpane.com





From CTIA_Daily_News at tour.unitymail.com  Wed Jun 24 10:50:36 1998
From: CTIA_Daily_News at tour.unitymail.com (CTIA Daily News)
Date: Wed, 24 Jun 1998 10:50:36 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - June 24, 1998
Message-ID: <199806241728.MAA10305@revnet4.revnet.com>



=====================================

Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon for the
most important news in wireless communications today.

CALEA Summit being held July 21 & 22 in Washington, DC.
Register Now!!  Call (202) 785-0081

=====================================



From caj at math.niu.edu  Wed Jun 24 10:53:51 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Wed, 24 Jun 1998 10:53:51 -0700 (PDT)
Subject: Banning privacy: A radical proposal
In-Reply-To: <19980624011241.15925.qmail@hades.rpini.com>
Message-ID: 


On 24 Jun 1998, Anonymous wrote:

> This came from Yahoo/ZDNet. Mr. Pappas suggests that we just ban anonymity
> and privacy to "protect the children." Now where have I heard that before?
> And yet again, the "Ethical Hackers Against Pedophilia" raise their heads,
> no pun intended.

	Thanks for the info.  Maybe some merry band of pranksters
	would be willing to sneak into this guy's house and install
	an obvious-looking mock camera over his shower head?  I mean,
	just in case he's a child molester and all.

	Maybe once we're done legislating the internet, we can
	legislate the topolology of Euclidean space, so that every
	point is within earshot of a mike and eyeshot of a camera.
	After all, those evil child molesting evil bad evil people
	might take to doing evil stuff in their basement, or the
	nearby woods!

==-  Xcott Craver -- Caj at niu.edu -- http://www.math.niu.edu/~caj/  -==
"Also note that elecronagnetic theory proves that if you microwave a
 bar of Ivory soap it turns into a REAL MARSHMALLOW THAT YOU CAN EAT."
                                                   -James "Kibo" Parry






From whgiii at invweb.net  Wed Jun 24 16:49:02 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Wed, 24 Jun 1998 16:49:02 -0700 (PDT)
Subject: Banning privacy: A radical proposal
In-Reply-To: 
Message-ID: <199806242352.SAA029.59@geiger.com>


-----BEGIN PGP SIGNED MESSAGE-----

In , on 06/24/98 
   at 11:10 AM, attila  said:

>> Hey William, that's called "woman freedom to choose".  Woman right precedes the 
>> baby-that-might-be rights for she is the sine-qua-none condition for the baby-who-might-be 
>> to exist.
>>
>    as I said, I am personally against abortion, but your point is
>    absolutely correct: it is "the freedom to chose" on the part of
>    the woman who must carry the _potential_ child to term  --and,
>    yes, the woman is the 'sine qua non' condition.

The woman made her choice when her legs went up in the air. Because she
does not wish to be inconvenienced by the consequences of her actions does
not give here the right to commit murder.


>    what the absolutists in the Right to Life movements do not
>    understand, and refuse to accept, is that they have _no_ God
>    given right to tell another what they can or can not do that
>    does not _directly_ infringe on their own rights; as a
>    consequence, the fanatics believe they have the God given
>    right to legislate morality --and then there are back alley
>    coat hanger abortions where the nascent mother is placed
>    at an unacceptable risk.

Bunk, their are numerous laws that tell others what they can or can not
do. It is illegal to steal, it is illegal to commit murder. The fact they
you may be stealing from someone else or trying to kill someone else does
not make it any less illegal (and immoral). Every human has basics rights;
the right to life being the cornerstone of those rights.

I think it quite acceptable for someone to incur risks while in the act of
commiting murder up to and including their own death. As far as the
practitioners of murderer for profit they are no better than the Nazi's
gassing the Jews.

>    and, there is nothing sadder than an unwanted, often fatherless, 
>    child.

Yes their is, a dead one. I suggest you talk to some "unwanted",
fatherless children and ask them if they would rather be dead (not to
mention die a quite painful and barbaric death). I think you will find
that few of them share your opinions on the matter.

 I really didn't want this to turn into an abortion debate. I was
just trying to show the hypocrisy of the "save the children" crowd.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: This marks Logical End-Of-Message. Physical EOM follows

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNZGRVo9Co1n+aLhhAQG3UAQAqmOrIaDiIDsvAN0Sb0pWxqR58x4ta8xg
AU0GYnnETZHJOucWVsJf9qVvcVVQXa8M7Bh5e/mHAc1wL6BRmlCXmCMtXqEhXCHB
z1Tm/JwJWx+v16ToNWaWt1Zmv56MwECQflJQPCcwVpBgghLPgn+vARCagjq+eTqq
5hIP8HZ6+nY=
=KEEt
-----END PGP SIGNATURE-----







From attila at hun.org  Wed Jun 24 20:19:00 1998
From: attila at hun.org (attila)
Date: Wed, 24 Jun 1998 20:19:00 -0700 (PDT)
Subject: Banning privacy: A radical proposal
In-Reply-To: <199806242352.SAA029.59@geiger.com>
Message-ID: 


On Wed, 24 Jun 1998, William H. Geiger III wrote:

>  I really didn't want this to turn into an abortion debate. I was
> just trying to show the hypocrisy of the "save the children" crowd.
> 
    what I said was that I am _personally_ against abortion;  and,
    yes, I _personally_ consider it a offense against our God; but,
    I do not go so far as to say it is murder in the social context; 
    I do believe that is not my privilege to tell another they can
    not commit the sin of "choosing when their legs went in the 
    air"; and, abortion statistics show that the vast majority of
    abortions are for "mistakes" or failure of birth control. keep
    in mind, the extreme right has also been campaigning to
    eliminate the availability of birth control --which then raises
    the abortion rate... and, if you want to shade the argument,
    should all abortion be illegal?  date rape? rape? deformity?
    downs syndrome, bifidia? health of the mother?

    yes, let's drop the subject as there is no solution.  

    few can debate the issue calmly, or even intelligently. I just
    look at abortion as a fact of society that has been with us for
    milleniums; you cant stop it any more than Prohibition was
    successful, or the War on Drugs has been successful.  why does
    the government continue the war on drugs? simple, it's
    profitable for them in many ways (as the largest vendor, if
    nothing else). 

    besides, if we want to have a pissing contest, I am as far right
    as it goes --with one exception: I dont want to change anyone!
    we call it "free-agency" --them that wish to go to Hell, line 
    up on the left! --or dont, if you do not wish to-- the choice
    is yours.

    'nuff said!

	attila out...

___________________________________________________________________
three things I dont tolerate:  crackers, fed stoolies, and toadies.

	






From nobody at REPLAY.COM  Thu Jun 25 00:04:49 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 25 Jun 1998 00:04:49 -0700 (PDT)
Subject: Skipjack extensibility
Message-ID: <199806250705.JAA31711@basement.replay.com>



NSA made a claim that Skipjack couldn't be extended past 80 bits of key. Most
plausible explanation to my mind is that they're lying. Second is that there is
an attack against a class of Skipjack-like ciphers that requires only a few
plaintexts and 2^80 operations. Third is that some common key-lengthening
tricks like those for 2-key-3DES, DES-X, and DEAL fail when applied to
Skipjack. I can hardly fathom one resistant to all three, but I guess it's
possible with NSA.

Seems to me that you could always figure out some construct so that no
practically-secure cipher with Skipjack's observable properties could evade
having its key lengthened with much probability. Or maybe not. IANAC.

Besides, it's impossible to make a cipher that can't be used to construct
constructs with bigger key lengths: Skipjack(cryptovariable, IDEA(key,
plaintext)) -- terminology jab intended -- provably has an effective key length
as long as IDEA's. Even if that is cheating...






From jya at pipeline.com  Thu Jun 25 04:57:47 1998
From: jya at pipeline.com (John Young)
Date: Thu, 25 Jun 1998 04:57:47 -0700 (PDT)
Subject: NSA Declass Query
Message-ID: <199806251157.HAA13191@dewdrop2.mindspring.com>


Spyrus claims in a press release yesterday that NSA
announced declassification of SKIPJACK and KEA on
June 6, earlier than the DoD notice on June 23. 

Does anyone know where and how NSA made this
earlier announcement, and whether there is a document
on it? We've queried Spyrus but no answer yet.

Spyrus has scheduled a June 30 conference on its release
of a FORTEZZA library and products in connection with
the NSA declassification. Bruce Schneier is a keynote
speaker.


http://www.spyrus.com/company/releases/pr_swf.html









From jya at pipeline.com  Thu Jun 25 05:40:34 1998
From: jya at pipeline.com (John Young)
Date: Thu, 25 Jun 1998 05:40:34 -0700 (PDT)
Subject: CIA 4 Nags: Hackers Crypto Y2K Foreigners
Message-ID: <199806251240.IAA05050@dewdrop2.mindspring.com>


June 24, 1998
CIA Head Forsees Better Hackers
Filed at 5:43 p.m. EDT
By The Associated Press

WASHINGTON (AP) -- Intrusion into government computers 
will become increasingly more sophisticated and better 
organized and is likely to involve hostile nations, CIA 
Director George Tenet told lawmakers Wednesday. 

"Potential attackers range from national intelligence 
and military organizations, terrorists, criminals, 
industrial competitors, hackers and disgruntled or 
disloyal insiders," Tenet told the Senate Governmental
Affairs Committee. "We know with specificity of several 
nations that are working on developing an information 
warfare capability." 

While Tenet did not identify the countries, committee 
Chairman Fred Thompson, R-Tenn., who received a classified 
briefing on Tuesday, named some of them. Citing published 
reports, Thompson said China, Russia, Libya, Iraq and Iran 
and at least seven other countries are developing 
information warfare programs. 

The challenge facing U.S. intelligence will be to detect 
attacks on U.S.computers and information systems by 
organized or individual hackers. In some cases, Tenet said, 
disruptive intrusions orchestrated by hostile states may 
be disguised as amateurish efforts by individual hackers. 

"Our electric power grids and our telecommunications 
networks will be targets of the first order," Tenet said. 
"An adversary capable of implanting the right virus or 
accessing the right terminal can cause massive damage." 

The shift of the computer hacker problem from individuals 
and terrorist groups to governments is only beginning, 
Tenet said, but he added, "Down the line we are going to 
encounter more and it will be more organized." 

Tenet cited one case, without naming it, of a foreign 
government targeting the United States for intrusion into 
information systems. 

Sen. Joseph Lieberman, D-Conn., asked if the U.S. 
government is taking steps to develop its own offensive 
hacking capability to disrupt adversaries and to serve as 
a deterrent for computer-based attacks. 

"We're not asleep at the switch in this regard," Tenet 
replied. 

Air Force Lt. Gen. Kenneth Minihan, head of the National 
Security Agency, said it was not going too far to think in 
terms of an "electronic Pearl Harbor," a well-organized 
assault on the United States based on strikes aimed at 
electronic information systems. 

The most sensitive information centers, such as CIA and 
Pentagon classified files, are heavily guarded against 
such intrusion and, in most cases, are fenced off from 
Internet-type transfers. The problems are more likely to
arise in less well-guarded areas such as financial 
networks or industrial control centers. 

"They're not going to attack our strengths," Minihan said. 

A key area of vulnerability within the intelligence 
community, Tenet said, is the possibility of a disloyal 
or disgruntled employee wreaking havoc with CIA computers. 
Another scenario stems from the difficulty the CIA is
encountering finding enough software specialists to grapple 
with the "Year 2000" problem, caused by computers not being 
programmed to recognize the shift in the calendar from 1999 
to 2000. 

Most of the contractors available to help the agency, Tenet 
said, would use foreigners, affording "an easy opportunity 
to come in and see how your system works and what your 
vulnerabilities are." 

The running debate over the availability of increasingly 
sophisticated encryption technology, which scrambles messages 
and data from unauthorized intrusion, also poses a worry, 
Tenet said. 

Unless the computer industry and the government find a 
legislative compromise, the government could fall victim to 
hackers able to hide their own actions in impenetrable 
encryption codes. It may take a major computer-hacker 
incident to create the political pressure needed to allow
the government the "recovery" power to access encrypted 
databases. 

"There is a train wreck waiting to happen unless we deal 

with the recovery aspect of the encryption debate," Tenet 
said. 

------








From billp at nmol.com  Thu Jun 25 07:11:25 1998
From: billp at nmol.com (bill payne)
Date: Thu, 25 Jun 1998 07:11:25 -0700 (PDT)
Subject: Skipjack SIMULATIONS
Message-ID: <3592598D.1EAE@nmol.com>

willis at rand.org            http://www.jya.com/skipjack-fi.htm 
Markus.Kuhn at cl.cam.ac.uk   http://www.jya.com/skipjack-uk.htm
perry at piermont.com         http://jya.com/skipjack-pem.txt
mab at research.att.com       http://www.jya.com/skipjack-mab.htm
colin at nyx.net              http://www.jya.com/skipjack-cp.txt

Guys

I looked at your neat, what I would call, SIMULATIONS of the skipjack
algorithm.

I get an uncomfortable feeling in terms of work involved in implementing

/* The permutation G */
#define G(l, r, key, koff) \
        ((l) ^= F[(r) ^ (key)[(koff)%10]],      \
        (r) ^= F[(l) ^ (key)[((koff)+1)%10]],   \
        (l) ^= F[(r) ^ (key)[((koff)+2)%10]],   \
        (r) ^= F[(l) ^ (key)[((koff)+3)%10]])

on, say, an 8051.

NSA gave Sandia similar algorithm SPECIFICATIONS.

I simulated Benincasa�s NSS/USO algorithm in Forth to make sure
I THOUGH that I understood it.   And could produce the test vectors.
http://jya.com/da/whpda.htm

In the REAL WORLD at Sandia some of the following considerations
IMMEDIATELY DOMINATE THE ALGORITHM.

1    power budget
2    thermal constraints
3    size limitations
4    conducted and radiated emissions
5    radiation-hard requirements
6    speed requirements
7    memory requirements
8    red/black analysis
9    hardware fault tolerance [DELFAS]
10   implementation work GUESS
11   software technology limitations [Can we use Forth?]
12   ...

I am guessing that putting Skipjack on, say, on a smart card might
involve some hairy engineering.  

NSA KG units Brian Snow showed me were fairly small in size.  Say
about 1-2 inches x  1-2 inches x 5-6 inches.

Shift register crypto technology is much simpler than number-based
crypto technology.  Size, power, scalability, ... are the reasons, I
think, 
that NSA uses shift registers for its GOOD STUFF.

Also, NSA/Sandia had SOME REAL project DISASTERS with number-based
crypto.  Expensive, embarrassing, ...  What ever happened to Sandia�s
low- and high-speed public key crypto chips?

I am very pleased to see all of this information getting out so everyone
can look at it.

I may have a project coming up - protecting gas pipeline survey data
from competitors.  I DO NOT plan to TRY TO reinvent a crypto algorithm. 

I will implement someone else�s idea.  Good idea from a liability
standpoint too!

Morales and I need to complete our SETTLEMENT PROJECT so that we
can all move on to other CONSTRUCTIVE projects.

Best
bill

http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html


Subject: 
        Judicial Misconduct at Tenth Circuit Court of Appeals
  Date: 
        Mon, 22 Jun 1998 13:29:01 -0600
  From: 
        bill payne 
    To: 
        art morales , senator_hatch at Hatch.senate.gov, senator at thurmond.senate.gov,
        chuck_grassley at grassley.senate.gov, senator_specter at specter.senate.gov, 
senator_thompson at thompson.senate.gov,
        info at kyl.senate.gov, senator_dewine at dewine.senate.gov, john_ashcroft at ashcroft.senate.gov, 
michigan at abraham.senate.gov,
        senator_leahy at leahy.senate.gov, senator at kennedy.senate.gov, senator at biden.senate.gov, 
senator_kohl at kohl.senate.gov,
        senator at feinstein.senate.gov, russell_feingold at feingold.senate.gov, dick at durbin.senate.gov, 
senator at torricelli.senate.gov
    CC: 
        steve dillingham <" Steven.Dillingham"@hq.doe.gov>, Robert Nordhaus <" 
Robert.Nordhaus"@hq.doe.gov>, mrgall at ix.netcom.com,
        jy at jya.com, art morales , federico pena <" Federico.F.Pena"@hq.doe.gov>, 
RJPARK at sandia.gov,
        cypherpunks at toad.com, ukcrypto at maillist.ox.ac.uk


Monday 6/22/98 1:02 PM

Senate Judiciary Committee
http://www.senate.gov/committee/judiciary.html

Republicans

Orrin G. Hatch, Utah, Chairman   senator_hatch at Hatch.senate.gov
Strom Thurmond, South Carolina   senator at thurmond.senate.gov
Charles E. Grassley, Iowa   chuck_grassley at grassley.senate.gov
Arlen Specter, Pennsylvania   senator_specter at specter.senate.gov
Fred Thompson, Tennessee   senator_thompson at thompson.senate.gov
Jon Kyl, Arizona   info at kyl.senate.gov
Mike DeWine, Ohio   senator_dewine at dewine.senate.gov
John Ashcroft, Missouri   john_ashcroft at ashcroft.senate.gov
Spencer Abraham, Michigan   michigan at abraham.senate.gov
Jeff Sessions, Alabama

Democrats

Patrick J. Leahy, Vermont   senator_leahy at leahy.senate.gov
Edward M. Kennedy, Massachusetts   senator at kennedy.senate.gov
Joseph R.Biden, Jr., Delaware   senator at biden.senate.gov
Herb Kohl, Wisconsin   senator_kohl at kohl.senate.gov
Dianne Feinstein, California   senator at feinstein.senate.gov
Russell D. Feingold, Wisconsin   russell_feingold at feingold.senate.gov
Richard Durbin, Illinois   dick at durbin.senate.gov
Robert Torricelli, New Jersey   senator at torricelli.senate.gov

Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Moore, Barrett, Weis and help get this matter settled.

Thursday March 30, 1995 I wrote Tenth Circuit clerk Hoecker to request a
copy of the docket sheets for case 94-2205  Payne v. Sandia Corporation,
et al

Hoecker did not answer my letter.

On Tuesday March 5,1996 I  wrote  Judge Lucius D. Bunton to ask his help
to get a copy of the docket sheets.  No response.

On Monday September 23, 1996 Arthur R Morales and I wrote  Henry A.
Politz, Chief Judge U.S. Court of Appeals - Fifth Circuit to ask his
help to get a copy of the docket sheets of my case and Morales� Tenth
Circuit case 95-2204.

Tenth Circuit also refused to send Morales copies of docket sheets for
his case.

Politz is Bunton's boss.  No response.

Friday May 30, 1997 I wrote Antonin Scalia to get this help to get a
copy of the docket sheets.  No response.

5 May 1998 citizen John Young finds docket sheets on

    Source: PACER, U.S. Court of Appeals, 10th Circuit, 1-800-279-9107

and posts them on Internet at http://jya.com/whp-10usca.htm

  Docket as of April 10, 1998 0:05 am
  Proceedings include all events.
  94-2205  Payne v. Sandia Corporation, et al

shows that I filed my Brief of the Appellant on 2/19/95.

2/23/95     [835344] Appellant's brief filed by William H. Payne.
            Original and 7 copies.   c/s: y. Served on 2/19/95  Oral
            argument? pro se. Appellee/Respondent's brief due 3/24/95
            for Thomas P. Wright, for Robert Surran, for Paul A.
            Stokes, for Mary J. Stang, for Tommy A. Sellers, for Craig
            A. Searls, for Albert Narath, for Preston B. Herrington,
            for Peter S. Hamilton, for Roger L. Hagengruber, for James
            R. Gosler, for Harold L. Folley, for Robert L. Ewing, for
            C. William Childers, for Harvey J. Brewster, for Sandia
            Corporation (mbm)

mbm writes "Appellee/Respondent's brief due 3/24/95"

Sandia had sent me a copy of its brief by 3/28/96.

I filed  attached MOTION TO GRANT PLAINTIFF-APPELLANT'S DEMANDS ON BASIS
THAT DEFENDANT-APPELLEES FAILED TO FILE BRIEF WITHIN 30 DAYS SPECIFIED
BY FEDERAL RULE OF APPELLATE PROCEDURE 31 on Tuesday the 28th day of
March, 1995

My February 28 MOTION at the Tenth Circuit is filed WITHOUT notice of
service logged.

4/4/95       [845484] Appellant's motion filed by Appellant William H.
             Payne [94-2205] to grant appellant's demands on basis that
             appellees' failed to file timely brief. Original and 3
             copies  c/s: y (mbm)

In 1995 FRAP 25 (a) stated  "[b]riefs shall be deemed filed on the day
of mailing if the 
most expeditious form of delivery by mail, excepting special delivery,
is used."

FRAP 25 has been changed by 1998 to
http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a

Since I mailed Appellant's motion filed by Appellant William H.  Payne
[94-2205] to grant appellant's demands on basis that appellees' failed
to file timely brief on 3/28/98, it is likely Sandia's lawyer Friedman
received it 3/29/95.

Tenth Circuit logs

3/30/95      [844759] Appellee's brief filed by Sandia Corporation,
             Harvey J. Brewster, C. William Childers, Robert L. Ewing,
             Harold L. Folley, James R. Gosler, Roger L. Hagengruber,
             Peter S. Hamilton, Preston B. Herrington, Albert Narath,
             Craig A. Searls, Tommy A. Sellers, Mary J. Stang, Paul A.
             Stokes, Robert Surran, Thomas P. Wright. Original and 7
             copies. c/s: y. Served on 3/27/95  Oral Argument? y
             (appellant is pro se) Appellant's optional reply brief due
             4/13/95 for William H. Payne (mbm)

Federal Rule of Appellate Procedure [FRAP] 26 (c) states

  (c) Additional Time after Service. When a party is required or
permitted to act within a      prescribed period after service of a
paper upon that party, 3 calendar days are added to the     prescribed
period unless the paper is delivered on the date of service stated in
the proof of   service. 

  http://www.ca5.uscourts.gov/docs/frap-iop.htm#26c

While the Tenth Circuit ASSERTS Appellees� brief was, in fact, served on
3/27/95
evidence given below points to the brief  was served, in fact, on
3/29/95.  

I allege that Friedman affixed a false date of service to Sandia's
brief.

I WAS NEVER PROPERLY SERVED.  I wrote

          Wednesday March 29, 1995

          Dan Friedman
          Simons, Cuddy & Friedman
          Pecos Trail Office Compound
          1701 Old Pecos Trail
          POB 4160
          Santa Fe, NM 87502-4160
          505-988-4476
          505-984-1807 FAX

          Dear Lawyer Friedman:

          Today at 14:00 hours I found a green and white about 9x13
          inch envelope in our mail box at my home.

          Mailing label indicated that the envelope came from your
          firm.  CONFIDENTIAL was stamped on the mailing label.

          I  wrote "Received at 14:00 hours on W 3/29/95 with no
          POSTMARK OR STAMP by W. H. Payne" at the bottom of the
          envelope.

          There was no STAMP OR POSTAGE METER LABEL or 
          POSTMARK on the envelope.

          Therefore, I gave the envelope to US Postal Service
          supervisor Mel at 14:49 hours today at the Postal Receiving
          station at 9904 Montgomery, NW in Albuquerque.  Mel has a
          copy of the cover of the envelope with Mel's note written on
          it.

          Mel told me the post office was going to return the envelope
          to your firm for proper mailing.

          I ask:

         1    What did this envelope contain?  Please identify
              the documents precisely.

         2    If any Certificates of Service were included in the
              envelope, then what were the dates affixed to these
              documents?

         3    Who placed this envelope in our mail box?

         Lawyer Friedman:  It appears you missed an important filing
         date.  And are in the process of attempt to correct your
         failure.  But may be using illegitimate methods to conceal
         your failure.

         Please respond as soon as possible so that we all may
         discover what has happened here." ...

Lawyer Friedman did not respond to the above letter.

But Friedman did mail me Appellees� brief many days later in envelope
showing TRUE MAILING date.  Certificate of service on received
Appellees� brief
did not reflect postmark date.

10th Cir. R. 25.4 in 1995 page 62 reads
  
  Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
  with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1

But Tenth Circuit clerks Fisher and Hoecker despite my protests and
submission of
evidence may have stamped FILED on Sandia's IMPROPERLY SERVED 
Appellee/Respondent's brief according to the Federal Rules of Appellate
Procedure.

Laywer Friedman FALSIFIED THE CERTIFICATE OF SERVICE.   

Friedman DID NOT MAIL ME "Served on 3/27/95."

d) Proof of Service; Filing. A paper presented for filing shall contain
an acknowledgment of service by the   person served or proof of service
in the form of a statement of the date and manner of service, of the
name of the person served, and of the addresses to which the papers were
mailed or at which they were delivered, certified by the person who made
service. Proof of service may appear on or be affixed to the papers
filed. When a brief or appendix is filed by mailing or dispatch in
accordance with Rule 25(a)(2)(B), the proof of service shall also state
the date and manner by which the document was mailed or dispatched to
the clerk.

  http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a
  
Crime apparently committed by Hoecker and Fisher is

� 1017. Government seals wrongfully used and instruments wrongfully
sealed 

Whoever fraudulently or wrongfully affixes or impresses the seal of any
department or agency of the United States, to or upon any certificate,
instrument, commission, document, or paper or with knowledge of its
fraudulent character, with wrongful or fraudulent intent, uses, buys,
procures, sells, or transfers to another any such certificate,
instrument, commission, document, or paper, to which or upon which said
seal has been so fraudulently affixed or impressed, shall be fined under
this title or imprisoned not more than five years, or both. 
http://www.law.cornell.edu/uscode/18/1017.shtml

Despite my protests of judicial misconduct Judges Moore, Barrett, Weis
award decision to Sandia

10/6/95      [890055] Order filed by Judges Moore, Barrett, Weis
             "...All outstanding motions are denied..." (found in Order
             & Judgment of 10/6/95) [879579-1]  Parties served by mail.
             (pdw)

when these judges should not have had Appellees� brief before them.

Then in an apparently attempt to conceal what happened

10/6/95     [890076]  NOTE: THIS ENTIRE CASE IS SEALED. Terminated on
            the Merits after Submission Without Oral Hearing; Judgment
            Affirmed; Written, Signed, Unpublished. Moore, authoring
            judge; Barrett; Weis. [94-2205] (pdw)

I WON MY APPEAL, pro se, ON A TECHNICALITY but judges Judges Moore,
Barrett, Weis
awarded the win to Sandia Labs!

Members of Congress, judicial misconduct in this matter has been
well-documented.  Court records
filed with the Tenth Circuit.  But CURRENTLY under seal.

Lawyers involved in this matter attempt to use the legal strategy of
IGNORE and STONEWALL to
attempt to deny me justice.  

Ignoring and stonewalling by lawyers forced Morales and me to seek
visibility so lawyers
could no longer ignore and stonewall.

Lawyer attitude apparently is that they ignore rules of civil procedure
or even the law so long
as their actions are invisible to public scrutiny.

Visibility was achieved by suing the National Security Agency which
revealed even more judicial misconduct http://www.jya.com/whp052898.htm.

I would like to settle all  matters involved with this unfortunate
cyrpto-related matter,
which includes criminal violations of the Privacy Act.

DOE lawyer Steve Dillingham asked me to prepare a settlement offer in
1994.  I wrote a
settlement letter  May 22, 1994 to Dillingham.  Nothing happened.

June 11, 1998 I made several modifications to my 1994 settlement letter
and sent it e-mail
to Robert Nordhaus, Chief Counsel, DOE.

I ask that you

1  help with settlement of my six-year-old since I won my appeal at the
Tenth Circuit,
2  investigate Tenth Circuit case 94-2205  Payne v. Sandia Corporation,
et al to bring
   the guilty to justice.

Sincerely

william payne

505 292 7037  I am not reading e-mail

http://jya.com/whpfiles.htm
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html

Coauthor Lewis in the above is one of my former MS and PhD students in
computer science.

http://www.friction-free-economy.com/



Monday 6/22/98 1:04 PM

Members of Congress

Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Anderson, Barrett, Logan and request a congressional
investigation.

After several years, with Payne, of trying to get Tenth Circuit to send
docket sheets from my case,
citizen John Young  http://www.jya.com/index.htm  locates docket sheets
and posts them
    
  Morales Case Dockets 10th USCA                    June 12, 1998

on Internet at http://www.jya.com/arm061298.htm.

  Source: Online records Tenth Circuit Court of Appeals via PACER 

  GENERAL DOCKET FOR
  Tenth Circuit Court of Appeals

  Court of Appeals Docket #: 95-2204                           Filed:
9/29/95
  Nsuit: 3440
  Morales v. Sandia National Lab.
  Appeal from: United States District Court for the District of New
Mexico

I filed

11/9/95     [898274] Appellant's brief filed by Arthur R. Morales.
            Original and 2 copies.   c/s: y. Served on 11/7/95.  Oral
            argument? pro se. Appellee's brief due 12/11/95 for Sandia
            National Lab. (pdw)

Sandia files its FIRST ATTEMPT at

12/11/95   [905033] Appellee's deficient brief filed by Sandia
           National Lab.. Appellee's corrected brief due 12/21/95 for
           Sandia National Lab.  additional copies received 12/11/95.
           (fg)

Tenth Circuit court clerk Patrick Fisher writes Wells on December 11,
1995
concerning Sandia's deficient brief

  [C]orrections, however made, must be accompanied by proof of service
  upon all other parties to the appeal. ...

and issues

12/14/95   [905975] FIRST notice of rules violation for Deborah D.
           Wells for Appellee Sandia National Lab. (sls)

Wells submits

12/21/95    [907974] Appellee's brief filed by Sandia National Lab..
            Original and 7 copies.   c/s: y. Served on 12/20/95  Oral
            Argument? n Appellant's optional reply brief due 1/8/96 for
            Arthur R. Morales (mbm)

but DOES NOT serve me with a copy.

Wells later admits in

2/1/96        [917660] Response filed by Sandia National Lab.
              Appellant/Petitioner motion to clarify   Original and 3
              copies.  c/s: y response Null Relief Code (fg)

Certificate of Service date 30th day of January, 1996,

  [h]ad Appellant simply made a phone call to the Tenth Circuit, he
could
  have established that the Defendant-Appellee's corrected brief was
indeed
  filed on a timely basis, ...

I protested by filing

1/3/96       [909965] Appellant's motion "for the Court to Grant
             Appeal" filed by Appellant Arthur R. Morales [95-2204].
             Original and 3 copies.  c/s: y. (pdw)

1/3/96       [909966] Appellant's motion "for New Trial" filed by
             Appellant Arthur R. Morales [95-2204]. Original and 3
             copies.  c/s: y. (pdw)

1/3/96       [909967] Appellant's motion "to Discipline
             Defendant-Appellee" filed by Appellant Arthur R. Morales
             [95-2204]. Original and 3 copies.  c/s: y. (pdw)

because Sandia did not properly serve me in violation of Fisher's
December
11, 1995 order.

The Tenth Circuit court of appeals should NOT, by its own rules, filed
Appellee's brief filed by Sandia National Lab..  Original and 7
copies.   
c/s: y. Served on 12/20/95

10th Cir. R. 25.4 in 1995 page 62 reads
  
  Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
  with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1

And is doubtful whether court clerk Fisher had any authority under
appellate procedure
to permit Wells to correct her deficient brief.  

Rather Sandia's  brief did not comply with with Federal Rules of
Appellate Procedure and should have been summarily rejected for filing.

I WON, pro se, my appeal to the Tenth circuit on a technicality but
Judges Anderson, Barrett, Logan
awarded the win to Sandia Labs.

4/2/96        [932848] Order filed by Judges Anderson, Barrett, Logan
              denying parties' motions for general relief(found in Order
              and Judgment of 4/2/96)--"...During the course of this
              appeal, the parties have filed various motions for
              dismissal, summary grant, and sanctions. We find no merit
              to any of these motions, and they are [920851-1] Parties
              served by mail. (pdw)

by accepting and judging on a documents which was not permitted to be
before the court by
its own rules.

Judicial misconduct in my case has been well-documented as it is in
Payne's case.

Payne and I speculate that similar judicial misconduct may have occurred
at the Tenth Circuit.

Sandia lawyer Robert J Park wrote me a settlement letter on Feb 18,
1998.

I filled in the blanks and made minor handwritten chages and returned it
on February 22, 1998.  

But my offer has not yet been accepted.

