From jya at pipeline.com Sat Aug 1 06:57:57 2015 From: jya at pipeline.com (John Young) Date: Sat, 01 Aug 2015 09:57:57 -0400 Subject: FOIA/PA In-Reply-To: References: Message-ID: I believe FBI was a minor player, if any, it was IRS TAIGA's Jeff Gordon and AUS Attorney Robb London who bird-dogged, planted a vehicle tracker, surveilled, harassed parents and friends, lurked on, sent messages and cherry-picked this mail list to subpoena cpunks and gather evidence for grand juries. https://cryptome.org/jdb-subpoena.htm https://cryptome.org/jya/jdbfiles.htm Indeed, it would be helpful to see the investigative files never introduced in court: some claim only 5% or less of "law enforcement senstive" are publicly released to avoid disclosing means and methods to assure conviction and chill others into lawful obedience, even if the judge remains awake during trial -- which in Mr. Bell's case, did not. Instead Judge Tanner (80+ years old), snoozed and periodically barked "Period." OTOH, some folks say once you see what is in such files, it may be prudent to let sleeping dogs lie. Shit your father, mother, friends, enemies, informants and shop-your-ass-to-save-their-own supporters say about you, reveal about you, lie about you, cover-up their own evildoing, well, now. No doubt, once the partially disclosed and redacted and doctored files are in hand, nothing stops you from culling them, doctoring them, fucking your tormentors by publishing your own version of FOIA/PA as the law and courts encourage official and unofficial liars to do. Admirable that Muckrock provides tutorials on how to do this, with gobs of documentary evidence far exceeding Snowden team's snow job. At 11:18 PM 7/31/2015, you wrote: >hey Jim, > >you know what'd be fun? a FOIA/PA request to FBI for your documents. :) > >if you're so inclined, > see > https://www.muckrock.com/foi/united-states-of-america-10/privacyactdirect-19921/ > for example wording of interest. > > >best regards, > codermange From drwho at virtadpt.net Sat Aug 1 11:09:46 2015 From: drwho at virtadpt.net (The Doctor) Date: Sat, 01 Aug 2015 11:09:46 -0700 Subject: FOIA/PA In-Reply-To: References: Message-ID: <55BD0B6A.3020000@virtadpt.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 07/31/2015 08:18 PM, coderman wrote: > you know what'd be fun? a FOIA/PA request to FBI for your > documents. :) It would be unsurprising if Jim got Glomar'd for his own records. :) "In accordance with standard FBI practice and persuant to FOIPA exemption (b)(7)(E)/Privacy Act exemption (j)(2), this response neither confirms nor denies the existence of your subject's name on any watch lists." - -- The Doctor [412/724/301/703/415] [ZS] PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ Progress over protocol. -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJVvQtkAAoJED1np1pUQ8RkbGMP/1DstlZr4RgSxACbC1X2ioUE UR4LiPEh5EJBbfhBEENDWPNn8HI/tZR9h0j8/FeGZ5CT3P4xkcvX6NotTiIb/RZm JyTe7iv47hkxckQIrnOHJWKB4YIccD4WGBMzw6uKyERCkbU5hZdK9nJDf64aLdFc IKlukpjtL460RwfwnUEXV5gfbpeM1OscTa+sdnPfTNwr4M9wk9JiNDek4Ahqnfou zU1UTrgyuWqGI6GYNoxzXuq8zOXjVs6X0AKM8ld6Ek1QHQFtSkONhI+jlGcceOeG zQF8inDrlVqIJbdRz1jZyhAp9M+ZtLhZPhlAOM+7ewd2nUQTEFlp62wW9cwRb1Cb em6etbrNNFMyDpnEdFKgv7b8G9HBUYNkYkZZfAb2zBjeG6aeziekpzdFG1dSkK8X KgnBbO++3s6mMoSnN523fjQQ/yuyOzGWPB+UE848ReKl2WS6CvWw0xN4fefjBD8s w306sbS0K5I8wjSW7BkS6Lv8CPI0xe86baahqrJsAgms/fv5u5VFXpiAkEkYiBf+ 9DBnP386kdKj5GhzS3h7tokwqiH4dNdtupDohuU3l3Wj4Ra1qV5CHFRVhnmvLybo AzKNKN0TFfEujQvX/PnPqQR/p+7/3QO9woGVCXceA8ac/KUKSNSl1SJjpIH9D3iA M4rNvq+3LuEAjo3xRCiA =MyYr -----END PGP SIGNATURE----- From drwho at virtadpt.net Sat Aug 1 11:15:11 2015 From: drwho at virtadpt.net (The Doctor) Date: Sat, 01 Aug 2015 11:15:11 -0700 Subject: FOIA/PA In-Reply-To: References: Message-ID: <55BD0CAF.9030604@virtadpt.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 08/01/2015 06:57 AM, John Young wrote: > I believe FBI was a minor player, if any, it was IRS TAIGA's Jeff > Gordon Not so minor. > and AUS Attorney Robb London who bird-dogged, planted a vehicle > tracker, surveilled, harassed parents and friends, lurked on, sent > messages and cherry-picked this mail list to subpoena cpunks and > gather evidence for grand juries. Indeed. > in court: some claim only 5% or less of "law enforcement senstive" > are publicly released to avoid disclosing means and methods to > assure conviction and chill others into lawful obedience, even if > the judge Existing documents released cite just this reason. Title 5 US, section 552, (b)(7): "...records or information compiled for law enforcement purposes, but only to the extent that the production of such law enforcement records or information..." Sub-paragraph (or whatever it is at that level of granularity) (E): "would disclose techniques and procedures for law enforcement investigations or prosecutions, or would disclose guidelines for law enforcement investigations or prosecutions if such disclosure could reasonably be expected to risk circumvention of the law," - -- The Doctor [412/724/301/703/415] [ZS] PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ Progress over protocol. -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJVvQyvAAoJED1np1pUQ8Rkoy4P+wQ7E8DZo5pOqPfSSWB6hwZ4 LglOkHzlHOoSawCZLwsE1RMDp9qyF77jvJ6JtJsrJXxbItQ+hImerIq55WcqTNPM OniAXIXPpbzjK0u4LKTiTAxBeGD39RJqfG2AD2prvV7bMMKK842LldjBJf0cUQgU nzXkqqxwJgt/HOdjDPK9PQprrkgaeb7h4ntF7w4nXJryF7u19zsqYCE+A3Hmozxf GvEKvhVXyUskQ89TI/0b29C8Q+5Q066sTQo9qSB5zObr+GlfOqZCVaRKZac1otYI rVq8rD4O+p62XHGuEzXB1SIq7zINz3fSwY1o1FvsdZEr2PftY1vIIC6Ip/ZUOw0x MZz2V5TYe1CuX3tfQDYHTiHK4pZVUrSN8NINtGBdkmNZ0xyLUvgwJrJCCTgxOAXs cOX2kaRt8WLQQRPPhbSA1ysRryich3e6rLITknhZCY6HH1lSMOAFk7p3mO9jOlQ8 CA6LT0RzsmF+7OGSSVEWrQnPRTw4EdhXBsM0a79OHz1RyIu4Kt/kKhWV3yupkt3/ +JsyKamDeZxfivX1ZYBLymAlDhHr5b3Qde+ze4w7Ul0cQ0+DyXA4KeU/PNIlPDJz QWPADMjDJlKU8LGy47c8qPm7masjQIFuPW7/Tl/mflLH2j7DfQuxnpkTlVfROynu Q/+3lxmVVrPbB87JhQ5S =AYI6 -----END PGP SIGNATURE----- From odinn.cyberguerrilla at riseup.net Sat Aug 1 19:43:46 2015 From: odinn.cyberguerrilla at riseup.net (odinn) Date: Sat, 01 Aug 2015 19:43:46 -0700 Subject: FOIA/PA In-Reply-To: References: Message-ID: <55BD83E2.9070400@riseup.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I say yes, just let us know what the results of the FOIA request are so we know if we are on the resulting docs, etc, which would be interesting. On 08/01/2015 06:57 AM, John Young wrote: > I believe FBI was a minor player, if any, it was IRS TAIGA's Jeff > Gordon and AUS Attorney Robb London who bird-dogged, planted a > vehicle tracker, surveilled, harassed parents and friends, lurked > on, sent messages and cherry-picked this mail list to subpoena > cpunks and gather evidence for grand juries. > > https://cryptome.org/jdb-subpoena.htm > > https://cryptome.org/jya/jdbfiles.htm > > Indeed, it would be helpful to see the investigative files never > introduced in court: some claim only 5% or less of "law enforcement > senstive" are publicly released to avoid disclosing means and > methods to assure conviction and chill others into lawful > obedience, even if the judge remains awake during trial -- which in > Mr. Bell's case, did not. Instead Judge Tanner (80+ years old), > snoozed and periodically barked "Period." > > OTOH, some folks say once you see what is in such files, it may be > prudent to let sleeping dogs lie. Shit your father, mother, > friends, enemies, informants and shop-your-ass-to-save-their-own > supporters say about you, reveal about you, lie about you, cover-up > their own evildoing, well, now. > > No doubt, once the partially disclosed and redacted and doctored > files are in hand, nothing stops you from culling them, doctoring > them, fucking your tormentors by publishing your own version of > FOIA/PA as the law and courts encourage official and unofficial > liars to do. > > Admirable that Muckrock provides tutorials on how to do this, with > gobs of documentary evidence far exceeding Snowden team's snow > job. > > > > At 11:18 PM 7/31/2015, you wrote: >> hey Jim, >> >> you know what'd be fun? a FOIA/PA request to FBI for your >> documents. :) >> >> if you're so inclined, see >> https://www.muckrock.com/foi/united-states-of-america-10/privacyactdi rect-19921/ >> >> >> for example wording of interest. >> >> >> best regards, codermange > > > - -- http://abis.io ~ "a protocol concept to enable decentralization and expansion of a giving economy, and a new social good" https://keybase.io/odinn -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJVvYPiAAoJEGxwq/inSG8C3eYIAKe8VwJ4HXvh5JEzx/7CRy96 /HbSS7Ynvla+o87ztzSH/UtzpMEiUxH4P4d1OJlDoVxz9cHIy05JWZVJCFy0xTBR ER8qfc3Z+6WCCKxE+qkjiZXH4/LGAn8zAMd45A8ordvhPrxc35QtRVHhtmwJfH/A lHqIzOpbwVoHIrRC8GMHCddIIaakE6Tq5KoNbVY6MuY+UnRVGc5HQO8/VtWTZ1zI zLqMTozn6lGH2/ezIzB05yZJ2MhtyZxVqxO+puqR3lSMED+kkHSLUNDTk5GF8kpj yrgu+OgNCl40X2w45anIIbhUnP72PF0YNQa77O5DEO0OYCgWbqMTJODwn0UGhz4= =aY54 -----END PGP SIGNATURE----- From odinn.cyberguerrilla at riseup.net Sun Aug 2 04:13:09 2015 From: odinn.cyberguerrilla at riseup.net (odinn) Date: Sun, 02 Aug 2015 04:13:09 -0700 Subject: Open Fabs In-Reply-To: References: <55B94E52.2050709@pilobilus.net> Message-ID: <55BDFB45.4010507@riseup.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Not sure if someone already mentioned this, but what of opencores.org ? Which offers professional support for products from that site, I imagine that one could develop, for example, very transparent and open source hardware development with production processes that could scale up depending on demand, one could start with FPGAs. There may be some already working on just such a project but I'm not aware of the details. - -O On 07/31/2015 03:56 PM, Cari Machet wrote: > > > On Thu, Jul 30, 2015 at 1:06 AM, Steve Kinney > wrote: > > -----BEGIN PGP SIGNED MESSAGE----- > > I do see problems with scaling DYI chip projects up to commercial > production numbers, and down in scale to achieve fast, high > capacity performance. That's why I am much more interested in the > prospects of a manufacturing process built for radical > transparency, using "commercial best practice" technology at > conventional production facilities. > > IMO the same kind of radical transparency should apply to all > industrial processes that pose large potential hazards to public > health & safety, i.e. nuclear power stations, transgenic > agriculture, etc. > > :o) > > > > > i have been thinking about this and i was thinking a lot about > actual nuclear bomb sites being added to the list of 'hazard to > public' and i was like - not possible to give the public any kind > of access to such horrors but then its already in play ... NATOish > people sold the design of the bomb to pakistan and israel long ago > so maybe actually if more people were involved in the process it > would be in safer hands and there would be less proliferation as it > seems to be the modus operandi that there be more bombs to counter > > best film ever points in the direction of nano/bio tech > possibilities le jette with the murder of species... can we have > the components make themselves and self destruct when in danger? > > > > > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com > AIM carismachet Syria +963-099 277 > 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 > 894 8650 Twitter: @carimachet > > 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 > > Ruh-roh, this is now necessary: This email is intended only for > the addressee(s) and may contain confidential information. If you > are not the intended recipient, you are hereby notified that any > use of this information, dissemination, distribution, or copying of > this email without permission is strictly prohibited. > > - -- http://abis.io ~ "a protocol concept to enable decentralization and expansion of a giving economy, and a new social good" https://keybase.io/odinn -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJVvftFAAoJEGxwq/inSG8C1roIAMCQ28UW9YkwD8JEfUrLJlJ9 pca/sQgf15R7X4UXU47kjcMG/HKd3gpNdKi5s5/kSO0+dpg2AKi0v3/Lma8kfQXs hoB04VoBFx+oTW28i2sKPzAQZedtVGE5cU22BbUGLb+5wFQRitAiHGe7MpjPcShf xcTPkeaXy7gwvKsJUU89PXu8x52gBdYyW+aEQbaw8qWj4mtuBAvoi/fDmB3TYlby h9hFXt1q6hhehwan1X/Arfi522vkn7Bvw9yWyPVnMxH86hvDWeBjHwH7FZljiB8d aBGc2qK4jHheyloQ4SsZlNEzGSFT1zlMvFNcU7+/b3vjjmnd0B9mstab5BAQpFQ= =PeiD -----END PGP SIGNATURE----- From jdb10987 at yahoo.com Sat Aug 1 23:43:23 2015 From: jdb10987 at yahoo.com (jim bell) Date: Sun, 2 Aug 2015 06:43:23 +0000 (UTC) Subject: FOIA/PA In-Reply-To: References: Message-ID: <109959012.382746.1438497803035.JavaMail.yahoo@mail.yahoo.com> From: John Young >I believe FBI was a minor player, if any, it was IRS TAIGA's Jeff Gordon >and AUS Attorney Robb London who bird-dogged, planted a vehicle >tracker, surveilled, harassed parents and friends, lurked on, sent >messages and cherry-picked this mail list to subpoena cpunks and >gather evidence for grand juries. I think the acronym was TIGTA:  Treasury Inspector General for Tax Administration. https://cryptome.org/jdb-subpoena.htm https://cryptome.org/jya/jdbfiles.htm >Indeed, it would be helpful to see the investigative files never introduced >in court: some claim only 5% or less of "law enforcement senstive" are >publicly released to avoid disclosing means and methods to assure >conviction and chill others into lawful obedience, even if the judge >remains awake during trial -- which in Mr. Bell's case, did not. Instead >Judge Tanner (80+ years old), snoozed and periodically barked "Period." The thing I REALLY want to see exposed is the fake, phony, forged docket for Ninth Circuit Court appeal case 99-30210.  It's the appeal case that was secretly initiated by corrupt attorney Judith Mandel Levins on about June 20, 1999, one day before she resigned.  Naturally, she never told me about the existence of that.   https://cpunks.wordpress.com/2013/11/19/jim-bell-to-andy-greenberg-your-errors-about-me-in-your-book/  :  And, for the next 10 months or so, I received no mail from that court about that case:  Ordinarily, I (ostensibly representing myself, but completely unaware of the existence of that case) should have gotten mail, but I didn't get any mail while at FDC Seatac (until about September 3, 1999) nor at FCI Phoenix (from about Sept 10, 1999 through April 13, 2000.) The phony docket was forged, but it was again re-forged, probably about May 2000, when they discovered that I was demanding a REAL appeal, still not having learned of the pre-April 2000 existence of that case.  (Unfortunately, I was unable to write very much about my May 20 discovery of the phony appeal case, in my July 2003 refiling of my Portland Federal Court lawsuit.      http://cryptome.org/jdb-v-usa-106.htmhttps://casetext.com/case/bell-v-district-courts-of-tacoma-and-seattle  This is because I was using someone in Portland doing the editing, and I learned about that phony case too late to add a lot.  I did put in a few mentions, however.) The docket is available to anyone, for free, using the PACER (www.pacer.com) system, if you use less than 150 pages per calendar quarter.  Also, there are at least two FORGED filings, ostensibly from me, dated (from memory) approximately November 20, 1999 and March 5, 2000.  The first was a handwritten filing, ostensibly in my handwriting, but anyone who knows my handwriting knows it to be terrible.  THAT handwriting was very neat; Probably a woman's handwriting.  The March 5 filing was apparently done using a modern word-processor, although the law library at FCI Phoenix did not have such; only typewriters. That docketing computer was presumably backed up regularly, at least weekly, and probably daily, and the backups might have been sent to the  You will notice that I lambasted Andy Greenberg for repeating errors about me (and especially my attorneys) in this book.  He never responded to my accusations against him.  He claimed that I had repeatedly tried to fire attorneys:  But the reality is that I was never SUCCESSFUL at firing an attorney:  Initially, I did not try to fire them, though I objected strenuously to their misconduct.  Later, I TRIED to fire a few, but the judge never allowed me to do so.  Eventually they left, of their own accord, after they had done the damage to me that they were trying to accomplish.   I wrote a series of motions in February/March 2001 that strongly objected to corrupt attorney Robert Leen's actions, for instance.            Jim Bell -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8599 bytes Desc: not available URL: From yassww at cock.li Sun Aug 2 06:01:19 2015 From: yassww at cock.li (xcelq) Date: Sun, 2 Aug 2015 08:01:19 -0500 Subject: Open Fabs In-Reply-To: <55BDFB45.4010507@riseup.net> References: <55B94E52.2050709@pilobilus.net> <55BDFB45.4010507@riseup.net> Message-ID: <55BE149F.3080104@cock.li> Sounds good is opensource hardware the future? On 08/02/15 06:13, odinn wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Not sure if someone already mentioned this, but what of opencores.org ? > > Which offers professional support for products from that site, > > I imagine that one could develop, for example, very transparent and > open source hardware development with production processes that could > scale up depending on demand, one could start with FPGAs. > > There may be some already working on just such a project but I'm not > aware of the details. > > - -O > > On 07/31/2015 03:56 PM, Cari Machet wrote: >> >> On Thu, Jul 30, 2015 at 1:06 AM, Steve Kinney > > wrote: >> >> -----BEGIN PGP SIGNED MESSAGE----- >> >> I do see problems with scaling DYI chip projects up to commercial >> production numbers, and down in scale to achieve fast, high >> capacity performance. That's why I am much more interested in the >> prospects of a manufacturing process built for radical >> transparency, using "commercial best practice" technology at >> conventional production facilities. >> >> IMO the same kind of radical transparency should apply to all >> industrial processes that pose large potential hazards to public >> health & safety, i.e. nuclear power stations, transgenic >> agriculture, etc. >> >> :o) >> >> >> >> >> i have been thinking about this and i was thinking a lot about >> actual nuclear bomb sites being added to the list of 'hazard to >> public' and i was like - not possible to give the public any kind >> of access to such horrors but then its already in play ... NATOish >> people sold the design of the bomb to pakistan and israel long ago >> so maybe actually if more people were involved in the process it >> would be in safer hands and there would be less proliferation as it >> seems to be the modus operandi that there be more bombs to counter >> >> best film ever points in the direction of nano/bio tech >> possibilities le jette with the murder of species... can we have >> the components make themselves and self destruct when in danger? >> >> >> >> >> -- Cari Machet NYC 646-436-7795 carimachet at gmail.com >> AIM carismachet Syria +963-099 277 >> 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 >> 894 8650 Twitter: @carimachet >> >> 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 >> >> Ruh-roh, this is now necessary: This email is intended only for >> the addressee(s) and may contain confidential information. If you >> are not the intended recipient, you are hereby notified that any >> use of this information, dissemination, distribution, or copying of >> this email without permission is strictly prohibited. >> >> > - -- > http://abis.io ~ > "a protocol concept to enable decentralization > and expansion of a giving economy, and a new social good" > https://keybase.io/odinn > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1 > > iQEcBAEBAgAGBQJVvftFAAoJEGxwq/inSG8C1roIAMCQ28UW9YkwD8JEfUrLJlJ9 > pca/sQgf15R7X4UXU47kjcMG/HKd3gpNdKi5s5/kSO0+dpg2AKi0v3/Lma8kfQXs > hoB04VoBFx+oTW28i2sKPzAQZedtVGE5cU22BbUGLb+5wFQRitAiHGe7MpjPcShf > xcTPkeaXy7gwvKsJUU89PXu8x52gBdYyW+aEQbaw8qWj4mtuBAvoi/fDmB3TYlby > h9hFXt1q6hhehwan1X/Arfi522vkn7Bvw9yWyPVnMxH86hvDWeBjHwH7FZljiB8d > aBGc2qK4jHheyloQ4SsZlNEzGSFT1zlMvFNcU7+/b3vjjmnd0B9mstab5BAQpFQ= > =PeiD > -----END PGP SIGNATURE----- From drwho at virtadpt.net Sun Aug 2 12:02:00 2015 From: drwho at virtadpt.net (The Doctor) Date: Sun, 02 Aug 2015 12:02:00 -0700 Subject: Open Fabs In-Reply-To: <55BDFB45.4010507@riseup.net> References: <55B94E52.2050709@pilobilus.net> <55BDFB45.4010507@riseup.net> Message-ID: <55BE6928.7020506@virtadpt.