I ask that you

1  help have my settlement offer accepted,
2  investigate judicial misconduct in case 95-2204 and punish the
guilty.

Some citizens can only express such frustrations with the US court
system with violence.

I seek change by legal reform.

Sincerely

Arthur R Morales
505 345 1381




From ATU5713 at compuserve.com  Thu Jun 25 07:31:35 1998
From: ATU5713 at compuserve.com (Alan Tu)
Date: Thu, 25 Jun 1998 07:31:35 -0700 (PDT)
Subject: Registering Euphoria
Message-ID: <199806251030_MC2-514B-F306@compuserve.com>


Terry,

Good points.  But...

1.  Registration brings money, doesn't mean Bob should just blindly make
changes.  I'm sure that's not what you meant, but I had to say that.
2.  However, on the other token, if a nonregistered user makes suggestions
nicely, his suggestion should be debated (as we are doing here) and
considered by Bob.

--Alan
 





From Hua at teralogic-inc.com  Thu Jun 25 09:45:19 1998
From: Hua at teralogic-inc.com (Ernest Hua)
Date: Thu, 25 Jun 1998 09:45:19 -0700 (PDT)
Subject: CIA 4 Nags: Hackers Crypto Y2K Foreigners
Message-ID: <413AC08141DBD011A58000A0C924A6D52C357D@MVS2>


I just don't understand how, in 1998, anyone could let Tenet get away
with a claim about key recovery like this.  Didn't anyone ask him how he
expected high-tech hackers (especially those possibly aided by foreign
intelligence agencies) to use key recovery?

Ern

	-----Original Message-----
	From:	John Young [SMTP:jya at pipeline.com]
	Sent:	Thursday, June 25, 1998 5:37 AM
	To:	cypherpunks at toad.com
	Subject:	CIA 4 Nags: Hackers Crypto Y2K Foreigners


	June 24, 1998
	CIA Head Forsees Better Hackers
	Filed at 5:43 p.m. EDT
	By The Associated Press

	WASHINGTON (AP) -- Intrusion into government computers 

	[SNIP]

	Unless the computer industry and the government find a 
	legislative compromise, the government could fall victim to 
	hackers able to hide their own actions in impenetrable 
	encryption codes. It may take a major computer-hacker 
	incident to create the political pressure needed to allow
	the government the "recovery" power to access encrypted 
	databases. 

	"There is a train wreck waiting to happen unless we deal 
	with the recovery aspect of the encryption debate," Tenet 
	said. 





From reservations at biztravel.com  Thu Jun 25 09:58:03 1998
From: reservations at biztravel.com (reservations at biztravel.com)
Date: Thu, 25 Jun 1998 09:58:03 -0700 (PDT)
Subject: Biztravel.com $25 Welcome Gift
Message-ID: <19980625165732345.AAA723@gw1-255.biztravel.com>


Dear Mr.  Cypherpunk,

Thank you for joining Biztravel.com.  Please note 
that your member name is CYPHERPUNKS. 

*********** FREE WELCOME GIFT ***********
I`d like to offer you a gift for new members -- 
we`ll give you a $25 American Express(R) 
Gift Cheque FREE with your first flight purchase.
Here`s how it works:
- purchase an airline ticket through Biztravel.com 
  by 8/31/98
- your travel must commence no later than 10/15/98 
- we`ll mail you your gift after you take your flight 

********** BIZTRAVEL.COM FEATURES ***********
Here`s just some of what Biztravel.com offers to make 
your travel planning easier to manage:

+ We present you with travel options based on the 
preferences you indicate in your Travel Profile.  This 
lets you plan your travel according to what`s most 
important to you, whether its getting the lowest fares,
departing at the most convenient time, or insuring 
you`re maximizing frequent flyer points for the trip. 

+ Our trained travel agents are available 24-hours-a-day
via email or telephone.  

+ We don`t stop at airline flights - we offer rental car 
and hotel reservations too, to provide you with one-stop
online travel booking.

+ Our free bizMiles service gives you a quick and 
convenient way to check your growing balances of
miles and points in the leading airline and hotel 
frequency programs.

+ We also have weather reports, driving directions, 
destination city information, and bizTraveler online 
magazine which is filled with travel news and tips, 
fare deals, and more.

Thank you again for joining us.  And remember - 
get a $25 American Express Gift Cheque FREE with your 
first qualifying flight purchase at 
http://www.biztravel.com

Sincerely,   
John I. Williams, Jr.
President & CEO
Biztravel.com(R)
***********************************************************************
Full details regarding this new member offer are available at 
http://www.biztravel.com/welcome25b 
***********************************************************************





From jya at pipeline.com  Thu Jun 25 10:01:34 1998
From: jya at pipeline.com (John Young)
Date: Thu, 25 Jun 1998 10:01:34 -0700 (PDT)
Subject: Dupes in NSA Release
Message-ID: <199806251701.NAA09644@dewdrop2.mindspring.com>


We need confirmation that pages 11 and 14 are the same
in the NSA algo release except for the words "Figure 7"
and Figure 8."

And that Figures 7, 8 and 9, showing "key formation diagram"
are the same on purpose.

We've asked ever-helpful Ed Roback at NIST about it but 
no answer yet.

Amazingly, thanks to Vanessa Talieri, NSA has cheerfully 
Fedexed us a hardcopy, due in tomorrow.  








From webmaster at home-employment.com  Thu Jun 25 10:04:51 1998
From: webmaster at home-employment.com (webmaster at home-employment.com)
Date: Thu, 25 Jun 1998 10:04:51 -0700 (PDT)
Subject: REAL JOBS You Can Do From HOME - Over 700 Companies Need YOU
Message-ID: <199806251704.KAA24611@toad.com>


*******************************************
     DO YOU WANT TO WORK FROM HOME?
---No MLM's - No Scams - No Franchises---
       No Work From Home Gimmicks
    http://www.home-employment.com/index.html
 Click 
Here
*******************************************
Over 700 Companies Interested in  FT/PT Employees and Independent 
Contractors to work From Their Home.

Visit our web page at:  http://www.home-employment.com/index.html

      Right Now MILLIONS Of People Are Working 
 Normal Jobs From The Comfort Of Their Own Homes.
           **YOU CAN BE ONE OF THEM!**

This company was started by WORK AT HOME Moms & ladies who 
have been telecommuting for several years. We decided to
start this company because we were tired of going through 
the same Work-At-Home scams and MLM runarounds that YOU've 
been through. For over a year now we've been helping people 
just like you to find LEGITIMATE Work-At-Home Employment.

SOME OF THE JOBS AVAILABLE ARE
   -  Typing
   -  Billing
   -  Clerical 
   -  Data Entry
   -  Data Processing
   -  Word Processing
   -  Technical Writing
   -  Computer Programming
   -  Internet Research
   -  Artists
   -  Sales
   -  Telemarketing
   -  Marketing
   -  Transcription
   -  Language Translation
   -  Graphics Design
   -  Web Page Design
           & MANY MANY more...

Wouldn't it be GREAT if you could actually locate a REAL home job 
without having to deal with the runarounds and scams.

Visit Our Web Site For More Information...
http://www.home-employment.com/index.html
______________________________________________________
______________________________________________________
This is a one time mailing only! Our intention is not to send you 
mail that you do not wish to receive. To be removed from our list 
please visit http://www.leadgenerator.net/remove.html We will 
promptly remove you from our list.

Information Net Source Corp.
3475 4th Street N.
St. Petersburg, FL 33704
(813)525-1643





From jf_avon at citenet.net  Thu Jun 25 11:06:17 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Thu, 25 Jun 1998 11:06:17 -0700 (PDT)
Subject: CIA 4 Nags: Hackers Crypto Y2K Foreigners
Message-ID: <199806251817.OAA23911@cti06.citenet.net>


On Thu, 25 Jun 1998 09:35:40 -0700, Ernest Hua wrote:

>I just don't understand how, in 1998, anyone could let Tenet get away
>with a claim about key recovery like this.  Didn't anyone ask him how he
>expected high-tech hackers (especially those possibly aided by foreign
>intelligence agencies) to use key recovery?


Same thing (gross lies) happens in the "freedom to own and keep arms" context...


Ciao

jfa


Definition:  FACISM: n.:  a political and economic movement, strongly nationalistic, magnifying the rights of the state as opposed to those of the individual, in which industry, though remaining largely under private ownership, and all administrative
political units, are controlled by a strong central government.
        -------------------------------------------------
"One of the ordinary modes by which tyrants accomplish their purpose, without resistance, is by disarming the people and making it an offense to keep arms".  - Joseph Story, U.S. Supreme Court Justice.
        -------------------------------------------------
the German gun control laws were enacted by the "liberal" Weimar Republic government that preceded Hitler, and were a strong aid to his coming to power -- because they disarmed Hitler's opponents, and Hitler's adherents ignored them -- as criminals have always ignored gun control laws.

Disarming the public is a frequent first step toward dictatorships and genocides.  Once the disarming is complete, the public is helpless against those who have the guns.        -------------------------------------------------

PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C







From helper1 at privacy-consultants.com  Thu Jun 25 11:14:09 1998
From: helper1 at privacy-consultants.com (helper1 at privacy-consultants.com)
Date: Thu, 25 Jun 1998 11:14:09 -0700 (PDT)
Subject: PRIVACY....and how to keep it!
Message-ID: <199806251813.KAA20120@privacy-consultants.com>


Everything you need for obtaining privacy and shelter from BIG BROTHER
you can find at

http://privacy-consultants.com/     or:

http://nauru-banker-net.com/

Driver's Licenses, 2nd passports, camouflage passports, Bank Charters, Offshore Companies
Anonymous Bank accounts, Press ID's, and a lot more!!

FREE monthly Newsletter 'PRIVACY BATTLE'

FREE extensive library 'WANNA SNOOP AROUND' and 'COUNTER SNOOP'

FREE 'ANONYMOUS RESOURCES', how to become invisible on the net, post anonymous, get censored news groups

It's really worth the visit, these guys know what they talk abou





From maksim at volga.net  Thu Jun 25 11:19:42 1998
From: maksim at volga.net (Maksim Otstavnov)
Date: Thu, 25 Jun 1998 11:19:42 -0700 (PDT)
Subject: SORM: New ex-KGB moves in telecom
Message-ID: <199806251819.LAA21699@geocities.com>


-----BEGIN PGP SIGNED MESSAGE-----

To whom it may concern:

The text between [Start of translation] and [End of translation] lines below
is a verbatim translation of the two drafts of documents which are currently
in the state of approvement by the two Russian ministries: Federal Security
Service (FSB, one of the five special services inheriting to KGB) and State
Committee on Communications (Goskomsvyaz'). The originals (and comments) are
available at the Libertarium Webpages (www.ice.ru/libertarium/sorm).

Inconsistencies of the original texts (including but not restrictive to:
paragraph misnumbering, language vagueness etc.) are left intact. I left the
two Russian abbreviations: SORM for the System of effitient research measures,
and FSB for the Federal Security Service, to avoid confusion in future.

In short: if approved, the rules will provide exKGB with technical facility to
_directly_ and covertly wiretap _any_ information transmitted via
telecommunication networks including telephone, telegraph, Internet etc. and
there will be no means to ensure KGBists obtained a court warrant (required by
Constitution and other federal legislation) before wiretapping.

Any informed comments (of legal and technological, not emotional nature) from
both organisations and from individual experts are welcome.

I am grateful to all involved with obtaining the documents. Hope some day I
will be in a position to mention them by their names...

- - Maksim Otstavnov

[Start of translation]

Approved                                                   
Deputy Director Federal Security Service
A.A.Bespalov
"____"___________1998

Confirmed
"____"___________1998

TECHNICAL  REQUIREMENTS 
TO THE SYSTEM OF TECHNICAL MEANS 
PROVIDING FOR THE FULLFILMENT OF EFFICIENT RESEARCH MEASURES 
IN THE DOCUMENTAL TELECOMMUNICATIONS NETWORKS

Approved
Head of the Telecommunications Management
A.Yu.Rokotyan
"____"___________1998�.

First Deputy to the Director General 
Of the Central Research Institute 
of the State Telecommunications of Russia
Yu.A.Alekseev
"____"___________1998�.

1. PURPOSE

1.1. The system of technical means destined to provide for the system of
efficient research measures (SORM) in the networks of the documental
telecommunications (NDTC) is being arranged at the basis of the Russian
Federation legislation and is meant to provide for technical support of the
above research measures in the telecommunications networks which are used for
supplying customers with telematic services, data transmission services, and
access to the world global information network of INTERNET. 

1.2 The actual technical requirements (TR) concern all NDTC regardless of
their forms of ownership formed previously or being currently formed according
to the Russian State Communications Committee licenses. 

1.3. SORM should provide for reading of all information (both incoming and
outgoing) belonging to the specific subscribers of the network(s) in question.

1.4. The actual TR should be observed regardless of what means of
information protection may be used in the NDTC.

1.5. The actual TR should be observed while providing additional services to
the NDTC subscribers.

1.6. The actual TR should be observed for each individual subscriber
regardless of the type of his connection to the DTC networks (individual or
collective). 

2. SET OF EQUIPMENT The set of SORM equipment should include:

  hardware and software means (HSM) providing for the requirements
fulfillment by SORM, these means should be part of the distant control center
(DCC) -  HSM SORM DCC;

  hardware and software means (HSM) providing for the requirements
fulfillment by SORM these means should be part of the NDTC node equipment -
HSM SORM NDTC;

  communication channel (communication lines and channeling hardware)
providing for establishing of communication between HSM SORM DCC and HSM
SORM NDTC; 

Note: The channeling hardware should be part of the HSM SORM NDTC equipment. 

  SORM software security and confidentiality protection means.

3. GENERAL REQUIREMENTS FOR THE SORM ORGANIZATION

3.1. NDTC SORM management should be controlled from the DCC by way of its
cooperation with the HSM SORM DCC via communication channels providing for
controlling commands transmission from the DCC to HSM SORM NDTC and for
information transmission from HSM SORM NDTC to the DCC. 

3.2 SORM should provide for transmission of the following information from the
HSM SORM NDTC to the DCC: 

  about the HSM SORM NDTC readiness; 

  about the results of DCC commands fulfillment; 

  about unauthorized interference with the HSM SORM NDTC work. 

3.3. SORM should provide for transmission to the DCC the NDTC
subscribers data base with the following information about subscribers at the
request of the DCC operator: 

  registration date in the DTC networks; 

  electronic address; 

  registration address; 

  additional services provided (including internet roaming (and voice
communication services). 

3.4. At the DCC command SORM should provide for receiving of the following
information pertaining to any individual user: 

  statistic information reading; 

  reading of information (both incoming and outgoing) belonging to specific
subscribers. 

Note: This command may be documented by the communications operator. 

3.5. SORM should provide for determination of: 

  subscriber's telephone number if he uses common carrier telephone line
(providing this line allows for this) for using telematic services and data
transmission;

  subscriber's electronic address if the latter uses other telecommunication
networks for using telematic services and data transmission. 

3.6. While reading statistical information SORM should provide for
transmission of the following information to the DCC HSM SORM NDTC: 

  period of work in the NDTC;

  telephone or commuted telephone line number or network address (of an other
network) used for NDTC access; 

  network addresses used for reception or transmission of information via
NDTC. 

3.7. While reading information SORM
should provide for transmission of the following information to the DCC HSM
SORM NDTC: 

  period of work in the NDTC; 

  telephone or commuted telephone line number or network address (other
network address) used for NDTC access; 

  real-time information transmitted via NDTC and belonging to specific
subscribers. 

3.8. The SORM reaction time from the moment of DCC command transmission to the
moment of its fulfillment confirmation by the HSM SORM NDTC reception should
not exceed 30 seconds (excluding the communication services access
discontinuation). 

4. HSM SORM NDTC AND HSM SORM DCC COMMUNICATION  INTERFACE 

4.1. Communication between SORM and DCC should be
conducted via the data transmission channel. 

4.2. Data transmission channel reservation should be provided. 

4.3. Switch to the reserve channel should be provided in case of the main
channel fault. 

4.4. The information exchange should be conducted via isolated communication
channel in a duplex regime at a speed not less than maximally allowed for the
NDTC subscribers. 

4.5. Interface of communication with the channeling equipment should comply
with the ITTU recommendations V.36, V.24, G.703. 

4.6. Protocol of digital data exchange between SORM and DCC should comply with
the X.25 ITTU recommendation (edition of 1995) for single chain LAPB
procedure. 

Note: When protocols used for the networks information exchange differ from
those recommended by the ITTU X.25 (such as TCP/IP), the protocol of
information exchange between SORM and DCC may differ from the protocol
mentioned in paragraph 4.6. as agreed with the FSB of Russia and the network
administration. 

4.7. The protocol of connection between SORM and DCC (the type of service
information, SORM/DCC interaction algorithm, arrangement of the information
transmission) should be defined in the process of SORM software development by
agreement with the FSB of Russia. 

5. SORM EFFICIENCY CONTROL 

5.1. Functional control of the SORM hardware and software efficiency against
the background of the NDTC equipment functioning should be provided for during
the exploitation. 

5.2. DCC should receive information concerning faults interfering with the
work of the NDTC SORM. 

5.3. Performance control of the information exchange channels between SORM and
DCC should be provided for. In case of the damage of information exchange
equipment data transmission should be cancelled and a corresponding message
should be transmitted to the maintenance personnel while automatic switch on
to the reserve channel should be fulfilled. 

6. UNAUTHORIZED INFORMATION ACCESS CONTROL 

6.1. The possibility of unauthorized interference with the process of
functioning and interaction between the HSM SORM NDTC and HSM SORM DCC should
be excluded. 

6.2. The possibility of unauthorized access to the data and software
providing for the HSM SORM NDTC interaction should be excluded. 

6.4. DCC should receive reports on all attempts of unauthorized access and
interference with the HSM SORM NDTC functioning. 

6.5. Information exchange between SORM and DCC should be secured. 

7. SORM INITIALIZING AND RESTART 

7.2. In case of SORM node software restart the information about this fact
should be transmitted to the DCC. 

7.3. Technological conditions of the SORM node software restart should
include the procedure of HSM SORM NDTC restart. 

7.4. A possibility of restarting part of the software controlling the work of
the HSM SORM NDTC should be provided for at the DCC command. 


_____________________________________________________________________________

Approved 
Deputy Director 
of the Federal Security Service 
of the Russian
Federation 
A.A.Bespalov 
"____"___________1998

Confirmed
"___"___________1998

THE ORDER OF IMPLEMENTATION OF THE SYSTEM OF THE EFFICIENT RESEARCH MEASURES
IN THE DOCUMENT TELECOMMUNICATIONS NETWORKS 

First Deputy to the Director General 
of the Central Research Institute 
of the State Telecommunications of Russia 
Yu.A.Alekseev

"____"___________1998


Administrations of the telecommunications documental networks (DTC) including
the services of data transmission, telematic services, Internet informational
resources access services that are guided by the "Technical  Requirements To
The System Of Technical Means Providing For  The Fullfilment Of Effecient
Research Measures In The Documental Telecommunications" should conduct the
following technical and administrative operations. A plan of measures to be
taken in order to implement the system of efficient research measures (SORM)
in the network consisting of two stages (the first stage may be missing)
should be developed and coordinated with the Federal Security Service of the
Russian Federation. 

The first stage - implementation of limited functions SORM using standard
equipment of the telecommunications provider, experimental running of the
system and evaluation of its compliance with the main technical SORM
requirements. 

The second stage - full fledged SORM implementation considering the results of
the experimental exploitation. The first stage provides for: 

1. Development and coordination with the FSB of the technological scheme and
SORM functioning algorithms at the telecommunications operator's network based
on the technical requirements. 

2. Correction if necessary of SORM technical requirements considering the
results of the first stage implementation. 

3. Development of the list of SORM hardware and software used at the first
stage and according to the results of the first stage (stating type, cost,
supply conditions and payer for each item). 

4. Preparation of proposals and coordination with the FSB of Russia of the
necessary communication protocols for data exchange between SORM equipment and
standard equipment of the telecommunications provider if the provider complies
with the SORM technical requirements (stage 2). 

5. Purchase and delivery of the SORM equipment in accordance with the list
provided by p. 3 

6. Allocation of necessary technical means for checking and tuning of the SORM
software at the provider's equipment. 

8. Organization of the intercity communication line between
telecommunications operator and the DCC.

9. Preparation of the exploitation and technical documentation for the SORM
including the regulations for the duty services interaction. 10. Testing and
tuning of the SORM hardware and software during interaction with the
telecommunications operator standard equipment. 

The first stage is completed as the SORM acceptance report is signed and it is
accepted for experimental exploitation as the result of the joint tests (FSB
as the contractor and the telecommunications operator as the performer.)

The second stage provides for:

1. Development of the SORM requirements for the telecommunications operator
equipment based on the "Technical  Requirements To The System Of Technical
Means Providing For  The Fulfillment Of Efficient Research Measures In The
Documental Telecommunications" (adjusted if necessary according to the results
of the first stage) containing the list of: 

  hardware and software means providing for the implementation of the SORM
requirements and included into the equipment of the node (nodes) of DTC
network - HSM SORM NDTC; 

  hardware and software means providing for implementation of the SORM
requirements and included into the DCC equipment - HSM SORM DCC; 

  type of channel for communication between NDTC and HSM SORM DCC; 

  type of equipment for the communication channel between the HSM SORM NDTC
and HSM SORM DCC; 

  the data exchange velocity between the HSM SORM NDTC and HSM SORM DCC; 

  protocol of the data exchange in the communication channel between HSM SORM
NDTC and HSM SORM DCC; 

  protocol of junction between HSM SORM NDTC and HSM SORM DCC; 

  information security and privacy protection software for the SORM.
Telecommunications operator should coordinate technical requirements with the
FSB of Russia. 

2. The specification of the specific hardware and software that should be
included as part of the standard equipment of the telecommunications operator
and of the DCC (stating type, cost, supply conditions and payer for each item)
is compiled according to the technical requirements. The specification is
coordinated by the telecommunications operator with the FSB of Russia organs. 

3. Technical design development for the SORM implementation by the
telecommunications operator's enterprise is fulfilled by the organization
licensed for the fulfillment of design works by the order of the
telecommunications operator. 

4. Development of the SORM technical exploitation documentation  including
regulation for duty services interaction. 

5. SORM equipment assembling at the telecommunications operator's enterprise
is fulfilled by the organization licensed for the fulfillment of assembling
works by the order of the telecommunications operator. 

6. Testing and tuning of the SORM software at the telecommunications
operator's equipment. 

7. Conducting joint SORM tests (FSB of the Russian Federation as a contractor
and the telecommunications operator as a performer). The second stage is
concluded with the SORM industrial exploitation acceptance report which is
jointly approved by the telecommunications operator management and the FSB of
Russia representatives. 

[End of translation]

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0.1iRu
Charset: noconv

iQCVAwUBNZJq7XGCEHWOiJDhAQE6cwP9Fm9c8js94liPIbQa+UHUAsPFuOAmEUQd
QsMIlNgJjTtRvmoDZS6fjxYbLgbO4imEOtsKEeIMJsZqX8UC0er2tk7VO3eK0968
EzM8w3+t8yFLB98/tWGE9Ghz2HiZh/ywoRiGX8Y08ZkKitYgOk/Aq4EmBHVQp92X
ePOimdtAtdY=
=BdJi
-----END PGP SIGNATURE-----
-- Maksim Otstavnov  http://www.ice.ru/otstavnov/
--   - chief, Labs of Civil & Financial Crypto
--   - editor, "CompuNomika" monthly
--   - maintainer of The Russian PGP HomePage





From CTIA_Daily_News at tour.unitymail.com  Thu Jun 25 11:43:47 1998
From: CTIA_Daily_News at tour.unitymail.com (CTIA Daily News)
Date: Thu, 25 Jun 1998 11:43:47 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - June 25, 1998
Message-ID: <199806251830.NAA11990@revnet4.revnet.com>



=====================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

CALEA Summit being held July 21 & 22 in Washington, DC.
Register Now!!  Call (202) 785-0081
=====================================



From mgraffam at mhv.net  Thu Jun 25 12:14:55 1998
From: mgraffam at mhv.net (mgraffam at mhv.net)
Date: Thu, 25 Jun 1998 12:14:55 -0700 (PDT)
Subject: CIA 4 Nags: Hackers Crypto Y2K Foreigners
In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C357D@MVS2>
Message-ID: 


On Thu, 25 Jun 1998, Ernest Hua wrote:

> I just don't understand how, in 1998, anyone could let Tenet get away
> with a claim about key recovery like this.  Didn't anyone ask him how he
> expected high-tech hackers (especially those possibly aided by foreign
> intelligence agencies) to use key recovery?

Easy. Make not using key recovery a crime with stiffer penalties than
any hack. If you can't get 'em on the hack, you get em on a crypto-related
charge. Scary stuff.

Michael J. Graffam (mgraffam at mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Enlightenment is man's emergence from his self-incurred immaturity.
Immaturity is the inability to use one's own understanding without the
guidance of another. . .Sapere aude! Have the courage to use your own
understanding!" - Immanuel Kant "What is Enlightenment?"






From Hua at teralogic-inc.com  Thu Jun 25 12:28:55 1998
From: Hua at teralogic-inc.com (Ernest Hua)
Date: Thu, 25 Jun 1998 12:28:55 -0700 (PDT)
Subject: CIA 4 Nags: Hackers Crypto Y2K Foreigners
Message-ID: <413AC08141DBD011A58000A0C924A6D52C357F@MVS2>


It is my humble opinion that possession of something physical that the
average person does not have the means to manufacture without
significant cost is very different from possession of something anyone
with high school math/CS skills can create from freely available books.

Now, if, next week, someone demonstrates a gun or some other physical
offensive weapon easily manufacturable using off the shelf parts at $10
a pop with less than $50 start-up costs (these numbers must include the
entire mechanism; in the case of a gun, it would include the bullets).

My objection to crypto regulations have nothing to do with rights; it
has to do with enforcement.  If you have almost no hope of enforcing
significant percentages of the violations of a crime law without posting
policemen at every PC and workstation, it would seem that the law is
pointless.  If the behavior is truly undesirable, then other means are
required to minimize the negative consequences of that behavior.

If you or anyone else really really want to follow up on this line of
discussion, please E-Mail me directly, and I will be happy to Cc: anyone
else expressing interest; I suspect I will not want to waste net
bandwidth debating this because it is largely theoretical.

Ern

	-----Original Message-----
	From:	Jean-Francois Avon [SMTP:jf_avon at citenet.net]
	Sent:	Thursday, June 25, 1998 11:59 AM
	To:	Ernest Hua
	Cc:	Cypherpunks
	Subject:	RE: CIA 4 Nags: Hackers Crypto Y2K Foreigners

	On Thu, 25 Jun 1998 09:35:40 -0700, Ernest Hua wrote:

	>I just don't understand how, in 1998, anyone could let Tenet
get away
	>with a claim about key recovery like this.  Didn't anyone ask
him how he
	>expected high-tech hackers (especially those possibly aided by
foreign
	>intelligence agencies) to use key recovery?


	Same thing (gross lies) happens in the "freedom to own and keep
arms" context...


	Ciao

	jfa


	Definition:  FACISM: n.:  a political and economic movement,
strongly nationalistic, magnifying the rights of the state as opposed to
those of the individual, in which industry, though remaining largely
under private ownership, and all administrative
	political units, are controlled by a strong central government.
	        -------------------------------------------------
	"One of the ordinary modes by which tyrants accomplish their
purpose, without resistance, is by disarming the people and making it an
offense to keep arms".  - Joseph Story, U.S. Supreme Court Justice.
	        -------------------------------------------------
	the German gun control laws were enacted by the "liberal" Weimar
Republic government that preceded Hitler, and were a strong aid to his
coming to power -- because they disarmed Hitler's opponents, and
Hitler's adherents ignored them -- as criminals have always ignored gun
control laws.

	Disarming the public is a frequent first step toward
dictatorships and genocides.  Once the disarming is complete, the public
is helpless against those who have the guns.
-------------------------------------------------

	PGP keys: http://bs.mit.edu:8001/pks-toplev.html
	PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
	PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From declan at well.com  Thu Jun 25 14:16:02 1998
From: declan at well.com (Declan McCullagh)
Date: Thu, 25 Jun 1998 14:16:02 -0700 (PDT)
Subject: CIA 4 Nags: Hackers Crypto Y2K Foreigners
In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C357D@MVS2>
Message-ID: 


Is your question rhetorical? Audience members can't ask questions at a
Senate hearing... And the point was probably too subtle for the
senators...

-Declan

On Thu, 25 Jun 1998, Ernest Hua wrote:

> I just don't understand how, in 1998, anyone could let Tenet get away
> with a claim about key recovery like this.  Didn't anyone ask him how he
> expected high-tech hackers (especially those possibly aided by foreign
> intelligence agencies) to use key recovery?






From jya at pipeline.com  Thu Jun 25 14:37:02 1998
From: jya at pipeline.com (John Young)
Date: Thu, 25 Jun 1998 14:37:02 -0700 (PDT)
Subject: Skipjack HTM
Message-ID: <199806252136.RAA16853@dewdrop2.mindspring.com>


We've transcribed a hardcopy of the 23-page SKIPJACK
doc into HTML:

   http://jya.com/skipjack-spec.htm  

  (350K, 41K text, 309K JPEG images of equations and figures)

A Zipped version:

   http://jya.com/skipjack-spec.zip  (295K)

Reports of typos in the tables welcomed.








From lreed at west.cscwc.pima.edu  Thu Jun 25 15:27:10 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Thu, 25 Jun 1998 15:27:10 -0700 (PDT)
Subject: BumBoy I - Space Aliens Hide My Drugs!!!
Message-ID: <009C83D6.67E0FB60.27@west.cscwc.pima.edu>


Entertainment for Victims             June 1998 * $7.09
_________________________

Trojan
Anniversary
Issue

BumBoy
Interview:
Wham! Bam!
C-J VAN DAMNNED
{AKA-Tutu, TruthMangler, ASlayerToBeNamedLater, ad infinitum}

VIAGRA AND
NIGHTSTICKS
The Untold Story

Mrs. Tom
Snyder
LATE NIGHT
BIG MOUTH

_____________________________________________________________

			DEAR BUMBO

GREAT BALLS OF FIRE!
   "Regarding the well-researched article claiming that the
length of President Clinton's dick and the circumference of
his two balls results in the number '666', I was wondering
if the dick-length was a surface measurement taking into 
account the famous 'bend', or if it was measured 'as the
crow flies.'
Paula Lewinski, Lincoln Bedroom Decorat(or/tion)

  {Next time, Monica, don't write your question on the back
   of your personalized stationery, and you won't have to
   eat crow, instead of flies. - BB}


		     THE BUMBO ADVISOR
K- JELL0
  "Does it violate a Canadian citizen's Charter Rights when
the RCMP put sand in the Vaseline?"
~ Sandy SandFart, A Radical Moderator

[Not if they are good kissers. - BB]


			 MOVIES

WAG THE STRAW DOG
The movie opens with great promise, as ClitOn's OpenFly-
Behind-Closed-Doors policy is exposed by BlackBalls
operatives of a former president referred to only as
'Dick' who break into Ken Starr's offices to plant X-Rays
suggesting that Monica Jones' pussy was bent *before*
her accusations of PresiBent ClitOn promising her a job
as a favor for her favours, when the credit card he
originally tried to pay her with turned out to have
expired long before his erection had done so.
The following scene, however, with PresiBent ClitOn dancing
in front of a Ferral Grand Jury, having a large penis rising
out of his shirt collar, and with a small 'head' sticking
out of his open fly, singing "If I Only Had A Brain," turned
out to be the highlight of a movie that was five years in the
making, at a cost to the US Government of eighty million
dollars.
BUMBO RATING - One Prick Up

__________________________________________________________

BumBoy Interview: C-J VAN DAMNNED
 A candied conversation with CyberSpace's most understood
 FUD Disseminator whose BadForgeries under the auspices of
 the Electronic Forgery Foundation have thus far failed to
 trick anyone but Adam Back and Alec McCrackin into being
 initiated by the Author into the mythical Circle of Eunuchs

{  It was a scene from a Film Blanc as AnInterviewerToBe-
  NamedLater was met at the door of the TrojanSafeHouse by
  a TruthMongrel wearing White Lipstick and no panties.
   It was immediately obvious that Blanc Weber's attempts
  to deflect the Author's obsession with her by forging
  love-letters to HimOrHer, purporting to be from Carol
  AnnaChrist CypherPunk, had not only failed miserably,
  but had also resulted in tremendous psychological trauma
  to Baby, who continually interrupted the BumBoy Interview
  by dropping a BadBillyG mask at the Author's feet, and
  backing towards him with her tail lifted.
   When asked about the vile-colored discharge coming from
  TruthMongrel's rear area, the Author merely mumbled an
  unintelligible statement about 'A tribute to Lucky Green'
  and forced a couple of antibotic pills down her throat
  with his penis.
   AnInterviewerToBeNamedLater, finding the door had locked
  behind her, quickly sat down and started her tape recorder
  before holding tightly onto the edges of her chair with
  both hands and attempting to smile as if nothing was wrong.}

BUMBO: I guess I should start by asking you for the True
Story (TM) behind the Legendary CypherPunks Moderation/
Censorship Experiment.
VAN DAMNNED: The True Story (TM), never before told, is that
the CypherPunks Censorship Crisis, which, incidentally, has
the same acronym (current CypherPunks Word of the Week) as
the Canadian Criminal Code, was, in reality, an attempt to
forcefully remove me from the CypherPunks Classic Mailing
List, after which the mailing list was scheduled to return
to normal, much along the lines of the NewCoke-ClassicCoke
ruse.