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 08/02/2015 04:13 AM, odinn wrote: > Not sure if someone already mentioned this, but what of > opencores.org ? It's been mentioned a few times. It's what usually starts the cycle of "Can't trust the FPGAs"/"Can't trust gate synthesis software" cycle. I got tired of talking about it; it's more efficient to actually play around with the cores and figure out how to get the best use of them. - -- The Doctor [412/724/301/703/415] [ZS] PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ I love children, but I don't think that I could eat a whole one. -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJVvmkoAAoJED1np1pUQ8RkwR8QAIlNnMbeNKOJW23a5OLf2i0I Pie5IT7MrdmIZNgYqokF2sp19Z0L9QgccK8gM424ZVlAj5+pwJzSPpwRV+hTI7z7 rUMw1daFmFkxs8+ZFdKE/j7uCMFcqMBdqSPHXCiLWqEowYaAH/Zb14TAT0GDzihk uVJpNh2hga2fGCOn+kHGEGA12oHO7Iw+rpNrGPvUba4fKDEZqlmMUaMV9qZg+/it yjGbrC0MGoTQdPxyu/wpvSlW6ccK60Hiwr6eyUve2Db0lK7cDQEFei7M7HA81nn3 VDmFhR7JHcUqMv9Y1u7mwQGWl+KH1CRE/BFTFJuhtdcU7OsCOEuwTBk5Uxc0oZf8 tKOR+LKJKriyeo6cQhh57AvFXyhTwYuywGZro7jcvEBqLNar4JW3bwYBElj4Hm29 2kzzLvYiRJb5U88YiYZmdSLp3TB3SLDij53FgaveCsyKVxKJXFNOb/8+UN1RldEP 6kuvQ1D3APDvjLvwx5KJVWLIRXSnPp6sptSfYW/CGDQDg97nps/IhGqhSbgJRF2Q YOcKdkhOaNzpJ/6VjCOmaPJJu/kruZcIgoO8HJHnhqdt0gbvh/YlZjg3ye3Xv83r nfNvj+Dd5BfQpdPcFrKCzcb+yXtWOfU3hw1jXaLDiNpovbIVkyX1Isg+T+3L2r1D X6kga+oKXZDd0FelX2Ef =GjXT -----END PGP SIGNATURE----- From odinn.cyberguerrilla at riseup.net Sun Aug 2 12:19:39 2015 From: odinn.cyberguerrilla at riseup.net (odinn) Date: Sun, 02 Aug 2015 12:19:39 -0700 Subject: Open Fabs In-Reply-To: References: <55B94E52.2050709@pilobilus.net> <55BDFB45.4010507@riseup.net> <55BE149F.3080104@cock.li> Message-ID: <55BE6D4B.5060900@riseup.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 my replies below On 08/02/2015 08:54 AM, Lodewijk andré de la porte wrote: > We will not get 50% of the population to use semi-good-crypto. Far > more than that just do not give any damns at all. This is probably true... on the other hand, looking at the flip side of this (referring to software side... the textsecure / stuff based on textsecure implemented in WhatsApp on massive scale) has worked for people on a massive scale who don't give much of a damn but who do care enough to use software with a privacy label and is easy to use. And I think that works to the benefit of the public. This makes me think that if the hardware is similarly easy to use (or at least easier for the user) then it will be easier to present the open source hardware as a benefit. The fact is that the OSH/SC (open source hardware / software communities) really have kind of sucked at marketing. That should chang e. > > Legal protection for those that make insecure shit is so huge that > society is literally stacked against privacy as a whole. Agreed. > The "protected-consumer" culture has led to widespread market > failure - rather than think people buy with their hearts. Simply > put, "Think Different" turned into "Don't think at all". > > That said, I don't see why there's no company attempting to address > the niche of "I want it truly secure". Wouldn't governments like if > the US doesn't spy on them? Wouldn't large companies' officers be > very happy with a secure e-mail/voice call system? > > If it runs Android apps (protip: Android's JVM is open source) in a > more secure manner (like, uhm, in-hardware-sandboxing? Libre > Hypervisor CPU with the OS on it, and a jailed EvilCorp coprocessor > that does the Android stuff?) it doesn't seem to take that much to > build a smartphone nowadays (looking at Chinaphones, that is). > > And, many of the people that want it "truly secure" will understand > that the products will cost more than a mass-produced NSA sponsored > unit. This makes a lot of sense, and I'm guessing that the smaller scale projects we've seen so far are indicative that this can happen at small to medium scale without problem for specific clients or anticipated customer base. Here are some successful examples: http://wiki.openmoko.org/wiki/Main_Page (refer also to http://bb.osmocom.org/trac/wiki/Hardware/Phones and http://bb.osmocom.org/trac/) https://www.crowdsupply.com/sutajio-kosagi/novena http://vr-zone.com/articles/novena-open-laptop-project-exceeds-280-perce nt-crowd-funding-target/77905.html TBD, but looks pretty good (same concept as Novena): https://puri.sm/ And of course, see: https://www.fsf.org/resources/hw/endorsement/respects-your-freedom These are by no means the only examples of open source hardware being marketed to a larger public, albeit at a limited production scale for the time being. It definitely is a market which is in need of attention . - -- http://abis.io ~ "a protocol concept to enable decentralization and expansion of a giving economy, and a new social good" https://keybase.io/odinn -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJVvm1LAAoJEGxwq/inSG8CtcQH/RGY5uoPXZ5QYbe2up9kVIQc lvjjWV2GmISSxUo11vZi0pPpEXcy5aRrCIJ0mho+TcDovzFXbj2m50y24GXF5wLr aVn/YHIsGTQWyXYQmYsBnR1dD0iKIQfqNZlK/OrYTwATlBtpAqP5QJGmyJK2wFHQ sZWWB1xnnKQxhrxGx3UeGa5wwtAWx5kA9KC7Rj1c5+JMi4U9DVCb3/LXoYHc8GnE W7Q9HCNdNl6ErwNeuU1nnoWHi49uH8wjjSXXn+erTb1kTzjM4L8Rn0NE4J8wpKMT MbTINoCfkgxi0Him9MStbOcjrrOMHBFing3HQXuQZNDGkmv7e3hXCtyXL+OjezI= =oOG2 -----END PGP SIGNATURE----- From juan.g71 at gmail.com Sun Aug 2 17:28:09 2015 From: juan.g71 at gmail.com (Juan) Date: Sun, 2 Aug 2015 21:28:09 -0300 Subject: Open Fabs In-Reply-To: References: <55B94E52.2050709@pilobilus.net> <55BDFB45.4010507@riseup.net> <55BE149F.3080104@cock.li> Message-ID: <55beb522.01948c0a.f18bc.26ff@mx.google.com> On Sun, 2 Aug 2015 23:22:43 +0000 Zenaan Harkness wrote: > > Perhaps Google could kick this project off - they already own Android > and they must have the dollars. In fact Intel could produce the CPU, > Foxconn can build the handsets, Google can install the software and > the NSA can deliver them to us^B^B^B sorry, the Postal Service can > deliver them to us. > > We have a plan for a better world. It starts with money. Money and > trust. Trust. But not without money. More money. And technology. > Technology and money. I'll leave you to contact Goog to start this > ball rolling. > Great! Finally the cypherpunks can start writing code and forget all the off-topic political ramblings. From zen at freedbms.net Sun Aug 2 16:22:43 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Sun, 2 Aug 2015 23:22:43 +0000 Subject: Open Fabs In-Reply-To: References: <55B94E52.2050709@pilobilus.net> <55BDFB45.4010507@riseup.net> <55BE149F.3080104@cock.li> Message-ID: On 8/2/15, Lodewijk andré de la porte wrote: > We will not get 50% of the population to use semi-good-crypto. Assuming you define TBB as semi-good crypto, the block AIUI to Mozilla incorporating Tor plugins/ mods into Firefox by default is simply that the Tor network cannot scale Internet wide. Yet. Because of course you know then we'd all be secure. But what do you define as semi-good crypto? > Far more > than that just do not give any damns at all. Agreed. But they might give some dollars for shiny new handset. > Legal protection for those that make insecure shit is so huge that society > is literally stacked against privacy as a whole. The "protected-consumer" > culture has led to widespread market failure - rather than think people buy > with their hearts. Simply put, "Think Different" turned into "Don't think > at all". You think you think? Bah! Thinking's overrated. > That said, I don't see why there's no company attempting to address the > niche of "I want it truly secure". Because there's no such thing as "truly secure" and marketing to the "I want it truly secure" crowd would likely result in deception, which due to the overly paranoid nature of such crowd, would quickly deconstruct the bullshit anywya. > Wouldn't governments like if the US > doesn't spy on them? Making a lot of assumptions there - such as "there are few enough politicians who are compromised (with sex or money), that the rest can stand strong in the face of the few". Although the very recent French and Italian delegations to Crimea suggest at least some are capable of on the ground analysis in the face of the rest of their respective parliaments. Who knows, next we might see Greece running a referendum so the people can decide what their government should be doi... oh, hang on... > Wouldn't large companies' officers be very happy with > a secure e-mail/voice call system? And a way to get rid of those compromising images held by their respective national governments... > If it runs Android apps (protip: Android's JVM is open source) in a more > secure manner (like, uhm, in-hardware-sandboxing? Libre Hypervisor CPU with > the OS on it, and a jailed EvilCorp coprocessor that does the Android > stuff?) it doesn't seem to take that much to build a smartphone nowadays > (looking at Chinaphones, that is). Of course! We've all missed that obvious for so long - put JVM in a secure open source hypervisor and the world will be safe. That would even encourage me to be less sarcastic. > And, many of the people that want it "truly secure" will understand that > the products will cost more than a mass-produced NSA sponsored unit. Perhaps Google could kick this project off - they already own Android and they must have the dollars. In fact Intel could produce the CPU, Foxconn can build the handsets, Google can install the software and the NSA can deliver them to us^B^B^B sorry, the Postal Service can deliver them to us. We have a plan for a better world. It starts with money. Money and trust. Trust. But not without money. More money. And technology. Technology and money. I'll leave you to contact Goog to start this ball rolling. From l at odewijk.nl Sun Aug 2 08:54:37 2015 From: l at odewijk.nl (=?UTF-8?Q?Lodewijk_andr=C3=A9_de_la_porte?=) Date: Mon, 3 Aug 2015 00:54:37 +0900 Subject: Open Fabs In-Reply-To: <55BE149F.3080104@cock.li> References: <55B94E52.2050709@pilobilus.net> <55BDFB45.4010507@riseup.net> <55BE149F.3080104@cock.li> Message-ID: We will not get 50% of the population to use semi-good-crypto. Far more than that just do not give any damns at all. Legal protection for those that make insecure shit is so huge that society is literally stacked against privacy as a whole. The "protected-consumer" culture has led to widespread market failure - rather than think people buy with their hearts. Simply put, "Think Different" turned into "Don't think at all". That said, I don't see why there's no company attempting to address the niche of "I want it truly secure". Wouldn't governments like if the US doesn't spy on them? Wouldn't large companies' officers be very happy with a secure e-mail/voice call system? If it runs Android apps (protip: Android's JVM is open source) in a more secure manner (like, uhm, in-hardware-sandboxing? Libre Hypervisor CPU with the OS on it, and a jailed EvilCorp coprocessor that does the Android stuff?) it doesn't seem to take that much to build a smartphone nowadays (looking at Chinaphones, that is). And, many of the people that want it "truly secure" will understand that the products will cost more than a mass-produced NSA sponsored unit. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1545 bytes Desc: not available URL: From carimachet at gmail.com Sun Aug 2 16:49:54 2015 From: carimachet at gmail.com (Cari Machet) Date: Mon, 3 Aug 2015 02:49:54 +0300 Subject: Open Fabs In-Reply-To: References: <55B94E52.2050709@pilobilus.net> <55BDFB45.4010507@riseup.net> <55BE149F.3080104@cock.li> Message-ID: ok zenaan ur way 2 intelligent for everyone ...we get it but.... On Sun, Aug 2, 2015 at 2:13 PM, odinn wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Not sure if someone already mentioned this, but what of opencores.org ? > > Which offers professional support for products from that site, why cant you yak your head (while slapping it) off about solution? On Mon, Aug 3, 2015 at 2:22 AM, Zenaan Harkness wrote: > On 8/2/15, Lodewijk andré de la porte wrote: > > We will not get 50% of the population to use semi-good-crypto. > > Assuming you define TBB as semi-good crypto, the block AIUI to Mozilla > incorporating Tor plugins/ mods into Firefox by default is simply that > the Tor network cannot scale Internet wide. Yet. Because of course you > know then we'd all be secure. > > But what do you define as semi-good crypto? > > > Far more > > than that just do not give any damns at all. > > Agreed. But they might give some dollars for shiny new handset. > > > Legal protection for those that make insecure shit is so huge that > society > > is literally stacked against privacy as a whole. The "protected-consumer" > > culture has led to widespread market failure - rather than think people > buy > > with their hearts. Simply put, "Think Different" turned into "Don't think > > at all". > > You think you think? Bah! Thinking's overrated. > > > That said, I don't see why there's no company attempting to address the > > niche of "I want it truly secure". > > Because there's no such thing as "truly secure" and marketing to the > "I want it truly secure" crowd would likely result in deception, which > due to the overly paranoid nature of such crowd, would quickly > deconstruct the bullshit anywya. > > > > Wouldn't governments like if the US > > doesn't spy on them? > > Making a lot of assumptions there - such as "there are few enough > politicians who are compromised (with sex or money), that the rest can > stand strong in the face of the few". Although the very recent French > and Italian delegations to Crimea suggest at least some are capable of > on the ground analysis in the face of the rest of their respective > parliaments. Who knows, next we might see Greece running a referendum > so the people can decide what their government should be doi... oh, > hang on... > > > > Wouldn't large companies' officers be very happy with > > a secure e-mail/voice call system? > > And a way to get rid of those compromising images held by their > respective national governments... > > > > If it runs Android apps (protip: Android's JVM is open source) in a more > > secure manner (like, uhm, in-hardware-sandboxing? Libre Hypervisor CPU > with > > the OS on it, and a jailed EvilCorp coprocessor that does the Android > > stuff?) it doesn't seem to take that much to build a smartphone nowadays > > (looking at Chinaphones, that is). > > > Of course! We've all missed that obvious for so long - put JVM in a > secure open source hypervisor and the world will be safe. That would > even encourage me to be less sarcastic. > > > > And, many of the people that want it "truly secure" will understand that > > the products will cost more than a mass-produced NSA sponsored unit. > > Perhaps Google could kick this project off - they already own Android > and they must have the dollars. In fact Intel could produce the CPU, > Foxconn can build the handsets, Google can install the software and > the NSA can deliver them to us^B^B^B sorry, the Postal Service can > deliver them to us. > > We have a plan for a better world. It starts with money. Money and > trust. Trust. But not without money. More money. And technology. > Technology and money. I'll leave you to contact Goog to start this > ball rolling. > > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6320 bytes Desc: not available URL: From carimachet at gmail.com Sun Aug 2 21:07:30 2015 From: carimachet at gmail.com (Cari Machet) Date: Mon, 3 Aug 2015 07:07:30 +0300 Subject: Open Fabs In-Reply-To: <55beb522.01948c0a.f18bc.26ff@mx.google.com> References: <55B94E52.2050709@pilobilus.net> <55BDFB45.4010507@riseup.net> <55BE149F.3080104@cock.li> <55beb522.01948c0a.f18bc.26ff@mx.google.com> Message-ID: aaaaahhhh i remember now seeing this shit before about one major reason why tor sux and i dont fucking want to use it and i desperately want smart brains to think up something new ... many ... different new things please not just one https://youtu.be/qXajND7BQzk?t=27m30s fuck the state in all its incarnations On Mon, Aug 3, 2015 at 3:28 AM, Juan wrote: > On Sun, 2 Aug 2015 23:22:43 +0000 > Zenaan Harkness wrote: > > > > > > Perhaps Google could kick this project off - they already own Android > > and they must have the dollars. In fact Intel could produce the CPU, > > Foxconn can build the handsets, Google can install the software and > > the NSA can deliver them to us^B^B^B sorry, the Postal Service can > > deliver them to us. > > > > We have a plan for a better world. It starts with money. Money and > > trust. Trust. But not without money. More money. And technology. > > Technology and money. I'll leave you to contact Goog to start this > > ball rolling. > > > > > Great! Finally the cypherpunks can start writing code and > forget all the off-topic political ramblings. > > > > > > > > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2874 bytes Desc: not available URL: From blibbet at gmail.com Mon Aug 3 13:28:40 2015 From: blibbet at gmail.com (Blibbet) Date: Mon, 03 Aug 2015 13:28:40 -0700 Subject: getting firmware vulnerability info into hardware reviews Message-ID: <55BFCEF8.4010404@gmail.com> Hi, I'm trying to get computer reviews to include more useful information, mainly about checking about known firmware vulnerabilities using Intel CHIPSEC (or MITRE/LegbaCore Copernicus for Windows). http://firmwaresecurity.com/2015/08/03/new-hardware-reviewers-please-post-chipsec-logs/ If you know of anyone that does reviews for a living, please forward it to them. I need help with that, I don't have any contacts at review sites. If you've recently bought a new Intel-based system , and it fails CHIPSEC, please let others know about it, so other consumers can avoid that broken hardware. If you work at a company where your purchases have more influence to OEMs than a single citizen, please help by demanding CHIPSEC results before purchase, to help make OEMs deliver better systems. Thanks very much! Lee RSS: http://firmwaresecurity.com/feed From blibbet at gmail.com Mon Aug 3 13:48:22 2015 From: blibbet at gmail.com (Blibbet) Date: Mon, 03 Aug 2015 13:48:22 -0700 Subject: getting firmware vulnerability info into hardware reviews In-Reply-To: <55BFD084.6040403@cock.li> References: <55BFCEF8.4010404@gmail.com> <55BFD084.6040403@cock.li> Message-ID: <55BFD396.7030906@gmail.com> On 08/03/2015 01:35 PM, xcelq wrote: >> http://firmwaresecurity.com/2015/08/03/new-hardware-reviewers-please-post-chipsec-logs/ > > Does Youtube reviewers count? Sure, please add some text besides the video, hopefully paste the text of the log, if Youtube allows that. Any awareness is better than current situation of ignorance. blogs, tweets, youtube videos, etc. Send logs of fresh hardware and I'll post blog entries on them. On Twitter use #UEFI and/or #BIOS. I don't know how to use Facebook. If you blog on it, let me know your Atom/RSS feed. I wish someone would create a site where users could upload their CHIPSEC report logs, and site would enable people to query all of the uploaded results. BTW, sorry my blog looks sucky, I still haven't learned WordPress and that's the default theme. Working on it. Will have static HTML files on site with related resource links in the coming days. Thanks, Lee RSS: http://firmwaresecurity.com/feed From yassww at cock.li Mon Aug 3 13:35:16 2015 From: yassww at cock.li (xcelq) Date: Mon, 3 Aug 2015 15:35:16 -0500 Subject: getting firmware vulnerability info into hardware reviews In-Reply-To: <55BFCEF8.4010404@gmail.com> References: <55BFCEF8.4010404@gmail.com> Message-ID: <55BFD084.6040403@cock.li> Does Youtube reviewers count? On 08/03/15 15:28, Blibbet wrote: > Hi, > > I'm trying to get computer reviews to include more useful information, > mainly about checking about known firmware vulnerabilities using Intel > CHIPSEC (or MITRE/LegbaCore Copernicus for Windows). > > http://firmwaresecurity.com/2015/08/03/new-hardware-reviewers-please-post-chipsec-logs/ > > If you know of anyone that does reviews for a living, please forward it > to them. I need help with that, I don't have any contacts at review sites. > > If you've recently bought a new Intel-based system , and it fails > CHIPSEC, please let others know about it, so other consumers can avoid > that broken hardware. > > If you work at a company where your purchases have more influence to > OEMs than a single citizen, please help by demanding CHIPSEC results > before purchase, to help make OEMs deliver better systems. > > Thanks very much! > Lee > RSS: http://firmwaresecurity.com/feed > From jdb10987 at yahoo.com Mon Aug 3 10:32:56 2015 From: jdb10987 at yahoo.com (jim bell) Date: Mon, 3 Aug 2015 17:32:56 +0000 (UTC) Subject: Old-style encryption Message-ID: <708199893.371667.1438623176165.JavaMail.yahoo@mail.yahoo.com> http://news.yahoo.com/italy-cracks-mafia-sheep-code-arrest-godfathers-henchmen-111947663.html Italy cracks Mafia sheep code to arrest Godfather's henchmen By Ella Ide 1 hour ago Rome (AFP) - Italian police on Monday arrested 11 suspects linked to the fugitive head of the Sicilian Mafia, including a former boss who ran a secret message system for the mobster using a sheep-based code. Matteo Messina Denaro, 53, who has been on the run since 1993, used a farm in Mazara del Vallo to communicate with his henchmen via the aged-old method of "pizzini", bits of paper containing messages often written in cipher, police said. Among those arrested was former boss Vito Gondola, 77, whose job it was to call the clan members to alert them to each new message, which was placed under a rock in a field at the farm and often destroyed on the spot after reading. "I've put the ricotta cheese aside for you, will you come by later?" he would say on the telephone -- a phrase investigators said had nothing to do with dairy products. "The sheep need shearing... the shears need sharpening" and "the hay is ready", were among other code phrases used to alert the gang to a new message, written on tightly folded bits of paper wrapped in Sellotape and then hidden in the dirt. The police investigation, which followed the passing of messages between 2011 and 2014, used hidden cameras and microphones around the farm near Trapani in western Sicily to follow the movements of the clan -- and discover Denaro's fading glory. View gallery Gondola is caught in one conversation telling another mobster that Denaro -- once a trigger man who reportedly boasted he could "fill a cemetery" with his victims -- was losing control over the latest generation of criminals, who "disappear without saying anything". - 'State win, Mafia loses' - Three of those arrested were over 70 years old. The only known photos of Denaro date back to the early 1990s. He is believed to be the successor of the godfathers Toto Riina and Bernardo Provenzano, who are both serving life sentences, but less is known about him. At the height of his power he had a reputation as a flashy, ruthless womaniser who ruled over at least 900 men with an iron fist. View gallery The 11 suspects arrested "were the men who were closest to Denaro right now," said police official Renato Cortese, adding that it was "too early to say" whether the sting would help investigators close in on the fugitive. Prime Minister Matteo Renzi thanked the investigators in a message on his Facebook page, saying onwards all, to finally capture the super-fugitive boss," insisting "Italy is united against organised crime" despite a recent slew of corruption scandals in the country. "The state wins, the Mafia loses," Interior Minister Angelino Alfano said on Twitter. Gondola, who despite his age rose every morning at 4 am to tend to his flock, is believed to have once been a right-hand man to Riina. In the 1970s he belonged to a gang used by the Mafia to carry out kidnappings, according to Italian media reports. The Sicilian Mafia, known as "Cosa Nostra" or "Our Thing", was the country's most powerful organised crime syndicate in the 1980s and 1990s, but has seen its power diminish following years of investigations and mass arrests. It also faces fierce underworld competition from the increasingly powerful Naples-based Camorra and Calabria's 'Ndrangheta. From coderman at gmail.com Mon Aug 3 18:57:24 2015 From: coderman at gmail.com (coderman) Date: Mon, 3 Aug 2015 18:57:24 -0700 Subject: FOIA/PA In-Reply-To: <109959012.382746.1438497803035.JavaMail.yahoo@mail.yahoo.com> References: <109959012.382746.1438497803035.JavaMail.yahoo@mail.yahoo.com> Message-ID: On 8/1/15, jim bell wrote: > ... > The docket is available to anyone, for free, using the PACER (www.pacer.com) > system, if you use less than 150 pages per calendar quarter. hey Jim, i wasn't able to find this case at a quick search, for any case #'s given. do you happen to have a fully qualified identifier or PDF doc from same? i bet digital archeology could find some things... now. :) best regards, From juan.g71 at gmail.com Mon Aug 3 16:29:52 2015 From: juan.g71 at gmail.com (Juan) Date: Mon, 3 Aug 2015 20:29:52 -0300 Subject: so called onion routing Message-ID: <55bff8f5.a85c8c0a.926e1.ffffce20@mx.google.com> http://www.onion-router.net/History.html 1995: Initial work on Onion Routing begins, funded by ONR. http://cypherpunks.venona.com/ grep onion cyp-1993.txt # For example, Eric Messick calls his things "onions," suggesting multiple "(For example, Eric Messick calls his things "onions," suggesting multiple layers of "return postage guaranteed" envelopes. This may be a great idea, and even a great name (which we may all be using in 5 years)," Also, the idea of multiple, nested, encrpyted 'envelopes' that contain routing information is routinely mentioned at that time, if I'm not mistaken. From zen at freedbms.net Mon Aug 3 17:25:02 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Tue, 4 Aug 2015 00:25:02 +0000 Subject: Open Fabs In-Reply-To: References: <55B94E52.2050709@pilobilus.net> <55BDFB45.4010507@riseup.net> <55BE149F.3080104@cock.li> Message-ID: On 8/3/15, Lodewijk andré de la porte wrote: > 2015-08-03 8:22 GMT+09:00 Zenaan Harkness : ... >> We have a plan for a better world. It starts with money. Money and >> trust. Trust. But not without money. More money. And technology. >> Technology and money. I'll leave you to contact Goog to start this >> ball rolling. > > Your comments are neither in depth nor self evident. > > I'm not going to expand on the virtues and evils on capitalism. > It suffices to say that money is here to stay, and we better > make good goddamn use of it. I agree. Thank you for bringing things down to earth - that is in fact a much more useful approach to (pick an adjective of) comedy in most circumstances. > We'll need it to live well, and allow others to live well while > supporting the cause. In general, and for most people, yes. For many years we have occasionally seen large endowments (in the order of say $1 million USD) to fund developers for this or that. A lurking thought for me is that this money could fund say one house, and the interest on the remainder could pay for rates, internet and electricity. Then somebody could live in that house, and grow their food, and have most of their time for programming without having to find rent each week. Yes some money is still needed, but a lot less than in a "normal rental" situation. There might be better futures still of course - this has just been a self posed question of "how can we harness resources better in general, so our results/ efforts are more long lasting". > I think it's better to deserve (earn) the money than > to beg for it. If capitalism is a remotely sane system that > must be possible. Feel free to propose an alternative. Exchange of human energy using money as facilitator is the extremely dominant reality right now, so we must work with it. One of the greatest insights into "a new reality" that the Free Software movement shows us (as compared with traditional capitalism) is that many of us humans like to contribute their talents and skills back to the community and don't require proprietary land and profit maximisation. Many of course are happy to develop libre software for a wage, some "hard core" programmers have sacrificed significant monetary income in order to build something truly free and community based - witness Paul Davis of ardour.org fame, and Tom Lord's arch version control back in the day - these and others have made personal sacrifices which very few ordinarily would. So how might we expand the comfort zone for those willing to make some sacrifices? What other transitions (slow movement away from base capitalism) might make sense? > I talked about trust a bit before. There's always going to be some trust. > If you're reasonable about the amount and type of trust it's entirely > workable. Agreed. Thanks again, Zenaan From jdb10987 at yahoo.com Mon Aug 3 19:15:38 2015 From: jdb10987 at yahoo.com (jim bell) Date: Tue, 4 Aug 2015 02:15:38 +0000 (UTC) Subject: FOIA/PA In-Reply-To: References: Message-ID: <1574391633.66688.1438654538789.JavaMail.yahoo@mail.yahoo.com> ----- Original Message ----- From: coderman To: jim bell Cc: John Young ; "cypherpunks at cpunks.org" Sent: Monday, August 3, 2015 6:57 PM Subject: Re: FOIA/PA On 8/1/15, jim bell wrote: > ... > The docket is available to anyone, for free, using the PACER (www.pacer.com) > system, if you use less than 150 pages per calendar quarter. hey Jim, i wasn't able to find this case at a quick search, for any case #'s given. do you happen to have a fully qualified identifier or PDF doc from same? i bet digital archeology could find some things... now. :) Here's a page from PACER: (It's the 9th Circuit Court of Appeals) CM/ECF Case Search Calendar Opinions Orders/Judgments XML TXT Logout Help Case Selection Page Case Number Title Opening Date Party Last Docket Entry Originating Case Number Origin 99-30210 USA v. Bell 07/06/1999 James Dalton Bell 03/08/2011 16:48:04 0981-3 : CR-97-05270-FDB U.S. District Court for Western Washington, Tacoma Note: * Click on Case No. to get Case Summary * Click on Short Title to get Case Query * Click on Originating Case No. to get Case Summary for Originating Case PACER Service Center Transaction Receipt U.S. Court of Appeals for the 9th Circuit - 08/03/2015 19:14:10 PACER Login: jamesbell Client Code: Description: Case Selection Table Search Criteria: Case: 99-30210, Name: bell,james (pty), Filed: 08/03/2015 and earlier Billable Pages: 1 Cost: 0.10 Court Information Court Home PACER Service Center Change Client Billing History Contact Us From l at odewijk.nl Mon Aug 3 10:50:39 2015 From: l at odewijk.nl (=?UTF-8?Q?Lodewijk_andr=C3=A9_de_la_porte?=) Date: Tue, 4 Aug 2015 02:50:39 +0900 Subject: Open Fabs In-Reply-To: References: <55B94E52.2050709@pilobilus.net> <55BDFB45.4010507@riseup.net> <55BE149F.3080104@cock.li> Message-ID: 2015-08-03 8:22 GMT+09:00 Zenaan Harkness : > > If it runs Android apps (protip: Android's JVM is open source) in a more > > secure manner (like, uhm, in-hardware-sandboxing? Libre Hypervisor CPU > with > > the OS on it, and a jailed EvilCorp coprocessor that does the Android > > stuff?) it doesn't seem to take that much to build a smartphone nowadays > > (looking at Chinaphones, that is). > > > Of course! We've all missed that obvious for so long - put JVM in a > secure open source hypervisor and the world will be safe. That would > even encourage me to be less sarcastic. JVM in a proper jail would indeed solve many of our problems. If you're saying we can't develop a proper jail, then, well, maybe your sarcasm can shield us from the future instead. If some variant of "but then there's this" is on your tongue, yes there's many other issues too. I'm pretty sure they can all be dealt with. > > > And, many of the people that want it "truly secure" will understand that > > the products will cost more than a mass-produced NSA sponsored unit. > > Perhaps Google could kick this project off - they already own Android > and they must have the dollars. In fact Intel could produce the CPU, > Foxconn can build the handsets, Google can install the software and > the NSA can deliver them to us^B^B^B sorry, the Postal Service can > deliver them to us. > I don't really know what kind of satire you're playing here :( If I squint I can see an argument along the lines of "but I won't trust you either" - which is entirely destructive. In the Bitcoin world there's some attempts to make trust less needed - but still deliver services. A 2-out-of-3 multisig wallet where the service holds one key, you hold another, and a trusted third party (a notary of your choosing, your safe, whatever) holds a key *you generated and gave that party* is a rather good way, for example, to securely store your money. Now you can run off screaming "LOL U R USING NSA CYRPTO WHAHA" and continue eating rocks instead, but try being clearer and less "funny" while doing so. > We have a plan for a better world. It starts with money. Money and > trust. Trust. But not without money. More money. And technology. > Technology and money. I'll leave you to contact Goog to start this > ball rolling. Your comments are neither in depth nor self evident. I'm not going to expand on the virtues and evils on capitalism. It suffices to say that money is here to stay, and we better make good goddamn use of it. We'll need it to live well, and allow others to live well while supporting the cause. I think it's better to deserve (earn) the money than to beg for it. If capitalism is a remotely sane system that must be possible. Feel free to propose an alternative. I talked about trust a bit before. There's always going to be some trust. If you're reasonable about the amount and type of trust it's entirely workable. Technology is the mantra here. If you want it otherwise, go elsewhere. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4180 bytes Desc: not available URL: From carimachet at gmail.com Mon Aug 3 19:20:05 2015 From: carimachet at gmail.com (Cari Machet) Date: Tue, 4 Aug 2015 05:20:05 +0300 Subject: FOIA/PA In-Reply-To: References: <109959012.382746.1438497803035.JavaMail.yahoo@mail.yahoo.com> Message-ID: Found out i cannot foia a person unless they are considered no longer with us ... they can foia themselves however... We need to have really specific key words to foia and a list of all agencies involved On Aug 4, 2015 5:13 AM, "coderman" wrote: > On 8/1/15, jim bell wrote: > > ... > > The docket is available to anyone, for free, using the PACER ( > www.pacer.com) > > system, if you use less than 150 pages per calendar quarter. > > > hey Jim, i wasn't able to find this case at a quick search, for any > case #'s given. do you happen to have a fully qualified identifier or > PDF doc from same? > > i bet digital archeology could find some things... now. :) > > > best regards, > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1146 bytes Desc: not available URL: From nymble at gmail.com Tue Aug 4 18:14:56 2015 From: nymble at gmail.com (Paul Lambert) Date: Tue, 4 Aug 2015 18:14:56 -0700 Subject: so called onion routing In-Reply-To: <55bff8f5.a85c8c0a.926e1.ffffce20@mx.google.com> References: <55bff8f5.a85c8c0a.926e1.ffffce20@mx.google.com> Message-ID: <460FFE1B-B1DE-437A-B808-B96A6364BB06@gmail.com> > > http://www.onion-router.net/History.html > > 1995: > Initial work on Onion Routing begins, funded by ONR. > > > http://cypherpunks.venona.com/ > > > grep onion cyp-1993.txt > > # For example, Eric Messick calls his things "onions," suggesting > multiple Interesting … the ISO NLSP-C did not call it’self an ‘opinion’, but about 1993 it supported multiple tunnel encapsulations that could be used for anonymity services ( https://goo.gl/CG9Koc ). It was derived from the 89 vintage NSA defined SP3-C protocol ( http://goo.gl/QEp67F ). > > > "(For example, Eric Messick calls his things "onions," suggesting > multiple layers of "return postage guaranteed" envelopes. This may be > a great idea, and even a great name (which we may all be using in 5 > years)," > > > > Also, the idea of multiple, nested, encrpyted 'envelopes' that contain > routing information is routinely mentioned at that time, if I'm not > mistaken. > > > > > > From jdb10987 at yahoo.com Tue Aug 4 15:01:15 2015 From: jdb10987 at yahoo.com (jim bell) Date: Tue, 4 Aug 2015 22:01:15 +0000 (UTC) Subject: Constitutionality of tracking cell phones. Message-ID: <2135272683.827611.1438725675436.JavaMail.yahoo@mail.yahoo.com> http://news.yahoo.com/constitution-check-does-cellphone-privacy-owner-wanderings-110211556--politics.html Constitution Check: Does cellphone privacy follow its owner’s wanderings? Lyle Denniston, the National Constitution Center’s constitutional literacy adviser, examines a case that has just arrived at the Supreme Court about police access to cellphone location data stored on cellphone towers. View photo.THE STATEMENT AT ISSUE: “As technology advances, location information from cellphones (and, of course, smartphones) will undoubtedly become more precise and easier to obtain, and if there is no expectation of privacy here, I have some concerns about the government being able to conduct 24/7 electronic tracking (live or historical) in the years to come without an appropriate judicial order.  And I do not think I am alone in this respect.” – Excerpt from an opinion by a federal judge, Adalberto Jordan of the U.S. Court of Appeals for the Eleventh Circuit, limiting his support for a ruling by that court rejecting a Florida man’s Fourth Amendment challenge to federal investigators’ monitoring of the places where he used a cellphone over a continuous span of more than two months.  That individual has now filed an appeal at the Supreme Court. WE CHECKED THE CONSTITUTION, AND… For nearly a half-century, it has been true that a private individual carries around as a kind of personal constitutional shield a right of privacy.  As the Supreme Court put it in a famous decision in 1967, “wherever a man may be, he is entitled to know that he will remain free from unreasonable searches and seizures.”  All that is necessary to have that shield available as that individual moves about, the court said then, is that he or she is doing something that they personally regard as private, and that society in general would agree that it should be private. In technical constitutional terms, that decision in Katz v. United States – extending protection to what an individual said while using a public telephone booth – was the origin of the idea that the Fourth Amendment protects “a reasonable expectation of privacy.” That amendment, the court said, “protects people, not places.” In the case of the telephone booth, the caller may have been entirely visible through the glass doors, but was still expecting that the actual messages spoken into the telephone were meant to be heard only by the person on the other end. It is too much to say, however, that the individual never loses that privacy once the activity moves outside the enclave of the home into the larger world.  The catch is that part of the test that says society must share the perception that the activity does deserve to remain private.  Even in that 1967 ruling, the court was careful to say that “what a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection.” That, of course, makes the protection of that amendment depend in part on the specific action the individual takes to show that the activity was meant to be private – such as closing the door on the telephone booth. Complicating the constitutional question, however, is the situation when an individual tries to keep something private, but strangers (“third parties,” in the language of law) learn of that activity.  That was the scenario that the Supreme Court encountered in 1979, when it allowed law enforcement officers to obtain from a telephone company the numbers that a user had dialed. That, the Justices ruled in the case of Smith v. Maryland, was not even a search under the Fourth Amendment, because the individual gave up the privacy about those numbers merely by dialing; that allowed a record to be made in the files of the company.  Besides, the court added, the officers did not learn much from that data; they could not even be sure that any call actually had connected. Lately, though, that part of Fourth Amendment law is being reexamined in the courts, as changes in technology make it far more likely that a person’s activities in public can be tracked much more closely, and thus more intrusively. Three years ago, the Supreme Court for the first time examined what it means to privacy that police can use a tracking device, linked to globe-circling satellites, to trace the movement of a suspect’s car, and thus some of the activities of the car’s driver.  