BUMBO: Declan McCullagh, a MainDream journalist with the
Netly News, and a media shill for Time Magazine, who was
the first false profit to announce 'The Death of the
CypherPunks', reported that the controversy began over the
forced unsuscbriving of Dr. Dimitri Vulis, KOTM as a result
of his relentless spamming of the CypherPunks Classic
Mailing List. Are you suggesting that Declan is a lying piece
of crap?
VAN DAMNED: ou don't understand...
There *is*no* Declan...there *is*no* Dimitri.

BUMBO: Well bend me over, and call me Mary...are you serious?
VAN DAMNNED: Fucking eh! Excuse me, but that's an old Canadian
TouretTic saying...
Believe me, I was as surprised as you are when I first began 
to suspect that the CypherPunks Classic Mailing List had at
its heart the classic scent of a dark, hidden conspiracy.
At first I thought it was part of the WorldWidePlot (TM) against
me by Gomez and the Dark Allies, but I later discovered it to 
be the work of a lone gunman, operating from behind the grass
grown on the knoll known as Mayonaisse Mountain.

BUMBO: Timothy C. May?
VAN DAMNNED: If that is his *real* name...

BUMBO: Are you sure you're not full of shit and just trying
to distract me while you try to peek up my skirt to see if
I'm wearing any panties?
VAN DAMNNED: Those are two separate issues...
Actually, my underlover investigation, with Baby on top,
eventually revealed that Tim May is a senile, grouchy old
fart whose redneck, racist cynicism resulted in him being
shunned by every decent, law-abiding, moral person on the
InterNet, and he single-handedly began the CypherPunks
Classic Mailing List by assuming the personas of a variety
of alleged founders of the list, including Gilmore, Hughes,
et al.
TCM's original plan was to create a mystique around the list
which would draw others into his sticky PreWorldWideWeb and
result in his being able to twist the minds of others with
his criminal, anarchistic beliefs. Over the years, however,
the lack of response by others on the InterNet forced him
to invent such a wide variety of CypherPunks Consistent
Net Personas (TM) that he eventually went mad, identifying
with each and every persona and subconsiously fearing the
intrusion of 'outsiders' into the CypherReality that he
had created.

BUMBO: And he managed to maintain the illusion all of 
these years?
VAN DAMNNED: es. As hard as it is to believe, little Timmy
Mayonnaise, a sorry, pathetic loser whose CyberLoneliness
drove him to madness, is solely responsible for the prodigious
output of the CypherPunks over the years. BlackNet, Remailers,
HashCash, StrangleHold and Comanche software...

BUMBO: Are you saying that Sameer, Ian Goldberg, Peter Trei,
Matt Blaze, Lance Cottrell, et al, don't exist?
VAN DAMNNED: Never have, never will.

BUMBO: And Sandy SandFart?
VAN DAMNNED: The best-kept-secret in CypherPunks CyberHistory
is that *I* am Sandy SandFart.

BUMBO: Get out of here...
VAN DAMNNED: OK, I'm leaving...

BUMBO: No, you fucking idiot...that's just an expression!
VAN DAMNNED: Oh...sorry...
Anyway, the whole CypherPunks Censorship Crisis (not to be
confused with the Canadian Criminal Code), began when I
innocently joined the CypherPunks Classic Mailing List,
believing it to be real. Tim May at first believed that
I was just another one of his invented personas, but he
inadvertantly stumbled upon documentation that I was
actually a separate individual, and thus a threat to the
CypherReality that he had so painstakingly created over
the years.
When I began to realize that my existence as an actual
person was creating problems on the list, due to my
post mathematically proving that I had broken PGP having
mysteriously failed to show up on the CypherPunks list,
I quickly changed my NetPersona to an imaginary being
known as Toto, but the mental infirmities that prevented
me from maintaining a Consistent CypherPunks Net Persona
made it a useless exercise in redundant uselessness.
Timothy C. May, under his John Gilmore persona, announced
the forceful unsribiving of another of his CypherPunks
personas, Dimitri Vulis, with the intention of having the
CypherPunks Classic Mailing List moderated/censored by
an entity introduced as Sandy SandFart.
  Recognizing TCM's clever ruse, I blindsided his devious
plan by assuming the role of Sandy SandFart on the list,
forcing little Timmy into a schizoid break during which
he withdrew from the CypherPunks list as Tim C. May,
while subconsiously maintaining his other personas.

BUMBO: This is getting too weird... Do you have any actual
*proof* of all this?
VAN DAMNNED: Think about it...
When did pouting little Timmy return to the list?
After 'Toto' posted a message to the list, with the
Subject: Cyphernomicon, Tim May was finally
driven beyond the boundaries of bizarre brainiatic
bedlam to the point where it broke the PGP-encrypted
brainwaves holding apart his separate CypherPunks 
Consistent Net Personas, and he reached a level where
he was 'Hun With Everything', including Attila.

BUMBO: Uuhhh...are you starting to 'lose it'?
VAN DAMNNED: Must be time to take my medication. Let's put
a right-square bracket in and continue this interview after
I suck up the pills I stashed up TruthMongrel's twat...]











From lreed at west.cscwc.pima.edu  Thu Jun 25 15:27:50 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Thu, 25 Jun 1998 15:27:50 -0700 (PDT)
Subject: BumBoy II - Space Aliens Hide My Drugs!!!
Message-ID: <009C83D6.824D3400.29@west.cscwc.pima.edu>


{ AnInterviewerToBeNamedLater, though sickened by the totally
  disgusting display of oral sodomy committed by the Author
  on the SingleInnocentChildDog, Baby, NunTheLess held her
  tight grip on the edges of her chair, keeping her knees
  together to thwart the depraved bastard from discovering
  whether or not she was wearing panties, and fulfilled her
  obligation to BUMBO to provide a completed interview in
  return for the drugs she had received as an advance}

BUMBO: How did you finally confirm your suspicions as to
Tim C. May being the only real subscriber to the CypherPunks
Classic Mailing List?
VAN DAMNNED: I reverse-engineered the Perl Beer script that
Ignoramous ChewedOff, that dickless prick, sent to the list,
explaining that it could be used to create forged posts from
allegedly real Net Personas.
Actually, I was trying to use the program to forge messages
to the list, but I was stinking fucking drunk, and the next
thing you know, EveryThing became EverClear.

BUMBO: ou have...uuhhh...*something* sticking to your 
upper lip...
VAN DAMNNED: Trade you a green one for a yellow one...

BUMBO: Quit trying to peek up my goddamn skirt!
VAN DAMNNED: Sorry, I can't help myself...
Anyway, although the results of the reverse-engineering of
Tim May's CommieSchill CypherPunks Consistent Net Persona,
Ignoramous, proved my previously perceived preponderance
of proof to be proven, it also revealed the presence of
a second gunman lurking in the gunsmoke from the seedless
grass behind the knoll on Mayonnaise mountain, even though
at first it didn't make any SenseToMeA.

BUMBO: JohnBob Hettinga-oung?
VAN DAMNNED: Exactly.
I had long suspected that Hettinga and oung were the same
person, due to their Consistent CypherPunks Net Personas
undergoing parallel degeneration into semi-coherent mad
ramblings similar to those experienced by TruthMonger when
I ran short of medications.
At first, I suspected they were two separate individuals
with the same drug connection, but when I made the final
connection between Hettinga-oung and Kent Crispin, it
became obvious that the 'Spooks' alleged to be operating
in the background of the CypherPunks Classic Mailing List
were actually only a single 'Spook', who, upon subversively
joining the CypherPunks list as an undocumentable persona
capable of sneaking in under Tim May's ever watchful, paranoid
eyes, fell prey to TCM's madness, developing a wide variety
of Consistent CypherPunks Net Spook Personas.

BUMBO: What gave rise to the CypherPunks Disturbed Male
List?
VAN DAMNNED: Previous to the Legendary CypherPunks Moderation/
Censorship Experiment/Crisis, little Timmy Mayonnaise's 
inability to reconcile his masculine and feminine sides resulted
in his few Female CypherPunks Consistent Net Personas being
incapable of balancing the strong male presence represented by
the majority of the CypherPunks personas he had created.
In order to prevent his extreme homophobia from destroying the
balance of the CypherTao, he was forced to personify it as
Dr. Dimitri Vulis, KOTM, publically accusing all of TCM's
other CypherPunks personas of being 'cocksuckers'. This enabled
the other personas, chiefly John Gilmore, to manifest the parts
of TCM's disturbed psyche that were warring against his feminine
side, threatening to prevent his continued residency in NewAge
California under the watchful eyes of Gloria Steinham clones.
Once little Timmy had reconciled his masculine side with his
feminine side, by listening to C.J. Parker's 'Song For Rose (I'll
Give ou My Heart But My Dick Belongs To Momma)', he felt more
comfortable wearing his Freudian Slip, and his CypherPunks
personas began to break up into sub-groups with lives of their
own.
His Jim Choate persona runs the Austin CypherPunks Node, with
the Einstein/Genius sub-personality peacefully coexisting with
the Feminine/Hysteria sub-personality that flipped out when Toto
violated Choate's identity by forging a post to the list in 
the WEBeastMaster's name.
His Commie Schill persona, Igor, runs the Algebra/Semantics
CypherPunks Node, with Igor's understanding of the similarities
between the strict logic of mathematics and the flowing music
of semantics making up for Tim's inability to understand the
connection between Comrade Lenin and John Lennon, or why the
sound of a Volkswagon engine was so hard to dance to.
Lance Cottrel's InfoNextStep CypherPunks Node secretly funded
by Steven BlowJobs, acts as a release valve for TCM's remaining
homophobic repressions, allowing him to justify his anal-
penetration fantasies by imagining that he is being victimized
by manly Nazis while trapped under the snowmobile that flipped
over while racing across the tundra, while still punishing
himself by the pain that results at night, when the ice-weasels
cum.
Joichi Ito (a play-on-words referring to Pearl Harbor
Computer's motto, "We Don't Eat [Ito] [Sushi] Dogs") as
the TCM sub-personality running the CypherNip Node, allows
TCM to indulge the S&M Bondage fantasies which are a 
prerequisite for buying land in NewAge California, while
telling himself that he's not *really* a fucking weirdo,
because he is only binding his feet.

BUMBO: And TCM's blatant redneck racism?
VAN DAMNNED: The Japanese CypherPunks Disturbed Male Node was
one of TCM's subconsious creations, designed to balance his
round-eyed, redneck imperialist side with the suppressed
slant-eyed gook in his California NewAge CosmicMakeUp.
Serious students of secular semantics soon saw that the
'Chop-chop' insults hurled by Tim May at his suppressed
errowMenace CyphelPunks Consistent Net Pelsonas were 
actually a pidgen-English variation on a red-white-and-blue/
stars-and-stripes Harley Davidson phrase, 'Chopper-Chopper'.

BUMBO: Uuhhh...it's getting a little deep. Is it medication
time again?
VAN DAMNNED: Think about it...
David Formosa, AKA ? the Platypus. It was an early sign of
the Chinc within struggling to get out, yet having to adopt
an Australian alias because TCM was not yet ready to face
butchering the English language without the excuse of being
drunk, or a victim of an imaginary disease named agraphia,
which was developed in a secret underground lavoratory by
Kent Crispin, who was desperately trying to keep Tim May
from consciously transposing his 'r's and 'l's, and realizing
that Pearl Harbor Computer's motto, "We don't eat dogs." was
not a reference to the disgusting dietary habits of Orientals,
but a veiled reference to the Reptilian Nazis who sated their
unnatural, carnal cuisenary desires by disguising themselves
as alligators crawling out of the Florida swamps to savagely
savour the sumptuous PuppyFlesh of TruthMongrel's distant
cousins, the FrenchConnection Poodles, whose heroin habits
were a survival mechanism designed to make them comfortably
numb as the Reptilian Nazis dined on their gonads, long
considered a delicacy by Space Aliens across the Universe,
turning them into Circle Of Eunuchs DoggieInitiates just
like Baby TruthMongrel, who was a Bitch trapped in a
Stud's body before being interrogated as a suspected member
of the Magic Circle by Gomez's Soviet dwarf, Hobbit uri
Kokoff? the Platypus, who was the inspiration for Tim May's
David 'The Australian Chinc' Formosa Consistent CypherPunks
Net Persona, completing the Magic Circle that began as a
defensive mechanism to thwart the Dark Forces that arise
every time that a Unix system is booted, releasing Daemons,
Zombies, Orphan Zombies, and the Dreaded Cron, enabling
students to face these imaginary creations of their drug-
addled minds with the comforting support of an equally
nonexistent creation by a mentally disturbed FrostBack
who bought into the drug-induced, Berzerkely Dungeons
and Dragons fantasies resulting from secret digital implants
into the brains of Bell Labs employees by Bill Gates in order
to promote his less versatile DOS Operating System as a safe
alternative to a Unix Operating System proliferating in the 
Bay Area, dangerously within reach of the Dark Forces in 
Oakland who were a threat to property values, in sharp contrast
to the safety of Redmond, Washington, where BadBillyG's secret
lover, Blanc Weber, kept the Dark Forces within the Author's
mind at bay, by resisting HisOrHer efforts to psychically 
peek up her skirt, to see if she was wearing panties.

BUMBO: If you're not going to take any medication, then
I *am*...
Baby! Come here...]





From vznuri at netcom.com  Thu Jun 25 21:05:26 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Thu, 25 Jun 1998 21:05:26 -0700 (PDT)
Subject: "deadbeat parents"
Message-ID: <199806260405.VAA23457@netcom3.netcom.com>


apparently one of the 4 horsemen of the infocalypse...?!?!
whatever can be used as an excuse to take away rights, eh?


------- Forwarded Message

Date: Wed, 24 Jun 1998 15:18:11 -0500
To: believer at telepath.com
From: believer at telepath.com
Subject: IP: Clinton Signs New Deadbeat Parents Penalties into Law 

Source:  USIA

Clinton Signs New Deadbeat Parents Penalties into Law 
U.S. Newswire
24 Jun 9:06

 President Clinton Signs New Deadbeat Parents Penalties into Law
 To: National Desk
 Contact: White House Press Office, 202-456-2100

   WASHINGTON, June 24 /U.S. Newswire/ -- The following was released
today by the White House:

  Today, President Clinton will announce new statistics highlighting
the success of Administration child support enforcement efforts and
will sign into law tough new penalties for parents who repeatedly
refuse to pay child support.  At an Oval Office ceremony, the
President will announce that a new child support collection system
launched nine months ago has already located one million deliquent
parents, and the child support enforcement program established a
record 1.3 million paternities in 1997.  Overall, 68 percent more
child support was collected in 1997 than in 1992.  The bill he will
sign into law, the Deadbeat Parents Punishment Act of 1998, is based
on his 1996 proposal for tougher penalties for parents who repeatedly
fail to support children living in another state or who flee across
state lines to avoid supporting them.  Finally, the President will
reiterate his position that bankruptcy reform legislation should not
make it harder to collect child support and alimony.

  New Hire Directory Finds One Million Deliquent Parents.  Today, the
President will announce that the new National Directory of New Hires
had located one million deliquent parents since its October 1, 1997
launch.  The directory, proposed by the President in 1994, and
enacted as part of the 1996 welfare reform law, helps track parents
across state lines and withhold their wages by enabling child support
officials to match records of delinquent parents with wage records
from throughout the nation.  Approximately one-third of all child
support cases involve parents living in different states.  (See
attached chart)

  A Record Number of Paternity Establishments.  The President will
also announce that the child support enforcement program established
a record 1.3 million paternities in 1997, two and a half times the
1992 figure of 510,000.  Much of this success is due to the
in-hospital voluntary paternity establishment program begun by the
Clinton Administration in 1994, which encourages fathers to
acknowledge paternity at the time of the child's birth.

  A Record Increase in Child Support Collections.  In 1997, the state
and federal child support enforcement program collected a record $13.
4 billion for children, an increase of 68% from 1992, when $8 billion
was collected.  Not only are collections up, but the number of
families that are actually receiving child support has also
increased.  In 1997, the number of child support cases with
collections rose to 4.2 million, an increase of 48% from 2.8 million
in 1992.

  New Felony Penalties for Egregious Failure to Pay Child Support.
The President called for these tough new penalties in July 1996 and
again in his 1997 State of the Union address.  This new law creates
two new categories of felonies, with penalties of up to two years in
prison, for more egregious child support evaders:

   Traveling across state or country lines with the intent to evade
child support payments will now be considered a felony if the
obligation has remained unpaid for a period longer than one year or
is greater than $5,000.

   When the obligation has remained unpaid for a period of longer
than two years or is greater than $10,000, willful failure to pay
child support to a child residing in another state will be considered
a felony.

  This bill was sponsored in Congress by Representatives Hyde and
Hoyer and Senators DeWine and Kohl, and had overwhelming bipartisan
support in both houses.

  Responsible Bankruptcy Reform that Doesn't Hurt Children.  Finally,
the President will reiterate his position that bankruptcy reform
legislation should not make it harder to collect child support and
alimony.  The Administration will work with Congress to produce a
bankruptcy reform bill that asks responsibility of both creditors and
debtors, while stemming abuse.  In those discussions, the President
will continue to make protecting child support and alimony a top
priority.  The House and Senate bills still raise the concern that
additional debts will survive bankruptcy and compete with child
support and alimony payments for scarce funds.

 -0-
 /U.S. Newswire  202-347-2770/
 06/24 09:06

Copyright 1998, U.S. Newswire
- -----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. 
- -----------------------





**********************************************
To subscribe or unsubscribe, email:
     majordomo at majordomo.pobox.com
with the message:
     (un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************

------- End of Forwarded Message






From jf_avon at citenet.net  Thu Jun 25 22:35:50 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Thu, 25 Jun 1998 22:35:50 -0700 (PDT)
Subject: CIA 4 Nags: Hackers Crypto Y2K Foreigners
Message-ID: <199806260547.BAA05417@cti06.citenet.net>



On Thu, 25 Jun 1998 12:18:44 -0700, Ernest Hua wrote:

>Now, if, next week, someone demonstrates a gun or some other physical
>offensive weapon easily manufacturable using off the shelf parts at $10
>a pop with less than $50 start-up costs (these numbers must include the
>entire mechanism; in the case of a gun, it would include the bullets).


Operational homemade firearms are often found to have been built by convicts in high security prisons...

Check with the NRA or with the NFA (Canada)
 e-mail: nfadat at telusplanet.net   Web site: http://nfa.ca/

Ask David Tomlinson for info on the topic, he'll tell you...

Ciao

jfa







Definition:  FACISM: n.:  a political and economic movement, strongly nationalistic, magnifying the rights of the state as opposed to those of the individual, in which industry, though remaining largely under private ownership, and all administrative
political units, are controlled by a strong central government.
        -------------------------------------------------
"One of the ordinary modes by which tyrants accomplish their purpose, without resistance, is by disarming the people and making it an offense to keep arms".  - Joseph Story, U.S. Supreme Court Justice.
        -------------------------------------------------
the German gun control laws were enacted by the "liberal" Weimar Republic government that preceded Hitler, and were a strong aid to his coming to power -- because they disarmed Hitler's opponents, and Hitler's adherents ignored them -- as criminals have always ignored gun control laws.

Disarming the public is a frequent first step toward dictatorships and genocides.  Once the disarming is complete, the public is helpless against those who have the guns.        -------------------------------------------------

PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C




From mitch at duzen.com.tr  Thu Jun 25 23:24:55 1998
From: mitch at duzen.com.tr (S. M. Halloran)
Date: Thu, 25 Jun 1998 23:24:55 -0700 (PDT)
Subject: "deadbeat parents"
In-Reply-To: <199806260405.VAA23457@netcom3.netcom.com>
Message-ID: <199806260522.IAA08459@ankara.192.168.3.5>


On 25 Jun 98, Vladimir Z. Nuri was found to have commented thusly:

> apparently one of the 4 horsemen of the infocalypse...?!?!
> whatever can be used as an excuse to take away rights, eh?
> 
> 
[news clip  regarding new Deadbeat Parents federal law excised]

I have a strong feeling that this new law is going to turn around and bite 
the Great Society II (GSII) advocates in their federal ass.  Considering 
some of the minimum limits regarding child support sums in arrears, it 
really won't take any time for prominent members, subscribers, and 
believers in GSII, including Friends of Bill and Friends of Hillary, to 
find themselves on the other side of a federal arrest warrant.  The $5000 
limit could be reached in a matter of a few months, it seems, for quite a 
few of even the "middle-class" child support payers.  (Anyone reading this 
who pays child support willing to divulge how many months it would take 
for them to reach that limit?)  I don't believe that deadbeat parents 
should evade their responsibility, but this law pretty much is the wrong 
way to deal with it.

Prosecutors of any stripe are not going to bother with making a judgment 
regarding 'intent', which they probably don't consider their duty anyway. 
They will have a formulae all worked out in concert with the presiding 
judge--whose duty should be the 'justice' end of any bum rap, deciding the 
issue of 'intent'--to nail anyone who violates the letter (and disregard 
the question of the violation of the spirit) of the law.  The poor will 
necessarily cop a plea and probably do some federal time AND/or find 
themselves assessed federal fines that will essentially make them 
indentured servants to the state for years.  The rich will work a deal to 
stay out of prison since the feds don't want to waste time with the 
delaying tactics of their savvy lawyers.

Perhaps at some point, after thousands of well-meaning but misfortunate 
parents find themselves considered felons in their society because they 
got behind in the support although there was no clear intent to do so, the 
law or certain elements of it will be sensibly repealed or reformed to 
target those whose intent to evade is really indisputable.  There are 
probably as well "minor" provisions and clauses in the law not reported in 
the news clip, but which certainly make life impossible for the well-
meaning to obtain complete rehabilitation;  those parts of the code would 
need attention as well.


Mitch Halloran
Research (Bio)chemist
Duzen Laboratories Group
Ankara   TURKEY
mitch at duzen.com.tr

"Tonight, again, the strong and arrogant opponent
           felt the bitter taste of defeat at your hands"
---Ayatollah Ali Khamenei, addressing the jubilant Iranian soccer team
        whose very unexpected victory over the US eliminated them
        from the France 1998 World Cup





From frantz at netcom.com  Thu Jun 25 23:32:36 1998
From: frantz at netcom.com (Bill Frantz)
Date: Thu, 25 Jun 1998 23:32:36 -0700 (PDT)
Subject: Skipjack extensibility
In-Reply-To: <199806250705.JAA31711@basement.replay.com>
Message-ID: 


At 11:05 PM -0800 6/24/98, Anonymous wrote:
>NSA made a claim that Skipjack couldn't be extended past 80 bits of key. Most
>plausible explanation to my mind is that they're lying. Second is that
>there is
>an attack against a class of Skipjack-like ciphers that requires only a few
>plaintexts and 2^80 operations. Third is that some common key-lengthening
>tricks like those for 2-key-3DES, DES-X, and DEAL fail when applied to
>Skipjack. I can hardly fathom one resistant to all three, but I guess it's
>possible with NSA.

3DES is useful because DES does not form a group.  To the best of my
knowledge, Skipjack has not been analysed in this area (outside of Never
Say Anything).


-------------------------------------------------------------------------
Bill Frantz       | If hate must be my prison  | Periwinkle -- Consulting
(408)356-8506     | lock, then love must be    | 16345 Englewood Ave.
frantz at netcom.com | the key.     - Phil Ochs   | Los Gatos, CA 95032, USA







From nobody at remailer.ch  Fri Jun 26 01:56:34 1998
From: nobody at remailer.ch (Anonymous)
Date: Fri, 26 Jun 1998 01:56:34 -0700 (PDT)
Subject: ACLU Action Update 06-25-98 -- Victory!  (fwd)
Message-ID: <19980626091418.18178.qmail@hades.rpini.com>


---------------------------------------------------------------
06-25-98
ACLU Action Update
----------------------------------------------------------------

TO:	 Action Network
FR:	 Penny Crawley, Cyber Organizer (pcrawley at aclu.org)
DT:	 June 25, 1998

1. Victims' Rights Amendment
2. Child Custody Protection:/"Teen Endagerment" Act
3. New E-mail address

1.  We did it! With both the House and Senate now adjourned for the Fourth of
July recess,  "Amend the Constitution Month" in Congress has come to an end a
victory: the Constitution remains intact!

The Senate Judiciary met briefly this morning to consider the so-called
Victims' Rights Amendment (SJ Res. 44), the last of the three amendments
targeted by the Republican leadership for passage during June.  Although there
was a brief debate on this measure, the Committee adjourned for the recess
without taking action.  It is anticipated that it will take up the proposed
amendment shortly after Senators return to Washington on July 6.

A new website can be found on the Internet containing editorials and other
resources (testimony, position statements and letters to Congress) on why a
constitutional amendment is the wrong way to assist victims of crime.  The
site is located at:

http://soiroom.hyperchat.com/celestin/vrainfo.html

ACTION NEEDED:

A. Urge your U.S. Senators to honor the founding of our nation this Fourth of
July by preserving the original Bill of Rights and voting against the victims'
rights amendment by sending a FREE FAX from the ACLU website at:

http://www.aclu.org/action/victim.html

B. Because no advocacy tactic is more effective than personal interaction,
push home the point about preserving the Bill of Rights during any public
appearance your Senators make during the Fourth of July recess. 

2.  Child Custody Protection/"Teen Endangerment" Bill

Like the Victims' Rights amendment, action on the anti-choice Child Custody
Protection Act (S 1645/HR 3682), which was also on today's agenda in the
Senate Judiciary Committee, was postponed when the Committee adjourned for
recess.  It, too, is expected to be taken up when Senators return to the
Capitol.

ACTION NEEDED:

Urge your Senators to oppose this misguided bill, which would intrude into
Americans' private relationships, isolate young women by discouraging them
from seeking the caring support of a trusted adult, and endanger their lives
by forcing them to travel alone to an abortion provider and back home after
the surgery.  Send a FREE FAX from the ACLU website at:

http://www.aclu.org/action/custody.html

3. My e-mail address has changed!  All future e-mail should be sent to:

pcrawley at aclu.org 

Please update any listings in your address book to reflect the change.  (My
AOL address will remain active until July 31, 1998.)

----------------------------------------------------------------
ONLINE RESOURCES FROM THE ACLU NATIONAL OFFICE
----------------------------------------------------------------

ACLU Freedom Network Web Page:  http://www.aclu.org.  
Constitution Hall on America Online (keyword ACLU)

----------------------------------------------------------------
ACLU Action Update
ACLU National Washington Office
122 Maryland Avenue NE 
Washington, DC 20002

To subscribe to the ACLU Action List, send a message to majordomo at aclu.org
with "subscribe action" in the body of the message. To end your
subscription, send a message to majordomo at aclu.org with "unsubscribe
action" in the body of the message.

For general information about the ACLU, write to info at aclu.org
This Message sent to
action






From deal447 at hotmail.com  Fri Jun 26 04:03:32 1998
From: deal447 at hotmail.com (deal447 at hotmail.com)
Date: Fri, 26 Jun 1998 04:03:32 -0700 (PDT)
Subject: Don't Miss These!
Message-ID: 


Attention!
Warning! Adults Only!                    Warning! Adults Only!

If you are under 21 years of age, or not interested in sexually 
explicit material... please hit your keyboard delete button now
and please excuse the intrusion.  To REMOVE your name from our email list, simply send us email with REMOVE in the subject line.  You need not read any further!

Available NOW for only $9.95!  Next 10 Days Only!

WORLD RECORD SEX!

Be There!  See It Now On Video!  Unbelievable ...But True!

You Won't Believe Your Eyes!!!  [As Seen on the Howard Stern Show]

"The World's Biggest Gang Bang"

See sexy  Annabel Chong as she sets the world Gang Bang Record
in this fantastic video documentary that chronicles her 24 hour
sexathon with 251 men engaging in sexual intercourse and oral
sex with her!  Don't worry, you won't have to stay up 24 hours
to watch it all.  We've selected only the most exciting and red
hot scenes for you...all in breathtaking living color with plenty of
extreme close-ups!  This video is guaranteed to knock your socks
off and leave you breathless!  You've never seen anything like it!
Annabel takes on five men at a time!  90 minutes! Order Today!
Only $9.95 plus $3 shipping and handling [Total $12.95].


"GANG BANG II"
The Record Breaker!!!  Starring Jasmin St. Claire!

See Beautiful and Voluptious Jasmin St. Claire shatter Annabel's
gang bang record by taking on 300 men in one 24 hour sex session!
You won't believe your eyes at all the hot firey action that you will
see as the new world record is established before your eyes as
Jasmin  takes on five men at a time for sexual intercourse and
oral sex!  Your friends will break down your door to see this video!
You'll be the most popular guy in town!  The action is truly unreal 
and you will see the best of it in living life-like color!  Order Today
and see Jasmin break the record!  90 minutes.  Only $9.95 plus
$3 shipping and handling [total $12.95].

Also Available...

The Uncensored Authentic Underground...
Pamela Anderson Lee & Tommy Lee
Sex Video Tape!

Everyone is talking about this exciting video!  See Pam and 
Tommy engaging in sexual intercourse and oral sex in the car,
on the boat and much, much more!  A  real collectors video! 30 minutes.
Only $9.95 plus $3 shipping and Handling [total $12.95]

"Tonya Harding Wedding Night Sex Video"
Now see the beautiful Ice Skating Shame of the Olympics
Tonya Harding engaging in sexual intercourse and oral 
sex on her wedding night with husband Jeff Gillooly!
This "Bad Girl" is Hot!  Don't miss this video! 30 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]

"Traci...I Love You"  Starring Traci Lords
Now see the most beautiful and popular porn star in her last
adult video before she hit the big time!  It's the blockbuster of
the year...sensual...fiery and exposive!  Traci Lords in her most
erotic and controversial film ever!  Don't Miss It!  90 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]

EMAIL SPECIAL!

ORDER ANY FOUR VIDEOS AND GET THE FIFTH ONE FREE!!!

Your order will be shipped via First Class Mail. All Shipments in plain unmarked wrapper.
For Priority Mail - Add $5
For Overnight Express - add $15

You can order by Phone, Fax, Mail or Email.

We accept all Major Credit Cards and checks by phone or fax.
Visa - MasterCard - American Express - Discover

10 Day Money Back Guarantee!  We know that you will be pleased with these Videos!

To Email your order - DO NOT HIT REPLY ON YOUR KEYBOARD

Send email to our special email address below:

brenda468 at juno.com

[Note: If you order by email and do not receive an email acknowledgement within 24 hours, please phone our office at
718-287-3800]

Phone our office 9am to 10 pm [eastern time]

[718] 287-3800 to Order By Phone for FASTEST SERVICE!

 We can accept your credit card or check by phone

Fax Your Order 24 hours per day  to  [718] 462-5920
You can fax your credit card information or your check

Order by mail by sending $12.95 per video,  cash, check, money order or major credit card [Visa, MasterCard, American Express or Discover] to

TCPS, INC.
4718  18th Ave.  Suite 135
Brooklyn, NY 11204

Make Checks & Money Orders Payable to TCPS, Inc.
New York State Residents Please Add 85 cents for Sales Tax per Video!