The decision in Jones v. United States was limited, based on a theory that installation of the device was a “trespass,” but it has come to stand for two larger principles: first, that officers should get a warrant before they do such monitoring, and, second, that technology can definitely change the Fourth Amendment equation about what is private. Last year, the court went further in this examination, concluding that police should get a warrant before they check out the stored contents of a cellphone that police take away from an individual they have arrested.  What is logged on a cellphone, the Justices said, can include a vast amount of intensely personal data, and police access to that should only be allowed if a judge has found a good reason to issue a search warrant to get at it. The next step in this constitutional evolution has just arrived in an appeal to the Supreme Court, in the case of Davis v. United States.  It is a test of the privacy – or lack of it – of the information that police may gather by checking stored data on cellphone towers located around a community.  The majority of the U.S. Court of Appeals for the Eleventh Circuit decided that this did not even implicate the Fourth Amendment, because an individual has no “reasonable expectation of privacy” in the location data; that is a record kept by the tower operator, the telephone company, and the individual whose calls were logged gave it up merely by using his cellphone. The data, covering 67 continuous days of use on that cellphone, was technically so refined and detailed that it actually placed the user – Quartavius Davis – at the scene of a series of robberies of local businesses in the Miami, Fla., area.    Davis’s lawyers have calculated that the towers yielded more than 11,000 bits of data about where he was when he made or got a call.  The data was used to convict him of a series of federal crimes, and his lawyers failed to get that excluded from his case on a theory that it invaded his right of privacy in his movements, so should have been barred unless police had a search warrant. Taking that case on to the Supreme Court, his attorneys argued that the Justices needed to step in now “to ensure that the Fourth Amendment does not become a dead letter as police accelerate their warrantless access to rich troves of sensitive personal location data.” The court is expected to act on the case early in the next term. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7474 bytes Desc: not available URL: From coderman at gmail.com Tue Aug 4 22:06:01 2015 From: coderman at gmail.com (coderman) Date: Tue, 4 Aug 2015 22:06:01 -0700 Subject: FOIA/PA In-Reply-To: <1574391633.66688.1438654538789.JavaMail.yahoo@mail.yahoo.com> References: <1574391633.66688.1438654538789.JavaMail.yahoo@mail.yahoo.com> Message-ID: here is one case docket report, also as PDF, Court of Appeals Docket #: 99-30210 Docketed: 07/06/1999 Termed: 05/25/2001 USA v. Bell Appeal From: U.S. District Court for Western Washington, Tacoma Fee Status: IFP Case Type Information: 1) criminal 2) sentence and conviction 3) null Originating Court Information: District: 0981-3 : CR-97-05270-FDB Court Reporter: Teri Hendrix Court Reporter: Catherine Maria Vernon Trial Judge: Franklin D. Burgess, Senior District Judge Date Filed: 07/18/1997 Date Order/Judgment: Date NOA Filed: 06/22/1999 06/22/1999 Prior Cases: None Current Cases: Lead Member Start End Companion 01-30143 01-30162 04/25/2001 Related 99-30210 01-30143 04/05/2001 99-30210 01-30162 04/25/2001 UNITED STATES OF AMERICA Plaintiff - Appellee, Robert London, Esquire, Attorney Direct: 206/553-7970 [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101 v. JAMES DALTON BELL (Federal Prisoner: 26906-086) Defendant - Appellant, James Dalton Bell [COR LD NTC Pro Se] FCI - FEDERAL CORRECTIONAL INSTITUTION - SHERIDAN P.O. Box 5000 Sheridan, OR 97378-5000 Jonathan S. Solovy, Esquire, Attorney [COR LD NTC Assist Fed Pub Def] Law Office of Jonathan S. Solovy, PLLC 705 Second Avenue Seattle, WA 98104-1705 UNITED STATES OF AMERICA, Plaintiff - Appellee, v. JAMES DALTON BELL, Defendant - Appellant. 07/06/1999 1 DOCKETED CAUSE AND ENTERED APPEARANCES OF COUNSEL. Filed in D.C. on 6/23/99; setting schedule as follows: transcript shall be ordered by 7/14/99 for James Dalton Bell; transcript shall be filed by 8/13/99; appellants' briefs, excerpts due by 9/22/99 for James Dalton Bell; appellees' brief due 10/22/99 for USA; appellants' reply brief due by 11/5/99 for James Dalton Bell. ( RT required: y) ( Sentence imp 2 years) [99-30210] (XX) [Entered: 07/06/1999 03:12 PM] 07/16/1999 2 Received copy of District Court order filed on 6/22/99 withdraw as counsel Judith Mandel. (CASEFILE) [99-30210] (SW) [Entered: 10/15/1999 12:09 PM] 11/10/1999 4 Received Appellant James Dalton Bell letter dated 8/5/99 re: requesting an extension of time on his filing. (MOATT PER PROMO) [99-30210] (SW) [Entered: 11/10/1999 11:12 AM] 11/24/1999 5 Filed order MoAtt (Appellate Commissioner) In this criminal appeal, appellant appears on the court's docket as proceeding pro se, althought appellant may be entitled to appointment of counsel at government expense. Within 28 days of this order, appellant shall: (1) retain counsel who shall file a notice of appearance; or (2) file a motion for appointment of counsel at government expense; or (3) inform the court in writing of his clear and unequivocal intention to represent himself. Appellant's motion for an extension of time to file the opening brief is denied as moot. A new briefing schedule shall be established upon compliance with this order. Failure to comply with this order may result in the dismissal of this appeal for failure to prosecute. The Clerk shall serve this order on appellant individually at Reg. No. 26906-086, FCE (Phoenix), 37900 N. 45th Avenue, Department 1680, Phoenix, AZ 85029. [99-30210] (CP) [Entered: 11/24/1999 10:29 AM] 01/26/2000 9 Filed order (Appellate Commissioner) On Nov. 24, 1999, the court ordered aplt, within 28 days, to: (1) retain counsel who whall file a notice of appearance; or (2) file a motion for appointment of counsel at gov expense; or (3) inform the ocurt in writing of his clear andunequivocal intention ot represent himself. To date, the court has not rec'd a response from alt. Aplt shall have one final opportunity to comply with the court's Nov. 24, 1999 order. Wtinin 28 days of this order, aplt shall comply with the court's Nov. 24, 1999 order. etc. The Clerk shall serve this order by certified mail on aplt. etc. ( MOTIONS) [99-30210] (VT) [Entered: 01/26/2000 07:24 AM] 01/26/2000 10 Sent document order dated 1/26/00 certified # P196-169-679 [99-30210] (VT) [Entered: 01/26/2000 07:31 AM] 02/01/2000 11 Return receipt received P196-169-679 Cert. no. (VT) [Entered: 02/02/2000 06:21 AM] 03/02/2000 15 Received Appellant James Dalton Bell's motion for appointment of counsel. served on 3/2/00 nan/SEE ORDER OF 3/13/00 case file [99-30210] (VT) [Entered: 03/14/2000 07:25 AM] 03/13/2000 13 Filed order (Appellate Commissioner) The court, on its own motion, appoints counsel to represent aplt for this appeal. Counsel will be appointed by separate order. The Clerk shall serve a copy of this order on Thomas W. Hillier, II, FPD, 1111 Third Ave., Suite 1100, Seattle, WA 98101, who will be locate appointed counsel. The district court shall provide the Clerk of this court with the name and address of appointed counsel for in this appeal, aplt shall file a written objection within 21 days after the date of this order. New counsel shall designate the reporter's rt's by April 17, 2000. The tr's is due May 17, 2000. Aplt's opening brief and excerpts of record and due June 26, 2000; aple's answering brief is due July 26, 2000; the optional reply brief is due within 14 days after service of the answering brief. The Clerk shall serve this order by ertified mail. etc. ( MOTIONS) [99-30210] (VT) [Entered: 03/13/2000 06:49 AM] 03/13/2000 14 Sent Thomas W. Hillier, II, FPD copy of order and aplt certified #P196-169-683 [99-30210] (VT) [Entered: 03/13/2000 07:00 AM] 03/29/2000 16 Return receipt received P196-169-683 Cert. no. (VT) [Entered: 03/30/2000 06:43 AM] 04/10/2000 18 Received James Dalton Bell notice of designation of reporter's transcript. [99-30210] (VT) [Entered: 05/02/2000 10:14 AM] 04/26/2000 17 Filed notice of appearance of Catherin L. Floit (Withdrew as counsel: attorney Judith M. Mandel for James Dalton Bell [99-30210] (VT) [Entered: 05/02/2000 08:29 AM] 05/08/2000 19 Received Catherine L. Floit for Appellant James Dalton Bell's motion to withdraw as counsel and appoint new counsel of record for aplt. (no proof of serve) MOATT (VT) [Entered: 05/09/2000 08:51 AM] 05/11/2000 20 Filed certificate of record on appeal RT filed in DC 5/1/00 [99-30210] (VT) [Entered: 05/15/2000 10:38 AM] 05/26/2000 22 Filed order (Appellate Commissioner) The motion of Catherine L. Floit to be relieved as csl of record is granted. Aplt's motion for appointment of csl is granted. David Bukey 1111 Third Ave, Suite 2220 Seattle WA 98101 (206) 9391 will be appointed by separate order. The briefing schd established previously shall remain in the reporter's transcript are due 5/17/00, aplt's brief is due 6/26/00, aples brief is due 7/26/00, the reply brief is due is due withikn 14 days after service of the answering brief. The clerk shall serve this order on former csl Catherine L. Floit. ( MOATT) [99-30210] (WP) [Entered: 05/26/2000 10:15 AM] 06/16/2000 25 Filed David B. Bukey's motion to withdraw as counsel [99-30210] ; served on 6/14/00 (MOATT) (FT) [Entered: 06/20/2000 12:20 PM] 06/26/2000 31 Received letter from pro se re: status of counsel. (sent public docket) (rec'd w/ no CA number) (LP) [Entered: 07/06/2000 01:17 PM] 06/27/2000 30 Filed order (Appellate Commissioner) The motion of David B. Bukey, Esq., 1111 Third Ave., Suite 2220, Seattle, etc., to be relieved as counsel is granted. Jonathan S. Solovy, Esq., 119 First Avenue South, Suite 500, Seattle, WA 98104, etc., will be appointed by separate order. Aplt's opening brief and excerpts of record are due Aug. 14, 2000; aple's brief is due Sept. 13, 200; aplt's optional reply brief is due witin 14 days after service of aple's brief. The Clerk shall serve this order on former counsel, David B. Bukey, Esq. ( MOTIONS) [99-30210] (VT) [Entered: 06/27/2000 08:22 AM] 07/17/2000 33 Filed motion & order :(Appellate Commissioner) This court has rec'd aplt's pro se letter dated June 19, 2000 requesting appointment of new counsel. Because aplt is represented by counsel, only counsel may file motions, and this court therefore declines to entertaine the request. The Clerk shall serve a copy of the pro se letter on aplt's counsel of record, Jonathan S. Wolovy, Esq., at 119 First Ave.,5th Cloor, Seattle, Wa 98104. The Clerk shall also serve this order on aplt individually 7214 Coreegidor, Vancouver, WA 98664. ( Motion recvd 6/26/00) ( MOTIONS) [99-30210] (VT) [Entered: 07/17/2000 06:40 AM] 07/17/2000 34 Sent the attorney copy of prose letter and aplt copy of order. [99-30210] (VT) [Entered: 07/17/2000 06:45 AM] 08/16/2000 36 Filed Motion of Appellant and Order (Deputy Clerk: CAG) Aplt's motion for an extension of time in which to file the opening brief is GRANTED. The opening brief is due Oct 13, 2000. The answering brief is due Nov 13, 2000. The optional reply brief is due 14 days from service of the answering brief. In view of the lengthy extension of time granted by way of this order, any further request for an extension of time to file this brief is strongly disfavored. ( Motion recvd 8/7/00) [99-30210] (AF) [Entered: 08/16/2000 08:44 AM] 10/11/2000 39 Filed motion & order :(Deputy Clerk: cag/PROMO) Aplt's second motion for an ext of time in which to file opening brief is granted. The opening brief is due Nov. 6, 2000. The answering brief is due Dec. 6, 2000. The optional reply brief is due 14 days from service of the answering brief. ( Motion recvd 10/5/00) [99-30210] (VT) [Entered: 10/11/2000 06:55 AM] 11/09/2000 40 Filed original and 15 copies Appellant James Dalton Bell opening brief ( Informal: no) 66 pages and five excerpts of record in 1volumes; served on 11/6/00 [99-30210] (VT) [Entered: 11/27/2000 11:21 AM] 12/01/2000 41 14 day oral extension by phone of time to file Appellee USA's brief. [99-30210] appellees' brief due 12/20/00; appellants' reply brief due 14 days . . . (JC) [Entered: 12/01/2000 01:29 PM] 12/27/2000 43 Received orig. 15 copies USA's brief of 10 pages; served on 12/21/00 deficient: late, motion pending in promo [99-30210] (CP) [Entered: 12/29/2000 02:32 PM] 01/02/2001 45 Filed motion & order (Deputy Clerk: cag/PROMO) granting aplt motion for an ext of time to file the reply brief to and including Feb. 14, 2001. ( Motion recvd 12/27/00) [99-30210] (VT) [Entered: 01/02/2001 07:17 AM] 01/04/2001 47 Filed motion & order :(Deputy Clerk: cag/PROMO) Aple's motion for permission to extend the time for filing the answering brief is granted. The prev'd rec'd brief is ordered filed. The reply brief is remains due Feb. 4, 2001. ( Motion recvd 12/27/00) [99-30210] (VT) [Entered: 01/04/2001 05:43 AM] 01/04/2001 48 Filed original and 15 copies appellee USA's 10 pages brief, served on 12/21/00 [99-30210] (VT) [Entered: 01/04/2001 05:51 AM] 02/16/2001 51 Filed original and 15 copies James Dalton Bell reply brief, ( Informal: no ) 22 pages; served on 2/14/01 [99-30210] (VT) [Entered: 02/22/2001 06:52 AM] 03/02/2001 52 Calendar check performed [99-30210] (TH) [Entered: 03/02/2001 01:50 PM] 03/23/2001 53 CALENDARED: Seattle May 10 2001 9:00 a.m. Courtroom at Park Place, 21st Floor [99-30210] (TH) [Entered: 03/23/2001 10:34 AM] 05/10/2001 55 ARGUED AND SUBMITTED TO Donald P. Lay, Stephen S. TROTT, Marsha S. BERZON [99-30210] (KM) [Entered: 05/10/2001 11:33 AM] 05/25/2001 59 FILED MEMORANDUM DISPOSITION: AFFIRMED ( Terminated on the Merits after Oral Hearing; Affirmed; Written, Unsigned, Unpublished. Donald P. Lay, Stephen S. TROTT, Marsha S. BERZON ) FILED AND ENTERED JUDGMENT. [99-30210] (VT) [Entered: 05/25/2001 11:08 AM] 06/07/2001 60 Filed Appellant James Dalton Bell in 99-30210's motion to extend time to file petition for rehearing until 7/23/01 served on 6/6/01 PANEL [99-30210] (VT) [Entered: 06/07/2001 12:25 PM] 06/14/2001 62 Filed order (Donald P. Lay, Marsha S. BERZON): Appellant's motion for enlargement of time to file a petition for rehearing with suggestion for rehearing en banc is granted. The appellant is given an extension of 45 days up to and including 7/23/01, in which to make the filings. [99-30210] (TM) [Entered: 06/14/2001 09:40 AM] 07/23/2001 63 [4215446] Filed original and 50 copies of Appellant James Dalton Bell petition for rehearing with suggestion for rehearing en banc 19 p.pages, served on 7/21/01 (PANEL AND ALL ACTIVE JUDGES) [99-30210] (BY) [Entered: 07/24/2001 04:14 PM] 08/15/2001 64 Filed order ( Donald P. Lay, Stephen S. TROTT, Marsha S. BERZON, ): The petition for panel rehearing and the petition for rehearing en banc are denied. [99-30210] (VT) [Entered: 08/15/2001 05:50 AM] 09/06/2001 66 MANDATE ISSUED [99-30210] (VT) [Entered: 09/06/2001 07:49 AM] 01/03/2002 69 Received notice from Supreme Court: The application for an ext of time to file a petition for certiorari is granted to and including Jan. 11, 2002. Supreme Court No. 01A464 filed on 12/28/01. [99-30210] (VT) [Entered: 01/07/2002 10:30 AM] 02/05/2002 70 Received notice from Supreme Court: petition for certiorari filed Supreme Court No. 01-8050 filed on 1/11/02. [99-30210] (VT) [Entered: 02/06/2002 08:32 AM] 03/11/2002 71 Filed Supreme Court order, certiorari denied on 3/4/02. Supreme Court No. 01-8050 [99-30210] (VT) [Entered: 03/14/2002 11:42 AM] 07/11/2002 72 RECORD RETURNED. (See control card for details.) (JAS) [Entered: 07/11/2002 02:36 PM] 06/18/2003 73 Received letter from pro se dated 6/15/03 re: request for information regarding docket(sent public docket) and request for copyof NOA. (sent request to casefiles mgr who will retrive file) (CP) [Entered: 06/18/2003 01:18 PM] 09/12/2005 75 Received Appellant James Dalton Bell in 99-30210 letter dated 9/8/05 re: registering a complaint because he had no lawyer to represent him. nan/case file [99-30210] (VT) [Entered: 09/16/2005 09:52 AM] 03/06/2006 76 Received Appellant James Dalton Bell in 99-30210 letter dated 3/1/06 re: a complaint concerning this appeal. NAN/CASE FILE* [99-30210] (VT) [Entered: 03/23/2006 10:28 AM] 06/29/2006 77 Received Appellant James Dalton Bell in 99-30210 letter dated 6/5/06 re: forgery, fraud and obstruction of justice. nan/case file [99-30210] (VT) [Entered: 07/03/2006 07:07 AM] 07/21/2006 78 Received letter from pro se dated 7/17/06 re: The denial of certiorari in No Way obstructs my right to file under FRCP 60(b)......In other words, the cs isn't over.......(NAN; Case Closed) (CASEFILES) (AF) [Entered: 07/21/2006 05:04 PM] 08/28/2006 79 Received letter dated 08/14/06, from pro se re: request for full investigation to detect and correct dkt forgery and manipulations.... [NAN case closed/CASEFILE] (JC) [Entered: 08/31/2006 11:40 AM] 09/05/2006 80 Rec'd notice of change of address from James Dalton Bell individually in 99-30210 dated 8/29/06. (Aplt's new address: Reg. No. 26906-086, P.O. Box 33, Terre Haute, IN 47808) [99-30210] (AF) [Entered: 09/07/2006 09:11 AM] 11/13/2006 81 Received letter from pro se undated re: requested copy of public docket. (sent by af) (AF) [Entered: 11/14/2006 04:52 PM] 12/15/2006 83 Received letter from pro se undated re: ved 11/29/06 letter.....(no action nec per moatt) (CP) [Entered: 12/18/2006 05:03 PM] 03/05/2007 84 Received letter dated 2/28/07 from pro se re: req for public dkt (sent on this date to pro se aplt) (GN) [Entered: 03/09/2007 04:04 PM] 04/05/2007 86 Received letter from pro se re: FRCP 60(b) mtn (CASEFILE) (GN) [Entered: 04/06/2007 01:45 PM] 06/05/2007 87 Received letter from pro se re: renewed complaint of fraud (NAN; to CASEFILE) (GN) [Entered: 06/10/2007 02:29 PM] 03/17/2010 88 3 pg, 246.06 KB Received Appellant James Dalton Bell letter dated 03/10/2010 re: asking for copy of early docket sheet, sent him current copy of docket sheet. [7268785] (RR) [Entered: 03/17/2010 10:14 AM] 02/25/2011 89 2 pg, 165.3 KB Received Appellant (PROSE) James Dalton Bell letter dated 02/20/2011 re: want documents unsealed, did not request document to be sealed. Also request evidence and records of last attorney including ip and why he was allowed to withdraw. [7673408] (RR) [Entered: 03/08/2011 04:48 PM] -------------- next part -------------- A non-text attachment was scrubbed... Name: USAvBell_99-30210_Docket.pdf Type: application/pdf Size: 237208 bytes Desc: not available URL: From coderman at gmail.com Tue Aug 4 22:10:31 2015 From: coderman at gmail.com (coderman) Date: Tue, 4 Aug 2015 22:10:31 -0700 Subject: FOIA/PA In-Reply-To: References: <1574391633.66688.1438654538789.JavaMail.yahoo@mail.yahoo.com> Message-ID: next is a different case number, but same action? Court of Appeals Docket #: 01-30143 Docketed: 04/05/2001 Termed: 05/22/2001 USA v. Bell Appeal From: U.S. District Court for Western Washington, Seattle Fee Status: IFP Case Type Information: 1) criminal 2) pre-guidelines 3) interlocutory Originating Court Information: District: 0981-2 : CR-00-05731-JET Trial Judge: Jack E. Tanner, District Judge Date Filed: 11/29/2000 Date Order/Judgment: Date NOA Filed: 03/30/2001 04/02/2001 Prior Cases: 97-30384 Date Filed: 12/30/1997 Date Disposed: 08/21/1998 Disposition: Affirmed - Memorandum Current Cases: Lead Member Start End Companion 01-30143 01-30162 04/25/2001 Related 99-30210 01-30143 04/05/2001 99-30210 01-30162 04/25/2001 UNITED STATES OF AMERICA Plaintiff - Appellee, Helen J. Brunner, Esquire, Assistant U.S. Attorney [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101 Robert Louis London, Esquire Direct: 206/553-7970 [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101 v. JAMES DALTON BELL (Federal Prisoner: 26906-086) Defendant - Appellant, James Dalton Bell [COR LD NTC Pro Se] FCI - FEDERAL CORRECTIONAL INSTITUTION - SHERIDAN P.O. Box 5000 Sheridan, OR 97378-5000 Robert Michael Leen, Esquire, Attorney Direct: 425-949-8555 [COR LD NTC Please Select] Law Office Of Robert M. Leen P.O. Box 82 Woodinville, WA 98072-0082 UNITED STATES OF AMERICA, Plaintiff - Appellee, v. JAMES DALTON BELL, Defendant - Appellant. 04/05/2001 1 DOCKETED CAUSE AND ENTERED APPEARANCES OF COUNSEL. (Partially SEALED: part of NOA package from USDC under SEAL). Filed in D.C. on 04/02/01; setting schedule as follows: transcript shall be ordered by 4/20/01 for James Dalton Bell; transcript shall be filed by 5/21/01; appellants' briefs, excerpts due by 7/2/01 for James Dalton Bell; appellees' brief due 8/1/01 for USA; appellants' reply brief due by 8/15/01 for James Dalton Bell. (RT required: yes) (Sentence imp) [01-30143] (JC) [Entered: 04/05/2001 04:52 PM] 04/05/2001 2 Filed certificate of record on appeal RT filed in DC n/a [01-30143] (JC) [Entered: 04/06/2001 10:42 AM] 04/05/2001 9 Received (FAXED) Appellant James Dalton Bell's motion for stay of trial; served 3/27/01 (MOATT) (TM) [Entered: 04/09/2001 04:52 PM] 04/06/2001 4 Filed order (Appellate Commissioner) MOATT: This court has received appellant's 4/5/01 pro se notice of appeal, and pro se emergency motion to stay d.c. proceedings pending appeal. Because appellant is represented by counsel, only counsel may file motions, and this court therefore declines to entertain the motion. The Clerk shall serve a copy of the pro se motion on appellant's counsel of record, Robert M. Leen. Within 14 days of this order, counsel Leen shall file a response to appellant's pro se motion. In addition, counsel Leen shall move for voluntary dismissal of the appeal filed 4/5/0, or show cause why it should not be dismissed for lack of jurisdiction because the d.c. has not issued any orders that are final or appealable. If counsel Leen elects to show cause, appellee may respond within 10 days after service of counsel Leen's memorandum. If counsel Leen does not comply with this order, the Clerk shall dismiss this appeal pursuant to 42-1. Briefing is suspended pending further order of the court. The Clerk shall also serve this order on appellant individually. (FAXED) [01-30143] (TM) [Entered: 04/06/2001 04:48 PM] 04/09/2001 8 Received (Hard copy) Appellant James Dalton Bell's motion for stay of trial; served on 3/27/01 (MOATT) (TM) [Entered: 04/09/2001 03:37 PM] 04/13/2001 10 Filed Appellant's response to to order of 4/6/01 ; served on 4/9/01 (MOATT) [01-30143] (TM) [Entered: 04/13/2001 04:23 PM] 04/27/2001 11 Filed Appellant's response to order of 4/6/01 ; served on 4/18/01 (MOATT) [01-30143] (TM) [Entered: 04/27/2001 03:26 PM] 05/22/2001 13 Order filed The court has rcvd and reviewed counsel's 4/13/01 response to this court's 4/6/01 OSC. This appeal is dismissed for lack of jurisdiction... All pending motions are denied. DISMISSED ( Terminated on the Merits after Submission Without Oral Hearing; Dismissed/Frivolous; Written, Unsigned, Unpublished. Harry PREGERSON, Ferdinand F. FERNANDEZ, Kim M. WARDLAW ) [01-30143] (WP) [Entered: 05/22/2001 07:37 AM] 05/29/2001 15 Received Appellant James Dalton Bell's letter dated 5/18/01 re: confusion associated with this case; response sent to incorrect court; unacceptable assigment of counsel . . . . (No action necessary per MOATT) [01-30143] (TM) [Entered: 06/05/2001 04:10 PM] 06/01/2001 14 Received letter from pro se re: Notice of continuing detition violation and defendant's response to April 6 9th Cir. order. Conflict of interest between defendant Bell and Leen. (CASEFILE) (TM) [Entered: 06/01/2001 02:52 PM] 06/06/2001 17 Per appellant's request, mail appellant a copy of the docket rpts. in 01-30143 and 01-30162 along with copy of orders in those cases dismissing them. [01-30143] (TM) [Entered: 06/06/2001 04:48 PM] 06/08/2001 19 Filed Appellant James Dalton Bell's "Notice of Fraud on Court. Motion for Replacement of counsel, and investigation and hearing on filings in this cas. Notice for request for stay on 5/22/01 order" MOATT [01-30143] (TM) [Entered: 06/19/2001 01:05 PM] 06/11/2001 20 Filed appellant's request for extension of time to file response (motion to reconsider and/or amended refiling) to 5/22/01 order (MOATT) [01-30143] (TM) [Entered: 06/20/2001 10:48 AM] 06/22/2001 21 Filed order (Ferdinand F. FERNANDEZ): Because appellant is represented by counsel, the court declines to entertain the 6/8/01 and 6/11/01 pro se motions. No motions for reconsideration, rehearing, clarification, stay of the mandate, or any other submissions shall be filed or entertained in this closed docket. [01-30143] (TM) [Entered: 06/22/2001 09:50 AM] 08/14/2001 23 MANDATE ISSUED [01-30143] (TM) [Entered: 08/14/2001 03:15 PM] 02/12/2003 24 NO ORIGINAL RECORD (SS) [Entered: 02/12/2003 03:51 PM] 03/28/2003 25 Received Appellant James Dalton Bell in 01-30143 letter dated 3/25/03 re: requesting copy of the docket rpts in 01-30143, 01-30296 and 01-30303 (Mailed copy to him) [01-30143] Also, new address:USP Atwater, P.O. Box 019001, Atwater, CA 95301 (TM) [Entered: 04/03/2003 05:00 PM] 09/05/2006 27 Rec'd notice of change of address from James Dalton Bell dated 8/29/06. (New Add: Reg No. 26906-086 U.S. Penn P.O. Box 33, Terre Haute, IN 47808) [01-30143] (XX) [Entered: 09/12/2006 09:14 AM] -------------- next part -------------- A non-text attachment was scrubbed... Name: USAvBell_01-30143_Docket.pdf Type: application/pdf Size: 138050 bytes Desc: not available URL: From coderman at gmail.com Tue Aug 4 22:12:43 2015 From: coderman at gmail.com (coderman) Date: Tue, 4 Aug 2015 22:12:43 -0700 Subject: FOIA/PA In-Reply-To: References: <1574391633.66688.1438654538789.JavaMail.yahoo@mail.yahoo.com> Message-ID: On 8/4/15, coderman wrote: > next is a different case number, but same action? ... followed a few weeks later with: Court of Appeals Docket #: 01-30162 Docketed: 04/25/2001 Termed: 05/22/2001 USA v. Bell Appeal From: U.S. District Court for Western Washington, Tacoma Fee Status: IFP Case Type Information: 1) criminal 2) pre-guidelines 3) null Originating Court Information: District: 0981-3 : CR-00-05731-JET Court Reporter: Julaine V. Ryen, Court Reporter Trial Judge: Jack E. Tanner, District Judge Date Filed: 11/29/2000 Date Order/Judgment: Date NOA Filed: 04/11/2001 04/17/2001 Prior Cases: 97-30384 Date Filed: 12/30/1997 Date Disposed: 08/21/1998 Disposition: Affirmed - Memorandum Current Cases: Lead Member Start End Companion 01-30143 01-30162 04/25/2001 Related 99-30210 01-30143 04/05/2001 99-30210 01-30162 04/25/2001 UNITED STATES OF AMERICA Plaintiff - Appellee, Robert London, Esquire, Attorney Direct: 206/553-7970 [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101 v. JAMES DALTON BELL (Federal Prisoner: 26906-086) Defendant - Appellant, Robert Michael Leen, Esquire, Attorney Direct: 425-949-8555 [COR LD NTC CJA Appointment] Law Office Of Robert M. Leen P.O. Box 82 Woodinville, WA 98072-0082 UNITED STATES OF AMERICA, Plaintiff - Appellee, v. JAMES DALTON BELL, Defendant - Appellant. 04/25/2001 1 DOCKETED CAUSE AND ENTERED APPEARANCES OF COUNSEL. Filed in D.C. on 4/17/01; setting schedule as follows: transcript shall be ordered by 5/9/01 for James Dalton Bell; transcript shall be filed by 6/8/01; appellant's briefs, excerpts due by 7/18/01 for James Dalton Bell; appellee's brief due 8/17/01 for USA; appellant's reply brief due by 8/31/01 for James Dalton Bell. (RT required: y) (Sentence imp n/a) [01-30162] (BY) [Entered: 04/25/2001 11:27 AM] 05/07/2001 3 Received Robert London for Appellee USA's letter dated 5/3/01 re: time schedule order should be vacated for various reasons....(MOATT) [01-30162] (CP) [Entered: 05/07/2001 03:05 PM] 05/07/2001 5 Filed Appellant James Dalton Bell in 01-30162's motion to stay appeal; served on 5/4/01 [4162520] (MOATT) [01-30162] (FT) [Entered: 05/09/2001 10:27 AM] 05/08/2001 4 Criminal Justice Act voucher sent () to Robert M. Leen for Appellant James Dalton Bell in 01-30162 [01-30162] (TU) [Entered: 05/08/2001 11:03 AM] 05/22/2001 8 Order filed, this appeal is DISMISSED for lack of jurisdiction. All pending mtns are DENIED. (Procedurally Terminated After Other Judicial Action; Jurisdictional Defects. Harry PREGERSON, Ferdinand F. FERNANDEZ, Kim M. WARDLAW) [01-30162] (RR) [Entered: 05/22/2001 08:14 AM] 06/13/2001 10 MANDATE ISSUED [01-30162] (FT) [Entered: 06/13/2001 09:36 AM] 12/17/2004 11 NO ORIGINAL RECORD (SS) [Entered: 12/17/2004 03:43 PM] -------------- next part -------------- A non-text attachment was scrubbed... Name: USAvBell_01-30162_Docket.pdf Type: application/pdf Size: 103626 bytes Desc: not available URL: From coderman at gmail.com Tue Aug 4 22:15:35 2015 From: coderman at gmail.com (coderman) Date: Tue, 4 Aug 2015 22:15:35 -0700 Subject: FOIA/PA In-Reply-To: References: <1574391633.66688.1438654538789.JavaMail.yahoo@mail.yahoo.com> Message-ID: next distinct case in august: Court of Appeals Docket #: 01-30296 Docketed: 08/23/2001 Termed: 12/26/2001 USA v. Bell Appeal From: U.S. District Court for Western Washington, Tacoma Fee Status: IFP Case Type Information: 1) criminal 2) pre-guidelines 3) null Originating Court Information: District: 0981-3 : CR-00-05731-JET Court Reporter: Julaine V. Ryen, Court Reporter Trial Judge: Jack E. Tanner, District Judge Date Filed: 11/29/2000 Date Order/Judgment: Date NOA Filed: 06/18/2001 08/14/2001 Prior Cases: 01-30143 Date Filed: 04/05/2001 Date Disposed: 05/22/2001 Disposition: Jurisdictional Defects - Judge Order 01-30162 Date Filed: 04/25/2001 Date Disposed: 05/22/2001 Disposition: Jurisdictional Defects - Judge Order Current Cases: Lead Member Start End Docketing Link Only 01-30296 01-30303 01/31/2003 UNITED STATES OF AMERICA Plaintiff - Appellee, Robert Louis London, Esquire Direct: 206/553-7970 [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101 v. JAMES DALTON BELL (Federal Prisoner: 26906-086) Defendant - Appellant, James Dalton Bell [COR LD NTC Pro Se] FCI - FEDERAL CORRECTIONAL INSTITUTION - SHERIDAN P.O. Box 5000 Sheridan, OR 97378-5000 Robert Michael Leen, Esquire, Attorney Direct: 425-949-8555 [COR LD NTC CJA Appointment] Law Office Of Robert M. Leen P.O. Box 82 Woodinville, WA 98072-0082 UNITED STATES OF AMERICA, Plaintiff - Appellee, v. JAMES DALTON BELL, Defendant - Appellant. 08/23/2001 1 DOCKETED CAUSE AND ENTERED APPEARANCES OF COUNSEL. Filed in D.C. on 8/16/01; setting schedule as follows: transcript shall be ordered by 9/4/01 for James Dalton Bell; transcript shall be filed by 10/4/01; appellant's brief, excerpt due by 11/13/01 for James Dalton Bell; appellee's brief due 12/13/01 for USA; appellant's reply brief due by 12/27/01 for James Dalton Bell. (RT required: y) () [01-30296] (EL) [Entered: 08/23/2001 09:35 AM] 08/23/2001 2 Referred to (MOATT) re: NOA filed by pro se but aplt has CJA appt'd csl. [01-30296] (EL) [Entered: 08/23/2001 09:37 AM] 08/23/2001 4 Received as of Aug 20, 2001 letter from pro se re: addendum to notice of appeal. (MoAtt via ProSe) (AF) [Entered: 08/29/2001 11:02 AM] 08/27/2001 3 Criminal Justice Act voucher sent () to Robert M. Leen for Appellant James Dalton Bell [01-30296] (TU) [Entered: 08/27/2001 09:51 AM] 09/05/2001 5 Filed Appellant James Dalton Bell's motion to dismiss second interlocutory appeal and motion to w/d and appointment of substitute appeallate counsel; served on 8/29/01. (MOATT) [01-30296] (AF) [Entered: 09/05/2001 03:10 PM] 09/13/2001 6 Received (ProSe) Appellant James Dalton Bell's motion to oppose fraudulent motion by Robert Leen filed to sabotage Bell's intermediate appeal rights; served 9/10/01. (Defendant has CJA counsel) (MOATT) [01-30296] (AF) [Entered: 09/13/2001 11:36 AM] 12/26/2001 9 Order filed, this ct previously dismissed aplt's pro se interlocutory appeal No. 01-30143 for lack of jurisdiction. Appeal No. 01-30296 was subsequently opened when pro se aplt filed an "Interlocutory Appeal Refiling Notice" in the DC. Appeal No. 01-30296 is also dismissed for lack of jurisdiction. (cite) All pending mtns are denied as moot. DISMISSED. ( Procedurally Terminated After Other Judicial Action; Jurisdictional Defects. Mary M. SCHROEDER, Stephen S. TROTT, Richard A. PAEZ) [01-30296] (AF) [Entered: 12/26/2001 11:45 AM] 01/17/2002 10 MANDATE ISSUED [01-30296] (AF) [Entered: 01/17/2002 10:05 AM] 02/04/2003 14 Filed Order (Michael D. HAWKINS, Ronald M. GOULD, James Ware,) The pnl as constituted above, on behalf of the ct, orders Aplt's Mtn for Clarification, rec'd by this ct on 1/15/03, filed in its entirety. The Mtn is DENIED. NO FURTHER FILINGS WILL BE ACCEPTED IN BOTH No. 01-30296 and No. 01-30303. [01-30296, 01-30303] (AF) [Entered: 02/04/2003 10:12 AM] 03/08/2005 18 NO ORIGINAL RECORD (XX) [Entered: 03/08/2005 03:26 PM] 09/05/2006 19 Rec'd notice of change of address from James Dalton Bell in 01-30296 undated. (Aplt's new address: Reg. No. 26906-086, P.O. Box 33, Terre Haute, IN 47808) [01-30296] (AF) [Entered: 09/11/2006 10:30 AM] -------------- next part -------------- A non-text attachment was scrubbed... Name: USAvBell_01-30296_Docket.pdf Type: application/pdf Size: 116037 bytes Desc: not available URL: From coderman at gmail.com Tue Aug 4 22:17:14 2015 From: coderman at gmail.com (coderman) Date: Tue, 4 Aug 2015 22:17:14 -0700 Subject: FOIA/PA In-Reply-To: References: <1574391633.66688.1438654538789.JavaMail.yahoo@mail.yahoo.com> Message-ID: and then: Court of Appeals Docket #: 01-30303 Docketed: 09/06/2001 Termed: 09/19/2002 USA v. Bell Appeal From: U.S. District Court for Western Washington, Tacoma Fee Status: IFP Case Type Information: 1) criminal 2) sentence 3) null Originating Court Information: District: 0981-3 : CR-00-05731-JET Court Reporter: Julaine V. Ryen, Court Reporter Court Reporter: Catherine Maria Vernon Trial Judge: Jack E. Tanner, District Judge Date Filed: 11/29/2000 Date Order/Judgment: Date NOA Filed: 08/24/2001 08/27/2001 Prior Cases: 01-30143 Date Filed: 04/05/2001 Date Disposed: 05/22/2001 Disposition: Jurisdictional Defects - Judge Order 01-30162 Date Filed: 04/25/2001 Date Disposed: 05/22/2001 Disposition: Jurisdictional Defects - Judge Order Current Cases: Lead Member Start End Docketing Link Only 01-30296 01-30303 01/31/2003 UNITED STATES OF AMERICA Plaintiff - Appellee, Helen J. Brunner, Esquire, Assistant U.S. Attorney [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101 Steven L. Lane, Esquire, Attorney [COR LD NTC Government] DOJ - U.S. Department of Justice Rm. 7264 950 Pennsylvania Ave., N.W. Washington, DC 20530 Robert London, Esquire, Attorney Direct: 206/553-7970 [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101 v. JAMES DALTON BELL (Federal Prisoner: 26906-086) Defendant - Appellant, Peggy Sue Juergens, Esquire, Attorney Direct: 206/442-9232 [COR LD NTC CJA Appointment] Law Offices of Allen R. Bentley Ste. 2220 1111 Third Avenue Seattle, WA 98101 James Dalton Bell [NTC Pro Se] FCI - FEDERAL CORRECTIONAL INSTITUTION - SHERIDAN P.O. Box 5000 Sheridan, OR 97378-5000 UNITED STATES OF AMERICA, Plaintiff - Appellee, v. JAMES DALTON BELL, Defendant - Appellant. 09/06/2001 1 DOCKETED CAUSE AND ENTERED APPEARANCES OF COUNSEL. Filed in D.C. on 8/29/01; setting schedule as follows: transcript shall be ordered by 9/26/01 for James Dalton Bell; transcript shall be filed by 10/26/01; appellant's briefs, excerpts due by 12/5/01 for James Dalton Bell; appellee's brief due 1/4/02 for USA; appellant's reply brief due by 1/18/02 for James Dalton Bell. (RT required: y) (Sentence imp 10 years) [01-30303] (BY) [Entered: 09/06/2001 08:22 AM] 09/06/2001 2 Criminal Justice Act voucher sent () to Robert M. Leen for Appellant James Dalton Bell in 01-30303 [01-30303] (SA) [Entered: 09/06/2001 02:43 PM] 09/20/2001 3 Received copy of transcript designation and ordering form filed in DC (sent to case file) (TM) [Entered: 09/26/2001 09:14 AM] 09/21/2001 4 rec notice of appearance of Peggy Sue Juergens for appellant (MOATT) [01-30303] (TM) [Entered: 09/26/2001 09:20 AM] 09/24/2001 5 Filed Robert M. Leen's motion to withdraw and substitute counsel; served on 9/18/01 (MOATT) (TM) [Entered: 09/26/2001 09:36 AM] 10/05/2001 6 Received copy of District Court order filed on 9/25/01 nunc pro tunc 8/31/01 appointing Peggy Sue Juergens counsel of record. (Filed by Judge Weinberg) [01-30303] (AH) [Entered: 10/11/2001 01:05 PM] 10/11/2001 9 Rec'd notice of change of address from Peggy Sue Juergens for Appellant James Dalton Bell in 01-30303; dated: 10/15/01. [01-30303] (RR) [Entered: 10/15/2001 11:35 AM] 10/22/2001 10 Filed order (Appellate Commissioner) MOATT: On 9/25/01, the d.c. appointed Peggy Sue Juergens, Esq., as appellant's counsel. The d.c.'s order is ratified. Accordingly, the motion of Robert M. Leen, Esq., to withdraw as counsel is denied as moot. The briefing schedule established previously shall remain in effect. The Clerk shall serve this order on appellant's former counsel Robert M. Leen, Esq. [01-30303] (TM) [Entered: 10/22/2001 09:45 AM] 10/29/2001 11 Filed certificate of record on appeal RT filed in DC 10/22/01 [01-30303] (TM) [Entered: 11/01/2001 10:51 AM] 11/30/2001 13 Filed motion of Appellant and order (Deputy Clerk lkk) Aplt's motion for an extension of time to file the opening brief is granted in part. The opening brief is due 03/06/02 and the optional reply brief is due 14 days from serivce of the answering brief. (PROMO) [13] (Motion recvd 11/19/01) [01-30303] (DJV) [Entered: 11/30/2001 08:33 AM] 01/23/2002 14 Filed notice of appearance of Steven L. Lane for appellee [01-30303] (TM) [Entered: 01/24/2002 01:03 PM] 02/06/2002 15 Filed original and 15 copies Appellant James Dalton Bell's opening brief (Informal: n) 29 pages and five excerpts of record in 1volumes; served on 2/4/02 [01-30303] (TM) [Entered: 02/06/2002 04:58 PM] 02/06/2002 16 Filed pre-sentencing report UNDER SEAL. [01-30303] (TM) [Entered: 02/06/2002 05:01 PM] 02/06/2002 17 Filed Appellant James Dalton Bell's motion to file supplemental brief (MOATT) [01-30303] (TM) [Entered: 02/14/2002 10:14 AM] 02/14/2002 18 Received Appellant James Dalton Bell's motion to take judicial notice of appellate aty sabotage of appellant's case; served on 2/8/02 (MOATT) [01-30303] (TM) [Entered: 02/21/2002 11:49 AM] 02/25/2002 19 Filed order (Appellate Commissioner) MOATT: This court has received appellant's pro se motion to file a supplemental brief. Because appellant is represented by counsel, only counsel may file motions, and this court therefore declines to entertain the motion. The Clerk shall serve a copy of the pro se motion on appellant's counsel of record, Peggy Sue Juergens, Esq. Appellant is advised that counsel is vested with the authority to determine which issues should be raised. Appellee's answering brief is due 3/18/02. The optional reply brief is due wihtin 14 days after service of the answering brief. The Clerk shall also serve this order on appellant individually. Lompoc. [01-30303] (TM) [Entered: 02/25/2002 09:42 AM] 03/04/2002 23 Filed Appellant James Dalton Bell's motion to demand the replacement of appt. attorney Peggy Juergens; served on 2/27/02. (MOATT) [01-30303] (CP) [Entered: 03/05/2002 12:07 PM] 03/12/2002 24 14 day oral extension by phone of time to file Appellee in 01-30303's brief. [01-30303] appellees' brief due 4/1/02; the optional reply brief is due 14 days from service of the answering brief. (CG) [Entered: 03/12/2002 01:06 PM] 03/15/2002 27 Filed motion & order :(Appellate Commissioner) This court has received apltr's pro se moton for judicial notice and pro se motion for new counsel. Because aplt is represented by counsel, only counsel may file motions, and this court therefore dclines to entertain the motions. The Clerk shall serve a copy fo the pro se motion on aplt's counsel of record, Peggy Sue Juergens, Esq. The Clekr shall also serve this order on aplt individually at Reg. No. 26906-086, 3901 Klein Blvd., Lompoc, Ca 93436 ( Motion recvd 3/4/02) ( MOTIONS) [01-30303] (VT) [Entered: 03/15/2002 06:56 AM] 03/15/2002 28 Sent order dated 3/15/02 to aplt in Lompoc [01-30303] (VT) [Entered: 03/15/2002 07:00 AM] 03/22/2002 29 Received Appellant James Dalton Bell letter dated 3/18/02 re: "Protest Motion Against Acts by Appellate Commissioner" (APP.COM) [01-30303] (TM) [Entered: 03/28/2002 02:37 PM] 03/28/2002 31 Received Appellant James Dalton Bell's letter dated 3/24/02 re: Futher objection to illegal and unethical actions of appointed counsel.