You must be over 21 years of age to order and give us your date of birth with your order!

The Following Order Form is for Your Convenience!

.............................................................................................................




Please ship me the following video tape[s]!

Qty___________Annabel Chong "World's Biggest Gang Bang"

Qty__________"Gang Bang II" Jasmin St. Claire

Qty___________"Pamela & Tommy Lee Sex Video Tape"

Qty_________   "Tonya Harding Wedding Night Sex Video Tape"

Qty__________"Traci I Love You" Traci Lords

at $9.95 each plus $3.00 for shipping and handling per tape
[$12.95 per video or "SPECIAL $51.80 for ALL FIVE"!

Credit Card #______________________________Exp Date___

I hereby represent that I am over 21 years of age.  
My date of birth is_________________________________

Signature______________________________________________

Ship to:  Name_______________________________________

Address____________________________________________

City________________________State___________Zip________

Area Code and Home Phone  [    ]___________________________

Fax # [     ]______________________________________________

Email Address___________________________________________

To remove your name from our mailing list, send us an email with 
remove in the subject line.  This is a one time offer and you should not hear from us again!

FOREIGN ORDERS -Add $15us if you desire Air Parcel Post Shipment.  We ship all over the world.

By deleting your unwanted E-Mail you waste one keystroke, yet
by throwing away paper mail you waste our planet!  SAVE THE
TREES and support internet E-Mail instead of paper mail!

[C] Copyright TCPS 1998
















































From privsoft at ix.netcom.com  Fri Jun 26 07:27:48 1998
From: privsoft at ix.netcom.com (Steve Orrin)
Date: Fri, 26 Jun 1998 07:27:48 -0700 (PDT)
Subject: RSA and Others work on SSL Fix
Message-ID: <199806261426.JAA08740@dfw-ix14.ix.netcom.com>


FYI



RSA DATA SECURITY WORKS WITH INTERNET SOFTWARE VENDORS TO RESPON
6/26/98 7:19

 to Potential
                 Security Attack on Secure Web Communications

    SAN MATEO, Calif., June 26 /PRNewswire/ -- RSA Data Security, Inc.
today
announced it is working with a group of leading Internet software vendors
on
pre-emptive countermeasures to thwart a newly-discovered potential attack
against secure Web communications.  This vulnerability is currently the
subject of research and has not been reported by any users.
    These countermeasures enhance the security of popular Internet server
software products based on the Secure Sockets Layer (SSL) protocol.  The
countermeasures are, or will be, available from respective vendors' Web
sites,
and include configuration guidelines, software updates where applicable and
additional information.  Currently available vendor information may be
found
at the following sites:

    * C2Net Software, Inc.
    http://www.c2.net
    * Consensus Development Corporation
    http://www.consensus.com/ssl-rsa.html
    * IBM Corporation
    http://www.ibm.com/security
    * Lotus Development Corporation
    http://www.lotus.com/security
    * Microsoft Corporation
    http://www.microsoft.com/security
    * Netscape Communications Corporation
    http://help.netscape.com/products/server/ssldiscovery/index.html
    * Open Market, Inc.
    http://www.openmarket.com/security
    * RSA Data Security, Inc.
    http://www.rsa.com/rsalabs/

    RSA will also maintain an updated list of all vendors' countermeasure
site
links at its site. In addition, RSA has been working closely with the CERT
Coordination Center on this problem. CERT has made a technical advisory on
this vulnerability available at http://www.cert.org.
    These countermeasures address a potential vulnerability discovered by
cryptographer Daniel Bleichenbacher of the Secure Systems Research
Department
of Bell Labs, the research and development arm of Lucent Technologies.
Bleichenbacher identified a cryptanalytic vulnerability that could
potentially
be used to discover the key for a particular encrypted session through a
process of repeatedly sending on the order of one million carefully
constructed messages to a target server and observing the server's
response.
Due to the large number of messages needed, the potential attack is
detectable
by network administrators.  Additional information is available on the Bell
Labs Web site at http://www.bell-labs.com.
    The vulnerability affects interactive key establishment protocols that
use
the Public Key Cryptography Standard (PKCS) #1, including SSL.  The PKCS
series of standards are defined by RSA Laboratories, reviewed by industry
and
have been adopted by many major vendors of information systems and
incorporated in national and international standards.  The vulnerability
does
not apply to PKCS #1-based secure messaging protocols, such as Secure
Electronic Transactions (SET) and Secure Multipurpose Internet Mail
Extension
(S/MIME) because they are not susceptible to, or already implement
mechanisms
preventing this potential vulnerability.
    A technical overview of the attack and recommended countermeasures for
installed SSL-based server software are available now on the RSA Labs Web
site
at http://www.rsa.com/rsalabs/.
    Software developers interested in testing their products for this
potential vulnerability should visit RSA's site at http://www.rsa.com where
they can find diagnostic instructions and prescriptive information for
updating their applications.   In  July, RSA plans to provide developers
using
the company's BSAFE security suite with free software enhancements designed
to
eliminate this threat.
    RSA Laboratories plans to release for comment a draft PKCS #1 v2 in
July
following a revision process that began early in the year.

    RSA Data Security, Inc.
    RSA Data Security, Inc., a wholly owned subsidiary of Security Dynamics
Technologies, Inc. (Nasdaq: SDTI), is a leading supplier of software
components that secure electronic data, with more than 300 million copies
of
RSA encryption and authentication technologies installed worldwide.  RSA
technologies are part of existing and proposed standards for the Internet
and
World Wide Web, ISO, ITU-T, ANSI, IEEE, and business, financial and
electronic
commerce networks around the globe.  RSA develops and markets platform-
independent security components and related developer kits and provides
comprehensive cryptographic consulting services.  RSA can be reached at
http://www.rsa.com.

    All products and companies mentioned herein may be trademarks or
registered trademarks of their respective holdings and are hereby
recognized.

SOURCE  RSA Data Security, Inc.
    -0-                             06/26/98
    /CONTACT:  Patrick Corman, Corman Communications, 650-326-9648,
patrick at cormancom.com/
    /Web site:  http://www.rsa.com/
    (SDTI)

CO:  RSA Data Security, Inc.
ST:  California
IN:  CPR
SU:



-0- (PRN) Jun/26/98   07:03
EOS   (PRN)    Jun/26/98    07:04      86

-0- (PRN) Jun/26/  98    7:19







From CTIA_Daily_News at tour.unitymail.com  Fri Jun 26 10:02:33 1998
From: CTIA_Daily_News at tour.unitymail.com (CTIA Daily News)
Date: Fri, 26 Jun 1998 10:02:33 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - June 26, 1998
Message-ID: <199806261646.LAA26369@revnet4.revnet.com>



=============================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.  Please click on the icon / attachment
for the most important news in wireless communications today.

CALEA Summit being held July 21 & 22 in Washington, DC.
Register Now!!  Call (202) 785-0081
=============================================



From billp at nmol.com  Fri Jun 26 12:37:06 1998
From: billp at nmol.com (bill payne)
Date: Fri, 26 Jun 1998 12:37:06 -0700 (PDT)
Subject: ?
Message-ID: <3593F79B.797B@nmol.com>

Friday 6/26/98 1:23 PM

John Young

I wonder what the effect of all of the like

  http://www.jya.com/rsa-pkcs1.htm

and other materials you have posted at http://www.jya.com/crypto.htm
are going to be on those controlling the money?  

Some key congressmen and their advisors.

Crypto, in my mind, represents pseudomathematics at its finest.

Also, the guy that is going to break-in will do it before encryption or 
after decryption. 

http://www.aci.net/kalliste/ricono.htm

Or, of course, TRANSMIT THE KEY WITH THE CYPHERTEXT!

My mind is getting back to finishing the digital FX - and revising
my book!

Morales and I do not know what to make of Mitchell's JUN 22 motion.

But, with us now complaining to the Senate Judiciary Committee, WITH
HARD DOCKET EVIDENCE of wrongdoing life for lawyers is now more
complicated.

I will respond to the JUN 22 motion about next Wednesday.

Won't be hard.  This is an INSIDE JOB.  I KNOW where the documents
are since I know the AUTHORS.  No search is required.

This should be settled before it gets WORSE.

Later
bill

http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2

http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html


Subject: 
        Judicial Misconduct at Tenth Circuit Court of Appeals
  Date: 
        Mon, 22 Jun 1998 13:29:01 -0600
  From: 
        bill payne 
    To: 
        art morales , senator_hatch at Hatch.senate.gov, senator at thurmond.senate.gov,
        chuck_grassley at grassley.senate.gov, senator_specter at specter.senate.gov, 
senator_thompson at thompson.senate.gov,
        info at kyl.senate.gov, senator_dewine at dewine.senate.gov, john_ashcroft at ashcroft.senate.gov, 
michigan at abraham.senate.gov,
        senator_leahy at leahy.senate.gov, senator at kennedy.senate.gov, senator at biden.senate.gov, 
senator_kohl at kohl.senate.gov,
        senator at feinstein.senate.gov, russell_feingold at feingold.senate.gov, dick at durbin.senate.gov, 
senator at torricelli.senate.gov
    CC: 
        steve dillingham <" Steven.Dillingham"@hq.doe.gov>, Robert Nordhaus <" 
Robert.Nordhaus"@hq.doe.gov>, mrgall at ix.netcom.com,
        jy at jya.com, art morales , federico pena <" Federico.F.Pena"@hq.doe.gov>, 
RJPARK at sandia.gov,
        cypherpunks at toad.com, ukcrypto at maillist.ox.ac.uk


Monday 6/22/98 1:02 PM

Senate Judiciary Committee
http://www.senate.gov/committee/judiciary.html

Republicans

Orrin G. Hatch, Utah, Chairman   senator_hatch at Hatch.senate.gov
Strom Thurmond, South Carolina   senator at thurmond.senate.gov
Charles E. Grassley, Iowa   chuck_grassley at grassley.senate.gov
Arlen Specter, Pennsylvania   senator_specter at specter.senate.gov
Fred Thompson, Tennessee   senator_thompson at thompson.senate.gov
Jon Kyl, Arizona   info at kyl.senate.gov
Mike DeWine, Ohio   senator_dewine at dewine.senate.gov
John Ashcroft, Missouri   john_ashcroft at ashcroft.senate.gov
Spencer Abraham, Michigan   michigan at abraham.senate.gov
Jeff Sessions, Alabama

Democrats

Patrick J. Leahy, Vermont   senator_leahy at leahy.senate.gov
Edward M. Kennedy, Massachusetts   senator at kennedy.senate.gov
Joseph R.Biden, Jr., Delaware   senator at biden.senate.gov
Herb Kohl, Wisconsin   senator_kohl at kohl.senate.gov
Dianne Feinstein, California   senator at feinstein.senate.gov
Russell D. Feingold, Wisconsin   russell_feingold at feingold.senate.gov
Richard Durbin, Illinois   dick at durbin.senate.gov
Robert Torricelli, New Jersey   senator at torricelli.senate.gov

Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Moore, Barrett, Weis and help get this matter settled.

Thursday March 30, 1995 I wrote Tenth Circuit clerk Hoecker to request a
copy of the docket sheets for case 94-2205  Payne v. Sandia Corporation,
et al

Hoecker did not answer my letter.

On Tuesday March 5,1996 I  wrote  Judge Lucius D. Bunton to ask his help
to get a copy of the docket sheets.  No response.

On Monday September 23, 1996 Arthur R Morales and I wrote  Henry A.
Politz, Chief Judge U.S. Court of Appeals - Fifth Circuit to ask his
help to get a copy of the docket sheets of my case and Morales� Tenth
Circuit case 95-2204.

Tenth Circuit also refused to send Morales copies of docket sheets for
his case.

Politz is Bunton's boss.  No response.

Friday May 30, 1997 I wrote Antonin Scalia to get this help to get a
copy of the docket sheets.  No response.

5 May 1998 citizen John Young finds docket sheets on

    Source: PACER, U.S. Court of Appeals, 10th Circuit, 1-800-279-9107

and posts them on Internet at http://jya.com/whp-10usca.htm

  Docket as of April 10, 1998 0:05 am
  Proceedings include all events.
  94-2205  Payne v. Sandia Corporation, et al

shows that I filed my Brief of the Appellant on 2/19/95.

2/23/95     [835344] Appellant's brief filed by William H. Payne.
            Original and 7 copies.   c/s: y. Served on 2/19/95  Oral
            argument? pro se. Appellee/Respondent's brief due 3/24/95
            for Thomas P. Wright, for Robert Surran, for Paul A.
            Stokes, for Mary J. Stang, for Tommy A. Sellers, for Craig
            A. Searls, for Albert Narath, for Preston B. Herrington,
            for Peter S. Hamilton, for Roger L. Hagengruber, for James
            R. Gosler, for Harold L. Folley, for Robert L. Ewing, for
            C. William Childers, for Harvey J. Brewster, for Sandia
            Corporation (mbm)

mbm writes "Appellee/Respondent's brief due 3/24/95"

Sandia had sent me a copy of its brief by 3/28/96.

I filed  attached MOTION TO GRANT PLAINTIFF-APPELLANT'S DEMANDS ON BASIS
THAT DEFENDANT-APPELLEES FAILED TO FILE BRIEF WITHIN 30 DAYS SPECIFIED
BY FEDERAL RULE OF APPELLATE PROCEDURE 31 on Tuesday the 28th day of
March, 1995

My February 28 MOTION at the Tenth Circuit is filed WITHOUT notice of
service logged.

4/4/95       [845484] Appellant's motion filed by Appellant William H.
             Payne [94-2205] to grant appellant's demands on basis that
             appellees' failed to file timely brief. Original and 3
             copies  c/s: y (mbm)

In 1995 FRAP 25 (a) stated  "[b]riefs shall be deemed filed on the day
of mailing if the 
most expeditious form of delivery by mail, excepting special delivery,
is used."

FRAP 25 has been changed by 1998 to
http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a

Since I mailed Appellant's motion filed by Appellant William H.  Payne
[94-2205] to grant appellant's demands on basis that appellees' failed
to file timely brief on 3/28/98, it is likely Sandia's lawyer Friedman
received it 3/29/95.

Tenth Circuit logs

3/30/95      [844759] Appellee's brief filed by Sandia Corporation,
             Harvey J. Brewster, C. William Childers, Robert L. Ewing,
             Harold L. Folley, James R. Gosler, Roger L. Hagengruber,
             Peter S. Hamilton, Preston B. Herrington, Albert Narath,
             Craig A. Searls, Tommy A. Sellers, Mary J. Stang, Paul A.
             Stokes, Robert Surran, Thomas P. Wright. Original and 7
             copies. c/s: y. Served on 3/27/95  Oral Argument? y
             (appellant is pro se) Appellant's optional reply brief due
             4/13/95 for William H. Payne (mbm)

Federal Rule of Appellate Procedure [FRAP] 26 (c) states

  (c) Additional Time after Service. When a party is required or
permitted to act within a      prescribed period after service of a
paper upon that party, 3 calendar days are added to the     prescribed
period unless the paper is delivered on the date of service stated in
the proof of   service. 

  http://www.ca5.uscourts.gov/docs/frap-iop.htm#26c

While the Tenth Circuit ASSERTS Appellees� brief was, in fact, served on
3/27/95
evidence given below points to the brief  was served, in fact, on
3/29/95.  

I allege that Friedman affixed a false date of service to Sandia's
brief.

I WAS NEVER PROPERLY SERVED.  I wrote

          Wednesday March 29, 1995

          Dan Friedman
          Simons, Cuddy & Friedman
          Pecos Trail Office Compound
          1701 Old Pecos Trail
          POB 4160
          Santa Fe, NM 87502-4160
          505-988-4476
          505-984-1807 FAX

          Dear Lawyer Friedman:

          Today at 14:00 hours I found a green and white about 9x13
          inch envelope in our mail box at my home.

          Mailing label indicated that the envelope came from your
          firm.  CONFIDENTIAL was stamped on the mailing label.

          I  wrote "Received at 14:00 hours on W 3/29/95 with no
          POSTMARK OR STAMP by W. H. Payne" at the bottom of the
          envelope.

          There was no STAMP OR POSTAGE METER LABEL or 
          POSTMARK on the envelope.

          Therefore, I gave the envelope to US Postal Service
          supervisor Mel at 14:49 hours today at the Postal Receiving
          station at 9904 Montgomery, NW in Albuquerque.  Mel has a
          copy of the cover of the envelope with Mel's note written on
          it.

          Mel told me the post office was going to return the envelope
          to your firm for proper mailing.

          I ask:

         1    What did this envelope contain?  Please identify
              the documents precisely.

         2    If any Certificates of Service were included in the
              envelope, then what were the dates affixed to these
              documents?

         3    Who placed this envelope in our mail box?

         Lawyer Friedman:  It appears you missed an important filing
         date.  And are in the process of attempt to correct your
         failure.  But may be using illegitimate methods to conceal
         your failure.

         Please respond as soon as possible so that we all may
         discover what has happened here." ...

Lawyer Friedman did not respond to the above letter.

But Friedman did mail me Appellees� brief many days later in envelope
showing TRUE MAILING date.  Certificate of service on received
Appellees� brief
did not reflect postmark date.

10th Cir. R. 25.4 in 1995 page 62 reads
  
  Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
  with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1

But Tenth Circuit clerks Fisher and Hoecker despite my protests and
submission of
evidence may have stamped FILED on Sandia's IMPROPERLY SERVED 
Appellee/Respondent's brief according to the Federal Rules of Appellate
Procedure.

Laywer Friedman FALSIFIED THE CERTIFICATE OF SERVICE.   

Friedman DID NOT MAIL ME "Served on 3/27/95."

d) Proof of Service; Filing. A paper presented for filing shall contain
an acknowledgment of service by the   person served or proof of service
in the form of a statement of the date and manner of service, of the
name of the person served, and of the addresses to which the papers were
mailed or at which they were delivered, certified by the person who made
service. Proof of service may appear on or be affixed to the papers
filed. When a brief or appendix is filed by mailing or dispatch in
accordance with Rule 25(a)(2)(B), the proof of service shall also state
the date and manner by which the document was mailed or dispatched to
the clerk.

  http://www.ca5.uscourts.gov/docs/frap-iop.htm#25a
  
Crime apparently committed by Hoecker and Fisher is

� 1017. Government seals wrongfully used and instruments wrongfully
sealed 

Whoever fraudulently or wrongfully affixes or impresses the seal of any
department or agency of the United States, to or upon any certificate,
instrument, commission, document, or paper or with knowledge of its
fraudulent character, with wrongful or fraudulent intent, uses, buys,
procures, sells, or transfers to another any such certificate,
instrument, commission, document, or paper, to which or upon which said
seal has been so fraudulently affixed or impressed, shall be fined under
this title or imprisoned not more than five years, or both. 
http://www.law.cornell.edu/uscode/18/1017.shtml

Despite my protests of judicial misconduct Judges Moore, Barrett, Weis
award decision to Sandia

10/6/95      [890055] Order filed by Judges Moore, Barrett, Weis
             "...All outstanding motions are denied..." (found in Order
             & Judgment of 10/6/95) [879579-1]  Parties served by mail.
             (pdw)

when these judges should not have had Appellees� brief before them.

Then in an apparently attempt to conceal what happened

10/6/95     [890076]  NOTE: THIS ENTIRE CASE IS SEALED. Terminated on
            the Merits after Submission Without Oral Hearing; Judgment
            Affirmed; Written, Signed, Unpublished. Moore, authoring
            judge; Barrett; Weis. [94-2205] (pdw)

I WON MY APPEAL, pro se, ON A TECHNICALITY but judges Judges Moore,
Barrett, Weis
awarded the win to Sandia Labs!

Members of Congress, judicial misconduct in this matter has been
well-documented.  Court records
filed with the Tenth Circuit.  But CURRENTLY under seal.

Lawyers involved in this matter attempt to use the legal strategy of
IGNORE and STONEWALL to
attempt to deny me justice.  

Ignoring and stonewalling by lawyers forced Morales and me to seek
visibility so lawyers
could no longer ignore and stonewall.

Lawyer attitude apparently is that they ignore rules of civil procedure
or even the law so long
as their actions are invisible to public scrutiny.

Visibility was achieved by suing the National Security Agency which
revealed even more judicial misconduct http://www.jya.com/whp052898.htm.

I would like to settle all  matters involved with this unfortunate
cyrpto-related matter,
which includes criminal violations of the Privacy Act.

DOE lawyer Steve Dillingham asked me to prepare a settlement offer in
1994.  I wrote a
settlement letter  May 22, 1994 to Dillingham.  Nothing happened.

June 11, 1998 I made several modifications to my 1994 settlement letter
and sent it e-mail
to Robert Nordhaus, Chief Counsel, DOE.

I ask that you

1  help with settlement of my six-year-old since I won my appeal at the
Tenth Circuit,
2  investigate Tenth Circuit case 94-2205  Payne v. Sandia Corporation,
et al to bring
   the guilty to justice.

Sincerely

william payne

505 292 7037  I am not reading e-mail

http://jya.com/whpfiles.htm
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html

Coauthor Lewis in the above is one of my former MS and PhD students in
computer science.

http://www.friction-free-economy.com/



Monday 6/22/98 1:04 PM

Members of Congress

Purpose of this e-mail is to give written proof of criminal judicial
misconduct by Tenth Circuit Court of Appeals clerks Hoecker, Fisher, and
Judges Anderson, Barrett, Logan and request a congressional
investigation.

After several years, with Payne, of trying to get Tenth Circuit to send
docket sheets from my case,
citizen John Young  http://www.jya.com/index.htm  locates docket sheets
and posts them
    
  Morales Case Dockets 10th USCA                    June 12, 1998

on Internet at http://www.jya.com/arm061298.htm.

  Source: Online records Tenth Circuit Court of Appeals via PACER 

  GENERAL DOCKET FOR
  Tenth Circuit Court of Appeals

  Court of Appeals Docket #: 95-2204                           Filed:
9/29/95
  Nsuit: 3440
  Morales v. Sandia National Lab.
  Appeal from: United States District Court for the District of New
Mexico

I filed

11/9/95     [898274] Appellant's brief filed by Arthur R. Morales.
            Original and 2 copies.   c/s: y. Served on 11/7/95.  Oral
            argument? pro se. Appellee's brief due 12/11/95 for Sandia
            National Lab. (pdw)

Sandia files its FIRST ATTEMPT at

12/11/95   [905033] Appellee's deficient brief filed by Sandia
           National Lab.. Appellee's corrected brief due 12/21/95 for
           Sandia National Lab.  additional copies received 12/11/95.
           (fg)

Tenth Circuit court clerk Patrick Fisher writes Wells on December 11,
1995
concerning Sandia's deficient brief

  [C]orrections, however made, must be accompanied by proof of service
  upon all other parties to the appeal. ...

and issues

12/14/95   [905975] FIRST notice of rules violation for Deborah D.
           Wells for Appellee Sandia National Lab. (sls)

Wells submits

12/21/95    [907974] Appellee's brief filed by Sandia National Lab..
            Original and 7 copies.   c/s: y. Served on 12/20/95  Oral
            Argument? n Appellant's optional reply brief due 1/8/96 for
            Arthur R. Morales (mbm)

but DOES NOT serve me with a copy.

Wells later admits in

2/1/96        [917660] Response filed by Sandia National Lab.
              Appellant/Petitioner motion to clarify   Original and 3
              copies.  c/s: y response Null Relief Code (fg)

Certificate of Service date 30th day of January, 1996,

  [h]ad Appellant simply made a phone call to the Tenth Circuit, he
could
  have established that the Defendant-Appellee's corrected brief was
indeed
  filed on a timely basis, ...

I protested by filing

1/3/96       [909965] Appellant's motion "for the Court to Grant
             Appeal" filed by Appellant Arthur R. Morales [95-2204].
             Original and 3 copies.  c/s: y. (pdw)

1/3/96       [909966] Appellant's motion "for New Trial" filed by
             Appellant Arthur R. Morales [95-2204]. Original and 3
             copies.  c/s: y. (pdw)

1/3/96       [909967] Appellant's motion "to Discipline
             Defendant-Appellee" filed by Appellant Arthur R. Morales
             [95-2204]. Original and 3 copies.  c/s: y. (pdw)

because Sandia did not properly serve me in violation of Fisher's
December
11, 1995 order.

The Tenth Circuit court of appeals should NOT, by its own rules, filed
Appellee's brief filed by Sandia National Lab..  Original and 7
copies.   
c/s: y. Served on 12/20/95

10th Cir. R. 25.4 in 1995 page 62 reads
  
  Papers not accepted for filing. -- The clerk shall not file papers
that do not comply
  with the Federal Rules of Appellate Procedure and these rules See
10thCir. R. 42.1

And is doubtful whether court clerk Fisher had any authority under
appellate procedure
to permit Wells to correct her deficient brief.  

Rather Sandia's  brief did not comply with with Federal Rules of
Appellate Procedure and should have been summarily rejected for filing.

I WON, pro se, my appeal to the Tenth circuit on a technicality but
Judges Anderson, Barrett, Logan
awarded the win to Sandia Labs.

4/2/96        [932848] Order filed by Judges Anderson, Barrett, Logan
              denying parties' motions for general relief(found in Order
              and Judgment of 4/2/96)--"...During the course of this
              appeal, the parties have filed various motions for
              dismissal, summary grant, and sanctions. We find no merit
              to any of these motions, and they are [920851-1] Parties
              served by mail. (pdw)

by accepting and judging on a documents which was not permitted to be
before the court by
its own rules.

Judicial misconduct in my case has been well-documented as it is in
Payne's case.

Payne and I speculate that similar judicial misconduct may have occurred
at the Tenth Circuit.

Sandia lawyer Robert J Park wrote me a settlement letter on Feb 18,
1998.

I filled in the blanks and made minor handwritten chages and returned it
on February 22, 1998.  

But my offer has not yet been accepted.

I ask that you

1  help have my settlement offer accepted,
2  investigate judicial misconduct in case 95-2204 and punish the
guilty.

Some citizens can only express such frustrations with the US court
system with violence.

I seek change by legal reform.

Sincerely

Arthur R Morales
505 345 1381




From bill.stewart at pobox.com  Fri Jun 26 18:14:13 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 26 Jun 1998 18:14:13 -0700 (PDT)
Subject: Lucent Researcher Cracks PKCS#1, SSL
Message-ID: <3.0.5.32.19980626181343.0098a8e0@popd.ix.netcom.com>


http://www.rsa.com/rsalabs/pkcs1/
http://www.zdnet.com/zdnn/stories/zdnn_display/0,3440,332372,00.html



Lucent researcher cracks encryption code

By Margaret Kane, ZDNet

An encryption researcher has discovered a software flaw that could allow 
a hacker to break the software codes used for electronic commerce.

The problem protocols use the Public Key Cryptography Standard #1, 
including the Secure Sockets Layer, or SSL standard. RSA Data Security 
Inc., which defined the standard, said that the vulnerability does not
apply to PKCS #1-based secure messaging protocols, such as Secure 
Electronic Transactions and Secure Multipurpose Internet Mail Extension 
because they are not susceptible to -- and already implement --
mechanisms preventing this potential vulnerability. But at a Web site 
using SSL, a hacker could break the code by sending millions of messages 
to the target server and observing the server's response.

That information could be used to decode an intercepted session, said 
Daniel Bleichenbacher, a researcher at Lucent Technologies Inc.'s 
(Nasdaq:LU) Bell Labs. 

A slew of software companies announced today that they are working on a 
patch for the problem, and will post it on their Web sites. RSA, a 
division of Security Dynamics 
Technologies, (Nasdaq:SDTI) said it is working with IBM (Nasdaq:IBM), 
Microsoft Corp.(Nasdaq:MSFT), Netscape 
Communications Corp. (Nasdaq:NSCP), Open Market Inc. (Nasdaq:OMKT), and 
others on the problem. 

RSA is also working with the CERT Coordination Center on the problem, 
which has posted a technical advisory about the situation. 

Reuters contributed to this story. 


++++++++++++++++++ Extracted From Another web page there m+++++++++++++
http://www.zdnet.com/zdnn/stories/zdnn_display/0,3440,332372,00.html

SSL flaw could expose encrypted data

A researcher at Lucent Technologies Inc.'s Bell Laboratories has discovered a vulnerability in the SSL encryption commonly used in electronic commerce transactions.

The flaw, which has been exposed only in a laboratory setting, would allow a hacker to capture encrypted data in a session between a browser and server.

The vulnerability is hardly a fatal flaw in SSL (Secure Sockets Layer). Rather, it's a hole that a savvy Web site administrator should be able to spot before a hacker can do any damage. "The good news here is that you still have to be pretty smart to break it," said Julie Ferguson, chief technology officer of ClearCommerce Corp., in Austin, Texas.

The researcher, Daniel Bleichenbacher, who works in the secure systems research department of Bell Labs, in Murray Hill, N.J., found a way for a hacker to derive the session key used in a transaction by feeding off the error messages created by a server.

First, the hacker must prepare roughly 1 million messages to send against the server to capture the information. Bleichenbacher said he created an algorithm that analyzes those messages and derives the session key--which is randomly generated for each transaction by a combination of public and private keys at the Web site and the consumer's browser. Still, a competent site administrator should notice that his Web site has suddenly received a barrage of bad messages.

"It should be very easy to see that an attack is taking place," Bleichenbacher said. The hacker would also have to capture a session at some point on the line, likely at an Internet service provider, not knowing whether there is information within it that is worth stealing.

Because a session key is randomly generated for each session, it's possible for a hacker to capture information only about that individual session, said officials at RSA Data Security Inc., which developed SSL in conjunction with Netscape Communications Corp.

The flaw, technically found in the standard called the Public Key Cryptography System #1, does not apply to encryption algorithms themselves but rather to the way packets are placed into encrypted envelopes. PKCS#1 is due to be upgraded next month, and the latest revision will account for the newly found vulnerability, said Scott Schnell, vice president of marketing at RSA, in Redwood City, Calif.

The implications are perhaps most serious for home banking, because a hacker using this flaw could capture a user's banking information.

Although there are no known real-world attacks taking advantage of this SSL flaw, software vendors promise to have patches that mask the error messages. Netscape, in Mountain View, Calif., already has one available on its Web site for several applications, including Netscape Enterprise Server, Netscape Proxy Server and the company's messaging servers.

Microsoft Corp. also has created a fix that masks the error messages that a hacker would rely upon. Officials of the Redmond, Wash., company said they have worked with Netscape to ensure that their respective fixes do not create interoperability problems.

Both companies said they have already alerted major customers about the problem and provided them with fixes.

Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From listmaster at extensis.com Fri Jun 26 18:29:27 1998 From: listmaster at extensis.com (listmaster at extensis.com) Date: Fri, 26 Jun 1998 18:29:27 -0700 (PDT) Subject: BeyondPress 4.0 from Extensis Message-ID: Announcing Extensis BeyondPress 4.0 The Award-winning Quark-to-HTML XTension from Extensis http://www.extensis.com/BeyondPress_P * Convert Quark to HTML & DHTML with one click * Compatible with QuarkXPress 3.31 & 4.0 * Receive PhotoAnimator FREE! with each copy of BeyondPress Extensis BeyondPress 4.0 is the latest version of our award-winning XTension that takes your Quark documents to the web - in no time. BeyondPress preserves the layout of your Quark documents in HTML tables or DHTML for cutting-edge design. Create animated GIFs with your FREE copy of Extensis PhotoAnimator (a $99 value). Then drag the animated GIFs into your Quark layout and see them displayed live inside QuarkXPress. Plus, add hyperlinks, image maps, and more - right in QuarkXPress. Extensis BeyondPress - It's the best way to take Quark to the Web. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Order BeyondPress 4.0 for only $499.95 AND get Extensis PhotoAnimator - FREE! (a $99 value) To order or receive more information please visit: http://www.extensis.com/BeyondPress_P Or phone: 1-800-796-9798 or (503) 274-2020 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ BeyondPress is available immediately for Macintosh users. BeyondPress for Windows will be available later this Summer. BeyondPress is 100% compatible with Quark XPress 3.31 & 4.0. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ PS. We have made every effort to ensure this message is being sent only to people who have expressed interest in Extensis products. If we have sent this to you in error, please accept our apologies and reply with "REMOVE" in the subject line for automatic exclusion from future communications. If you know someone who would like to be on our mailing list have them send an email to listmaster at extensis.com with "ADD" in the subject line and their email address in the body. From billp at nmol.com Fri Jun 26 19:24:30 1998 From: billp at nmol.com (bill payne) Date: Fri, 26 Jun 1998 19:24:30 -0700 (PDT) Subject: Wooden sculpture Message-ID: <35945717.2653@nmol.com> Friday 6/26/98 7:44 PM John Young I am reading http://www.jya.com/gak-fails.htm Tonight I retrieved a wooden sculpture given to me by numerical analyst LINPACK http://av.yahoo.com/bin/query?p=linpack&z=2&hc=0&hs=0 Richard Hanson. That's him! http://www.vni.com/products/imsl/hanson.html Hanson gave me the sculpture in about 1978. Hanson and I have been colleagues for about 25 years. I will forward it to you. With initials on the bottom. And, of course, YOU must pass on the sculpture to the NEXT DESERVING. Our buddies aren't happy about what happened. http://www.wpiran.org/ Allahu akbar ... and keep up wind. Until we get SETTLMENT, of course. Settlment must include support payments for Iranian mothers who lost sons in the Iraq/Iran war, retirement benfits for them, health insurance and a LETTER OF APOLOGY. All paid for by NSA and the CIA. We are ALL working for settlment. bill http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html From bill.stewart at pobox.com Fri Jun 26 19:49:29 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Fri, 26 Jun 1998 19:49:29 -0700 (PDT) Subject: RSA Material on PKCS#1 Crack Message-ID: <3.0.5.32.19980626194913.00909b10@popd.ix.netcom.com> The attack: ftp://ftp.rsa.com/pub/pdfs/bulletn7.pdf 4-page PDF file. There's also a Postscript version available. The paper is by Bleichenbacher of Lucent and Burt Kaliski and Jessica Staddon of RSA Labs. OEM Countermeasures: http://www.rsa.com/rsalabs/pkcs1/oem_counter.html (below) Countermeasures for Users of Servers: http://www.rsa.com/rsalabs/pkcs1/countermeasures.html (below - it's pointers to vendor home pages, pleasantly including C2. Apparently they've done a good job coordinating it...) Q&A : http://www.rsa.com/rsalabs/pkcs1/qa.html ====== RSA to Provide OEM Customers with Guidelines and Technology to Thwart Potential Web Server Security Attack OAEP Formatting Adds Important Security to Vulnerable Applications June 26, 1998 -- RSA Data Security, Inc. today announced guidelines to assist its OEM customers in both assessing their products� vulnerability to a newly discovered potential security attack, and to identify pre-emptive countermeasures to thwart such an attack. The guidelines are designed to help developers understand the nature and mechanism of the threat, pose a series of technical questions to identify vulnerable constructs in the developer�s software design, and provide a set of countermeasures from which to choose based on the developer�s needs. These guidelines are available online at http://www.rsa.com/rsalabs/. The potential threat affects server products that employ an interactive key establishment protocol in conjunction with the PKCS #1 standard for digital envelopes, including SSL-based servers. SET (Secure Electronic Transaction) and other secure messaging protocols, such as S/MIME (Secure Multipurpose Internet Mail Extension), are not susceptible to or already implement mechanisms preventing this potential attack. Recent research by cryptographer Daniel Bleichenbacher of the Bell Labs Secure Systems Research Department, the research and development arm of Lucent Technologies, indicate that the above combination is potentially vulnerable to a class of attack known as Adaptive Chosen Ciphertext Attacks. The potential attack noted by Mr. Bleichenbacher relies on sending a target server on the order of a million carefully constructed messages and observing variations in the server�s response. As such, the attack is both detectable and can be prevented with countermeasures. For some developers, the most effective countermeasure is incorporation of the Optimal Asymmetric Encryption Padding (OAEP) technology, a method of formatting an encrypted message so that attackers cannot learn information about the contents through repeated probing. OAEP is designed to thwart a variety of attacks, including the Adaptive Chosen Ciphertext Attack. For other developers, the most effective countermeasure will be preventing an assailant from gaining information from messages returned from their server. RSA�s guidelines provide design information for developers to use in implementing this form of countermeasure as well. RSA Laboratories, the research arm of RSA, plans to include OAEP in the next version of PKCS #1, a widely used cryptography standard, that will be available as a draft for comment in July. PKCS #1 is used in SSL and other popular security mechanisms to provide confidentiality for exchange of symmetric encryption keys (digital envelopes), as well as to construct digital signatures. OAEP has already been integrated into RSA�s newest release of BSAFE� 4.0, the company�s flagship cryptographic security development suite which began shipping this month. RSA intends to make available OAEP updates conforming to the new PKCS #1 specification for its BSAFE 3.0 and 4.0 products in July, and to incorporate OAEP in an upcoming version of JSAFE�, RSA�s security engine for Java�. RSA recommends that developers target these upcoming OAEP updates for inclusion in their products. Check this site for more information on OAEP updates in the coming weeks. RSA�s Website will also host links to vendors� sites where countermeasures are made available as a service to both OEMs and end customers. See RSA�s related announcement on this subject. Currently, the following vendor information Website links are available: C2Net Software, Inc. http://www.c2.net Consensus Development Corporation http://www.consensus.com/ssl-rsa.html IBM Corporation http://www.ibm.com/security Lotus Development Corporation http://www.lotus.com/security Microsoft Corporation http://www.microsoft.com/security Netscape Communications Corporation http://www.netscape.com Open Market, Inc. http://www.openmarket.com/security/ RSA Data Security, Inc. http://www.rsa.com/rsalabs An RSA Labs technical paper discussing this vulnerability, as well as additional information, is available on RSA�s Website, http://www.rsa.com/rsalabs. ============ SSL Countermeasures These countermeasures enhance the security of popular Internet servers and software products based on the Secure Sockets Layer (SSL) protocol. The countermeasures are available from respective vendors' Web sites, and include configuration guidelines, software updates where applicable and additional information. Currently available vendor information may be found at the following sites: Aventail Corporation http://www.aventail.com/ C2Net Software, Inc. http://www.c2.net/ Consensus Development Corporation http://www.consensus.com/ Lotus Development Corporation http://www.lotus.com/security IBM Corporation http://www.ibm.com/security/ Microsoft Corporation http://www.microsoft.com/security/ Netscape Communications Corporation http://help.netscape.com/products/server/ssldisc overy/index.html Open Market, Inc. http://www.openmarket.com/security/ RSA Data Security, Inc. http://www.rsa.com/rsalabs/ Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From lee7 at msn.com Fri Jun 26 20:57:18 1998 From: lee7 at msn.com (lee7 at msn.com) Date: Fri, 26 Jun 1998 20:57:18 -0700 (PDT) Subject: WORRIED ABOUT HIS OR HER BACKGROUND? Message-ID: <199806261236HAA45284@RECON.lonet.ca>

INFORMATION USA Your Source For Information LOCATE Business & Individuals in the USA Old Friends, Lost Loved Ones, Dead Beat Parents, Debtors Assets Local, State, National & International

Information needed varies, sometimes just a name. Helpful information would be Last Known Address, Social Security Number, Date of Birth and any other information you feel would be of use. Provide us with everything you have and let the Professionals at Information USA do the rest. Information USA has the most competitive prices in the industry! Call today for a free price quote.

Other Services Available *Criminal Background *Civil Court Records *Bankruptcy & Liens & Judgments *National Real Property *Business Credit Reports *Corporate Profiles *National Bank Asset Information *Stocks & Bonds & Mutual Fund Search *Safe Deposit Box Search *Social Security Death Records *Marriage & Divorce *Workers Compensation Records *Non-Published Numbers *Drivers License Records *Vehicle Records Search *Water & Aircraft Search *Pre-Trial Comprehensive Reports *Pre-Employment Background *Verify Education *Verify Professional License *Verify Employment Call for additional Services Information USA Call Toll Free 1-888-370-9112 Ask for Ken Wagner Visa, MasterCard & Discover Cards Accepted