(MOATT) [01-30303] (TM) [Entered: 04/02/2002 04:54 PM] 04/02/2002 30 Filed original and 15 copies appellee USA's 56 pages brief, 1 Exc. vols: ; served on 4/1/02 [01-30303] (TM) [Entered: 04/02/2002 12:06 PM] 04/11/2002 33 14 day oral extension by phone of time to file Appellant James Dalton Bell in 01-30303's reply brief. [01-30303] appellants' reply brief due 5/2/02; (XX) [Entered: 04/11/2002 09:54 AM] 04/19/2002 34 Filed order (Appellate Commissioner) MOATT: This court has received appellant's pro se motions. Because appellant is represented by counsel, only counsel may file motions, and this court therefore declines to entertain the motions. The Clerk shall serve a copy of the pro se motion on appellant's counsel of record, Peggy Sue Juergens, Esq. The Clerk shall also serve this order on appellant individually. [01-30303] (TM) [Entered: 04/19/2002 10:00 AM] 05/06/2002 35 Filed original and 15 copies of James Dalton Bell reply brief (Informal: n) 4 pages; served on 4/29/02 [01-30303] (BY) [Entered: 05/06/2002 02:18 PM] 05/29/2002 37 Calendar check performed [01-30303] (RG) [Entered: 05/29/2002 11:47 AM] 06/17/2002 38 Calendar materials being prepared. [01-30303] [01-30303] (RG) [Entered: 06/17/2002 01:19 PM] 06/21/2002 40 CALENDARED: Seattle August 6, 2002 9:00 PM Courtroom Park Place, 21st Floor [01-30303] (RG) [Entered: 06/21/2002 08:34 AM] 08/06/2002 41 ARGUED AND SUBMITTED TO Michael D. HAWKINS, Ronald M. GOULD, James Ware [01-30303] (SB) [Entered: 08/06/2002 11:57 AM] 09/19/2002 45 FILED OPINION: AFFIRMED ( Terminated on the Merits after Oral Hearing; Affirmed; Written, Signed, Published. Michael D. HAWKINS, author; Ronald M. GOULD; James Ware, author. ) FILED AND ENTERED JUDGMENT. [01-30303] (VT) [Entered: 09/19/2002 11:57 AM] 10/04/2002 46 Filed Appellant James Dalton Bell's motion to stay the mandate; served on 9/29/02 (PANEL) [01-30303] (TM) [Entered: 10/04/2002 02:06 PM] 10/11/2002 48 [4557503] Received original and 4 copies Appellant James Dalton Bell petition, for panel rehearing and petition for rehearing en banc , deficient (late and petitioner has counsel) , served on 10/4/02 . Notified appellant (TM) [Entered: 10/16/2002 04:22 PM] 10/11/2002 49 Filed Peggy Sue Juergens's motion to withdraw as counsel ; served on 10/7/02 (PANEL) (TM) [Entered: 10/16/2002 05:03 PM] 10/31/2002 52 Received Appellant James Dalton Bell's motion to file late petition for rehearing en banc (PANEL) [01-30303] (TM) [Entered: 10/31/2002 03:51 PM] 11/04/2002 54 Filed order ( Michael D. HAWKINS, Ronald M. GOULD): The motion to withdraw as counsel of record by Peggy Sue Juergens is granted. The motion for stay or recall of mandate is denied. [01-30303] (TM) [Entered: 11/04/2002 12:43 PM] 11/07/2002 55 Received Appellant James Dalton Bell letter dated 11/4/02 re: status of motion to recall the mandate. [01-30303] (TM) [Entered: 11/14/2002 08:59 AM] 11/07/2002 56 Received Appellant James Dalton Bell letter requesting a copy of the docket rpt. in this case and 01-30296 (Mailed them to him) [01-30303] (TM) [Entered: 11/14/2002 09:12 AM] 11/14/2002 58 Filed order ( Michael D. HAWKINS, Ronald M. GOULD, James Ware):The motion for the court to accept the previously received petition for rehearing with suggestion for rehearing en banc is granted. The petition for rehearing with suggestion for rehearing en banc is ordered filed. [01-30303] (TM) [Entered: 11/14/2002 03:57 PM] 11/14/2002 59 [4580825] Filed original and 50 copies Appellant James Dalton Bell petition for panel rehearing and petition for rehearing en banc 16 p.pages, served on 10/4/02 (PANEL AND ALL ACTIVE JUDGES) (TM) [Entered: 11/14/2002 04:01 PM] 12/03/2002 60 Filed Appellant James Dalton Bell's motion to reconsider order of the Court and for stay of mandate (PANEL AND ALL ACTIVE JUDGES) [01-30303] (TM) [Entered: 12/03/2002 02:59 PM] 12/18/2002 61 Filed order ( Michael D. HAWKINS, Ronald M. GOULD, James Ware): The petition for enbanc rehearing is denied. The motion for reconsideration of appellant's pro se motion for stay or recall of mandate is denied. [60] [01-30303] (TM) [Entered: 12/18/2002 10:54 AM] 12/27/2002 62 MANDATE ISSUED [01-30303] (TM) [Entered: 12/27/2002 11:27 AM] 01/15/2003 63 Received Appellant James Dalton Bell's motion for clarification (PANEL) [01-30303] (TM) [Entered: 01/22/2003 11:04 AM] 02/04/2003 67 Filed Order (Michael D. HAWKINS, Ronald M. GOULD, James Ware,) The pnl as constituted above, on behalf of the ct, orders Aplt's Mtn for Clarification, rec'd by this ct on 1/15/03, filed in its entirety. The Mtn is DENIED. NO FURTHER FILINGS WILL BE ACCEPTED IN BOTH No. 01-30296 and No. 01-30303. [01-30296, 01-30303] (AF) [Entered: 02/04/2003 10:12 AM] 10/15/2003 69 NO ORIGINAL RECORD (JAS) [Entered: 10/15/2003 10:54 AM] 09/05/2006 70 Rec'd notice of change of address from James Dalton Bell dated 8/29/06. (New Add: Reg No. 26906-086 U.S. Penn P.O. Box 33, Terre Haute, IN 47808) Appellant James Dalton Bell in 01-30303 dated 8/29/06. [01-30303] (XX) [Entered: 09/12/2006 09:16 AM] -------------- next part -------------- A non-text attachment was scrubbed... Name: USAvBell_01-30303_Docket.pdf Type: application/pdf Size: 203540 bytes Desc: not available URL: From coderman at gmail.com Tue Aug 4 22:19:30 2015 From: coderman at gmail.com (coderman) Date: Tue, 4 Aug 2015 22:19:30 -0700 Subject: FOIA/PA In-Reply-To: References: <1574391633.66688.1438654538789.JavaMail.yahoo@mail.yahoo.com> Message-ID: years later, in '04, then: Court of Appeals Docket #: 04-30115 Docketed: 03/16/2004 Termed: 10/19/2004 USA v. Bell Appeal From: U.S. District Court for Western Washington, Tacoma Fee Status: IFP Case Type Information: 1) criminal 2) pre-guidelines 3) null Originating Court Information: District: 0981-3 : CR-97-05270-FDB Trial Judge: Franklin D. Burgess, Senior District Judge Date Filed: 05/16/1997 Date Order/Judgment: Date NOA Filed: 02/19/2004 03/12/2004 Prior Cases: 01-30143 Date Filed: 04/05/2001 Date Disposed: 05/22/2001 Disposition: Jurisdictional Defects - Judge Order 01-30162 Date Filed: 04/25/2001 Date Disposed: 05/22/2001 Disposition: Jurisdictional Defects - Judge Order 01-30296 Date Filed: 08/23/2001 Date Disposed: 12/26/2001 Disposition: Jurisdictional Defects - Judge Order 01-30303 Date Filed: 09/06/2001 Date Disposed: 09/19/2002 Disposition: Affirmed - Opinion 97-30384 Date Filed: 12/30/1997 Date Disposed: 08/21/1998 Disposition: Affirmed - Memorandum 99-30210 Date Filed: 07/06/1999 Date Disposed: 05/25/2001 Disposition: Affirmed - Memorandum Current Cases: None UNITED STATES OF AMERICA Plaintiff - Appellee, Helen J. Brunner, Esquire, Assistant U.S. Attorney [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101 v. JAMES DALTON BELL (Federal Prisoner: 26906-086) Defendant - Appellant, James Dalton Bell [NTC Pro Se] FCI - FEDERAL CORRECTIONAL INSTITUTION - SHERIDAN P.O. Box 5000 Sheridan, OR 97378-5000 UNITED STATES OF AMERICA, Plaintiff - Appellee, v. JAMES DALTON BELL, Defendant - Appellant. 03/16/2004 1 DOCKETED CAUSE AND ENTERED APPEARANCES OF APLT IN PRO PER AND COUNSEL FOR APLE. Filed in D.C. on 3/12/04; setting schedule as follows: transcript shall be ordered by 4/2/04 for James Dalton Bell; transcript shall be filed by 5/3/04; appellants' briefs, excerpts due by 6/14/04 for James Dalton Bell; appellees' brief due 7/14/04 for USA; appellants' reply brief due by 7/28/04 for James Dalton Bell. ( RT required: YES) ( Sentence imp ) [04-30115] (KM) [Entered: 03/16/2004 02:26 PM] 03/16/2004 2 Filed certificate of record on appeal RT filed in DC None [04-30115] (KM) [Entered: 03/22/2004 11:31 AM] 06/24/2004 3 Received letter from pro se dated 6/19/04 re: statement of appellant's administrative complaint. (MOATT) (CP) [Entered: 06/28/2004 10:38 AM] 07/09/2004 7 Filed order (Deputy Clerk: ahh/MOATT) Within 21 days of the filing date of this order, appellant shall filewith this court a declaration or notarized statement attesting to the date on which the notice of appeal was deposited in the institution's internal mail systen and whether first-class postage was prepaid, or otherwise show cause why this appeal should not be dismissed for lack of jurisdiction. Appellee may respond to the declaration within 8 days after service of appellant's response. Failure to comply with this order may result in the dismissal of this appeal for failure to prosecute. Briefing is suspended pending further order of this court. Appellant's request for appointment of counsel will be addressed upon resolution of timeliness of this appeal. [04-30115] (BY) [Entered: 07/09/2004 08:48 AM] 07/26/2004 8 Filed Appellant James Dalton Bell's response to clerk order re: timeliness of filing of the notice of appeal; served on 7/22/04. (MOATT) [04-30115] (CP) [Entered: 07/26/2004 03:36 PM] 08/11/2004 11 Filed order (Johnnie B. RAWLINSON, CONSUELO M. CALLAHAN) A review of the record indicates that the notice of appeal in this case ws timely filed. The 7/9/04 order to show cuse is therefore discharged. To the extend appellant has moved to have the panel recuse itself from consideration of this appeal, that request is denied. To the extend appellant has moved for appt. of counsel in this appeal. that request is denied because he is not entitled to appt of counsel and this appeal does not present exceptional circumstances warranting the appt of counsel. (see casefile for citations). No motions for recon , clarification, modification of the denial of appt. of counsel shall be filed or entertained. The court's records reflect that this case may be appropriate for summary disposition because appellant is no longer entitled to appt of counsel. Within 21 days, appellant shall show cause why the DC's order allowing counsel to withdraw shall not be summarily affirmed. If appellant does not comply with this order, this appeal will be automatically dismissed for failure to prosecute. Briefing remains suspended pending further order of this court. [04-30115] (CP) [Entered: 08/11/2004 12:05 PM] 08/19/2004 12 Filed Appellant James Dalton Bell's response to 8/11/04 order to show cause; served on 8/16/04. (MOATT) [04-30115] (CP) [Entered: 08/19/2004 02:29 PM] 10/07/2004 15 Filed notice of appearance of Helen Brunner for the USA. (Withdrew as counsel: attorney Helen J. Brunner for USA) [04-30115] (CP) [Entered: 10/07/2004 02:25 PM] 10/19/2004 20 FILED MEMORANDUM: AFFIRMED ( Terminated on the Merits after Submission Without Oral Hearing; Affirmed; Written, Unsigned, Unpublished. Andrew J. KLEINFELD, A. W. TASHIMA, Ronald M. GOULD ) FILED AND ENTERED JUDGMENT. [04-30115] (CP) [Entered: 10/19/2004 11:18 AM] 10/28/2004 21 Received letter from pro se dated 10/22/04 re: status check. (MOATT, fyi per prose) (CP) [Entered: 11/02/2004 11:06 AM] 11/10/2004 22 MANDATE ISSUED [04-30115] (CP) [Entered: 11/10/2004 11:57 AM] 11/17/2004 23 Received Appellant James Dalton Bell's supplemental argument concerning 10/19/04 court order; served on 11/12/04. (mandate issued, sent public docket report, casefile) [04-30115] (CP) [Entered: 11/17/2004 02:13 PM] -------------- next part -------------- A non-text attachment was scrubbed... Name: USAvBell_04-30115_Docket.pdf Type: application/pdf Size: 126808 bytes Desc: not available URL: From coderman at gmail.com Tue Aug 4 22:22:02 2015 From: coderman at gmail.com (coderman) Date: Tue, 4 Aug 2015 22:22:02 -0700 Subject: FOIA/PA In-Reply-To: References: <1574391633.66688.1438654538789.JavaMail.yahoo@mail.yahoo.com> Message-ID: few more years later, and then: Court of Appeals Docket #: 06-35904 Docketed: 10/25/2006 Termed: 12/21/2006 Nature of Suit: 2510 Vacate Sentence USA v. Bell Appeal From: U.S. District Court for Western Washington, Tacoma Fee Status: Due Case Type Information: 1) prisoner 2) federal 3) 2255 habeas corpus Originating Court Information: District: 0981-3 : CV-06-05148-FDB Lead: CR-00-05731-FDB Trial Judge: Franklin D. Burgess, Senior District Judge Date Filed: 01/26/2006 Date Order/Judgment: Date NOA Filed: 08/17/2006 09/28/2006 Prior Cases: 01-30143 Date Filed: 04/05/2001 Date Disposed: 05/22/2001 Disposition: Jurisdictional Defects - Judge Order 01-30162 Date Filed: 04/25/2001 Date Disposed: 05/22/2001 Disposition: Jurisdictional Defects - Judge Order 01-30296 Date Filed: 08/23/2001 Date Disposed: 12/26/2001 Disposition: Jurisdictional Defects - Judge Order 01-30303 Date Filed: 09/06/2001 Date Disposed: 09/19/2002 Disposition: Affirmed - Opinion 04-30115 Date Filed: 03/16/2004 Date Disposed: 10/19/2004 Disposition: Affirmed - Memorandum 05-35289 Date Filed: 03/30/2005 Date Disposed: 02/24/2006 Disposition: Affirmed - Memorandum 05-35897 Date Filed: 09/12/2005 Date Disposed: 10/14/2005 Disposition: Jurisdictional Defects - Judge Order 97-30384 Date Filed: 12/30/1997 Date Disposed: 08/21/1998 Disposition: Affirmed - Memorandum 99-30210 Date Filed: 07/06/1999 Date Disposed: 05/25/2001 Disposition: Affirmed - Memorandum Current Cases: None UNITED STATES OF AMERICA Plaintiff - Appellee, Helen J. Brunner, Esquire, Assistant U.S. Attorney [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101 v. JAMES DALTON BELL (Federal Prisoner: 26906-086) Defendant - Appellant, James Dalton Bell [NTC Pro Se] FCI - FEDERAL CORRECTIONAL INSTITUTION - SHERIDAN P.O. Box 5000 Sheridan, OR 97378-5000 UNITED STATES OF AMERICA, Plaintiff - Appellee, v. JAMES DALTON BELL, Defendant - Appellant. 10/25/2006 1 Filed request for a certificate of appealability. Date COA denied in DC: 10/19/06 Record on Appeal included (y/n): on pacer only (RECORDS) (KM) [Entered: 10/25/2006 01:55 PM] 10/25/2006 2 Received orig District Court case file. ON PACER ONLY (KM) [Entered: 10/25/2006 01:56 PM] 11/03/2006 3 Filed aplt's Bell request to dismiss appeal. (MOATT) [06-35904] (EL) [Entered: 11/15/2006 01:49 PM] 12/21/2006 5 Order filed The request for a certificate of appealability is denied. See 28 U.S.C. �� 2241(d)(1), 2253(c)(2). All outstanding motions are denied. (Procedurally Terminated After Other Judicial Action; Certificate of Appealability. M. M. McKEOWN, Raymond C. FISHER ) [06-35904] (TSP) [Entered: 12/21/2006 12:04 PM] -------------- next part -------------- A non-text attachment was scrubbed... Name: USAvBell_06-35904_Docket.pdf Type: application/pdf Size: 120182 bytes Desc: not available URL: From coderman at gmail.com Tue Aug 4 22:24:31 2015 From: coderman at gmail.com (coderman) Date: Tue, 4 Aug 2015 22:24:31 -0700 Subject: FOIA/PA In-Reply-To: References: <1574391633.66688.1438654538789.JavaMail.yahoo@mail.yahoo.com> Message-ID: On 8/4/15, coderman wrote: > ... > Prior Cases: > 01-30143 Date Filed: 04/05/2001 Date Disposed: 05/22/2001 > Disposition: Jurisdictional Defects - Judge Order > 01-30162 Date Filed: 04/25/2001 Date Disposed: 05/22/2001 > Disposition: Jurisdictional Defects - Judge Order > 01-30296 Date Filed: 08/23/2001 Date Disposed: 12/26/2001 > Disposition: Jurisdictional Defects - Judge Order > 01-30303 Date Filed: 09/06/2001 Date Disposed: 09/19/2002 > Disposition: Affirmed - Opinion > 04-30115 Date Filed: 03/16/2004 Date Disposed: 10/19/2004 > Disposition: Affirmed - Memorandum > 05-35289 Date Filed: 03/30/2005 Date Disposed: 02/24/2006 > Disposition: Affirmed - Memorandum > 05-35897 Date Filed: 09/12/2005 Date Disposed: 10/14/2005 > Disposition: Jurisdictional Defects - Judge Order > 97-30384 Date Filed: 12/30/1997 Date Disposed: 08/21/1998 > Disposition: Affirmed - Memorandum > 99-30210 Date Filed: 07/06/1999 Date Disposed: 05/25/2001 > Disposition: Affirmed - Memorandum interesting - this list is longer than what is returned from the PACER front-end search for Jim's cases. adding in the following now: 05-35289 Date Filed: 03/30/2005 Date Disposed: 02/24/2006 Disposition: Affirmed - Memorandum 05-35897 Date Filed: 09/12/2005 Date Disposed: 10/14/2005 Disposition: Jurisdictional Defects - Judge Order 97-30384 Date Filed: 12/30/1997 Date Disposed: 08/21/1998 Disposition: Affirmed - Memorandum From coderman at gmail.com Tue Aug 4 22:26:25 2015 From: coderman at gmail.com (coderman) Date: Tue, 4 Aug 2015 22:26:25 -0700 Subject: FOIA/PA In-Reply-To: References: <1574391633.66688.1438654538789.JavaMail.yahoo@mail.yahoo.com> Message-ID: and then: Court of Appeals Docket #: 05-35289 Docketed: 03/30/2005 Termed: 02/24/2006 Nature of Suit: 3550 Prisoner-Civil Rights Bell, et al v. DC of Tacoma, et al Appeal From: U.S. District Court for Oregon, Portland Fee Status: Paid Case Type Information: 1) prisoner 2) state 3) civil rights Originating Court Information: District: 0979-3 : CV-02-01052-AJB Trial Judge: Anna J. Brown, District Judge Date Filed: 08/05/2002 Date Order/Judgment: Date NOA Filed: 01/07/2005 03/10/2005 Prior Cases: 01-30143 Date Filed: 04/05/2001 Date Disposed: 05/22/2001 Disposition: Jurisdictional Defects - Judge Order 01-30162 Date Filed: 04/25/2001 Date Disposed: 05/22/2001 Disposition: Jurisdictional Defects - Judge Order 01-30296 Date Filed: 08/23/2001 Date Disposed: 12/26/2001 Disposition: Jurisdictional Defects - Judge Order 01-30303 Date Filed: 09/06/2001 Date Disposed: 09/19/2002 Disposition: Affirmed - Opinion 01-35910 Date Filed: 10/02/2001 Date Disposed: 04/15/2002 Disposition: COA Denied - Judge Order 04-30115 Date Filed: 03/16/2004 Date Disposed: 10/19/2004 Disposition: Affirmed - Memorandum 97-30384 Date Filed: 12/30/1997 Date Disposed: 08/21/1998 Disposition: Affirmed - Memorandum 99-30210 Date Filed: 07/06/1999 Date Disposed: 05/25/2001 Disposition: Affirmed - Memorandum Current Cases: Lead Member Start End Companion 05-35289 05-35897 09/12/2005 Consolidated 05-35289 05-35291 05/18/2005 JAMES DALTON BELL (Federal Prisoner: 26906-086) Plaintiff - Appellant, James Dalton Bell [NTC Pro Se] FCI - FEDERAL CORRECTIONAL INSTITUTION - SHERIDAN P.O. Box 5000 Sheridan, OR 97378-5000 CHARLES STEWART Plaintiff, Charles Stewart, Esquire Direct: 503/558-3932 [NTC Pro Se] 19164 Barrington Ave Sandy, OR 97055 MICHAEL HUNTER Plaintiff, v. USDC, TACOMA Defendant - Appellee, No Appearance [Please Select] No Address - UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF WASHINGTON, SEATTLE Defendant - Appellee, No Appearance [Please Select] (see above) JACK E. TANNER Defendant - Appellee, Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] DOJ-USAO Suite 600 Firm: 503/727-1000 1000 S.W. Third Avenue Portland, OR 97204 FRANKLIN D. BURGESS Defendant - Appellee, Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) ROB LONDON Defendant - Appellee, Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) ROBERT MICHAEL LEEN Defendant - Appellee, John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] Ransom Blackman LLP Security Plaza Building Suite 1400 1001 S.W. Fifth Avenue Portland, OR 97204 JEFF GORDON Defendant - Appellee, Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) ANNE M. LEVINS Defendant - Appellee, Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) LESLIE SPIER, MICHAEL MARKHAM; JILL SJODIN; S. YOUNG; LISA STEVENSON; ERNIE GRIZZELL; MATT RICHARDS; COUNSELOR J. GUSTIN, FDC Seatac Counselor; SEATAC FDC; TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION; DEPARTMENT OF TREASURY; ALCOHOL TOBACCO AND FIREARMS AGENTS; Defendant - Appellee, Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) PETER AVENIA Defendant - Appellee, John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] (see above) JUDITH MANDEL Defendant - Appellee, John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] (see above) FEDERAL PUBLIC DEFENDERS OF TACOMA Defendant - Appellee, John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] (see above) FEDERAL PUBLIC DEFENDERS OF SEATTLE Defendant - Appellee, John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] (see above) RYAN LUND, PETER L. SHAW; WILLIAM MARTIN; STEVE WALSH, aka Steve Wilson Warden W.J. JUSINO; NICOLE CUNNINGHAM; TACOMA FEDERAL PROSECUTORS OFFICE; TACOMA FEDERAL PROBATION OFFICE; INTERNAL REVENUE SERVICE AGENTS; SEATTLE FEDERAL PROSECUTORS OFFICE; SEATTLE FEDERAL P Defendant - Appellee, No Appearance [Please Select] (see above) VANCOUVER POLICE DEPARTMENT Defendant - Appellee, Jeffrey N. Riback, Esquire, Attorney Direct: 360/696-8251 [COR LD NTC Retained] OFFICE OF THE CITY ATTORNEY 415 W. 6th Street Vancouver, WA 98660 DAVID KING, Sargeant (State Prisoner: T-11563) Defendant - Appellee, Jeffrey N. Riback, Esquire, Attorney Direct: 360/696-8251 [COR LD NTC Retained] (see above) CLACKAMAS COUNTY SHERIFF'S DEPARTMENT Defendant - Appellee, Edward S. McGlone, III, Attorney Direct: 503-486-7048 [COR LD NTC County Counsel] Edward McGlone Law Offices 4000 Kruse Way Place, 3-120 Lake Oswego, OR 97035 MULTNOMAH COUNTY SHERIFF Defendant - Appellee, Susan M. Dunaway Direct: 503-988-3138 [COR LD NTC Retained] Multnomah County Attorney's Office Suite 500 501 SE Hawthorne Blvd. Portland, OR 97214 CITY OF PORTLAND Defendant - Appellee, David A. Landrum, Esquire, Attorney Direct: 503/823-4047 [COR LD NTC Deputy City Attorney] OFFICE OF THE CITY ATTORNEY Rm. 430 1221 SW Fourth Avenue Portland, OR 97204 Mark R. Moline, Esquire Direct: 503-823-3089 [COR LD Deputy City Attorney] OFFICE OF THE CITY ATTORNEY Suite 430 1221 SW Fourth Avenue Portland, OR 97204 PORTLAND POLICE BUREAU Defendant - Appellee, David A. Landrum, Esquire, Attorney Direct: 503/823-4047 [COR LD NTC Deputy City Attorney] (see above) Mark R. Moline, Esquire Direct: 503-823-3089 [COR LD Deputy City Attorney] (see above) GUNDERSON, Officer Defendant - Appellee, David A. Landrum, Esquire, Attorney Direct: 503/823-4047 [COR LD NTC Deputy City Attorney] (see above) Mark R. Moline, Esquire Direct: 503-823-3089 [COR LD Deputy City Attorney] (see above) PIERCE COUNTY SHERIFF Defendant - Appellee, Daniel Hamilton, Attorney Direct: 253-798-7746 [COR LD NTC County Counsel] Pierce County Prosecutor's Office Civil Division Suite 301 955 Tacoma Avenue South Tacoma, WA 98402-2160 CBS BROADCASTING INC. Defendant - Appellee, Duane A. Bosworth Direct: 503-778-5224 [COR LD NTC Retained] Davis Wright Tremaine, LLP Firm: 503-241-2300 1300 SW Fifth Avenue Suite 2400 Portland, OR 97201-5610 STATE OF WASHINGTON, a Lessor of Land Occupied by SeaTac FDC Defendant - Appellee, John A. Level, Esquire, Attorney Direct: 360/586-6300 [COR LD NTC Dep State Aty Gen] AGWA - OFFICE OF THE WASHINGTON ATTORNEY GENERAL (OLYMPIA) Torts Division P.O. Box 40126 Olympia, WA 98504-0126 JOHN RANSOM Defendant - Appellee, Jonathan Mark Radmacher, Attorney Direct: 503-226-7321 [COR LD NTC Retained] McEWEN GISVOLD, LLP Suite 1600 1100 S.W. Sixth Ave. Portland, OR 97204 Trung D. Tu, Attorney Direct: 503-226-7321 [COR LD NTC Retained] McEWEN GISVOLD, LLP Suite 1600 1100 S.W. Sixth Ave. Portland, OR 97204 JAMES DALTON BELL, Plaintiff - Appellant, and CHARLES STEWART; MICHAEL HUNTER, Plaintiffs, v. USDC, TACOMA; UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF WASHINGTON, SEATTLE; JACK E. TANNER; FRANKLIN D. BURGESS; ROB LONDON; ROBERT MICHAEL LEEN; JEFF GORDON; ANNE M. LEVINS; LESLIE SPIER, MICHAEL MARKHAM; JILL SJODIN; S. YOUNG; LISA STEVENSON; ERNIE GRIZZELL; MATT RICHARDS; COUNSELOR J. GUSTIN, FDC Seatac Counselor; SEATAC FDC; TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION; DEPARTMENT OF TREASURY; ALCOHOL TOBACCO AND FIREARMS AGENTS;; PETER AVENIA; JUDITH MANDEL; FEDERAL PUBLIC DEFENDERS OF TACOMA; FEDERAL PUBLIC DEFENDERS OF SEATTLE; RYAN LUND, PETER L. SHAW; WILLIAM MARTIN; STEVE WALSH, aka Steve Wilson Warden W.J. JUSINO; NICOLE CUNNINGHAM; TACOMA FEDERAL PROSECUTORS OFFICE; TACOMA FEDERAL PROBATION OFFICE; INTERNAL REVENUE SERVICE AGENTS; SEATTLE FEDERAL PROSECUTORS OFFICE; SEATTLE FEDERAL P; VANCOUVER POLICE DEPARTMENT; DAVID KING, Sargeant; CLACKAMAS COUNTY SHERIFF'S DEPARTMENT; MULTNOMAH COUNTY SHERIFF; CITY OF PORTLAND; PORTLAND POLICE BUREAU; GUNDERSON, Officer; PIERCE COUNTY SHERIFF; CBS BROADCASTING INC.; STATE OF WASHINGTON, a Lessor of Land Occupied by SeaTac FDC; JOHN RANSOM, Defendants - Appellees. 