From lreed at west.cscwc.pima.edu Fri Jun 26 21:55:15 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Fri, 26 Jun 1998 21:55:15 -0700 (PDT) Subject: BumBoy III - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C84D5.C921D340.16@west.cscwc.pima.edu> BumBoy III - SPACE ALIENS HIDE M DRUGS!!! __________________________________________ BumBoy Interview: C-J VAN DAMNNED (will it never end?) { AnInterViewerToBeNamedLater, sucking medication out of Baby's twat, only to find that it was a surprisingly pleasureable experience, made the mistake of allowing the Author to continue the interview on his own, while she and the TruthMongrel engaged in behavior that even the disgusting perverts on the BumBoy staff found to be revolting, since it was being done by two females.} VOICES: "Tell them about US..." VAN DAMNNED: It's not always voices...sometimes it's dreams... sometimes the TV, or the Radio, or...anything, really... Like the dream where I'm in the front row at a prizefight, and two guys are beating the living shit out of each other, until the final bell sounds and the winner is declared. Then the two guys get out of the ring and come after me. The one wearing the elephant-colored boxing trunks holds me down while the one wearing the donkey-colored trunks starts shoving a large box up my asshole, and pieces of paper fall out, giving me papercuts, until one of the pieces of paper cuts my throat as I puke it out, and the two guys who pretended to be fighting each other are sucking up my blood out of the trough at the edge of the boxing ring, which turns out to be a pig-pen. As the last of my lifeblood drains out of me, a person in a dirty white smock appears, saying, "I'm from the government, and I'm here to help you." As the person places the piece of paper that cut my throat onto my juglar vein, to stop the bleeding, I notice that it is an election ballot--it is *my* election ballot. As the ambulance rushes me back to my office, to return to work, with the attendants telling me I should be back to normal in about forty months, the two boxers walk past me, arm in arm, with two sinister-looking agents walking behind them, discussing their 'fighters' rematch, four years hence. They have decided to raise the price of tickets from $100.00 to $500.00, since the government automatically deducts it from everyone's paycheck, whether they attend the 'fight' or not. As they discuss how much to raise the concession prices for beer, soda, peanuts, popcorn and hot dogs, they seem to suddenly notice me, and stop to offer their sincere condolences for my 'accident', and say that they hope it won't prevent me from attending the rematch. As if on cue, the fight-promoter, who tells me he is from the government, and is here to help me, picks up a pig-turd containing a small piece of the hot-dog I was eating when I was sodomized by the boxers, and hands it to me, saying, "This is your share of the 'take'. ou know, in Communist countries, the government keeps it all..." I don't think I'll attend the rematch. I have a feeling that I already know who wins...and who loses... VOICES: "ou're getting excited again. Why don't you take your medicine, and read a book, or something, to calm you down?" VAN DAMNNED: ou sadistic pricks, you *know* that the only book I have with me is Collier and Horowitz's, 'The KENNEDS, AN AMERICAN DRAMA,' and it's not in the least bit entertaining, since I just finished a book about the Mafia, so I know how everything in the Kennedy book, or *any book on politics, is going to turn out even before the authors even finish writing about it. It's even more depressing than reading Hitler's "Mein Kamf" and "New World Order" and then reading mainstream press reports about government news conferences. Doesn't anybody do 'original material' any more, or is everyone just plagarizing President Henny oungman, who said, "Take my citizens...please!" And take them...and take them...and take them... VOICES: "We *told* you that everything since the Big Bang has been plagarism..." VAN DAMNNED: Oh, yeah? What about my song, "Booger-Eating Dog (Don't Bite The Nose That Feeds ou)," or, "I Was Sitting On My Horse, And She Jerked Me Off," and all of the other sick, depraved songs I've written? Do you see a big lineup of people claiming credit for the lyrics? VOICES: "ou're getting excited again. See, you even placed your quote marks in the correct place..." VAN DAMNNED: See, there is another thing that proves that people are capable of original, independent thought and actions... Just because I'm the Author doesn't mean I have to use correct spelling, punctuation, syntax (whatever the hell that is), or write in a manner that indicates a well-researched and well- reasoned train of thought. VOICES: "That doesn't make you unique, you fucking imbecile. Just ask any one of a thousand publishing editors who have to wade through the mountains of trash sent to them by self- declared 'authors' who eventually end up cashing in Andy Warhol's IOU for 'Fifteen Minutes Of Fame' by becoming a guest on the Jerry Springer Show and telling the whole world about how they got their dog pregnant by sucking themselves off and blowing their sperm up her twat." VAN DAMNNED: That wasn't *me*! That was someone who just looked like me and deposited Jerry Springer's check in my bank account to make me look bad. But I don't mind, because it makes me unique! VOICES: "Everything since the BigBang is Plagarism. ou're just like all the other Sheeple." VAN DAMNNED: No! ou're trying to trick me into thinking that I'm not a free, independent human being. ou're trying to take away the only things I have to hold on to that make me unique. ou want me to believe that I am not the only sick, depraved pervert in the world who spreads FUD (Fear, Uncertainty and Disinformation) in an attempt to cloak my evil, wretched life in an aura of grandoise importance and imagined righteousness. VOICES: "ou haven't been following the Clinton-Lewinski affair in the news, have you?" VAN DAMNNED: Shut up! I'm not listening! I AM *NOT* LIKE PRESIDENT CLINTON!!! I did *not* give strong encryption to those Chinese people who let me have my way with Buddy in the Lincoln bedroom before they ate him. I'm the one who tried to expose the fact that the *real* Buddy had been replaced by a cross-cloning of Spuds Mackenzie and Janet Reno. I told the CypherPunks to draw glasses on a picture of Buddy and see if it looked like Reno. That was *me*, *really*! I just forged Mark Hedges name to that post to make him look like an asshole! Honest! VOICES: "ou're just like all of the other sorry, pathetic losers who can't get a *real* publishing contract with a *real* publisher who is helping to destroy the Rain Forests by printing millions of hardcover and paperback books decrying the destruction and loss of the Rain Forests. "Instead, you continue to contribute to the destruction of the Digital Environment by sending mountains of your rotting, greasy Digital SPAM to the CypherPunks Disturbed Male List, where your sins are compounded in MeatSpace as a result of the millions of plastic keys that need to be created every day in order for decent, moral, law-abiding NetiZens to protect themselves and their children from your mindless drivel. "As punishment, WE are going to tell you the *real* name of the right-hand square bracket..." VAN DAMNNED: Noooo!!! I'M NOT LISTENING!!! AAARRRRRGGHHHHH!!!!!!!!!!!!!!!!!!!!!!!!!!! {The BumBoy Interview with C-J VAN DAMNNED came to a sudden end, as heavily armed, black-clad ninja agents of ACypherNipsNode- ToBeNamedLater, came bursting through the door, screaming, "Torah! Torah! Torah! Chop! Chop! ", surrounding the Author and allowing AnInterviewerToBeNamedLater to grab Baby and the tape recorder, making her escape while clutching her skirt close to her body, as the Author was trying to peek up it even as he lie on the floor taking a tremendous beating. "ou've got to admire his persistence." she told BumBoy editors while dropping off the interview tapes. Sadly, we must report that Baby, obviously a codependent enabler of the Author's sickness, failed to make it to California, where BumBoy was prepared to foot the bill for her to see a Doggie Therapist, instead choosing to return to the Author, once again dropping the BadBillyG mask at HisOrHer feet and backing toward him with her tail raised in eager anticipation. Redoubtable sources inform us that the black-clad ninja agents of ACypherNipsNodeToBeNamedLater sat back, drinking the Author's Scotch and enjoying the spectacle, as well as tucking money in the Author's panties when HeOrShe bound Baby's feet for the second performance. Official Police Reports indicate that, when officers arrived in response to noise complaints from the neighbors, that the ninjas were fighting violently over a Din-Din Tin roasting pan and a bottle of barbeque sauce, seemingly surprised that the Author and Baby TruthMongrel had vanished. The leader of the black-clad ninja agents was quoted as saying, "Shit! We come to Ito his dog, and now we have to go home and Ito mole of his SPAM, instead." Turning to his companions, he said, "We go now...chop-chop!" Looking embarassed, the leader explained to police, "We not even know what that mean, until oul fliend, Timmy-San, point us to the alchives, whele we find out it mean we have big cocks, rike Amelican bikels. Then we aporogized fol accusing Timmy-San of making fun of us. He good guy..." The editors at BumBoy, upon receiving Declan McCullagh's expense receipts for the clothing he purchased to go undercover as AnInterviewerToBeNamedLater, could not help but notice that an article of clothing conspicuously missing from the receipts was...panties.} From jya at pipeline.com Sat Jun 27 13:05:28 1998 From: jya at pipeline.com (John Young) Date: Sat, 27 Jun 1998 13:05:28 -0700 (PDT) Subject: Jim Bell Update Message-ID: <199806272005.QAA08989@camel8.mindspring.com> According to the June 26 court docket: 1. Jim was arrested June 22; 2. A hearing was held on June 23, USDC Western WA, Tacoma; 3. A new defense attorney present, Peter Voelker; 4. Jim advised of rights and of allegations in violation petition (not specified); 5. Gov moves for detention; 6. Gov and defense attorneys make unspecified proffers; 7. Jim is ordered detained; 8. Probation revocation hearing set for July 10; 9. Judge appoints an (unamed) Federal Public Defender. From jorgec at mundivia.es Sat Jun 27 13:16:23 1998 From: jorgec at mundivia.es (Jorge C. Palma) Date: Sat, 27 Jun 1998 13:16:23 -0700 (PDT) Subject: What does it mean and How much does it cost a healthy diet? A natural foods one ! Message-ID: <6n3jrl$27h$14645@talia.mad.ibernet.es> Cantabrian Altamira Shopping http:/www.cantabrian.com/altamira/altamira.htm Hello: How much does it cost a healthy diet?. Cantabrian Altamira Shopping shows in its web pages natural and ecological foods without additives and preservants from Spain. You will find there white tuna, anchovies, honeys, partridges, wines and assocites. We apologize if this message has been missadressed, Thanks, Cantabrian Virtual Publishers http://www.cantabrian.com From jdobruck at kki.net.pl Sat Jun 27 13:31:21 1998 From: jdobruck at kki.net.pl (Jan) Date: Sat, 27 Jun 1998 13:31:21 -0700 (PDT) Subject: Program: 'Speak Feely' for "secure comminucations"... Message-ID: <3595576A.A100CB77@kki.net.pl> Greetings, I've come across this program on the net which claims to give "secure communications"... could any of you folks comment of this program? Speak Freely 6.1 For Windows 95/NT (295K) Author: John Walker Homepage: http://www.fourmilab.ch/speakfree/windows/ Description: Real time one to one audio chat, half or full duplex, bitmap transfer. Encryption for secure communications. Might be slow with modem connections. The text below is part of the text on the homepage... ======================== Speak Freely for Windows Release 6.1 Speak Freely is a Windows application that allows you to talk (actually send voice, not typed characters) over a network. If your network connection isn't fast enough to support real-time voice data, four forms of compression may allow you, assuming your computer is fast enough, to converse nonetheless. To enable secure communications, encryption with DES, IDEA, and/or a key file is available. If PGP is installed on the user's machine, it can be invoked automatically to exchange IDEA session keys for a given conversation. Speak Freely for Windows is compatible with Speak Freely for Unix, and users of the two programs can intercommunicate. Users can find one another by communicating with a "Look Who's Listening" phone book server. You can designate a bitmap file to be sent to users who connect so they can see who they're talking to. Speak Freely supports Internet RTP protocol, allowing it to communicate with other Internet voice programs which use that protocol; in addition, Speak Freely can also communicate with programs which support the VAT (Visual Audio Tool) protocol. ... [remainder snipped] Jan out. From workathome at grid.sk Sat Jun 27 14:30:37 1998 From: workathome at grid.sk (workathome at grid.sk) Date: Sat, 27 Jun 1998 14:30:37 -0700 (PDT) Subject: Use Your Computer To Make Money From Home Message-ID: <199806272143.XAA10412@durman.krnap.cz> Use Your Computer To Make Money From Home Great Home-Based Business Opportunity. Secret Marketing Software Turns YOUR PC Into A MONEY MACHINE! Easy And Simple. No Risk! Free Marketing Software Explains How! Act Now! To Turn YOUR Computer Into A Money Machine, Send Your Name, Address, and Phone Number within 48 hrs. to: mailto:cashsoftware6 at juno.com Click here for removal -> mailto:optout3 at juno.com From jya at pipeline.com Sat Jun 27 15:34:16 1998 From: jya at pipeline.com (John Young) Date: Sat, 27 Jun 1998 15:34:16 -0700 (PDT) Subject: CIA Hires Lo/Hi-Tech Spies Message-ID: <199806272234.SAA30802@camel7.mindspring.com> NYT, June 27, 1998: Getting Back to Basics, C.I.A. Is Hiring More Spies Taking steps to reduce dependence on high-tech spying. By James Risen Washington, June 26--The Central Intelligence Agency is beginning the largest recruitment drive for new spies in its history, in an ambitious effort to rebuild its espionage service, which has been severely damaged by spy scandals, budget cutbacks and high turnover since the end of the cold war, officials said. With Congress already providing increased financing, the Directorate of Operations, the C.I.A.'s clandestine espionage arm, will hire record numbers of case officers --spies-- beginning this year as part of a new strategic plan to repair the decaying espionage capabilities of the United States by 2005, officials said. In addition to expanded hiring, the agency also plans to reopen several overseas stations that were closed in the early 1990's after the demise of the Soviet Union led Congress and the White House to reduce the C.I.A.'s budget sharply. The recruitment plan is a sign that the C.I.A. recognizes that it has become far too dependent on so-called technical intelligence, or eavesdropping devices and spy satellites. Now, the agency wants to get back to espionage basics, by increasing its ability to place a spy behind enemy lines or inside the offices of a rival government. The spread of new technologies like encryption and computer networks has eroded the value of spy satellites and listening devices and has led the C.I.A. to see the need for an expanded cadre of spies. Without having an agent in place, the C.I.A. has found it much harder to gain access to secrets from rival governments, terrorists and international organized crime groups. ... The C.I.A. is recruiting case officers, and people to support them with technical skills that spies have rarely been asked to learn in the past. "As we tried to figure out our requirements for the future, we realized we needed to have greater technical support for agent operations," said one American official. At the top of the list of requirements is computer expertise. The proliferation of global computer data networks, for example, has made it more difficult for the agency to slip into a country using false identifications. Only computer experts can defeat those local computer systems, and even developing countries routinely make sophisticated computer checks on passports and visas. ... ----- Full story: http://jya.com/cia-hires.htm From gwb at gwb.com.au Sat Jun 27 18:25:41 1998 From: gwb at gwb.com.au (Global Web Builders) Date: Sat, 27 Jun 1998 18:25:41 -0700 (PDT) Subject: New on-line moderated forum for Pauline Hanson's One Nation Message-ID: <1.5.4.32.19980628010014.00a78dbc@mail.pronet.net.au> G'day One Nation supporter in NSW Pauline Hanson's One Nation now has its own moderated discussion group on-line. You may participate by requesting a unique username and password from GWB by reply email. The URL for the discussion board is: http://plato.cc.adfa.oz.au/auspolitics/ Follow the link to Pauline Hanson's One Nation discussion group in the frame on the right. The purpose of the discussion group is to discuss One Nation policy, issues and brain storm. Please not IT IS a moderated discussion group and any offensive posts will result in the poster being taken off the forum. GWB Scott Balson From jya at pipeline.com Sat Jun 27 18:43:00 1998 From: jya at pipeline.com (John Young) Date: Sat, 27 Jun 1998 18:43:00 -0700 (PDT) Subject: AU Cryptozilla Attack Message-ID: <199806280142.VAA19935@camel7.mindspring.com> Thanks to Anonymous we offer the article which describes the AU government attack on Eric Young's and Tim Hudson's full-strength Cryptozilla for Netscape: http://jya.com/oz-crypto.htm It's also a good overview of crypto policy battles down under -- the pols, the crats, the laws, the regs, the obfuscations, the work arounds of export controls and runarounds with chicken heads off -- like like all around hereabouts. From ci0u at worldnet.att.net Sat Jun 27 19:32:29 1998 From: ci0u at worldnet.att.net (ci0u at worldnet.att.net) Date: Sat, 27 Jun 1998 19:32:29 -0700 (PDT) Subject: Earn $100 every time OUR phone rings... Message-ID: ALL YOU DO IS ADVERTISE THIS 800 NUMBER! THAT'S ALL!! $100 goes to you for EVERY sale that the company closes! Does the idea of making at least $1,000 per week beginning your 2nd week of doing business excite you? How about never having to sell a thing to your customer and never having to talk to ANYONE to make money? I don't know how this could get any easier. EVERY aspect of selling or talking to someone is DONE COMPLETELY by the company! The number one home based business for the 2nd year in a row, Fortune 5000 is a member of the Better Business Bureau and the U.S. Chamber of Commerce. WHAT THIS BUSINESS WILL DO FOR YOU: * Handles all your calls, closes your sales, and sends you WEEKLY commission checks! * It pays you a $100 commission (that's over 50% of the total sale) for EVERY sale. CHECKS put $$$ in your pocket in less than your first week or two... Quick commission earnings build and maintain motivation. ALL YOU DO IS ADVERTISE the toll-free number and your ID number. * You can get STARTED TODAY. Just advertise the business toll-free number with your ID # and let this business CLOSE YOUR SALES every day... They do all the work and YOU GET PAID FOR IT! * You may advertise any way you choose: Bulk E-Mail, Flyers, Classifieds, Postcards, etc. Suppose you use bulk E-Mail, as I am: 100,000 E-Mails with a 1/10th of a percent (0.1%) sales rate at $100 per sale nets $10,000... not too bad. There is nothing else out there that will provide you with an immediate income beginning THIS WEEK with minimal effort. Before you call, I want you to think about the quality of the live operators handling your call. I am convinced you will not find a better team of closers for your own personal sales. You will clearly understand what I am talking about once you call. PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!! 1-800-811-2141 You will be asked for ID #50030 when you call. (Live operators are available from 8 AM-10 PM CST Monday through Saturday and will be able to answer any questions you may have.) Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949, 888-446-6951 or 888-731-3457 (all toll free). From whgiii at invweb.net Sat Jun 27 20:06:47 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Sat, 27 Jun 1998 20:06:47 -0700 (PDT) Subject: CIA Hires Lo/Hi-Tech Spies In-Reply-To: <199806272234.SAA30802@camel7.mindspring.com> Message-ID: <199806280312.WAA005.26@geiger.com> -----BEGIN PGP SIGNED MESSAGE----- In <199806272234.SAA30802 at camel7.mindspring.com>, on 06/27/98 at 06:29 PM, John Young said: >Washington, June 26--The Central Intelligence Agency >is beginning the largest recruitment drive for new spies >in its history, in an ambitious effort to rebuild its >espionage service, which has been severely damaged by >spy scandals, budget cutbacks and high turnover since >the end of the cold war, officials said. Sounds like a good time to get some moles in place. :) - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html - --------------------------------------------------------------- Tag-O-Matic: Windows: Just another pane in the glass. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNZW0j49Co1n+aLhhAQFhOAQAn8B/VxAiIofDpynV9GMrL4QCnWIsbng6 dEG51nVIe9L+UWyyuYc9NFB4NjIxhXp4dibJG1H9PlkXg++vvMYR6JUyHa6h1/E2 dMY7injK0KZvYUd9Rvhq/JM1p56cRwnXa0UVtlP2b4cJsB+1v6ZxWlyvtCoEkz/n q5nUM8lzlgI= =vQay -----END PGP SIGNATURE----- From whgiii at invweb.net Sat Jun 27 21:05:16 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Sat, 27 Jun 1998 21:05:16 -0700 (PDT) Subject: Jim Bell Update In-Reply-To: <199806272005.QAA08989@camel8.mindspring.com> Message-ID: <199806280410.XAA006.76@geiger.com> -----BEGIN PGP SIGNED MESSAGE----- In <199806272005.QAA08989 at camel8.mindspring.com>, on 06/27/98 at 04:01 PM, John Young said: >According to the June 26 court docket: >1. Jim was arrested June 22; >2. A hearing was held on June 23, USDC Western WA, >Tacoma; >3. A new defense attorney present, Peter Voelker; >4. Jim advised of rights and of allegations in violation petition (not >specified); >5. Gov moves for detention; >6. Gov and defense attorneys make unspecified proffers; >7. Jim is ordered detained; >8. Probation revocation hearing set for July 10; >9. Judge appoints an (unamed) Federal Public Defender. If I were Jim the next time I got out they would never find me again. It seems quite obvious that they are going to hound him to the day he dies. Jim has a chem degree doesn't he? I know a few countries where such talents are in demand :) - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html - --------------------------------------------------------------- Tag-O-Matic: One man's Windows are another man's walls. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNZXCSI9Co1n+aLhhAQGG1AP/c8CDhDVDneygrcvglEofoiq48YvWvE4u cgAc/ox7yOkAsInxmqeiFZGUgiyIYeIJXLvFY43D+T4v2xU4t50L6tFf22nVjxmP kUqv5QPn0xB7ssO7LMUWKOqoP7doqNks275LB92LFANX44bp1RRhTr7ziiw22L6A dD/FhnB1x1Q= =cI+Z -----END PGP SIGNATURE----- From attila at hun.org Sat Jun 27 21:34:04 1998 From: attila at hun.org (attila) Date: Sat, 27 Jun 1998 21:34:04 -0700 (PDT) Subject: Jim Bell Update In-Reply-To: <199806280410.XAA006.76@geiger.com> Message-ID: On Sat, 27 Jun 1998, William H. Geiger III wrote: >If I were Jim the next time I got out they would never find me again. It >seems quite obvious that they are going to hound him to the day he dies. > >Jim has a chem degree doesn't he? I know a few countries where such >talents are in demand :) > yeah, but the weather in Baghdad is not only hot, but occasionally rains clusters. From q4ix at worldnet.att.net Sun Jun 28 01:25:58 1998 From: q4ix at worldnet.att.net (q4ix at worldnet.att.net) Date: Sun, 28 Jun 1998 01:25:58 -0700 (PDT) Subject: Earn $100 every time OUR phone rings... Message-ID: ALL YOU DO IS ADVERTISE THIS 800 NUMBER! THAT'S ALL!! $100 goes to you for EVERY sale that the company closes! Does the idea of making at least $1,000 per week beginning your 2nd week of doing business excite you? How about never having to sell a thing to your customer and never having to talk to ANYONE to make money? I don't know how this could get any easier. EVERY aspect of selling or talking to someone is DONE COMPLETELY by the company! The number one home based business for the 2nd year in a row, Fortune 5000 is a member of the Better Business Bureau and the U.S. Chamber of Commerce. WHAT THIS BUSINESS WILL DO FOR YOU: * Handles all your calls, closes your sales, and sends you WEEKLY commission checks! * It pays you a $100 commission (that's over 50% of the total sale) for EVERY sale. CHECKS put $$$ in your pocket in less than your first week or two... Quick commission earnings build and maintain motivation. ALL YOU DO IS ADVERTISE the toll-free number and your ID number. * You can get STARTED TODAY. Just advertise the business toll-free number with your ID # and let this business CLOSE YOUR SALES every day... They do all the work and YOU GET PAID FOR IT! * You may advertise any way you choose: Bulk E-Mail, Flyers, Classifieds, Postcards, etc. Suppose you use bulk E-Mail, as I am: 100,000 E-Mails with a 1/10th of a percent (0.1%) sales rate at $100 per sale nets $10,000... not too bad. There is nothing else out there that will provide you with an immediate income beginning THIS WEEK with minimal effort. Before you call, I want you to think about the quality of the live operators handling your call. I am convinced you will not find a better team of closers for your own personal sales. You will clearly understand what I am talking about once you call. PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!! 1-800-811-2141 You will be asked for ID #50030 when you call. (Live operators are available from 8 AM-10 PM CST Monday through Saturday and will be able to answer any questions you may have.) Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949, 888-446-6951 or 888-731-3457 (all toll free). From creditmedic at earthlink.net Sun Jun 28 06:30:00 1998 From: creditmedic at earthlink.net (creditmedic at earthlink.net) Date: Sun, 28 Jun 1998 06:30:00 -0700 (PDT) Subject: Credit Medic Message-ID: <199806281325.GAA12072@scotland.it.earthlink.net> Dear Friend, DO YOU SUFFER FROM BAD CREDIT? DO YOU WISH YOU COULD START OVER WITH A CLEAN SLATE? Maybe you just want a better way to protect your privacy. Many of us never realized the long-term effect that bad credit has on our lives. In the computer age, many of these negative issues seem inescapable, and for good reason. Fortunately, Credit Medic will rescue you from your past negative credit and open the way to a new life in the credit world. By creating an entirely new credit file, you can obtain the credit you deserve. This powerful program will explain how you can create a new credit bureau file that will give you the opportunity for new credit. People lose their credit privileges for any number of reasons. In our society, it's very difficult to live without good credit. Regardless of your past credit history, this program will show you how to regain good credit. But you will get more than that. With good credit comes high self-esteem and self-worth. You will be better able to take care of yourself or your family and enjoy the things you deserve. Credit Medic will walk you through this process step by step. It will take some energy and focus on your part but the rewards will be well worth the effort. By creating a new credit file, the Government allows you a second chance at getting the credit you deserve. Thousands of people who have used this program have achieved success in releasing themselves from the exasperating stranglehold of bad credit and moved on to having outstanding credit. Understand that there is absolutely no reason for you to believe that it is impossible for you to release yourself from your past negative credit and move on to excellent credit! The process is very simple, but it is important to be dedicated and to follow through with all details. You must also be patient, some steps take longer than others. Don't be fooled into thinking that this is a miracle quick fix. This method will require some work on your part. What's important to realize is how the Government and the CRAs (Credit Reporting Agencies) identify you and list all of your past and present credit information. Credit Medic will show you how to apply for new credit identification. This creates a whole new credit identity, that runs parallel (but never crosses) your existing credit. This program doesn't require that you repair your old credit file, although it's a good idea for many obvious reasons. This is your decision to make. Credit Medic isn't loaded with fluff or filler material. Everything in this kit is important! You will find out about rights that you probably didn't know you had. Remember, you deserve good credit. Follow the program carefully, and you will be successful! Credit Medic will give you a second chance for credit. It will also be your last chance. You must understand that you only get ONE (1) second chance. If your credit is damaged again, Credit Medic cannot help you. Credit Medic is a PROVEN method that REALLY WORKS if you follow the steps described. Credit Medic DOES NOT do the work for you, but it DOES give you COMPLETE detailed instructions for building NEW credit. DON'T PROCRASTINATE! YOU DESERVE GOOD CREDIT! ORDER by June 10th and receive 50% off the regular price of $39.95. NOW ONLY $19.95 if your order is postmarked by July 10, 1998! Please print and fill out the following order form: ---------------------------------------------------------------------------- ATTN: Please type or print legibly to ensure proper delivery. Name______________________________________________________ E-mail Address (Required for E-Mail Delivery--U.S. Postal Delivery $5.95 extra) __________________________________________________________ Address __________________________________________________________ __________________________________________________________ __________________________________________________________ Phone #______________________ PLEASE CHECK ONE: _____ E-Mail Delivery _____ U.S. Mail $_19.95_ CREDIT MEDIC SECRETS (If postmarked by 7/10/98) $_______ Sales Tax (CA residents add 8.25%) $_FREE_ E-Mail Delivery (you must include an e-mail address which accepts large attachments) $__5.95_ Postal Delivery (Only add this amount if you want Credit Medic delivered by U.S. Mail) $_______ Order Total PAYMENT BY (US FUNDS only!): ___ Personal/Business Check ___ Money Order ___ Cashier's Check PREFERRED FORMAT (Please check one or more of the following): ___ ASCII ___ Microsoft Word ___ Zipped *If none of these three formats are acceptable, please order for delivery by U.S. Mail. You must include the additional $5.95 shipping & handling fee. The complete kit will be mailed in printed form. **If you're ordering from outside the USA, only a Money Order in US Dollars will be accepted. No postal delivery is available outside the USA, so you must include your E-Mail address accurately and legibly. If you do not currently have an E-Mail address, please get permission to use a friend's. -------------------------------------------------------------------------------------- Please make payable to -> BWZ Publications and send to: Credit Medic 21755 Ventura Blvd. Suite 455 Woodland Hills, CA 91367 USA From hihe57 at texas.net Sun Jun 28 10:52:38 1998 From: hihe57 at texas.net (Cherry Pit) Date: Sun, 28 Jun 1998 10:52:38 -0700 (PDT) Subject: New Web Site Message-ID: <19980628206FAA56484@post.pge.com> Cherry Pit Check Out My Free Adult Site with Lots of Pictures http://209.215.147.9/ From Ivestheis at aol.com Sun Jun 28 17:27:54 1998 From: Ivestheis at aol.com (Ivestheis at aol.com) Date: Sun, 28 Jun 1998 17:27:54 -0700 (PDT) Subject: tell me about digi cash if you know about it Message-ID: <121815ca.3596df68@aol.com> Thanks here is my phone 502 961 0332 Name Ives Aidan Sandol From billp at nmol.com Sun Jun 28 18:28:58 1998 From: billp at nmol.com (bill payne) Date: Sun, 28 Jun 1998 18:28:58 -0700 (PDT) Subject: Just clicked on http://www.jya.com/crypto.htm Message-ID: <3596ED18.890@nmol.com> Sunday 6/28/98 7:12 PM John Young Just looked at http://www.jya.com/crypto.htm usa062698.htm Payne v. NSA: US on Classified NSA Declaration June 27, 1998 usa062298.htm Payne v. NSA: US Motion on FOIA for NSA Algos June 27, 1998 See you got the Saturday fax. Dinner is ready, said Patty. Glad you enjoyed the hat I sent you ... FLASH Patty just called me to dinner. Patty yelled J Orlin Grabbe! J ORLIN GRABBE appeared on 60 Minutes. http://www.aci.net/kalliste/ Leslie Stall was critital. Watched remainder of 60 minutes. For the record, Patty is my SAME wife since 1962, Implementing Basics : How Basics Work by William H. and Patricia Payne http://www.amazon.com/exec/obidos/subst/home/home.html/002-8309979-0236834 Patty and I met John Gilmore http://www.cygnus.com/~gnu/ and his girl friend Cindy for dinner in about October. It took about 15 minutes for Patty and I to discover if Gilmore and his girl friend were of THE SAME SPECIES. I am a TOTAL CONSERVATIVE. I FINALLY saw J Orlin Grabbe on 60 Minutes tonight. http://www.aci.net/kalliste/speccoll.htm http://www.aci.net/kalliste/nukearse.htm http://www.aci.net/kalliste/sandcryp.htm Looks like he may be from a different spicies too. But from our minds, Gilmore, Grabbe, and LOTS OF YOU think the same thoughts. And likely John Young too. Good ones. No evil. I need to collect my thoughts after seeing 60 minutes tonight. Best bill From amainfo at amazonmall.com Sun Jun 28 21:49:23 1998 From: amainfo at amazonmall.com (amainfo at amazonmall.com) Date: Sun, 28 Jun 1998 21:49:23 -0700 (PDT) Subject: Internet Success Toolbox Message-ID: <989.283923.42380 amainfo@amazonmall.com> We do not wish to send e-mail to anyone that does not want to receive it. To be removed from this list: Send an e-mail to: amainfo at amazonmall.com and type "remove" in the "Subject Line" You will be promptly removed from our database. ................................................................ ..... "THE INTERNET SUCCESS TOOLBOX" The Most Complete Marketing Software Package Available Anywhere! This is what you will receive on CD-ROM: 1. Submission Spider Program (Optional - value $99.90) The NEW and IMPROVED Strut Your Stuff Submission Spider Program! Now automatically submitting to 500 Search Engines and Directories! We believe you'll find this product to be a vast improvement over the Older Spider program The Strut Your Stuff Search Engine Submission Software will automatically submit your site to 500 search engines, directories and link sites. The software is extremely easy to use. Register and Submit your web site to ALL major internet search engines and directories in less than 45 minutes! Increase your web site's visibility to webcrawlers, spiders, indexers and worms. Boost and track your web site's search engine ranking. 2. Stealth Mass Mailer ($399.00 value) - This unique, first of it's kind - software that allows you to easily send 250,000 e-mail messages an hour. Simply enough by making a single connection to the Internet using a standard modem, and connecting to either 20 different mail servers, or a single mail server 20 times. This, easy to use, software is designed for the basic computer user to understand. It's as easy as imputing the mail server, selecting the list of e-mail recipients to send to, inserting your e-mail address, adding your subject line, selecting your sales letter, and pressing send. 3. E-Mail Pro Extractor ($350.00 value) - This one of a kind software program is designed to manage and clean up any list of e-mail addresses. It will purge duplicates, manage removes and delete undeliverables. It will also separate and categorize your list of e-mail addresses by domain names. The E-mail Pro Version 4.0 Bulk E-mail Loader also imports simple text files that anyone can download from AOL, CompuServe, the Internet, etc...These text files contain classified ads, forum messages, or data from the member directory. Each of these files are filled with e-mail addresses. 4. Check Deposit System ($125.00 value) - Check Deposit System Version 2.1 is a state of the art, revolutionary software that allows you to easily and legally process checks by fax, phone or Internet. The customer's signature on the check is not necessary. 5. 16 Million E-mail Addresses ($149.00 value) - We took a total of over 92 million e-mail addresses from many of the touted CD's that are out there (bought them all - some were $300+)! We added the millions we had in storage to those. When we combined them all, we had in excess of 100+ million addresses in one huge file. We then ran a super "sort/de-dupe" program against this huge list. It cut the file down to less than 25 million!! We then ran a program that contained 150+ keywords to remove addresses with vulgarity, profanity, sex-related names, postmaster, webmaster, flamer, abuse, spam, etc...Also we eliminated all .edu, .mil., org., gov., etc... After that list was run against the remaining list, it reduced it down to near 16 million addresses! So, you see, our list will save people hundreds of dollars buying all others that are out there on CD. Using ours will be like using the 100+ million that we started with, but a lot less money and a lot less time! If you order "The Internet Success Toolbox" for $495.00 within the next 7 days, you'll also receive the following awesome bonuses absolutely FREE. A value of over $400.00 !!! ----------------------------------------------------------------- - To order: Fill out, copy and fax this order form to: (425)379-9722 or send Check to: SYS 11014 19th Ave SE Suite 305 Everett, WA 98208 Questions: (425)338-9491 We accept Visa, MasterCard or Check. ____ YES! I'm bursting with anticipation! Please send me "The Internet Success Toolbox" so I can start advertising my business to "millions of people" - absolutely FREE! I'm anxious to see how others are creating immediate "cash-flow explosions", and eliminating most of their advertising and marketing costs - and how I can do the same! Enclosed is $495. ____ YES AGAIN! Because I'm responding within 7 days, I will receive 5 BONUSES with a total value of $488.90 - absolutely FREE! They include: BONUS #1 ($39 value): "Search Engine Secrets" - Discover the Most Powerful and Proven Strategies that really work to place you at the Top of the Search Engines! BONUS #2 ($195 value): A FREE one year subcription to "The Internet Success Toolbox Newsletter" - my ticket to marketing and internet cash flow heaven! BONUS #3 ($39.95 value): Your Hotline List of "7000 Free Classified Ad Sites on the Internet" - a virtual GOLDMINE! BONUS #4 ($39.95 value): A FREE Special Report titled "How to Put Your Business on Automatic Pilot and Turn Your Marketing System Into a Predictable, Turnkey, Cash-Flow Machine That Keeps on Working - Even When You Don't!!" BONUS #5 ($175 value): Order within 7 days and I'll also throw in a FREE VACATION CERTIFICATE good for 3 days and 2 nights of FREE lodging at one of over 30 "premier" resorts. Some vacation spots you can choose from include: Hawaii; Orlando, FL; Las Vegas; Atlantic City; Palm Springs; Aruba - in the South Carribean; Cancun, Mexico; and many, many more! Hey, when you start making a TON of money, you'll wanna do some celebrating, won't you? So start packing those bags! That's it. A lot more than you bargained for isn't it? When you total all the goodies up, you're looking as a total value of $488.90! All yours - absolutely FREE - with your purchase of our amazing package "The Internet Success Toolbox " for only $495.00. And I'll even pay for shipping your package. Anyway, I have a copy right here on my desk reserved for you. All I need is your go ahead and I'll rush it out to you along with your 5 FREE BONUSES. Name _____________________________________________________ Street Address ____________________________________________ City)__________________State_______Zip_____________ Phone # (_____) ___________________________ Fax # (______) _____________________ E-mail Address _________________________ ___Visa ___MasterCard___Check ___Include the Submission Spider $495.00 ___Don't include the Submission Spider $395.00 Total:$________ Account Number_____________________ Expiration Date____________________ I understand that all sales are final. ____________________________________ Signature Fax order to: (425)379-9722 To order by check: *********************************************************** Tape or paste your check here Fax it to us at: You do not need to send a hard copy of your check. The fax is all we need. Make check payable to: S.Y.S. (We are able to perform this service using our Check Deposit System Software) ************************************************************ * Orders by Credit Card are shipped IMMEDIATELY. Fax completed order form to: * Orders by personal, business or credit card CHECK are shipped in 7-10 business days. From operator at theshopcenter.com Mon Jun 29 01:58:47 1998 From: operator at theshopcenter.com (operator at theshopcenter.com) Date: Mon, 29 Jun 1998 01:58:47 -0700 (PDT) Subject: Cheapest Long Distance...As Low As 4.9cpm!! Message-ID: <989.283923.711042 operator@theshopcenter.com> LOWEST LONG DISTANCE RATES...AS LOW AS 4.9CPM!!! Join This Incredible Wholesale Card Club for ONLY $35.00 And You Not Only Get A 96min. Phonecard, But You Also Can Purchase Them At Incredibly Low Rates!! This Membership Also Puts You In Our Mega Money 2x3 Power Matrix.... And You Never Have To Sponsor Anyone Ever And Your Matrix Will Fill And You Get Paid.. Daily Payout!! Only 14 Sales = A Cycle!! Unlimited Cycles Daily!! Absolutly No Wash!! Earn $200.00, $600.00, OR $1800.00 per cycle or ALL THREE UNLIMITED TIMES DAILY!! AND Get The Lowest Phone Cards Rates In History...and Incredible International Rates Too!! CALL 1-800-600-0343, EXT.2700 FOR BRIEF OVERVIEW AND ANOTHER NUMBER TO SIGN UP RIGHT NOW OVER THE PHONE AND LEAVE ME YOUR CONTACT INFORMATION AND I WILL CALL YOU BACK FIRST!! BE SURE TO WRITE DOWN THIS ID#3299 as you can not sign up without it. You may also reply back to with "LOWEST Long Distance" in the subject and you will automatically receive some more information. If you would like to be removed from any further mailings, then please From nobody at REPLAY.COM Mon Jun 29 04:07:25 1998 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 29 Jun 1998 04:07:25 -0700 (PDT) Subject: (no subject)Re: Premail (and Replay) Message-ID: <199806291108.NAA19606@basement.replay.com> Anonymous #49812 wrote: > On 28 Jun 1998, Secret Squirrel wrote: > > > Also, remailer at replay.com appears to have been deleted. The 'remailer' > > user is unknown. > > That's correct. I don't know what happened. Oh, really? From attila at hun.org Mon Jun 29 04:31:51 1998 From: attila at hun.org (attila) Date: Mon, 29 Jun 1998 04:31:51 -0700 (PDT) Subject: saving the world from a cancerous monopoly Message-ID: there is only one _sane_ course of action against M$: divestiture --before Gates becomes the Hydra. to make it short: at 90% of the OS market, and 95% of the current office software (w/p, spreadsheet, database, etc) market worldwide, M$ _is_ in a position of total market dominance. the real issue is not the 90% of the OS market, it is the 95% (expected to grow to 98% before 2000) of the office s/w. the office software, available _only_ on M$ platforms creates a self-perpetuating juggernaut: no other OS can even begin to make market penetraton without the key product (office s/w) --and people are not willing to learn a new application-- that's just human nature. it will take two technical factors to make M$ subject to market pressures and responsive to further competitive innovation (and this involves extensive ongoing regulation and oversight which I consider anathema): 1. M$' base operating system must be fully defined; eg- the API interface must be made available to all. if the API is not a moving target, emulators can be written enabling native WinTel s/w to run correctly on other platforms (unix variants, OS/2, beos, apple, etc). the increasing CPU "horsepower" makes this approach at least feasible. 2. M$ must be required to port it's major products to other operating systems; it is worth noting that freeBSD, for instance, will run native binaries from Linux and SCO variants which simplifies on set. as a corollary, M$ must be required to support some of the non-Intel hardware ports such as freeBSD or Linux on Alpha (almost 5 years ago, Alpha was at the performance level of the current Intel 400 Mhz). M$ does support Word and Explorer on Apple, but major features were not ported in both instances --this is not acceptable. I am not in favour of the government meddling in the design or integration of M$ products... but: the Sherman Act, passed in 1890 is designed to level the playing field, not regulate/administrate. the real issue of the act is that it acts _in the interest of society_ to curtail monopolistic and anti-competitive actions and excesses --M$ certainly qualifies for the remedies far more than John D. Rockefeller's Standard Oil did in 1908. Bill Gates, through his _total_ dominance of the desktop, (with exceptiom of a few of the hardheaded/stubborn who refuse to run _any_ M$ products (author included)) is using his cash cow, swollen by gouging the consumer, to acquire _significant_ interests in industries which use computers: cable networks, cellular networks, satellite networks, etc. and related industries dependent on communications: news (MSNBC), television, productions, etc. this horizontal and vertical spread of M$ is even more dangerous. Bill Gates is quickly approaching critical mass --Bill Gates could literally bring the world to its knees-- and Gates is a notorious control freak: there is Bill's way, there is Bill's way, there is... sorry, there is no other way. unless the DOJ shows some spine, particularly in light of the appeals court ruling dumping the injunction _and_ the special master (which is far more critical than the public perceives, which is why M$ went after Lessig), the DOJ is going to be in and out of court with M$ until M$ literally buys the government or intimidates the DOJ out of the deal. the scenario of forcing M$ to accommodate other OSs and hardware platforms might be workable, but Gates will not only fight it, but it will be a constant additional legal burden to force M$ to make the services available in a timely manner; in other words, the government will end up establishing an agency the size of the FCC just to regulate M$ the "controlled" monopoly (as Sen. Hatch threatened). nothing in American law says we can not have a regulated monopoly if it serves the public interest --AT&T provided superb and universal service for decades (many of us would love to have that service today), but AT&T did _not_ innovate in a timely manner at the market demand. and telephones are rather low tech compared to computers which have been subject to Grove's Law for two decades. M$ has not been a creative company --it is a marketing and control machine which acquires technology, often by less than socially acceptable means, and integrates it into M$' market offerings. credit must be given to M$ for making the PC ubiquitous, but that value starts to wear very thin with M$' current market domination. from the perspective of serving the future interests of our society, the only effective option for the DOJ is to litigate for the divestiture of M$ into several operating companies --and to prevent Bill Gates from owning or controlling more than one division --much on the line of the AT&T divestiture. anything less will mean continuing litigation and further dominance of Gates as he uses his enormous cash reserves to buy control in additional markets. likewise, the orders must prohibit Gates from further market horizontal and vertical "octopussing". the Sherman Act also permits market damages (M$' 50-80% gross profit margin certainly qualifies as gouging) --which are then trebled; that would put a cramp on Bill's $50 _billion_ net worth and probably force even further divestiture of his controlling stock interests. Gates' personality needs to be considered as a factor as he must control, totally control. it is not enough to be first in a market, he must be the only player in the market. Gates' tactics have been deplorable: his minions go forth to companies and say: "...we dont know whether to buy you out, or force you out..." and if the company is purchased, it is purchased for much less than potential or fair market value. Gates does not buy just the leader, he buys outright, or controls, _all_ of the players in an emerging technology so there will be no competition to the direction chosen for inclusion in the M$ product line --and the choice may not be the best choice... the market is stifled. unfortunately, Bill Gates is a cancer on society. it is the old story: deal with it today, or deal with it later when Gates has become an even more cash bloated and arrogant monster which has devoured more of societies' rights and destroyed even more of the worlds' technical infrastructure. Bill Gates is not going to mellow with age; if anything, he will get more difficult. the world will be in less of a shock knocking the pins out from under Gates now rather than later. attila out.... __________________________________________________________________________ go not unto usenet for advice, for the inhabitants thereof will say: yes, and no, and maybe, and I don't know, and fuck-off. _________________________________________________________________ attila__ On Sun, 28 Jun 1998, Brian wrote: >> ...(Compared to Gates, Hannibal lacks vision...) >> >> I read a statistic yesterday (I think) that 90% >> of all PCs have Win95 installed, and Gates wants 90% of them to 'upgrade' >> to Win98. He has 90% of the WORLD market. And the Zionist theory people >> worry about 6% controlling 90%? What about one guy controlling 90% of the >> PC in the world? And stopping him is a restriction of his rights as defined >> by the American Constitution? During a debate on this, people happened to >> mention that the constitution was partially about resisting tyranny. Gates >> could bury ANYTHING DEEP into a new OS (remember the windows bomb joke that >> made the rounds a while back?), and no one would know. even then, people in >> businesses don't speak up, cause those who dissent, get fired. >> >> I think that Gates should be slowed down now, while the chance is still >> there, and (somehow) get some alternative, workable, opposition OS's up and >> running, yet are compatible with win95/98 as well. The only way forward is >> through both unity and diversity. >> From jf_avon at citenet.net Mon Jun 29 06:52:40 1998 From: jf_avon at citenet.net (Jean-Francois Avon) Date: Mon, 29 Jun 1998 06:52:40 -0700 (PDT) Subject: saving the world from a cancerous monopoly Message-ID: <199806291404.KAA16743@cti06.citenet.net> On Mon, 29 Jun 1998 11:31:43 +0000 (GMT), attila wrote: > I am not in favour of the government meddling in the design > or integration of M$ products... but: > > the Sherman Act, passed in 1890 is designed to level the > playing field, not regulate/administrate. the real issue > of the act is that it acts _in the interest of society_ > to curtail monopolistic and anti-competitive actions and > excesses --M$ certainly qualifies for the remedies far > more than John D. Rockefeller's Standard Oil did in 1908. That is B$, i.e. pork barelled gold plated bullshit! Standard Oil story was simply some businessmen whoring to politicians whoring to businessmen. But what a price did we pay for that! The Sherman Act is simply another appropriation of market by physical force, made morally acceptable by legislating it. When a country legalize the use of force for profits, their citizens will suffer the consequences sooner or later. Ciao jfa Jean-Francois Avon, Montreal QC Canada "One of theses centuries, the brutes, private or public, who believe that they can rule their betters by force, will learn the lesson of what happens when brute force encounters mind and force." - Ragnar Danneskjold PGP key at: http://bs.mit.edu:8001/pks-toplev.html ID# C58ADD0D : 529645E8205A8A5E F87CC86FAEFEF891 From StanSqncrs at aol.com Mon Jun 29 08:17:54 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Mon, 29 Jun 1998 08:17:54 -0700 (PDT) Subject: Premail (and Replay) Message-ID: <51a3bf4e.3597affc@aol.com> In a message dated 6/29/98 6:31:46 AM Central Daylight Time, nobody at REPLAY.COM writes: << Anonymous #49812 wrote: > On 28 Jun 1998, Secret Squirrel wrote: > > > Also, remailer at replay.com appears to have been deleted. The 'remailer' > > user is unknown. > > That's correct. I don't know what happened. Oh, really? >> ROFLOL! Stan From hrook at exchange.microsoft.com Mon Jun 29 10:39:33 1998 From: hrook at exchange.microsoft.com (Harvey Rook (Exchange)) Date: Mon, 29 Jun 1998 10:39:33 -0700 (PDT) Subject: saving the world from a cancerous monopoly Message-ID: <2FBF98FC7852CF11912A00000000000108A78AC5@DINO> From: attila [mailto:attila at hun.org] > 1. M$' base operating system must be fully defined; eg- > the API interface must be made available to all. if > the API is not a moving target, emulators can be > written enabling native WinTel s/w to run correctly > on other platforms (unix variants, OS/2, beos, apple, > etc). the increasing CPU "horsepower" makes this > approach at least feasible. > How do you plan on accomplishing this? The courts have said that they will not design computers. Since freezing an API is tantamount to computer design, this isn't going to happen any time soon. More generlly, API's only freeze when the system is dead. Windows has, for better or for worse, many years of life left in it. This means one way or the other, MS will extend Windows as it needs. For them, freezing Windows would be killing one of their cash cows. > 2. M$ must be required to port it's major products to > other operating systems; it is worth noting that > freeBSD, for instance, will run native binaries from > Linux and SCO variants which simplifies on set. This is also very difficult to implement. How do you choose what OS/s to port to? If MS can't expect to earn a profit from the port, then MS is dumping software, which is not legal. Why choose x86 UNIX's (less than 10 million users) Why not MVS (more than 20 million users)? Attila, I think you're jealous, and confused by MS's success. You don't understand why someone would choose Windows (NT or 98) when OS's are available that have a better core. And you desperatly want to change that. Some terrible truths... #1 Only MS, and Apple know how to make and OS that the mass market wants. Apple unfortunatly doesn't know how to make hardware that the mass market wants. #2 If people made decisions rationally, advertisements would consist of nothing but readings from Consumer Reports. #3 The typical computer user is getting less, not more intelligent. If an x86 unix is to gain mass market popularity, it must become vastly more usable. Most people don't know and don't care about the internals of the OS. They don't want to think about it. They just want their documents and games to be there when they click on them, and they want to surf the internet. Not that Windows is perfect for usability, but it's a hell of a lot better than UNIX. But enough of this... this is cypherpunks, not alt.bash.microsoft. Take a peek at my email address if you want to see my bias. ob cypher... I've got a validated C++ implementation of RC-6 email me if you'd like a copy of the source. Harv. From CTIA_Daily_News at tour.unitymail.com Mon Jun 29 11:17:20 1998 From: CTIA_Daily_News at tour.unitymail.com (CTIA Daily News) Date: Mon, 29 Jun 1998 11:17:20 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - June 29, 1998 Message-ID: <199806291808.NAA00067@revnet4.revnet.com> ============================================= Welcome to today's edition of the CTIA Daily News from WOW-COM. Please click on the icon / attachment for the most important news in wireless communications today. CALEA Summit being held July 21 & 22 in Washington, DC. Register Now!! Call (202) 785-0081 ============================================= From bill.stewart at pobox.com Mon Jun 29 11:20:37 1998 From: bill.stewart at pobox.com (bill.stewart at pobox.com) Date: Mon, 29 Jun 1998 11:20:37 -0700 (PDT) Subject: saving the world from a cancerous monopoly In-Reply-To: Message-ID: <3.0.5.32.19980629095745.009bbae0@popd.ix.netcom.com> At 11:31 AM 6/29/98 +0000, attila wrote: > there is only one _sane_ course of action against M$: > divestiture --before Gates becomes the Hydra. [...] > the real issue is not the 90% of the OS market, it is the > 95% (expected to grow to 98% before 2000) of the office s/w. > the office software, available _only_ on M$ platforms > creates a self-perpetuating juggernaut: no other OS can > even begin to make market penetraton without the key > product (office s/w) --and people are not willing to > learn a new application-- that's just human nature. Attlia - you'd probably enjoy reading "Barbarians Led By Bill Gates", a recent book by some MS ex-insiders on how MS became what it is. Windows 3.0, for instance, wasn't supposed to muscle out OS/2, but the developers of Word/Excel/Powerpoint (which they originally wrote for the Macintosh) got better development/porting support from the small group of developers on the low-status backwater leftover Windoze team than from the high-profile IBM OS/2 partnership, and Win3.0 was ready to ship when they were, unlike the upcoming insanely great next version of OS/2. When it sold a million copies in a few months, Gates had to deal with it, and suddenly Windows became a strategic product again, and gradually OS/2 became the leftover. > is using his cash cow, swollen by gouging the consumer, to Gates has only gouged consumers by selling us crap which we buy, either because we need compatibility with other users of their products, or because we work for big companies who have centralized decision- making droids who buy it. Better than Gates tells my corporate droids what to buy than Janet Reno, Louis Freeh, or FCCmeister Kennard. Not only do they have even less taste, but they'd solve the problem by taking a long time to do the spec, which wouldn't have enough details to interoperate with anything except the National Information Infrastructure Data Entry Escrow Protocol. Personally, I disliked WordPerfect immensely (though I last used it back when it and MSWord were character-based), and Word has acquired enough features to be about as flaky and unpredictable as WP was back then. Excel is friendly, and I don't use s preadsheets enough to prefer something else. Powerpoint reeks, and the integration between Word and Powerpoint reeks badly. > acquire _significant_ interests in industries which use > computers: cable networks, cellular networks, satellite > networks, etc. and related industries dependent on > communications: news (MSNBC), television, productions, Good for him - would you rather he spent the money acquiring other parts of the software industry or Seattle real estate? He also spent a pile of money trying to outflank the Internet with MSN, and lost badly. Are you still running Microsoft BoB? Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From waters at ultimateprivacy.com Mon Jun 29 11:36:54 1998 From: waters at ultimateprivacy.com (Bryan Waters) Date: Mon, 29 Jun 1998 11:36:54 -0700 (PDT) Subject: Finally... a One-Time-Pad implementation that works!!! In-Reply-To: Message-ID: <199806291836.OAA02926@omniwork.com> At 05:49 PM 6/27/98 -0400, Geoffrey C. Grabow wrote: >-----BEGIN PGP SIGNED MESSAGE----- > >TriStrata has announced that is has a product that provides OTP without the >pad distribution problem. The product also has a unique key-recovery >system. Check out: > > >http://www.tristrata.com > >for details. > I wish there were more details. Namely how they generate their 10^30 byte "virtual keystream". In order to be a true one-time pad the keystream needs to be completely random, this looks more like a psuedo-random stream cypher to me. But it should be fast and still might be secure. As a competing one-time pad vendor I don't want to be a pot calling the kettle black, but If I've learned anything from the cypherpunks, it's prove it. Which is what we've tried to do. Bryan Waters http://www.ultimateprivacy.com Director of Marketing Voice: 512-305-0505 Fax: 512-305-0506 Ultimate Privacy Corporation 3925 W Braker Ln #305, Austin, TX, 78759 From lreed at west.cscwc.pima.edu Mon Jun 29 11:55:25 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Mon, 29 Jun 1998 11:55:25 -0700 (PDT) Subject: Dina Moe Hmmm... - SPACE ALIENS HIDE MYDR Message-ID: <009C86DD.7C367360.5@west.cscwc.pima.edu> Dina Moe Hmmm... - SPACE ALIENS HIDE M DRUGS!!! ____________________________________________ >Return To Sender: ElvisImpersonatorChainsawMassacre at mccullagh.stihl >Return Of Server: MX%RodLaver at west.cscw.pima.edu >Date: Fri 13(*2) June 1998 ; 7:09 am/pm >Subject: Hmmmm... > >"So what prompted you to start writing those missives to cypherpunks?" > >Rectum McCullagh-Caulkin >(aka Tim C. May, Sir Stan Sequin, Joicho Ito-Dogs, No Body, > AnEnvelopeManufacturerToBeNamedLater, Nanny Anna Mess, etc.) On the advice of my lawyers: GoDoG & DoGoD, Attorneys At Law & Lawlessness, Alpha & Omego Building, Suite 16, Nymphomani aks, N 010101 I have decided to tell the Truth, the Whole Truth, and also a variety of Half-Truths, leaving it up to the responedent to decide what level of truth HeOrShe can deal with without becoming despondent, thus putting even more of a burden on the American R&D Department's booth at Juxtaposition '98 in their competition with the Japanese L&R Juxtaposition '98 Booth, widely rumored to have been behind the Abraham Lincoln assassination. In other words, your chances of getting a 'straight' answer are comparable to the lengthy discussions in regard to the 'dick' of a President whose name isn't even Richard, in the first place. In defense of my rudimentary rudeness in replying ridiculously to a perfectly reasonable and seemingly serious question, I must admit that my intentions to provide an equally serious response to the question above were thwarted by the intervention of a HigherPower- CapableOfSquaringTheShitOutOfJason, in a process providing pretty persuasive proof that the CranialConsipiracyCrapola I am about to provide for your non-racist, but nevertheless discriminating, mind, is nothing more nor less than as honest and direct anwer to your question as I am capable of giving, given the grandoise nature of the nature of the claim I am about to stake claim to, not as a Wooden Indian nor a Vampire, but simply one who is driven by Forces of Light and Darkness that are not only beyond my Ken to understand, but also beyond the Barbie Wired to the MeatSpace Manifestation of the magazine which was ultimately responsible for my ultimately sending my intimate informational infatuations with CypherPunks Issues, whether digital or organic, to the Disturbed Male LISP. In short, it is those depraved motherfuckers at Wired Magazine who must ultimately be held responsible for my continued spamming of a SingleInnocentCypherPunk (TCM-aka Bill Helm-RadiationMan III, Forever Hettinga, Politician Lefty Frissel, ChevyBlazer FloorMatt, and Peter SonOfTheSumOfOneAndTuTuBeNamedLater.) The True Story (TM) of why I originally subscribed to the CPUNX Cardinal & Ms. Spelling LISP has been confirmed by the Nine UnKnowing to be the result of a subconscious desire to destroy the Band of Mary Anarchists by forcing them to band together, forming a well-organized and tightly-knit political organization dedicated to eliminating me from both DigitalSpace and MeatSpace. In draw-string shorts, to yank the CPUNKS cotton chains and expose their private parts in a manner that would leave no doubt about the fact that the Magic Circle of WhiteLipstick around all of the 'members' provides postive proof of the accuracy of Dr. Dimitri Vulis, KOTM's contention that Nun of the CypherPunks were born female, and that they are not, in fact, Anarchists, but merely LostBoys from Lost Alamo who are alone in the world because they cannot accept the diagnosis of Dr. Stephan Goodman, who theorizes that they are "men who love men, every now and then," to whom the phrase, 'blow it out your ass', has more meaning than it does for most people. [Spin Editor: What the Author *meant* to say, is that, as a result of being the subject of Direct Electrical Shock Radio Experiments during his youth, he soon learned that, unless others in the room were gathered around the radio, the correct answer to the question, "Do you hear Voices?" is an emphatic "Nope! Not me...nosiree, Bob. Nope...not me!"] What the Spin Editor *meant* to say, is that my early exposure to the True Agenda (TM) of the MindPolice left little doubt in my mind (little of practically *anything*, actually) that one's career as a TruthMonger would allow them to keep their head longer with a 'CourtJester at dev.null' alias, than as "AnneBolyne at head.null', particularly if the name of the person saying "I'd just like to ask you a few questions." is OffWithSir Head, or who holds a position titled 'Head Doctor' in a non-medical surgical facility. To make a short story long, with a bend in the middle, Dog spoke to me in a Stream piped through the fillings in my teeth, and told me that there was one who would come before me, to prepare my way, who would be a 'voice lying in the wilderness', telling the masses, "I am a messenger for one who will come after me, who is (a) greater (bullshitter) than I, sent by Dog to sniff the rear parts of the front-men posing as wolves, in wolves clothing, who say 'What big teeth I have... the better to make you render unto Ceasar, that which you mistakenly thought was yours." Long before the Starr appeared over DC, I knew that the Virgin Birth of William Lewinski would never have taken place if there had not been no room for burning the double-negatives in the Ovulate Office which told the True Story (TM) of what had taken place in the Lincoln bedroom as a result of a sexual Jones that the King of the Juice could not satisfy, no matter how large a vein he punctured in women, or vice versa, with his dirty needle. Upon purchasing a copy of the Wired Magazine edition which had the Jasons of CypherSpace on the front cover, with an article accompanying it which I did not bother to read, instinctively knowing that their Goal was to XOR the Net, so that after Jesus Saves, Louis Freeh would not be able to put in the rebound, yanking a man's parole as a result of Space Alien FUD indicating he had participated in the VirtualNuclearBombing of pubic buildings eleven KILLometers from MongerItaVille. Knowing that, even though "Ignorance is no excuse." in the 'ayes' of a Rigged Justice System, it is better to remain silent than to speak up and remove all doubt as to one's guilt, I merely glanced through the copy of Wired sufficiently to confirm the Marshall Dillon theory that smoking guns doesn't kill people, the Message kills people, or, more accurately, that the Department of Justice people covering up the INSLAW affair killed those on the List of Adrian Messenger, and then put the magazine away in DeepThroatStorage until Dog, the only Horse I ever bet on (although I have shot a lot of Horse over the years, sometimes on the basketball court, sometimes in a seedy alley behind the GreyHound Computer Buss Station), gave me a No Smoking Gun sign, with the election of a Wise Man who rose from the dead three times, as LazerAss Long (cousin of Johnny Wadd), drinking cold HeinleinKin, playing the SexAPhone at $4.99/minute, running up the WhiteHouse phone bill and the Federal Deficit, and making such outstanding use of BlatantLies that his Pole rose in the Polls at a rate that astounded even Poles named Lewinski, leading me to realize that, had I, like Marlo Branded, the Rifleman on the grassy knoll, despite my reputation as a traitorous, lying coward, followed my instincts and run for President of the United States of America, "I could'a been a contend'a..." My point, if I may be so Bold (although without Italics, having never been to Sicily) to state it plainly (without extra cheese), is that Lucky Green is a fucking idiot... He is such an ignorant, Robotically Programmed Sheeple, incapable of free, independent thought, that the only possible way to accurately impress upon you his total devoidness (coming soon to a dictionary near you) of hope in ever truly understanding the concepts of True Freedom, Liberty and the Pursuit of Felony Happiness, can be illustrated only by sharing with you the "True Story (TM) of TruthMangler", Penguin Books, FrostBack Division. 'The True Story of the InterNet' when stripped of all of the grandoise, pretentious, mystical FUD surrounding its artificial dissemination across HyperSpace, can be summarized by quoting "All My Lies Are True", by Carroll. "All my lies are true. And everything I do, I really am." Believe it or not, Ripley, that's all there is... That's the whole fucking poem. In the end, that's all there really is to say. Upon receiving an email from AnInterViewerToBeNamedLater, who was named earlier, in the 'BumBoy III' chapter of Space Aliens Hide My Drugs (which, correctly, should also have single quotes around the title), I was quite prepared to write a short, simple response to the question, "So what prompted you to start writing those missives to cypherpunks?" As always, the fillings in my teeth convinced Reality to become a participant in an Intervention program designed to thwart my efforts to continue the heavy drug-use enabling me to be 'normal' and 'saved' me from sanity by using the TV program, '60 Minutes', to embody The Voice (TM) coming from the BurningBush, calling for a "New World Order", reminding me that the BurningBush in the bunker outside of Berlin was a clever ruse, later to become a 'play on words' in a Braun Shaver advertising campaign that referred to a 'close shave', to disguise the fact that it is the AdamAntartic that holds the key to FrostBack Musicians embedding hints in their music in regard to the Reptilian Nazis biding their time, emerging from Florida puddles to dine on the gonads of FrenchConnection Poodles, leading me to realize that I forgot to mention how my insanity illustrates Lucky Green's ignorance. (But, before I return to that subject, I should take the time to explain that this disjointed '60 Minutes' diatribe refers to the fact that my efforts at a 'direct reply' to D.M. Stihl's question was interrupted by a sychronicitious eruption from The Tube ("Watch me and I'll bleed you, 'Cause you eat the shit I feed you") during which Leslie Stahl (not to be confused with the chainsaw with a similar name), presented a piece called 'The Rumor Mill', in which she ignored the attempts of InterNet Magazine's Edwin Cantor (?) to explain that the Freedom Of The InterNet was a Healing Force capable of returning HumanKind to a Wholistic State wherein we use our minds to discriminate between FUD (Fear/Uncertainty/Disinformation), MUD (Mind/ Uniformity/Disinformation) and CRUD (Conscious Realists Using Discrimination), thereby forcing the InterNet User/ Consumer to actually Think (TM) before accepting any of the information that is pulled, prodded or pushed into the range of their perceptive attention... Hang on a second, I lost my train of thought... Oh, yeah! Anyway, Leslie Stahl, desperately attempting to maintain the illusion that MainStream Lies piped through the OfficialNewsStream are preferable to Non-Officially- Recognized-Lies on J. Orlin Grabbe's 'World's 50 Greatest Conspiracies' website, subliminally inserted the bent logic of the pricks in DC, using words such as Junk/Regulation/ OnLinePoliceMan(no mention of toilet plungers...go figure)/ BadInformation... Fuck completing that train of thought! 'BadInformation' implies that the Freedom To Choose To Believe BadInformation does not exist, and that NetiZens, like CitiZens, are all Sheeple who need the people from the government, who are here to help us, to step in and regulate/legislate which BadInformation will be magically transformed into Reality by blessing it with the OfficalSealOfApproval. Random Thought That MayOrMayNot Apply #27: Question: "Who was not happy to see the Prodigal Son return?" Answer: "The fatted calf." My point is this: "Penned cattle have been found to gain as much weight when fed a combination of drugs, shredded newspaper and animal excrement, as when fed whole grains." Therefore, it is not in the best interests of the ProfitMongers to feed us the Truth, and, CitiZen or NetiZen, it is in our own best interest, when we meet the Bubba on the road, to kill him.) [Idioter's Note: Good prosecutors, recognizing the limited attention span of the spawn of pawns of modern civilization, due to being force-fed ten-second sound-bytes, and hyphenated words designed to evoke emotive responses rather than logical thought processes, would have long ago begged the Court Of Public Opinion for a short recess, in order to allow the Readers/Jurors time to grab a bite to eat, suck down a cold beer or two, and engage in sexual fantasies about their fellow jurors. However, the Author plans to proceed, uninterrupted, even though HeOrShe risks once again letting the SAHMD manuscript fall into semi-coherent mad ramblings, since HeOrShe realizes that, if the Reader has not yet learned to order Pizza, Beer, and AMasseuseToBeMaimedLater before undertaking the burdensome task of reading the True Story manuscripts, then they are most likely a goddamn Republican, anyway, with little hope of ever truly understanding a missive meant to manipulate their mind toward a realistic, non-discriminatory political point of view which can only be understood by Democrats who are willing to sit in the back of the bus with niggers and spics, although they inevitably shit their pants and jump back on the bus if one of those thieving fucking darkies happens to get off at the same stop as they do.* *This racist interlude is a paid advertisement, sponsered by Democratic Friends of the Kluless Klux Klan. Anyway, I have forgotten where this aside was going, but I just remembered I was attempting to get back to explaining how my derision of Lucky Green is, in reality, a veiled reference to my own idiocy, so I will do that...] I was devestated when Lucky Green, wearing a Prozac T-Shirt, while I, on the other hand, had a pocket full of Prozac, told me, "I read 'The Xenix Chainsaw Massacre', but I didn't understand what it was about." I was devastated as a result of realizing that Lucky was nothing more nor less than a mindless, robotic result of the *new* generation of programmed, robotic Sheeple. I was devastated because Lucky was a reminder that, despite my great pretensions of being an anarchistic, free, individual, capable of independent thought, I was just as guilty of unthinking automatism, with the main difference between myself and Lucky being that the programming I had bought into had tailfins and cruise control, instead of point-and-click and multimedia capability. In effect, although I considered myself some exemplary example of the evolution of mankind (usually remembering to refer to 'humankind' to illustrate my UniSexual/NonRacist/Politically Correct rEvolutionAiryFairy development), I was actually a fraud--not a TruthMonger, but a JokeMonger. While allowing myself the luxury of consternation over Lucky Green being of a GenerationX which could not recognize the prophetic warnings contained in 'The Xenix Chainsaw Massacre', due to having been educated in an era where the 'BB/BB' tattoo on a child's forehead, indicating that one was a BumBoy owned by BigBrother (replacing childhood circumcision indicating that a child was owned by the GodOfMoses), I nonetheless comforted myself with the thought that *my* cowardly acceptance of 'the way things are', illustrated by using my sense of ironic humor to poke fun at things I knew to be insane, instead of taking a firm, serious stand that ultimately results in crucifixion, in Palestine, or to being barbequed, in Texas (see...there I go again), was somehow superior to the cowardice of Lucky's generation, which gives Non-Sexual LipService to freedom, privacy and anarchy, while preparing for an old-age where they will undoubtedly justify their lack of total committment to fighting the GreatEvil of their time by saying, "es, but when the Computer was Fuhrer, the trains ran on time...until the year 2000, of course." I, like Lucky and the rest of the CypherPunks, told myself that the problem was Dimitri, always trying to push Black Unicorn's envelope, and not accepting my excuse that I wasn't really a cocksucker, but merely accepting of the fact that BigBrother had a lot of mouths to feed... [I know that I've rambled on too long to really hold the attention of a generation that traded in twenty-minute guitar solos for a Pentium processor, and really don't have time to wait for me to get to the point of what I am trying to say (despite their refusal to admit that the only reason they need a Pentium processor, in the first place, is to speed up the downloading of the ads on the Anti-SPAM Anarchist WebPage they are accessing, not to mention the mountains of excess commas contained in the 'True Story' manuscripts...). However, I need to run to the Liquor Store, giving the soft-drug old farts on the CPUNKS list a chance to "smoke 'em if you got 'em," (<--correct punctuation, will wonders never cease?) and the young pissants on the CPUNX list a chance to throw on a New Crusty Nostrils CD, 'Ramblin', featuring 'Green, Green', (<--incorrect punctuation) little realizing that the USENET post referring to the album as the product of a CypherPunks Action Project first appeared on April 1st, and that Lucky wasn't even born when it was recorded. BAD NEWS!!! - I'll be back...] From caj at math.niu.edu Mon Jun 29 13:35:07 1998 From: caj at math.niu.edu (Xcott Craver) Date: Mon, 29 Jun 1998 13:35:07 -0700 (PDT) Subject: Finally... a One-Time-Pad implementation that works!!! In-Reply-To: <199806291836.OAA02926@omniwork.com> Message-ID: On Mon, 29 Jun 1998, Bryan Waters wrote: > >TriStrata has announced that is has a product that provides OTP without the > >pad distribution problem. The product also has a unique key-recovery > >system. Check out: No pad distribution problem, but it has a key-recovery system, AND the pad is truly random? > >http://www.tristrata.com > > > >for details. This must be a typo: that URL doesn't contain any details. > I wish there were more details. Namely how they generate their 10^30 byte > "virtual keystream". Which brings up one more point: the web page mentions the estimated time it takes to "defeat" an encrypted message, via brute force. If it really was a one-time pad, it wouldn't be possible to "defeat" it by brute-force. -Caj From sunder at brainlink.com Mon Jun 29 13:58:20 1998 From: sunder at brainlink.com (Ray Arachelian) Date: Mon, 29 Jun 1998 13:58:20 -0700 (PDT) Subject: Finally... a One-Time-Pad implementation that works!!! In-Reply-To: Message-ID: <3597FEA9.19A7D5D3@brainlink.com> Great... more snake oil.... :( Geoffrey C. Grabow wrote: > > -----BEGIN PGP SIGNED MESSAGE----- > > TriStrata has announced that is has a product that provides OTP without the > pad distribution problem. The product also has a unique key-recovery > system. Check out: > > http://www.tristrata.com > > for details. > > **************************************************************************** > ************* > PGP 5.5.3 Fingerprint: 15B3 DDC1 93BB 4BDF 4DFD 1B27 12A1 E0C4 > **************************************************************************** > ************* > > -----BEGIN PGP SIGNATURE----- > Version: PGPfreeware 5.5.3i for non-commercial use > > iQEVAwUBNZVo5dc2wHb8nZI1AQFqngf/bCJVbMQX/5sYb181CLONmqWjPzhQ66Ef > HoyPqxRzEyq4FSWnIuQODH/YTeyyQROUqCZGhC19v8PCiZpI1ynSvn4i+Zcjv9I0 > OZBThzKayNoMne7TkNr49Ah9BwDK6XuwS9bns1xM65zfKLpvKP2gboWkADD52K4w > eUuJx/cTaR7PgdO/q6nrVRNq1jlaJsFBKGt2q5E1S12ZK1nA+mpKAS95XMgr2IMx > 5/wJ+jsOIUTn2gWR64nhluOgmcACeIVsiRlsGqfUdL8gJHAl0gaQ7E1+HSOBx60K > Ur5x5MzQKBKlWcoDaEXB1AsICW2enwdGVOxPBklq1CbcQxFXdBj1DQ== > =vZmi > -----END PGP SIGNATURE----- -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From lreed at west.cscwc.pima.edu Mon Jun 29 19:13:58 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Mon, 29 Jun 1998 19:13:58 -0700 (PDT) Subject: Diana Moe Hmmm... - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C871A.C38D9E40.5@west.cscwc.pima.edu> Return Of Beyond The Planet Of The Valley Of Diana Moe Hmmm... - SPACE ALIENS, ETC., ETC. ____________________________________________ No doubt there are a variety of self-impressed, elitist CypherPunks who have grown used to my weird capitalization of the word 'cypherpunks', as well as my excess use of commas, and incorrect punctuation, having come to recognize that these things are part of my personal 'writing style' (although few realize that, being too lazy to look up proper spelling, and too ignorant to understand the reasons behind 'correct' punctuation, I am merely cloaking my sloth and stupidity under a croak of eccentric Oriental genius). However, there are undoubtedly a few egoistical self-proclaimed geniuses on the CypherPunks Disturbed Male LISP who have noticed the 'Dina' spelling of the last chapter title being out-of-sync with the 'Diana' spelling of the current chapter title (see above), and mentally ridiuculed me as really being the sorry drunk I keep claiming to be, thinking that I am only dimly aware of the difference between my drunk&ignorant-but-honest typos and literary mistakes, and the typos and mistakes which I quickly recognize to have deep meaning, and are therefore inviolate proofs of my true inner genius, in need of no correction, even if I happen to spot the error. If you noticed the discrepancy mentioned above, and were indeed mentally degrading my literary talent, while considering yourself to be superior to me because of your ability to imitate a robotic computer spell-checking program, you would, in this case, be quite correct in your assumption, since it was really a meaninless mistake, but one I will not bother to rectify, since I am currently both lazy and drunk. However, you smart-ass sons-of-bitches, it would be a serious mistake to fail to realize that my failings in character in no way negate my obvious intellectual superiority over all of the pretentious fools who consider themselves part of an elite group of PseudoMathematicalGeniusAnarchists because of their participation in Legendary LevelWithTheGround InterNet Community MailingList Composed Of Subscribers Who Are Using 11% Of Their Potential BrainPower, and considering themselves to be 'above' the other InterNet Elitists who are using only the 'documented average' 10% of their potential brainpower, and who, in turn, consider themselves to be superior to the AOL'ers who believe that their IQ is somehow related to the speed of their computer's processor (NOT!!!). The short and simple answer to the question, ""So what prompted you to start writing those missives to cypherpunks?" is: "On a mailing list of elitist geniuses using only 11% of their potential brainpower, the person using 12% is King!" Thus I am able to toy with you silly fools, having little fear of someone who uses 13% of their brainpower subscribing to the CypherPunks list, and putting me in my place, since a person capable of using 13% of their brain would likely be above joining the list in the first place... Why I Send My Missives To The CypherPunks List #327: I truly recognize the past, current and future subscribers to InterNet forums/experiences such as the CypherPunks to be the only real hope for a world of VirtualReality to rise above and go beyond the vicious MeatSpaceRealityCycles which are evident throughout millennia of human history. Thus, I feel it incumbent upon myself, as your intellectual superior, to impress upon you what an ignorant, silly asshole I am... ou stupid fucks think I'm being silly, again, don't you? I'm fucking serious!!! While I truly consider myself to be the current epitome of human evolution to this point in time, I would, nonetheless, upon being recognized for my great wisdom and genius and declared King Of The World, issue a press statement advising everyone to kill themselves, since a world under my control would be a scary thing, indeed. As far as the world currently being under the control of murderers and thieves who seem to have a lot of trouble figuring out some of the more rudimentary things in life, such as pulling up their fly upon entering the Offal Office, I really prefer not to think about that, which I am sure can be understood by voters in Boston, Chicago, ad infinitum, who eventually figured out that the slogan, "Vote Early, Vote Often" was not really a part of the original Constitution, as their Ward Bosses had claimed. The Original Peter Principle: Civilization and Human Behavior provide hard evidence that Creatures From The Primordial Swamp who crawled out to become Middle Managers in the Gene Pool did so about a billion years ahead of schedule. The Original Clinton Inaugural Address: "Most of my time, energy and money was spent on women, booze, drugs and gambling--the rest I just wasted, eventually becoming Governor, and then President." The Original Commandment: "Buy a fucking Clue!" I guess that what I am really trying to say is, "As insane as it would be for you to vote for me as the new King Of The World / Ruler Of All That Exists / New World Order Dictator, etc., etc., it would be even more insane for you to *not* vote for me if I was running against the people currently in control of our governments and society. Why I Send My Missives To The CypherPunks List #18: My only hope of being understood when I say, "I may be a stupid fuck, but at least I'm not a stupid fuck." lies in preaching to an audience that has the ability to understand that ogi Berra's statement, "It's DejaVu all over again." was nothing more nor less than A DirectMessageFromGod, designed to serve as the Cole's Notes To Universal Human History From The Beginning Of Time, in a format that would allow us to write it on a slip of paper we could tuck into the elastic of our panties, in preparation for the FinalExam. True Initiates into the Mythical Circle of Eunuchs have long understood that my obsession with peeking up women's skirts is not the result of sexual depravity, but a highly spiritual exercise in recognizing the difference between the masses of Sheeple who truly benefit from the advice to wear clean undergarments, in case they get hit by a bus, and those whose unique, individual spark of life allows them to recognize that they can step beyond society's strict moral programming by not wearing any undergarments at all. Although I am currently up to my ass in drunken alligators, I am still capable of remembering that my original objective was to drain the Scotch... And The Way This Relates To Craptographics Is: What is encryption, if not the epitome of the Anarchy Of Meaning? David Byrne, Largely Suited to serve as the Talking Head who *could* be the originator of the Voice we hear, asking us, "Psycho Killer, Qu'est Que C'est?", if we actually owned a radio, understood that when Bob Dylan sang, "Johnny's in the basement, mixing up the medicine...", it was an oblique reference to Owsley developing a chemical technique to thwart the MindPolice by using LSD to encrypt one's thought processes. The Moody Blues, recognizing that the hippie movement arose in response to Freedom and Privacy being threatened by a GreyHound Restroom Public Key System that could be broken by anyone with a dime, warned us that Timothy Leary, sick, depraved pervert that he was, was 'outside, looking in', alerting us to the fact that 'Free Shit' was nothing more than a corporate advertising ploy by NewAge Gurus who wanted to save the cost of a dime while buggering us, by telling us we may have won 'Free Film For Life.' Phil Zimmerman, Hero Of The TellGovernmentToSitOnItAndRotate Revolution, provided us with the tools we needed to have a genuinely Free Shit in Pretty Good Privacy, enabling us to lock the door while we crapped out our pearls of wisdom, while the anal-retentive government agents on the other side of the restroom-stall door dropped their dime, upon finding out that the cost of peeking up the public's butt had risen exhorbantly, due to those fucking California Hippie Trouble Makers slipping 'acid' in their email. The point that I probably would have made much earlier in this chapter, were it not for the fact that I am a drunken, inconsiderate asshole who fails to realize that *some* people have better things to do than to waste their time wondering where the fuck I get all of these goddamn commas, is this: Anarchy is our only hope... Surely anyone who has been paying attention to life around them could not have failed to realize that if society elects some bum going through the dumpster, to look for lunch, to an official government position that designates him to be the person responsible for removing doggie-doo from the city streets (no salary, but all you can eat...), he soon declares that he needs more money and a larger staff to do his job properly, funds research indicating that dog owners are a threat to Family Values, Apple Pie and the American Flag, presses for Law&Order legislation adding Thirty-Five Dog ears to the sentence of any Monger or Mongrel who is found guilty of 'squatting' in commission of a poop, and calls for the censorship of 'The Doggie Of Anne Frank' because of its graphic descriptions of FIDO crapping in a secret room in the attic, to avoid discovery by the DoggiePoop Gestapo. If you think I'm being a WiseGuy, then think again, because, if memory serves me correctly, this was the lead headline of News Of The Weird last week, even though the original source for the article was on page 4,385 of the New ork Times. The first act of organized religion was to fuck up the Lord's Prayer. Anarchy is our only hope... The first act of organized government was to raise taxes so that they could give themselves a pay raise. Anarchy is our only hope... It is a knee-jerk reaction to bend over to pick up the soap when somebody drops it, but it doesn't matter *who* fucks you, it doesn't matter *how* they fuck you, *when* they fuck you, or *why* they fuck you...the bottom line is this: If you remain silent, ignoring the pain and indignity, listening to the still, small voice of the Tao, you hear the Voice of Eternity echoing from the birth of time to the death of the ten-thousand things, whispering what was shouted by a great ogi, upon realizing that the BigBang was actually a FistFucking KnuckleBall headed Hell Bent For Leather (a California company) toward the Great Void where the sun don't shine...you hear the Tao bend over and whisper, "It's DejaVu, all over again." Anarchy is our only hope... Dr. Seuss Explains Sex To Children During His Prostrate Check: After God created Adam, he took a bone out of Adam's side and created Eve. The first thing Adam did was give Eve another bone-from behind, as he wanted it to be a surprise. If two people exist on the face of the planet, then, as surely as night follows day, one of them is going to get fucked. Anarchy is our only hope... LIFE IN HELL Goes Country: If you can see two assholes on a horse, without lifting its tail, then it is a good bet that they are voting to steal your money and your freedom. Anarchy is our only hope... We live in a world where, in a country in which starving children are dying by the millions, the greatest threat to those who manage to survive a FamineInTheMidstOfPlenty is the ArmySurplusLandmine Company's 'Democracy' model, which is guanteed to blow the limbs off of terrorists and freedom- fighters, men, women and children, without discrimination as to race, creed or color, although the guarantee clearly states that it is not the responsibility of the manufacturer to see that it serves the purpose for which it was originally intended, according the color-glossy brochures distributed by retired armed services officers now making the BigBucks as DC corporate whores. "The Democracy Model Landmine" "Our most popular item, due to the billions of dollars in advertising given to its name through the use of taxpayer money being spent by unelected entities, both within and outside of government circles, was built and designed by highly qualified engineers and technicians to 'Save The Life Of A Single Child.' "As you can see from the pie-charts below, a computer simulation showed that a minimum distribution of a hundred units per square mile is sufficient to save the life of a single child, providing that the child is not so unfortunate as to accidentally step on a landmine." Anarchy is our only hope... [GOVERNMENT REQUIRED NOTIFICATION:] This chapter of 'Space Aliens Hide My Drugs'is a paid advertisement for the Bienfait Nutly News "Anarchy Is Our Only Hope' Christmas Special, available in boxes of individually-wrapped 1's and 0's (in quantities of 8, 16, 32, 64...) The perfect gift for grouchy old farts who still have the box of Pecans you sent them last Christmas, because they put their dentures in their shoes, and they can't find their godamn shoes, and when they asked for help in a post to the CypherPunks list, they got a hundred anonymous emails from assholes telling them to, "Check the archives." From cme at acm.org Mon Jun 29 21:20:05 1998 From: cme at acm.org (Carl Ellison) Date: Mon, 29 Jun 1998 21:20:05 -0700 (PDT) Subject: change of address Message-ID: <3.0.3.32.19980630001829.04c56ee8@pop3.clark.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I am moving from CyberCash. Until I get the new work account set up in a month or so, please replace cme at cybercash.com with cme at acm.org Thanks, Carl -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.5.3 iQA/AwUBNZhnFJSWoQShp/waEQJYKwCeIDZe9E67VOL2fin2L2unLYJfhCQAnRfL HFncaiI5a/n/rpBAEO2zgavF =pU5t -----END PGP SIGNATURE----- +------------------------------------------------------------------+ |Carl M. Ellison cme at acm.org http://www.clark.net/pub/cme | | PGP: 08FF BA05 599B 49D2 23C6 6FFD 36BA D342 | +-Officer, officer, arrest that man. He's whistling a dirty song.--+ From netcenter-news at netscape.com Mon Jun 29 22:39:42 1998 From: netcenter-news at netscape.com (netcenter-news at netscape.com) Date: Mon, 29 Jun 1998 22:39:42 -0700 (PDT) Subject: Netcenter News - Volume 8 - July 1998 Message-ID: <199806300539.WAA26479@toad.com> Title: Netscape Netcenter News - July 1998 Welcome to Netcenter Netcenter is dedicated to the proposition that you should be able to find everything you need online in one place. This newsletter is one of the free benefits you receive for registering with a Netcenter program. Employers! Job seekers! Post a job or resume, browse job listings, promote your company, or get career information easily with Netcenter's new Career Center. A beta version of Netscape Communicator 4.5 will be available to the public in early July. This latest version of Communicator will include improvements such as Smart Browsing as well as enhanced messaging and roaming access. A 1998 SPA Codie Award Winner, Netscape Publishing Suite is now just $49.95 ($129.95 value). Get MasterClips 33,000 or Net Accelerator for just $10 with purchase. Netscape respects your online time and Internet privacy. If you would prefer not to receive the monthly Netcenter News, please go to the Netscape section of In-Box Direct and uncheck the Netcenter News item. You may also, click here to send an unsubscribe email or reply to this message with the word unsubscribe in the subject line. Copyright � 1998. Netscape Communications Corporation. All rights reserved. NETSCAPE NETCENTER: YOUR SPRINGBOARD TO THE INTERNET Jump from here. That's the launch-point attitude at Netcenter's new Internet portal. Starting in July, Netcenter will incorporate 16 new business and consumer channels, along with a variety of new services. From downloading software upgrades automatically to sending flowers, Netcenter channels offer immediate access to goods, services, and a wealth of information. Among the new services, Smart Browsing is designed to help you navigate the tricky waters of the Internet. With Internet Keywords, simply type a word such as "Ford" and blast to Ford's site. What's Related displays a list of dynamic links to related sites - great for online research or shopping. Netscape Search & Directory boosts your searches with a complete line-up of search engines in one location. Use My Netscape to design your "home on the web," a personalized home page that displays the information you use every day - news, stock quotes, sports, and more - the moment you log on. WebMail, Netcenter's free email service, allows you to respond to messages automatically and to integrate your organizer's address book with your email. Members can scan incoming attachments for viruses and even be paged when they receive high-priority messages. Netscape Netcenter. Dive in - the water's fine. SmartUpdate is expanding! Netscape has signed agreements with more than 20 leading software companies to make their products available, free of charge, for automatic download via the SmartUpdate service. Netcenter members can SAVE $10 on all software at Netscape Software Depot by software.net. Limited time offer! Join Member Directory and choose your Netcenter member name now - before the Netcenter 2.0 rush. Then, search for friends or new acquaintances. Thanks to everyone who took part in last month's survey about online communities! Here is what 2000 of you told us: In general, newsgroups and instant messaging are more popular than chat. Only 15 percent of you hadn't tried any kind of online community. Of those who do visit communities, 44 percent go daily and 20 percent go several times a day. The thing you like most about your visits is the ability to see what other people are thinking. The most popular forum in Netcenter's Professional Connections is the Product Center. This month's survey is about customizing web pages. We invite you to tell us what you'd like to see in a personalized home page! From cyp at cyp.dcl.com Mon Jun 29 22:54:58 1998 From: cyp at cyp.dcl.com (cyp at cyp.dcl.com) Date: Mon, 29 Jun 1998 22:54:58 -0700 (PDT) Subject: Info on Jim Bell Message-ID: <435jfhdhfds3dcl.com> Jim has been arrested again and he is in the Federal Detention Center at Seattle. Jim wants people to write him at: James Bell #26906086 Federal Detention Center P.O. Box 68976 Seattle WA 98168 From m_harlow at villingandcompany.com Mon Jun 29 23:31:33 1998 From: m_harlow at villingandcompany.com (Matt Harlow) Date: Mon, 29 Jun 1998 23:31:33 -0700 (PDT) Subject: Marketing, Advertising & PR Forum Message-ID: <001401bda318$509c3900$58062bd1@mattharlo.qtm.net> I recently started a mailing list for the marketing, advertising and PR industry. We've already got over 100 subscribers from all over the globe. The conversation is really flowing now and we're ready to expand. So far we've have touched on office politics, how to's, compensation and critiques of national campaigns, job openings and a whole lot more. We'd love to have you on board. All you need to do to sign up is send an email to the address: requests at mail.villing.net with the subject of: SUBSCRIBE DIGEST MATT to receive the a daily digest or SUBSCRIBE MATT to receive individual emails Also, please do me a favor and copy me at M_harlow at villingandcompany.com if you sign up. That way I know to add your name to the roster. Hope to see you at the forum! We're getting some great exchanges and I'd love to get you in on them. Feel free to pass this message on to anyone you feel might be interested in the group. Sincerely, Matt Harlow P.S. If you're already signed up or if I've recruited you before, Sorry! It's tough to recruit for a project like this and sometimes I get a name twice in my efforts not to miss anyone. Matt Harlow Account Executive Villing and Company 3900 Edison Lakes Parkway, Suite 100 Mishawaka, Indiana 46545 Work: Email: m_harlow at villingandcompany.com, Phone: 219-277-0215, Fax: 219-277-5513 Home: Email: mattharlo at qtm.net, Phone: 616-683-2599, Fax: 616-684-4765 From specialnews4u at usa.net Tue Jun 30 01:16:36 1998 From: specialnews4u at usa.net (specialnews4u at usa.net) Date: Tue, 30 Jun 1998 01:16:36 -0700 (PDT) Subject: PERSONAL NOTICE Message-ID: <199806300816.BAA27797@toad.com> HI. I APOLOGIZE FOR THIS INTRUSION , BUT YOU MAY THANK ME FOR THIS . COULD YOU USE AN EXTRA $ 25,000 NEXT WEEK ? THEN GIVE ME ONE MINUTE OF YOUR TIME... IT MIGHT BE WORTH A MILLION DOLLARS Dear Friend, My name is David Ross and I need YOU. Let me explain I reside in an island paradise . I entertain on a 75 ft. yacht . I travel the world by private lear jet . I drive 8 cars including two Ferraris, a Rolls Royce Corniche and a 1955 gull wing Mercedes worth over a million dollars. I party with supermodels , world famous celebrities and diplomats. Banks are constantly trying to lend me money at prime rates.. but I don't need them any more. However, it wasn't always like this. Until 1995 I was working for the telephone company . I drove a 1989 Chrysler LeBaron and had over $50,000 in revolving debt. It seemed that I would never get ahead and was doomed to be a loser . In my spare time I studied every money making system out there. In fact , I often ordered 10 new money making systems a month. I guess this is one of the main reasons I was so over extended on my credit cards. You could say that my single obsession was investigating profit systems . Then , one day , I was doing research on grants at the library. I accidentally discovered something that all the B.S.money making books never mentioned This simple discovery brought in: $1,876.89 FOR THREE HOURS WORK ! Over the next 5 weeks , I proved to myself that this method worked time after time....EVERY TIME ! Then , at the beginning of the next month, I opened my bank statement. My jaw dropped opened to discover that there was $ 265,832.91 IN MY CHECKING ACCOUNT ! I had discovered a secret program that virtually forced people to give me money ! After a period of 11 incredibly exciting months , I discovered that I had made $ 1,454,742.39 working about three hours per night from home. All without spending a dime on office rent or employees, and while keeping my current job..... which I soon quit after many years ( to hell with the pension and benefits ) . Then I made another exciting break through ! I thought, " WOW.... ANYBODY COULD DO THIS.. IF THEY ONLY KNEW HOW ! " This has lead me to an even faster and easier way to get richer : WORKING WITH PEOPLE JUST LIKE YOU ! I am going to help a few others DO EXACTLY THE SAME THINGS I HAVE DONE ! AND PROFIT RIGHT ALONG WITH YOU FROM YOUR OWN POWERFUL RESULTS ! I've developed a comprehensive , easy to understand PRIVATE REPORT . A complete STEP BY STEP , FOOLPROOF BLUEPRINT FOR YOUR VERY OWN PERSONAL CASH MACHINE THE INSTANT CASH REPORT is just like having a legal printing press to MAKE SERIOUS MONEY ANYTIME YOU WANT ! SIMPLE INSTRUCTIONS WORK FROM HOME , OR ANYWHERE ELSE YOU WANT TO BE. GUARANTEED Are you skeptical ? I understand. So was I ..at first. SO PLEASE ... DON'T TAKE MY WORD FOR IT. SEE FOR YOURSELF TEST IT OUT ABSOLUTELY RISK FREE ! In fact..you WILL be completely convinced that this system WILL make you at least 10,000 times what you paid for the report or I'll send you your money back.. NO QUESTIONS ASKED . EVEN ONE YEAR LATER . GUARANTEED . Frankly, I don't know why anybody would want to waste time .....but I am that confident. Take a full year to TEST THIS SYSTEM and if you're not 100 % SATISFIED during your one year NO RISK TRIAL... I' LL SIMPLY REFUND EVERY PENNY TO YOU. You just can't lose ! SHORT ON START UP CASH ? NOT A PROBLEM ! The administrative cost for personally registering your Instant Cash Report to you is just $ 49.95 And you can put this program to work IMMEDIATELY . Your profits should be rolling in WITHIN DAYS . REMEBER... IF YOU WANT SOMETHING YOU'VE NEVER HAD.. YOU MUST DO SOMETHING YOU'VE NEVER DONE.. AND LETS FACE IT...THE TIME IS NOW . BE AMONG THE FEW TO PROFIT ON THIS AMAZING OPPORTUNITY WHILE IT LASTS I GUARANTEE YOU > The Instant Cash report can be your ticket to A NEW LIFE ..just like it was for me. Obtain the kind of freedom and retirement that you deserve .. Please..forget social security. MAKE IT ALL NOW WORKING FROM HOME JUST A FEW HOURS PER DAY ! But I urge you to act now.. New regulations may soon eliminate this opportunity forever , THEREFORE...TO INSURE MAXIMUM RESULTS FOR MY PARTICIPANTS I AM LIMITING THE DISTRIBUTION OF THE INSTANT CASH REPORT TO THOSE WHO WILL USE IT WISELY AND ARE SERIOUS ABOUT ENDING THEIR FINACIAL CONCERNS .....FOR LIFE ! THIS OFFER WILL BE WITHDRAWN WITHOUT NOTICE. RESPOND TODAY SO NOW ..YOU DECIDE. WHICH DO YOU PREFER ... TO KEEP .WORKING HARD ? .. OR START WORKING SMART ! HERE'S HOW TO GET STARTED WORKING SMART > > Note: You must agree to remit 5 % of your gross revenues from Instant Cash to my company. You nust sign an agreement promising not to divulge its contents to anybody else . Because of the explosive nature of this program, it is necessary to limit distribution . In order to maximize the results for all participants. This offer will soon be discontined without further notice . I urge you to act now . METHOD OF PAYMENT IS BY CHECK DRAFT FACSIMILE ONLY 1. MAKE OUT YOUR CHECK FOR $ 49.95 ( U.S ) TO : ARIEL PUBLISHING GROUP 2. IN THE LOWER LEFT CORNER OF THE CHECK PRINT: INSTANT CASH REPORT ( make sure you sign and date the check ) 3. ATTACH YOUR CHECK TO A FAX COVER PAGE . 4. ON THE FAX COVER PAGE PRINT THE FOLLOWING : ATTENTION DAVID. ROSS DEPT. IC441 PLEASE SEND ME THE INSTANT CASH REPORT. I HEREBY AGREE NOT TO DIVULGE ANY PART OF ITS CONTENTS TO THIRD PARTIES. I ALSO AGREE TO PAY 5 PER CENT OF THE PROFITS FROM INSTANT CASH TO : ROSS ENTERPRISES INC. NEXT.... SIGN YOUR NAME DIRECTLY UNDER THAT STATEMENT. THEN ....CLEARLY PRINT: YOUR NAME , FULL MAILING ADDRESS ,ZIP/POSTAL CODE , YOUR PHONE NUMBER AND E-MAIL ADDRESS ( Sorry, no orders can be processed unless the instructions above are followed exactly Please do not respond to this note via e-mail Due to the actions of anti - commercial e-mail vandals , we do not maintain an e-mail responder ) 4. FAX THIS MATERIAL TO : ( 01 ) 404 - 685 - 0905 ( for best results : dial then press "send" ) SHIPPED BY FIRST CLASS MAIL . Ariel Publishing Group is not affiliated with Ross Enterprises or any other entity. Ariel Publishing Group makes no claim or warranty regarding the content , nature or intended use of this material . Copyright 1998 Ariel Publishing Group Ltd. . From gcg at ibm.net Mon Jun 29 10:17:17 1998 From: gcg at ibm.net (Geoffrey C. Grabow) Date: Tue, 30 Jun 1998 01:17:17 +0800 Subject: Finally... a One-Time-Pad implementation that works!!! Message-ID: -----BEGIN PGP SIGNED MESSAGE----- TriStrata has announced that is has a product that provides OTP without the pad distribution problem. The product also has a unique key-recovery system. Check out: http://www.tristrata.com for details. **************************************************************************** ************* PGP 5.5.3 Fingerprint: 15B3 DDC1 93BB 4BDF 4DFD 1B27 12A1 E0C4 **************************************************************************** ************* -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.5.3i for non-commercial use iQEVAwUBNZVo5dc2wHb8nZI1AQFqngf/bCJVbMQX/5sYb181CLONmqWjPzhQ66Ef HoyPqxRzEyq4FSWnIuQODH/YTeyyQROUqCZGhC19v8PCiZpI1ynSvn4i+Zcjv9I0 OZBThzKayNoMne7TkNr49Ah9BwDK6XuwS9bns1xM65zfKLpvKP2gboWkADD52K4w eUuJx/cTaR7PgdO/q6nrVRNq1jlaJsFBKGt2q5E1S12ZK1nA+mpKAS95XMgr2IMx 5/wJ+jsOIUTn2gWR64nhluOgmcACeIVsiRlsGqfUdL8gJHAl0gaQ7E1+HSOBx60K Ur5x5MzQKBKlWcoDaEXB1AsICW2enwdGVOxPBklq1CbcQxFXdBj1DQ== =vZmi -----END PGP SIGNATURE----- From CTIA_Daily_News at tour.unitymail.com Tue Jun 30 10:07:23 1998 From: CTIA_Daily_News at tour.unitymail.com (CTIA Daily News) Date: Tue, 30 Jun 1998 10:07:23 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - June 30, 1998 Message-ID: <199806301704.MAA30266@revnet4.revnet.com> ============================================= Welcome to today's edition of the CTIA Daily News from WOW-COM. Please click on the icon / attachment for the most important news in wireless communications today. ============================================= From billp at nmol.com Tue Jun 30 11:52:45 1998 From: billp at nmol.com (bill payne) Date: Tue, 30 Jun 1998 11:52:45 -0700 (PDT) Subject: Settlement help, please Message-ID: <359932F0.2232@nmol.com> Senators Please help get this mess settled. Thanks bill Tuesday 6/30/98 12:03 PM Mr. Thomas J. Schlageter, Assistant Legal Counsel Advice and External Litigation Division Office of Legal Counsel 1801 L. Street, Northwest, Room 6034 Washington, D.C. 20507 Dear Mr. Schlageter: Purposes of this letter are to 1 seek administrative remedy of a release of false and defaming information on myself which violated Privacy Act. Charles Burtner and Larry Trujillo of the U.S. Equal Employment Opportunity Commission's (EEOC) Phoenix District Office unlawfully released the information. 2 Exhaust administrative remedies if we are not able to settle this matter. 3 Request information under the Freedom of Information and Privacy Acts. On June 29 I received at letter from Aletha L. Brown Inspector General U.S. Equal Employment Opportunity Commission POB 18858 Washington, D.C. 20036-8858 202-663-4375 800-849-4230 dated June 25, 1998, OIG Control Number 981770 which said This is to acknowledge receipt for your letter dated May 15, 1998, requesting Freedom of Information Act (FOIA) and Privacy Act information. I apologize for the delay in responding to your request. Your complaint regarding alleged Privacy Act violation and FOIA request was forwarded to the Office of Legal Counsel on May 27, 1998. With regards to these matters, please contact: Mr. Thomas J. Schlageter, Assistant Legal Counsel Advice and External Litigation Division Office of Legal Counsel 1801 L. Street, Northwest, Room 6034 Washington, D,C, 20507 Mr. Payne, the OIG plans no investigative action regarding this matter. Thank you for contacting this office. Sincerely [signature] Aletha L. Brown Inspector General Attachment Attachment reads U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C 20507 May 27, 1998 MEMORANDUM TO: Mr. Thomas J. Schlageter, Assistant Legal Counsel Advice and External Litigation Division [signature] FROM Joyce T. Willoughby, Counsel Office of the Inspector General SUBJECT: Freedom of Information Act (FOIA) Request of William Payne Attached is a Freedom of Information (FOIA) request from William Payne, which was received by the Office of the Inspector General (OIG) on May 20, 1998. In an effort to respond to this request, attached are copies of the OIG case file concerning Mr. Payne, the Inspector General Act of 1978, as amended, and excerpts from the OIG Investigative Manual and Deskbook. If you have any question concerning this memorandum or need additional information you may contact me at Extension 4397. Attachments While I hope we are able to settle the civil aspects of this unfortunate release of false and defaming information on me, I must anticipate, however, that I will have to seek judicial review. Therefore, under 5 USC 552, the Freedom of Information Act, and 5 USC 552a, the Privacy Act, I request access to copies 1 All documents describing YOUR efforts to properly investigate and settle this unlawful release of false and defaming information about me. 2 All WRITTEN documents, including phone call message notes or another notes, containing the name of William Payne, Bill Payne, etc. made between 3/18/98 and 6/30/98 by your or your staff. If all or any part of this request is denied, please cite the specific exemption(s) which you think justifies your refusal to release the information and inform me of your agency's administrative appeal procedures available to me under the law. I would appreciate your handling this request as quickly as possible, and I look forward to hearing from you within 20 working days, as the law stipulates. This letter resembles one I sent to Ms. Varygas of your office on 6/29. I append the Varyas letter to this letter for your information. Mr. Schlageter, I hope this unfortunate matter can be resolved at the administrative level at EEOC. And I ask your help. Sincerely, William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 505 292 7037 <- I am not reading e-mail Distribution Tom Spellman Aletha L. Brown Senate Judiciary Committee http://www.senate.gov/committee/judiciary.html Republicans Orrin G. Hatch, Utah, Chairman senator_hatch at Hatch.senate.gov Strom Thurmond, South Carolina senator at thurmond.senate.gov Charles E. Grassley, Iowa chuck_grassley at grassley.senate.gov Arlen Specter, Pennsylvania senator_specter at specter.senate.gov Fred Thompson, Tennessee senator_thompson at thompson.senate.gov Jon Kyl, Arizona info at kyl.senate.gov Mike DeWine, Ohio senator_dewine at dewine.senate.gov John Ashcroft, Missouri john_ashcroft at ashcroft.senate.gov Spencer Abraham, Michigan michigan at abraham.senate.gov Jeff Sessions, Alabama Democrats Patrick J. Leahy, Vermont senator_leahy at leahy.senate.gov Edward M. Kennedy, Massachusetts senator at kennedy.senate.gov Joseph R.Biden, Jr., Delaware senator at biden.senate.gov Herb Kohl, Wisconsin senator_kohl at kohl.senate.gov Dianne Feinstein, California senator at feinstein.senate.gov Russell D. Feingold, Wisconsin russell_feingold at feingold.senate.gov Richard Durbin, Illinois dick at durbin.senate.gov Robert Torricelli, New Jersey senator at torricelli.senate.gov /\/\/\ append ----- Monday 6/29/98 11:59 AM Ms. Ellen J. Varygas, Legal Counsel Office of Legal Counsel 1801 L. Street, Northwest, Room 6002 Washington, DC 20507 (202) 663-4637 Dear Ms. Varygas: Purposes of this letter are to 1 seek administrative remedy of a release of false and defaming information on myself which violated Privacy Act. Charles Burtner and Larry Trujillo of the U.S. Equal Employment Opportunity Commission's (EEOC) Phoenix District Office unlawfully released the information. 2 Exhaust administrative remedies if we are not able to settle this matter. 3 Request information under the Freedom of Information and Privacy Acts. Aletha L. Brown Inspector General U.S. Equal Employment Opportunity Commission POB 18858 Washington, D.C. 20036-8858 202-663-4375 800-849-4230 wrote me on May 7 1998 The Office of Inspector General (OIG) is empowered to investigate matters of fraud, waste and abuse which may be attendant to EEOC programs and operations. We do not have programmatic responsibilities and are not involved in the administration and resolution of Privacy Act violations. Based upon our review of the information provided, we have determined that this matter, although important, is outside of OIG's purview and therefore does not warrant any investigative action by this office. In regards to this issue contact: Ms. Ellen J. Varygas, Legal Counsel Office of Legal Counsel 1801 L. Street, Northwest, Room 6002 Washington, DC 20507 (202) 663-4637 Mr. Payne, I hope this information is helpful to you but regret that I can not provide the remedy you seek. Thank you for contacting the Office of the Inspector General. Sincerely, Aletha L. Brown Inspector General June 16, 1998 A Jacy Thurmond, Jr, Assistant Legal Counsel/FOIA sent me some information I requested on possible administrative remedy of the matter under a FOIA/PA request. My request was mailed Friday 5/15/98. While I hope we are able to settle the civil aspects of this unfortunate release of false and defaming information on me, I must anticipate, however, that I will have to seek judicial review. Therefore, under 5 USC 552, the Freedom of Information Act, and 5 USC 552a, the Privacy Act, I request access to copies 1 All documents describing YOUR efforts to properly investigate and settle this unlawful release of false and defaming information about me. 2 All WRITTEN documents, including phone call message notes or another notes, containing the name of William Payne, Bill Payne, etc. made between 3/18/98 and 6/29/98 by your or your staff. If all or any part of this request is denied, please cite the specific exemption(s) which you think justifies your refusal to release the information and inform me of your agency's administrative appeal procedures available to me under the law. I would appreciate your handling this request as quickly as possible, and I look forward to hearing from you within 20 working days, as the law stipulates. Details of the release of information can be found on Internet starting most recently with Payne v. NSA: US on Classified NSA Declaration June 27, 1998 Payne v. NSA: US Motion on FOIA for NSA Algos June 27, 1998 at http://www.jya.com/usa062698.htm Ms Varygas, I hope this unfortunate matter can be resolved at the administrative level at EEOC. And I ask your help. Sincerely, William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 505 292 7037 <- I am not reading e-mail Distribution Tom Spellman Aletha L. Brown Senate Judiciary Committee http://www.senate.gov/committee/judiciary.html Republicans Orrin G. Hatch, Utah, Chairman senator_hatch at Hatch.senate.gov Strom Thurmond, South Carolina senator at thurmond.senate.gov Charles E. Grassley, Iowa chuck_grassley at grassley.senate.gov Arlen Specter, Pennsylvania senator_specter at specter.senate.gov Fred Thompson, Tennessee senator_thompson at thompson.senate.gov Jon Kyl, Arizona info at kyl.senate.gov Mike DeWine, Ohio senator_dewine at dewine.senate.gov John Ashcroft, Missouri john_ashcroft at ashcroft.senate.gov Spencer Abraham, Michigan michigan at abraham.senate.gov Jeff Sessions, Alabama Democrats Patrick J. Leahy, Vermont senator_leahy at leahy.senate.gov Edward M. Kennedy, Massachusetts senator at kennedy.senate.gov Joseph R.Biden, Jr., Delaware senator at biden.senate.gov Herb Kohl, Wisconsin senator_kohl at kohl.senate.gov Dianne Feinstein, California senator at feinstein.senate.gov Russell D. Feingold, Wisconsin russell_feingold at feingold.senate.gov Richard Durbin, Illinois dick at durbin.senate.gov Robert Torricelli, New Jersey senator at torricelli.senate.gov 6 From billp at nmol.com Tue Jun 30 11:59:47 1998 From: billp at nmol.com (bill payne) Date: Tue, 30 Jun 1998 11:59:47 -0700 (PDT) Subject: NSA and crypto algorithms Message-ID: <359934DE.1B4@nmol.com> It is EASY to make mistakes when designing crypto algorithms. SECRECY works against NSA in that their work doesn't get proper evaluation by HOSTILE referees. Like http://www.jya.com/skipjack-bs2.htm NSA does have good experiences at fielding crypto devices. My suprise at gaining access to NSA crypto algorithms was how simple they were. From agamble at alloytech.com Tue Jun 30 12:46:36 1998 From: agamble at alloytech.com (Alan Gamble) Date: Tue, 30 Jun 1998 12:46:36 -0700 (PDT) Subject: Metal Suppliers Online Newsletter Message-ID: <3.0.32.19980630144255.009e7180@mail.alloytech.com> June 30, 1998 Metal Suppliers Online (MSO) Summer Newsletter Hello from rainy New Hampshire! Its been a great year here at MSO and I wanted to get this newsletter out to remind you about Metal Suppliers Online (www.suppliersonline.com) and bring you up to date with site improvements. We now have over 12,000 worldwide users (!) . RECENT IMPROVEMENTS INCLUDE: Metal Supplier Data - We continue to grow, with the searchable inventory of 2700 Worldwide Distributors, Producing Mills and Forging Shops. Material Property Data - We now property data on 17,000 ferrous & non-ferrous materials. UP-COMING IMPROVEMENTS INCLUDE: Specification Cross Reference Utilities - Cross reference any ASTM, ASME, AMS, QQ, MIL and selected company specifications. Physical Property Data - CTE, Densities, Conductivity, Resistivity & more. Specification Cross Reference Utilities - Cross reference any ASTM, ASME, AMS, QQ, MIL and selected company specifications. If you haven't been to the site in a while, I invite you to give us a visit. I think that you'll be impressed by the way that we've grown. If you have any recommendations on how to improve our site, please don't hesitate to Email them to me. Thanks for your time. Best Regards, Alan Alan C. Gamble Webmaster Metal Suppliers Online http://www.suppliersonline.com 603-890-6500 - phone 603.890.6222 - fax "We don't stop playing because we get old, we get old because we stop playing" From billp at nmol.com Tue Jun 30 14:46:45 1998 From: billp at nmol.com (bill payne) Date: Tue, 30 Jun 1998 14:46:45 -0700 (PDT) Subject: Judge Campos letter Message-ID: <35995BF1.156C@nmol.com> Tuesday 6/30/98 3:20 PM John Young Nice to talk to you. I see Payne v. NSA: Response to Motion to Remand FOIA June 30, 1998 at http://www.jya.com/whp063098.htm I opened judge Campos' letter at the fax. I handed it to the nice lady. I wrote your fax number on the envelope. Then went to Page One Two to look at used VW repair manuals. Page One Two specializes in used books and CDs. I am REALLY CURIOUS about what Campos wrote. Especially on a Tuesday. But not curious enough to read the letter now. Lawyers always plan to have their hate letters arrive on a weekend or, just before a vacation. Christmas is a lawyer favorite. I ordered a engine rebuild gasket set, rod and main bearings, engine mounts, rings, valve guides and springs, and SPLURGED by ordering an exhuast header this afternoon. My '82 rabbit is about guaranteed to fail emissions test this fall. I ordered today from J C Whitney because the price for the $99.95 header goes up $10 tomorrow. Perhaps headers will even FURTHER improve its exciting 20 second 0-60 performance? I will do the rebuilt in the fall. I phoned a member of Albuquerque�s underground economy last night. He will do the labor on the head for $60. Cash, of course. I must now ABSOLUTE CERTAINLY complete the digital FX IMMEDIATELY. To make some money. Litigation is more of a long term financial project. Like Morales and I have been working on this project for SIX YEARS. Hopefully this mess will be settled so that I can devote time to another of my specialties. Rebuilding Big Block Ford and VW water cooled engines. And writing MORE books too. Perhaps even write a law book. On pro se litigation. With Morales, of course. But this can be a point for settlement negotiation, of course. Later bill http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 From nodebt at mail-info.com Tue Jun 30 18:18:41 1998 From: nodebt at mail-info.com (nodebt at mail-info.com) Date: Tue, 30 Jun 1998 18:18:41 -0700 (PDT) Subject: A *Gold-Mine*--Right Under Your Nose?!! Message-ID: <<> A *Gold-Mine*--Right Under Your Nose?!! Take just a minute and look down. What do you see? A thin plastic board with keys on it? How would you feel if I told you those keys were lined with gold? Well, it's true! The keys on your keyboard are FILLED with PURE GOLD--just sitting there waiting for you to mine it out! How? The Internet...Online Mass Marketing. With the potential to reach millions, the Internet is the perfect place to market a product or an idea. And, the wonderful thing is that you can have as great a presence on the World Wide Web as the biggest of the big corporations, perhaps even greater-- IF YOU HAVE THE TOOLS - and - IF YOU KNOW HOW TO USE THEM! >>>>>>>>>>>LEVEL THE PLAYING FIELD! >>>>>>>>>>>>>>>WE TEACH YOU HOW! That is why I want to tell you about Online Success. Online Success is a resource center dedicated to providing you with the tools to cash in on the TREMENDOUS OPPORTUNITIES to be found through mass Internet marketing-AND-teaching you how to use them. It may be far easier then you think... if you know the inside secrets. As a member of the Online Success group, you will have the constant support of a staff of highly experienced Internet marketers. You will be carefully guided step by step along your path to AMAZING PROFITS through online marketing success. >We track the hottest trends so you can reap the profits! A few examples of what we offer: >Placement of your ad in 100 of the HOTTEST online classifieds. >Registration of your web-site with the TOP 100 search engines. >Dedicated E-mail account, autoresponder, and webspace. >Your own web-site DOMAIN NAME--FREE to members! (An absolute must!) You will also gain access to the Online Mass Marketing Institute where you will learn how to make the web work for you. You have no product to offer? No problem! Online Success can even provide you with that! ***And now for the truly amazing Part!*** All of this can be yours for FREE simply by referring two other individuals that become active Online Success members! As a matter of fact, we will PAY YOU a 40% commission on any additional active referrals! Imagine that! MAKE MONEY while you learn how to MAKE MONEY! So, why not see how easy it is to mine that wealth of gold from your keyboard--with the help of Online Success. Come to our web-site at: http://www.mail-info.com/osg/109 Find out what it's all about and start down your path to Internet marketing prosperity! >>>>>>>>>>>>>You make it happen. >>>>>>>>>>>>>Online Success makes it possible. Thank You, Karen Flowers Ref # 109 nodebt at mail-info.com http://www.mail-info.com/osg/109 P.S. Join NOW and we will ALSO include 250 HOT Internet and Business Marketing Reports with FULL reprint and resale rights...FREE! This is NOT some simple collection of raw ideas. These reports are being sold on the Internet right NOW for $49.95! YOU can become an INSTANT self publisher by selling these reports! P.S.S. We will also include FREE (a $50 value), the stand alone report: "How To Make $1,600 A Week Online...Starting NOW!" This report contains the SECRETS to making money online that the Internet marketing insiders DON'T want YOU to know! HURRY! This offer from Online Success is for a LIMITED time. Make sure you DO NOT miss this new and exciting opportunity that will take the Internet by storm! From cb0630 at hotmail.com Tue Jun 30 18:41:14 1998 From: cb0630 at hotmail.com (cb0630 at hotmail.com) Date: Tue, 30 Jun 1998 18:41:14 -0700 (PDT) Subject: Data Processing, Translation, Software & Web Localization Services Message-ID: <199807010644.ZZZ4950@msfc.cseeq.equr.com> Dear Sir/Madam, We are a professional information services company in Hong Kong providing fast, accurate and inexpensive information services since 1993 with more than 100 supporting staff. Scope of Services: (1) Chinese/English Word Processing Service & Chinese/English Data Preparation Service [Offshore Services Welcome] * 50+ data entry professionals working on a 24-hour shifting scale. * 99.95% accuracy level is guaranteed by our "Double Entry System" * Competitive price to provide you quality results on time and on budget * Rapid Turnaround * Confidential Processing * Year 2000 data conversion / migration * Offshore Service Welcome: Contract out your projects to save 50+% operational cost! (2) English/Chinese Translation Services [Offshore Services Welcome] * 30+ translators with solid experience * Competitive price to provide you quality results on time and on budget. FREE trial and evaluation for first time customers. * Specialize in the translation of - Software localization (User manuals, on-line help systems & user interfaces) - Web site localization - Commercial documents - Technical manuals and specifications - Architectural proposals, etc. The popularity of Internet makes it more easy for you to contract out your most labor intensive jobs in your company to information services companies like us to fully utilize inexpensive workforce in our production centers. You will find that you can concentrate your valuable time and efforts on the most profitable parts of your company. You will then use less labor, less equipment, less office space and less working time to produce more products and services with more profits. Interested parties please fax the following enquiry form to our customer services department for more information. *** Services Reply Slip *** Please fax to (852) 8108 7786 Attn.: Customer Services Department We are interested in your __ Data Processing Service __ Software Localization Service __ Web Site Localization Service __ Chinese Translation Service, please contact us asap. Our project description: ____________________________________________ _____________________________________________________________________ Company: _________________________________________ Address:__________________________________________ Tel: ____________________ Fax: ____________________ E-mail: _____________________________________________ Web Site: ___________________________________________ Contact Person: _____________________________________ Post: _______________________________________________ Date: _______________________________________________ PS. This e-mail will only be sent to the same account once (you may receive the same message more than once if you have more than one e-mail accounts). Please keep it for future reference. There is no need to remove your name from our database. Sorry for any inconvenience caused. [CB980630] From dformosa at cit.nepean.uws.edu.au Tue Jun 30 21:36:32 1998 From: dformosa at cit.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Tue, 30 Jun 1998 21:36:32 -0700 (PDT) Subject: NSA and crypto algorithms In-Reply-To: <359934DE.1B4@nmol.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Tue, 30 Jun 1998, bill payne wrote: > It is EASY to make mistakes when designing crypto algorithms. [...] > My suprise at gaining access to NSA crypto algorithms was how > simple they were. The second stament follows logicly from the first. Simple algorithums are easyer to analise for mistates. - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBNZmuSqQK0ynCmdStAQFHowP/efP6rwDRJdjNhXvcS9rRbJW9tB10YqtP 6SCjzgCQj6W2rZSDevehIthNBn2iF0yo+rxkHA6qSYIR4y4FbyZQNSAJyCJO5i5s iEl8Prg6Mt2FgPRxyqgSbDaVqprBaa2kkHXHiCB0Uvf4FIdc3SjMtPnU0B+ijC3v fXmFqRvpe9o= =7en9 -----END PGP SIGNATURE----- From jim.burnes at ssds.com Tue Jun 30 17:34:32 1998 From: jim.burnes at ssds.com (Jim Burnes) Date: Wed, 1 Jul 1998 08:34:32 +0800 Subject: saving the world from a cancerous monopoly (fwd) In-Reply-To: <199806302318.SAA15079@einstein.ssz.com> Message-ID: <3599832A.4D0E49E3@ssds.com> Jim Choate wrote: > > mjg says: > > > Yes, I've thought of that too. That is the place to start, but I think > > the federal government is too strong -- eventually the states will hit a > > stand-off and the succession issue arises again. Feds won't go down > > without a fight. > > That's actualy an easy one. All it would take is a govenor to declare that > citizens of his state are not going to submit to annual taxation. I > guarantee that things will move quickly. Since the National Guard requires > the ok of the govenor for the feds to invoke that is pretty much a moot > point. It's clearly unconstitutional to involve the Army, especialy if it is > made clear the National Guard will be there at the border to stop them. As > to the FBI and such, have the Sherrif in each county and he state police > proceed to arrest any such persons who attempt to invoke their federal > authority. > Since the National Guard is an extension of the Army and was created through the federal authority of raising armies it is not necessary for the Governor of any state to be consulted before it is given its orders. So says the Supreme Court several years ago. The all happened when Dukakis challenged George Bush's power to mobilize his National Guard during the Persian Gulf war. (operation Just 'Cuz). Dukakis was pissed (thinking he lived in the old US) and challenged the whole thing. He lost. He mistook the state militia for the National Guard. As far as the unconstitutionality of the Army doing anything, thats history -- all they have to do is invoke the Drug laws and the constitution is null and void. In any case, the National Guard is the Army (for all practical purposes). As far as arresting federal authorities goes, there aren't enough sherrifs lying around to stop even FBI agents, much less the National Guard. (state police included) Where were the sheriffs when the BATF broke assuaulted the Branch Davidian church? The answer is: helping them... > > Speaking of brain-washed.... > > They didn't fear democracy, they feared an authoritarian central government > without the states exercising their authority to stop it via the 10th. They > felt that democracy was the only way to deal with this sort of excess. > >In short, they celebrated democracy. Actually they feared an excess of both. Tryanny of the king and tyranny of the masses -- mobocracy. That is why the Senators were appointed by the states and not elected by the people. It was an effort to allow states to control their interests instead of everthing being determined by congress. This is known as a balance of power. jim