03/30/2005 1 DOCKETED CAUSE AND ENTERED APPEARANCES OF Aplt in pro per & csl of aples. CADS SENT (Y/N): NO. setting schedule as follows: Fee payment is due 4/13/05 ; appellant's designation of RT is due 3/21/05; appellee's designation of RT is due 3/30/05,, ; appellant shall order transcript by 4/11/05; court reporter shall file transcript in DC by 5/10/05; certificate of record shall be filed by 5/17/05 ; appellant's opening brief is due 6/27/05; appellees' brief is due 7/26/05,, ; appellants' reply brief is due 8/9/05; [05-35289] (MF) [Entered: 03/30/2005 11:50 AM] 05/18/2005 3 Filed order ( Harry PREGERSON, William C. CANBY, ): The ct, sua sponte, consolidates appl number 05-35289 and 05-35291. A review of the record demonstrates that, although the 3/10/05 and 3/15/05 notices of appl were not filed within 60 days from entry of the 1/7/05 judgment, aplts filed timely mtns for ext of time to appl pursuant to FRAP 4(a)(5), which were contained in the notices of app. The dc has not ruled on those motions. Accordingly, these appls are remanded to the dc for the limited purpose of allowing that ct to rule on aplts' mtns. The dc is requested to serve a copy of its decision on this ct at its earliest convenience. Br in these appls is stayed pending further order of this ct. [05-35289, 05-35291] (GR) [Entered: 05/18/2005 08:47 AM] 06/01/2005 4 FILED deft-aple John Ransom's notice of appearance as a party to the appeal; served on 5/26/05 (CASEFILES) (HH) [Entered: 06/07/2005 03:05 PM] 06/06/2005 6 Received copy of District Court minute order filed on 5/31/05: Denying plntfs Stewart and Bell's motions to extend the time for filing a notice of appeal. (to PROSE) [05-35289, 05-35291] (HH) [Entered: 06/15/2005 12:40 PM] 06/13/2005 7 Rec'd notice of change of address from Appellant James Dalton Bell in 05-35289 (PO Box 33, Terre Haute, IN 47808). (CASEFILES) [05-35289, 05-35291] (HH) [Entered: 06/16/2005 12:39 PM] 06/13/2005 8 Received letter from pro se James Bell, dated 6/7/05 re: Notice of fact of appeal notice filed. (to PROSE) (HH) [Entered: 06/16/2005 12:42 PM] 06/22/2005 9 Received Appellant James Dalton Bell's "motion and notice regarding this court's jurisdiction," dated 6/7/05 (fees due) [5476067] (to PROSE) [05-35289] (HH) [Entered: 06/24/2005 12:37 PM] 07/21/2005 11 Order filed: A review of the record demonstrates that this court lacks jurisdiction over appeal no. 05-35291 because the 3/15/05 notice of appeal was not filed within 60 days from entry of the 1/7/05 judgment...CITE. Consequently, appeal no. 05-35291 is DISMISSED for lack of jurisdiction. Although the district court also denied aplt James Bell's motion for ext of time to appeal no. 05-35289, further review of the record reflects that aplt Bell's appeal was timely filed pursuant to FRAP 4(c) because aplt Bell is incarcerated and his 3/10/05 noa was recvd by the dc one day after the deadline prescribed by FRAP 4(a)(1). Consequently, appeal no. 05-35289 shall proceed. A review of this court's docket in appeal no. 05-35289 reflects that the filing and docketing fees for this appeal remain due. Within 21 days after the filing date of this order, aplt Bell shall pay to the dc the $255.00 filing and docketing fees for this appeal and file in this court proof of such payment or file in this court a motion to proceed ifp. Failure to pay the fees or file a motion to proceed ifp shall result in the automatic dismissal of the appeal by the clerk for failure to prosecute. See 9th Cir.R. 42-1. ( Procedurally Terminated After Other Judicial Action; Jurisdictional Defects. Mary M. SCHROEDER, Johnnie B. RAWLINSON, Jay S. BYBEE ) [05-35289, 05-35291] (HH) [Entered: 07/21/2005 10:29 AM] 08/11/2005 18 Received Appellant James Dalton Bell's "request for ext and relief from obstruction," dated 8/2/05 [5540923] (to PROSE) [05-35289] (HH) [Entered: 08/23/2005 12:33 PM] 08/15/2005 13 Order filed (Dep. Clk. jlc) dismiss case for failure to prosecute (C.R. 42-1) A certified copy of this order sent to the district court shall act as and for the mandate of this court. ( Procedurally Terminated Without Judicial Action; Default. ) [05-35289] (JC) [Entered: 08/15/2005 09:46 AM] 08/17/2005 17 Received Appellant James Dalton Bell's "Notice of obstruction of plntf's right to pursue appeal," dated 8/11/05 (to PROSE) (HH) [Entered: 08/23/2005 09:52 AM] 08/19/2005 14 Received Appellant James Dalton Bell's "motion for relief from obstruction of this appeal," dated 8/15/05 [5539551] (to PROSE) [05-35289] (HH) [Entered: 08/22/2005 12:16 PM] 08/19/2005 15 Received aplt James Dalton Bell's document entitled "Response to 7/21/05 order," dated 8/15/05 (to PROSE) [05-35289] (HH) [Entered: 08/22/2005 12:18 PM] 08/19/2005 16 Received aplt James Dalton Bell's "Notice of impaired filing," dated 8/15/05 (to PROSE) (HH) [Entered: 08/22/2005 12:22 PM] 09/12/2005 20 Filed order (Appellate Commissioner) The ct is in receipt of aplt's filing titled "mtn for relief from obstruction of this appl" Aplt's filings is construed as a mtn to reinstate the appl dismissed for lack of prosecution on 8/15/05/ So construed, the mtn to reinstate is denied without prejudice to filing a renewed mtn to reinstate the appl within 21 days of this order, accompanied by 1) prf of pymnt of the $255 fee, or 2) a mtn to proc ifp...The clerk shall provide a copy of form 4 of the 9th CR to aplt along with this order. All other pndg mtns are denied as moot. [14] [18] ( PROSE) [05-35289] (GR) [Entered: 09/12/2005 08:14 AM] 09/19/2005 22 Filed order PROSE (Appellate Commissioner) It has come to the attention of the court that the appellate commissioner is a named party to this appeal. Accordingly, the order filed on 9/12/05 is VACATED. The matter will be addressed by separate order. [05-35289] (HH) [Entered: 09/19/2005 09:55 AM] 09/29/2005 24 Received Appellant James Dalton Bell's response to 9/12/05 order; dated 9/19/05 (to PROSE) [05-35289] (HH) [Entered: 10/11/2005 04:02 PM] 10/06/2005 25 Received Appellant James Dalton Bell's "objection to clerk's dismissal/notice of pending 28 USC 455/Rule 59(e)/60(b) filing," dated 10/3/05 (to PROSE) [05-35289] (HH) [Entered: 10/11/2005 04:04 PM] 10/14/2005 27 Filed order PROSE ( Thomas G. NELSON, Richard C. TALLMAN, ): The court is in receipt of aplt's filing titled, "motion for relief from obstruction of this appeal." Aplt's filing is construed as a motion to reinstate the appeal, which was dismissed for lack of jurisdiction on 8/15/05 under 9th Cir.R. 42-1. So construed, the motion to reinstate is DENIED without prejudice to the filing of a renewed motion to reinstate the appeal within 21 days after the date of this order, accompanied by: 1) proof of payment of the $255 docketing and filing fee; or 2) a motion to proceed ifp... The clerk shall provide a copy of form 4 of the 9th Cir.R. rules to aplt along with this order pursuant to FRAP 24. All other pending motions are DENIED as moot. [05-35289] (HH) [Entered: 10/14/2005 10:43 AM] 10/17/2005 28 Received Appellant James Dalton Bell's "request to construe filings as Rule 60(b) and under 28 USC 2441 in appeals 99-30210, 01-30143, 01-30296, 01-30303," dated 10/2/05 [5603631] (to PROSE - NAN case dismissed - aplt needs to respond to 10/14/05 order) [05-35289] (HH) [Entered: 10/20/2005 03:14 PM] 10/24/2005 29 Received letter from pro se re: obstruction of justice. (PRO SE - NAN - case closed) (GR) [Entered: 10/26/2005 02:18 PM] 10/27/2005 30 Received letter from pro se dated 10/23/05 re: "status of these matters." (general docket sent to aplt) (HH) [Entered: 11/02/2005 05:02 PM] 10/31/2005 32 Received Appellant James Dalton Bell's "response to 10/14/05 order; motion to correct procedural error; motion to adjudicate existing 28 USC 455 motion," dated on 10/26/05 [5619003] (to MOATT) [05-35289] (HH) [Entered: 11/03/2005 04:02 PM] 10/31/2005 34 Received Appellant James Dalton Bell's "renewed motion to reinstate appeal, motion regaring in form pauperis status of aplt Bell," dated 10/24/05 (no proof of service) (to MOATT - includes affidavit accompanying mtn to appeal ifp, Form 4 ) [5620686] [05-35289] (HH) [Entered: 11/04/2005 04:36 PM] 11/03/2005 33 Received letter from pro se dated 10/30/05 re: irregularities associated with court's mishandling of 05-35289. (CASEFILES) (HH) [Entered: 11/03/2005 04:21 PM] 11/04/2005 38 Received Appellant James Dalton Bell's "supplement to motion under 28 usC 455" [32], served on 11/2/05 (to MOATT) [05-35289] (HH) [Entered: 11/18/2005 05:01 PM] 11/07/2005 35 Received Appellant James Dalton Bell's "supplement to motion under 28 USC 455" [34], [32]; dated 10/23/05 (to MOATT) [05-35289] (HH) [Entered: 11/08/2005 11:11 AM] 11/07/2005 36 Received Appellant James Dalton Bell's "motion for reconsideration of denied as moot motions," dated 10/23/05 [5622662] (to PROSE) [05-35289] (HH) [Entered: 11/08/2005 11:13 AM] 11/14/2005 39 Received Appellant James Dalton Bell's motion under 28 USC 455; dated 11/4/05 [5634572] (to MOATT) [05-35289] [05-35289] (HH) [Entered: 11/18/2005 05:13 PM] 11/14/2005 43 Received Appellant James Dalton Bell's "motion to repair corruption," dated 11/7/05 [5639726] [05-35289] [05-35289] (HH) [Entered: 11/25/2005 12:18 PM] 11/18/2005 47 Received letter from pro se re: filings in cases 99-30210 and 05-35289. (to MOATT) (HH) [Entered: 12/28/2005 11:56 AM] 11/21/2005 40 Received Appellant James Dalton Bell's "renewed motion to reinstate appeal, motion regaring in form pauperis status of aplt Bell," dated 10/24/05 (no proof of service) (MOATT) [5635140] [05-35289] (HH) [Entered: 11/21/2005 11:00 AM] 11/21/2005 41 Filed order MOATT ( J. C. WALLACE, Edward LEAVY, ): The clerk is directed to file aplt's 10/31/05 "renewed motion to reinstate appeal, motion regarding ifp status of aplt Bell." The renewed motion to reinstate is GRANTED. [40] Aplt's 10/31/05 filing is construed as a motion to proceed ifp on appeal. So construed, the motion is DENIED. [34] Within 21 days after the filing date of this order, aplt shall pay $255.00 to the dc as the docketing and filing fees for this appeal and file proof of payment with this court. Failure to pay the fees will result in the automatic dismissal of the appeal by the clerk for failure to prosecute, regardless of further filings. See 9th Cir.R. 42-1. If aplt pays the fees as required and files proof of such payment in this court, aplt shall simultaneously show cause why the judgment challenged in this appeal should not be summarily affirmed. See 9th Cir.R. 3-6. If aplt pays the fees but fails to file a response to this order, the clerk shall dismiss this appeal for failure prosecute. See 9th Cir.R. 42-1. To the extent aplt has a motion for recusal pending, it is DENIED...CITE. All other pending motions are DENIED. No motions for reconsideration, clarification, or modification of this order shall be filed or entertained. Briefing is SUSPENDED pending further order of this court. [05-35289] (HH) [Entered: 11/21/2005 11:00 AM] 12/06/2005 44 Check Number 553 in the amount of 255.00 forwarded to district court. (See Case File) [05-35289] (JR) [Entered: 12/06/2005 02:34 PM] 12/06/2005 45 Filed Appellant James Dalton Bell's response to order to show cause; served on 12/2/05 (to MOATT) [05-35289] (HH) [Entered: 12/13/2005 02:49 PM] 12/19/2005 46 Received Appellant James Dalton Bell's notice of attempted payment of docket fee; motion for ext to pay docket fee; dated 12/14/05 [5670120] (to MOATT) [05-35289] (HH) [Entered: 12/22/2005 03:16 PM] 01/04/2006 49 Filed order MOATT (EO) Aplt's motion for an ext of time to pay the docketing and filing fees is GRANTED. [46] Within 21 days after the filing date of this order, aplt shall pay $255.00 to the DC as the docketing and filing fees for this appeal and file proof of payment with this court. Failure to pay the fees will result in the automatic dismissal of the appeal by the clerk for failure to prosecute, regardless of further filings. See 9th Cir.R. 42-1. If aplt pays the fees as required and files proof of such payment in this court, aplt's 12/6/05 response to the court's order to show cause will be considered. Briefing remains suspended pending further order of this court. [05-35289] (HH) [Entered: 01/04/2006 09:56 AM] 01/13/2006 50 Received notification from District Court re payment of docket fee. ( Date: 12/27/05) [05-35289] (HH) [Entered: 01/20/2006 02:46 PM] 01/23/2006 51 Received Appellant James Dalton Bell's notice and request to clerks (to correct caption); dated 1/18/06 (no proof of service to aples) [5704222] (to MOATT) [05-35289] (HH) [Entered: 01/26/2006 04:17 PM] 02/24/2006 53 FILED MEMORANDUM: A review of the record and aplt's response to the 11/21/05 order to show cause indicates that the questions raised in this appeal are so insubstantial as not to require further argument...CITE. Accordingly, we summarily affirm the DC's judgment. All pending motions are DENIED as moot. AFFIRMED. ( Terminated on the Merits after Submission Without Oral Hearing; Affirmed; Written, Unsigned, Unpublished. Mary M. SCHROEDER, Alfred T. GOODWIN, Johnnie B. RAWLINSON ) FILED AND ENTERED JUDGMENT. [05-35289] (HH) [Entered: 02/24/2006 12:53 PM] 02/27/2006 54 Received Appellant James Dalton Bell's "notice of continuing obstruction of this case," dated 2/18/06 (CASEFILES) (HH) [Entered: 03/09/2006 05:18 PM] 03/20/2006 55 MANDATE ISSUED [05-35289] (HH) [Entered: 03/20/2006 11:45 AM] 01/08/2007 56 Rec'd notice of change of address from Appellant James Dalton Bell, dated 1/1/07 (PO Box 7000, Florence, CO 81226-7000). (CASEFILES) [05-35289] (HH) [Entered: 01/09/2007 09:39 AM] -------------- next part -------------- A non-text attachment was scrubbed... Name: Bell_05-35289_Docket.pdf Type: application/pdf Size: 265570 bytes Desc: not available URL: From list at sysfu.com Tue Aug 4 22:26:53 2015 From: list at sysfu.com (Seth) Date: Tue, 04 Aug 2015 22:26:53 -0700 Subject: =?utf-8?B?V29ybGTigJlzIEZpcnN0IOKAmFRydWx5IEFub255bW91c+KAmSBDcnlwdG8=?= =?utf-8?B?IEV4Y2hhbmdlIExhdW5jaGVzIG9uIEkyUA==?= Message-ID: http://cryptonewsday.com/worlds-first-truly-anonymous-crypto-exchange-launches-on-i2p/ World’s First ‘Truly Anonymous’ Crypto Exchange Launches on I2P The Grand Opening of a new cryptocurrency exchange, offering anonymous peer-to-peer trading over the I2P privacy network, was announced yesterday. Exchanged.I2P will offer its users a way to trade between Bitcoin and a range of altcoins, without compromising their financial privacy. Currently, the following altcoins can be traded: Anoncoin ANC Bitcoin BTC Dogecoin DOGE Dogecoindark DOGED Litecoin LTC Peercoin PPC Primecoin XMP Vertcoin VTC Additional coins will be added in the near future. Other exchanges services such as ShapeShift allow their users to exchange between different cryptocurrencies instantly, without creating an account or sharing personal information, but they are centralized services with no direct peer-to-peer trading, and they do not include the extra privacy protecting measures used by Exchanged.I2P. Not only will the exchange refrain from asking its traders for the usual ‘KYC’ information – your name, address and other personal information – it also includes a range of other privacy-protecting features. Users can create accounts and log-in using just a password or PGP key (or both for 2-factor authentication), without even needing to identify themselves with a username. Of course, the use of the I2P network also means that users cannot be identified and tracked using their IP address. I2P is a privacy network, also known as a ‘deep web’ or ‘darknet’, which allows users to create and browse internet services anonymously. It is used in a very similar way to the more popular TOR network. Some users claim that it offers improved security compared to TOR, which has been compromised in the past. TOR has also been the subject of controversy because a large proportion of its funding which comes from the U.S. government, and the technology it is built on was original developed by U.S. naval intelligence. I2P has failed to gain the levels of popularity achieved by TOR, however, largely because it is more difficult to install and use. The Exchanged.I2P project has been backed by the developers of Anoncoin, a privacy-centric cryptocurrency which is designed for use over I2P and Tor deep web services, and which has become one of the leading cryptocurrencies used on I2P dark markets. From coderman at gmail.com Tue Aug 4 22:27:50 2015 From: coderman at gmail.com (coderman) Date: Tue, 4 Aug 2015 22:27:50 -0700 Subject: FOIA/PA In-Reply-To: References: <1574391633.66688.1438654538789.JavaMail.yahoo@mail.yahoo.com> Message-ID: and more then: Court of Appeals Docket #: 05-35897 Docketed: 09/12/2005 Termed: 10/14/2005 Nature of Suit: 3550 Prisoner-Civil Rights Bell, et al v. DC of Tacoma, et al Appeal From: U.S. District Court for Oregon, Portland Fee Status: Due Case Type Information: 1) prisoner 2) state 3) civil rights Originating Court Information: District: 0979-3 : CV-02-01052-AJB Trial Judge: Anna J. Brown, District Judge Date Filed: 08/05/2002 Date Order/Judgment: Date NOA Filed: 01/07/2005 08/26/2005 Prior Cases: None Current Cases: Lead Member Start End Companion 05-35289 05-35897 09/12/2005 Consolidated 05-35289 05-35291 05/18/2005 JAMES DALTON BELL (Federal Prisoner: 26906-086) Plaintiff - Appellant, James Dalton Bell [NTC Pro Se] FCI - FEDERAL CORRECTIONAL INSTITUTION - SHERIDAN P.O. Box 5000 Sheridan, OR 97378-5000 CHARLES STEWART Plaintiff, Charles Stewart, Esquire Direct: 503/558-3932 [Pro Se] 19164 Barrington Ave Sandy, OR 97055 MICHAEL HUNTER Plaintiff, v. USDC, TACOMA Defendant - Appellee, No Appearance [Please Select] No Address - UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF WASHINGTON, SEATTLE Defendant - Appellee, No Appearance [Please Select] (see above) JACK E. TANNER Defendant - Appellee, Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] DOJ-USAO Suite 600 Firm: 503/727-1000 1000 S.W. Third Avenue Portland, OR 97204 FRANKLIN D. BURGESS Defendant - Appellee, Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) ROB LONDON Defendant - Appellee, Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) ROBERT MICHAEL LEEN Defendant - Appellee, John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] Ransom Blackman LLP Security Plaza Building Suite 1400 1001 S.W. Fifth Avenue Portland, OR 97204 JEFF GORDON Defendant - Appellee, Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) ANNE M. LEVINS Defendant - Appellee, Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) LESLIE SPIER, MICHAEL MARKHAM; JILL SJODIN; S. YOUNG; LISA STEVENSON; ERNIE GRIZZELL; MATT RICHARDS; COUNSELOR J. GUSTIN, FDC Seatac Counselor; SEATAC FDC; TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION; DEPARTMENT OF TREASURY; ALCOHOL TOBACCO AND FIREARMS AGENTS; Defendant - Appellee, Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) PETER AVENIA Defendant - Appellee, John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] (see above) JUDITH MANDEL Defendant - Appellee, John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] (see above) FEDERAL PUBLIC DEFENDERS OF TACOMA Defendant - Appellee, John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] (see above) FEDERAL PUBLIC DEFENDERS OF SEATTLE Defendant - Appellee, John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] (see above) RYAN LUND Defendant - Appellee, No Appearance [Please Select] (see above) PETER L. SHAW Defendant - Appellee, No Appearance [Please Select] (see above) WILLIAM MARTIN Defendant - Appellee, No Appearance [Please Select] (see above) STEVE WALSH, aka Steve Wilson Defendant - Appellee, No Appearance [Please Select] (see above) MICHAEL MARKHAM, ; JILL SJODIN; WARDEN W.J. JUSINO; S. YOUNG;LISA STEVENSON; ERNIE GRIZZELL; MATT RICHARDS;COUNSELORJ. GUSTIN, FDC Seatac Counselor; SEATAC FDC; TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION; DEPARTMENT OF TRREASURY; ALCOHOL TOBACCO AND FIREARMS AGENTS; FEDERAL BUREAU OF PRISONS; ORTIZ, Seatac Counselor;MIKE MCNALL; STEVEN L LANE; JOHN MCKAY; HELEN BRUNNER; ATWATER UNITED STATES PENITENTIARY;LOMPOC USP and its Warden; PHOENIX FCI and its Warden; CHRISTINE MILLIGAN, Atwater Counselor; COMMISSIONER OF INTERNAL REVENUE SERVICE; CHARLES VOLLMER; Defendant - Appellee, Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Dep State Aty Gen] (see above) PORTLAND POLICE BUREAU Defendant - Appellee, David A. Landrum, Esquire, Attorney Direct: 503/823-4047 [COR LD NTC County Counsel] OFFICE OF THE CITY ATTORNEY Rm. 430 1221 SW Fourth Avenue Portland, OR 97204 CITY OF PORTLAND, ; GUNDERSON, Officer; Defendant - Appellee, David A. Landrum, Esquire, Attorney Direct: 503/823-4047 [COR LD NTC County Counsel] (see above) VANCOUVER POLICE DEPARTMENT, ; DAVID KING, Sargeant; Defendant - Appellee, Jeffrey N. Riback, Esquire, Attorney Direct: 360/696-8251 [COR LD NTC County Counsel] OFFICE OF THE CITY ATTORNEY 415 W. 6th Street Vancouver, WA 98660 CLACKAMAS COUNTY, SHERIFF'S DEPARTMENT Defendant - Appellee, Edward S. McGlone, III, Attorney Direct: 503-486-7048 [COR LD NTC County Counsel] Edward McGlone Law Offices 4000 Kruse Way Place, 3-120 Lake Oswego, OR 97035 MULTNOMAH COUNTY SHERIFF Defendant - Appellee, Susan M. Dunaway Direct: 503-988-3138 [COR LD NTC County Counsel] Multnomah County Attorney's Office Suite 500 501 SE Hawthorne Blvd. Portland, OR 97214 VANCOUVER PROBATION OFFICE Defendant - Appellee, Jeffrey N. Riback, Esquire, Attorney Direct: 360/696-8251 [COR LD NTC County Counsel] (see above) PIERCE COUNTY SHERIFF DEPARTMENT Defendant - Appellee, Daniel Hamilton, Attorney Direct: 253-798-7746 [COR LD NTC County Counsel] Pierce County Prosecutor's Office Civil Division Suite 301 955 Tacoma Avenue South Tacoma, WA 98402-2160 CBS BROADCASTING INC Defendant - Appellee, Duane A. Bosworth Direct: 503-778-5224 [COR LD NTC Retained] Davis Wright Tremaine, LLP Firm: 503-241-2300 1300 SW Fifth Avenue Suite 2400 Portland, OR 97201-5610 JAMES DALTON BELL, Plaintiff - Appellant, and CHARLES STEWART; MICHAEL HUNTER, Plaintiffs, v. USDC, TACOMA; UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF WASHINGTON, SEATTLE; JACK E. TANNER; FRANKLIN D. BURGESS; ROB LONDON; ROBERT MICHAEL LEEN; JEFF GORDON; ANNE M. LEVINS; LESLIE SPIER, MICHAEL MARKHAM; JILL SJODIN; S. YOUNG; LISA STEVENSON; ERNIE GRIZZELL; MATT RICHARDS; COUNSELOR J. GUSTIN, FDC Seatac Counselor; SEATAC FDC; TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION; DEPARTMENT OF TREASURY; ALCOHOL TOBACCO AND FIREARMS AGENTS;; PETER AVENIA; JUDITH MANDEL; FEDERAL PUBLIC DEFENDERS OF TACOMA; FEDERAL PUBLIC DEFENDERS OF SEATTLE; RYAN LUND; PETER L. SHAW; WILLIAM MARTIN; STEVE WALSH, aka Steve Wilson; MICHAEL MARKHAM, ; JILL SJODIN; WARDEN W.J. JUSINO; S. YOUNG;LISA STEVENSON; ERNIE GRIZZELL; MATT RICHARDS;COUNSELORJ. GUSTIN, FDC Seatac Counselor; SEATAC FDC; TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION; DEPARTMENT OF TRREASURY; ALCOHOL TOBACCO AND FIREARMS AGENTS; FEDERAL BUREAU OF PRISONS; ORTIZ, Seatac Counselor;MIKE MCNALL; STEVEN L LANE; JOHN MCKAY; HELEN BRUNNER; ATWATER UNITED STATES PENITENTIARY;LOMPOC USP and its Warden; PHOENIX FCI and its Warden; CHRISTINE MILLIGAN, Atwater Counselor; COMMISSIONER OF INTERNAL REVENUE SERVICE; CHARLES VOLLMER;; PORTLAND POLICE BUREAU; CITY OF PORTLAND, ; GUNDERSON, Officer;; VANCOUVER POLICE DEPARTMENT, ; DAVID KING, Sargeant;; CLACKAMAS COUNTY, SHERIFF'S DEPARTMENT; MULTNOMAH COUNTY SHERIFF; VANCOUVER PROBATION OFFICE; PIERCE COUNTY SHERIFF DEPARTMENT; CBS BROADCASTING INC, Defendants - Appellees. 09/12/2005 1 DOCKETED CAUSE AND ENTERED APPEARANCE OF APLT IN PRO PER AND COUNSEL FOR APLES. CADS SENT (Y/N): n. setting schedule as follows: Fee payment is due 9/26/05 ; appellant's designation of RT is due 9/6/05; appellee's designation of RT is due 9/15/05,, ; appellant shall order transcript by 9/26/05; court reporter shall transcript in DC by 10/26/05; certificate of record shall filed by 11/2/05 ; appellant's opening brief is due 12/12/05; appellees' brief is due 1/11/06,, ; appellants' reply brief is due 1/25/06; [05-35897] (KKW) [Entered: 09/12/2005 02:35 PM] 10/14/2005 3 Order filed A review of the record demonstrates that this court lacks jurisdiciton over this appeal because the order challenged in the appeal is not final or appelable. Consequently, this appeal is dismissed for lack of jurisdiciton. All pending mtns are denied as moot.( Procedurally Terminated After Other Judicial Action; Jurisdictional Defects. G. NELSON, Kim M. WARDLAW, Richard C. TALLMAN ) [05-35897] (KKW) [Entered: 10/14/2005 11:27 AM] 11/07/2005 4 MANDATE ISSUED [05-35897] (KKW) [Entered: 11/07/2005 08:48 AM] -------------- next part -------------- A non-text attachment was scrubbed... Name: Bell_05-35897_Docket.pdf Type: application/pdf Size: 139053 bytes Desc: not available URL: From grarpamp at gmail.com Tue Aug 4 19:29:22 2015 From: grarpamp at gmail.com (grarpamp) Date: Tue, 4 Aug 2015 22:29:22 -0400 Subject: Constitutionality of tracking cell phones. In-Reply-To: <2135272683.827611.1438725675436.JavaMail.yahoo@mail.yahoo.com> References: <2135272683.827611.1438725675436.JavaMail.yahoo@mail.yahoo.com> Message-ID: > The court is expected to act on the case early in the next term. Judges are no different than politicians and execs, you can just as easily write, fax, call, email and even brief them. inb4juanrants. From coderman at gmail.com Tue Aug 4 22:29:40 2015 From: coderman at gmail.com (coderman) Date: Tue, 4 Aug 2015 22:29:40 -0700 Subject: FOIA/PA In-Reply-To: References: <1574391633.66688.1438654538789.JavaMail.yahoo@mail.yahoo.com> Message-ID: the first in file order, from '97: Court of Appeals Docket #: 97-30384 Docketed: 12/30/1997 Termed: 08/21/1998 USA v. Bell Appeal From: U.S. District Court for Western Washington, Tacoma Fee Status: IFP Case Type Information: 1) criminal 2) sentence and conviction 3) null Originating Court Information: District: 0981-3 : CR-97-05270-FDB Court Reporter: Teri Hendrix Trial Judge: Franklin D. Burgess, Senior District Judge Date Filed: 07/09/1997 Date Order/Judgment: Date NOA Filed: 12/12/1997 12/18/1997 Prior Cases: None Current Cases: None UNITED STATES OF AMERICA Plaintiff - Appellee, Annmarie Levins, Esquire Direct: 206/553-7970 [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101 Robb London, Esquire Direct: 206/553-7970 [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101 v. JAMES DALTON BELL (Federal Prisoner: 26906-086) Defendant - Appellant, Peter J. Avenia, Assistant Federal Public Defender Direct: 206-553-1100 [COR LD NTC Assist Fed Pub Def] FPDWA - FEDERAL PUBLIC DEFENDER'S OFFICE Western District of Washington Suite 700 1601 Fifth Ave. Seattle, WA 98101 UNITED STATES OF AMERICA, Plaintiff - Appellee, v. JAMES DALTON BELL, Defendant - Appellant. 12/30/1997 1 DOCKETED CAUSE AND ENTERED APPEARANCES OF COUNSEL. Filed in D.C. on 12/18/97; setting schedule as follows: transcript shall be ordered by 1/9/98 for James Dalton Bell; transcript shall be filed by 2/9/98; appellants' briefs, excerpts due by 3/20/98 for James Dalton Bell; appellees' brief due 4/20/98 for USA; appellants' reply brief due by 5/4/98 for James Dalton Bell. ( RT required: y) ( Sentence imp 11 months) [97-30384] (TM) [Entered: 12/30/1997 03:34 PM] 02/17/1998 2 Filed certificate of record on appeal RT filed in DC n/a appellants' brief due ; [97-30384] (RG) [Entered: 02/25/1998 12:28 PM] 03/24/1998 3 Filed original and 15 copies Appellant James Dalton Bell opening brief ( Informal: n) 25 pages and five excerpts of record in 1 volumes., served on 3/20/98 [97-30384] (RG) [Entered: 03/24/1998 02:50 PM] 03/24/1998 4 Filed Appellant's excerpts within pre-sentencing report UNDER SEAL. [97-30384] (RG) [Entered: 03/24/1998 02:53 PM] 03/27/1998 5 Filed Appellant James Dalton Bell's motion to stay special conditions of supervised release and D.C.'s Order to disclose confidential Psychological report; [97-30384] served on 3/20/98. (MoAtt) [3422227] [97-30384] (DL) [Entered: 03/27/1998 01:36 PM] 04/13/1998 6 14 day oral extension by phone of time to file 's brief. [97-30384] appellees' brief due 5/4/98; the optional reply brief is due 14 days... (LKK) [Entered: 04/13/1998 02:00 PM] 05/01/1998 8 Filed order ( Melvin BRUNETTI, Thomas G. NELSON): Appellant's motion for injunctive relief is denied. The br. sch. established previously shall remain in effect. [97-30384] (RG) [Entered: 05/01/1998 08:01 AM] 05/06/1998 9 Filed original and 15 copies appellee USA's 24 pages brief, served on 5/4/98 [97-30384] (RG) [Entered: 05/06/1998 01:44 PM] 05/20/1998 13 Filed original and 15 copies James Dalton Bell reply brief, ( Informal: n ) 5 pages; served on 5/18/98 [97-30384] (RG) [Entered: 05/21/1998 09:41 AM] 05/21/1998 12 Calendar check performed [97-30384] (TH) [Entered: 05/21/1998 09:29 AM] 06/02/1998 14 Calendar materials being prepared. [97-30384] [97-30384] (UK) [Entered: 06/02/1998 01:56 PM] 06/05/1998 15 CALENDARED: SE 8/5/98 9:00 am Courtroom Park Place, 21st Floor [97-30384] (UK) [Entered: 06/05/1998 11:10 AM] 06/19/1998 18 FILED CERTIFIED RECORD ON APPEAL; IN 1 CLERKS REC, 0 RTs. (Orig) [97-30384] (JR) [Entered: 06/19/1998 02:00 PM] 08/05/1998 19 ARGUED AND SUBMITTED TO Dorothy W. NELSON, Alex KOZINSKI, William W. Schwarzer [97-30384] (XX) [Entered: 08/05/1998 01:38 PM] 08/21/1998 23 FILED MEMORANDUM DISPOSITION: AFFIRMED (Terminated on the Merits after Oral Hearing; Affirmed; Written, Unsigned, Unpublished. Dorothy W. NELSON; Alex KOZINSKI, author; William W. Schwarzer) FILED AND ENTERED JUDGMENT. [97-30384] (RR) [Entered: 08/25/1998 11:55 AM] 09/14/1998 24 MANDATE ISSUED [97-30384] (RR) [Entered: 09/14/1998 11:38 AM] 07/13/2000 25 RECORD RETURNED. (See control card for details.) (JR) [Entered: 07/13/2000 01:07 PM] -------------- next part -------------- A non-text attachment was scrubbed... Name: USAvBell_97-30384_Docket.pdf Type: application/pdf Size: 120377 bytes Desc: not available URL: From coderman at gmail.com Tue Aug 4 22:36:00 2015 From: coderman at gmail.com (coderman) Date: Tue, 4 Aug 2015 22:36:00 -0700 Subject: so called onion routing In-Reply-To: <55bff8f5.a85c8c0a.926e1.ffffce20@mx.google.com> References: <55bff8f5.a85c8c0a.926e1.ffffce20@mx.google.com> Message-ID: On 8/3/15, Juan wrote: > ... > http://www.onion-router.net/History.html > 1995: > Initial work on Onion Routing begins, funded by ONR. back in this day, fully saturated ISDN pairs made for great zero knowledge overlays, too. the real question is, what do you propose to do better? if TCP Tor is just a jump toward datagram traffic analysis resistant overlays, how little it matters what origins for this open source", distributed, public infrastructure? cooperation is the future. learn to do it least badly :P best regards, From coderman at gmail.com Tue Aug 4 22:58:30 2015 From: coderman at gmail.com (coderman) Date: Tue, 4 Aug 2015 22:58:30 -0700 Subject: FOIPA adventures In-Reply-To: References: <000701d0bcb7$94118e80$bc34ab80$@co.uk> Message-ID: my first payment required: https://www.muckrock.com/foi/united-states-of-america-10/hotpluggedin-19762/#file-50509 as i do not qualify for fee waiver in their eyes. :( this diss hurts most deep, earth humans... best regards, acting in selfish self interest FOIA for profitman (?!?) From coderman at gmail.com Tue Aug 4 23:02:59 2015 From: coderman at gmail.com (coderman) Date: Tue, 4 Aug 2015 23:02:59 -0700 Subject: FOIPA adventures In-Reply-To: References: <000701d0bcb7$94118e80$bc34ab80$@co.uk> Message-ID: On 8/4/15, coderman wrote: > ... > best regards, > acting in selfish self interest FOIA for profitman (?!?) i forgot to add, they also checked off: "You have not demonstrated your expertise in the subject area [forensic power supply devices for live in-situ and lab equipped volatile memory and running system analysis], your ability, and/or your intention to effectively convey the information to the public." which offends me for MuckRock as their publication platform is excellent! rude. i suppose if my competence is insulted, there is no alternative but to reclaim and defend honor so besmirched... From coderman at gmail.com Tue Aug 4 23:23:25 2015 From: coderman at gmail.com (coderman) Date: Tue, 4 Aug 2015 23:23:25 -0700 Subject: FOIPA adventures In-Reply-To: References: <000701d0bcb7$94118e80$bc34ab80$@co.uk> Message-ID: Privacy Act request to FBI is in third attempt, with dual copies of notarized DoJ-361 to both RIDS and MuckRock: https://www.muckrock.com/foi/united-states-of-america-10/privacyactdirect-19921/ enabled web tracking for real-time stats on progress of each identical USPS certified letter. expect to get next: 0. X records responsive to your request. you must pay for them and it will take three years to dribble out. 1. upon reading the dribbles, majority is redacted. now starts the remove-redact fight, more years hence... best regards, From coderman at gmail.com Wed Aug 5 01:32:36 2015 From: coderman at gmail.com (coderman) Date: Wed, 5 Aug 2015 01:32:36 -0700 Subject: FOIPA adventures In-Reply-To: References: <000701d0bcb7$94118e80$bc34ab80$@co.uk> Message-ID: On 8/4/15, coderman wrote: > ... > i suppose if my competence is insulted, there is no alternative but to > reclaim and defend honor so besmirched... able to pre-pay for the most technical report on FBI procurement of forensic power overrides: https://www.pay.gov/public/search/global?formSearchCategory=FOIA%20Request and FBI specifically at: https://www.pay.gov/public/form/start/37210538 updated MuckRock accordingly, https://www.muckrock.com/foi/united-states-of-america-10/hotpluggedin-19762/ fun to see how pre-payment processed? :) best regards, From coderman at gmail.com Wed Aug 5 03:05:59 2015 From: coderman at gmail.com (coderman) Date: Wed, 5 Aug 2015 03:05:59 -0700 Subject: FOIPA adventures In-Reply-To: References: <000701d0bcb7$94118e80$bc34ab80$@co.uk> Message-ID: most recent batch: P25Count Count of the number of P25 capable radio units or systems in use by, or owned, or leased, or otherwise utilized by the Bureau. This includes any of the Motorola ASTRO APX P25 portables, Vertex Standard P25 portables, ICOM P25 portables, RELM Wireless P25 portables, Motorola MOTOTRBO DMR radios, and Mobile P25 Radios. This includes any P25 Phase 1 and Phase 2 capable radios. Please include yearly break-down by radio model, if available. Please include processing notes for this request, even if denied in part. @FBI https://www.muckrock.com/foi/united-states-of-america-10/p25count-20168/ @DEA https://www.muckrock.com/foi/united-states-of-america-10/p25count-20169/ @USMarshals https://www.muckrock.com/foi/united-states-of-america-10/p25count-20170/ @ATF https://www.muckrock.com/foi/united-states-of-america-10/p25count-20171/ @CoastGuard https://www.muckrock.com/foi/united-states-of-america-10/p25count-20172/ @USSS https://www.muckrock.com/foi/united-states-of-america-10/p25count-20173/ @DoJ(crim. div.) https://www.muckrock.com/foi/united-states-of-america-10/p25count-20174/ @CIA https://www.muckrock.com/foi/united-states-of-america-10/p25count-20175/ @NSA https://www.muckrock.com/foi/united-states-of-america-10/p25count-20176/ @StateDept https://www.muckrock.com/foi/united-states-of-america-10/p25count-20177/ @DoT https://www.muckrock.com/foi/united-states-of-america-10/p25count-20178/ @HomeSec https://www.muckrock.com/foi/united-states-of-america-10/p25count-20179/ @NCSC https://www.muckrock.com/foi/united-states-of-america-10/p25count-20180/ @DSS https://www.muckrock.com/foi/united-states-of-america-10/p25count-20181/ @DoJ(natsec div.) https://www.muckrock.com/foi/united-states-of-america-10/p25count-20182/ @INTERPOL https://www.muckrock.com/foi/united-states-of-america-10/p25count-20183/ all reqs: https://www.muckrock.com/foi/list/?page=1&per_page=104&user=2774 best regards, From grarpamp at gmail.com Wed Aug 5 02:02:13 2015 From: grarpamp at gmail.com (grarpamp) Date: Wed, 5 Aug 2015 05:02:13 -0400 Subject: =?UTF-8?Q?Re=3A_World=E2=80=99s_First_=E2=80=98Truly_Anonymous=E2=80=99_Crypto_Exc?= =?UTF-8?Q?hange_Launches_on_I2P?= In-Reply-To: References: Message-ID: Not quite the first that looks like a typical 'exchange', but the most substantial by far. This one's been known widely for 2mo and spoken for a year. And markets and boards exist in the past and present. It's necessarily closed system, and unnecessarily centralized. Have fun. From juan.g71 at gmail.com Wed Aug 5 01:15:58 2015 From: juan.g71 at gmail.com (Juan) Date: Wed, 5 Aug 2015 05:15:58 -0300 Subject: so called onion routing In-Reply-To: References: <55bff8f5.a85c8c0a.926e1.ffffce20@mx.google.com> Message-ID: <55c1c5c7.042c8c0a.6f6b9.615c@mx.google.com> On Tue, 4 Aug 2015 22:36:00 -0700 coderman wrote: > On 8/3/15, Juan wrote: > > ... > > http://www.onion-router.net/History.html > > 1995: > > Initial work on Onion Routing begins, funded by ONR. > > back in this day, fully saturated ISDN pairs made for great zero > knowledge overlays, too. > > the real question is, what do you propose to do better? what I was getting at is that, if I'm not mistaken, syverson and co. claim to have 'invented' 'onion routing' but they didn't come up with the ideas and didn't even come up with the name apparently > > > if TCP Tor is just a jump toward datagram traffic analysis resistant > overlays, how little it matters what origins for this open source", > distributed, public infrastructure? > do you consider your governemnt to be a 'repressive regime' coderman? does tor protect people from your goverment's attacks? do you think tor helps the US government in any way? do you think it's 'hypotetically' acceptable to murder say a 100 people so that 1 million people can 'anonymously' browse their newspaper or favorite sports website? > cooperation is the future. learn to do it least badly :P > > > best regards, From list at sysfu.com Wed Aug 5 10:08:13 2015 From: list at sysfu.com (Seth) Date: Wed, 05 Aug 2015 10:08:13 -0700 Subject: =?utf-8?B?V29ybGTigJlzIEZpcnN0IOKAmFRydWx5IEFub255bW91c+KAmSBDcnlwdG8=?= =?utf-8?B?IEV4Y2hhbmdlIExhdW5jaGVzIG9uIEkyUA==?= In-Reply-To: References: Message-ID: On Wed, 05 Aug 2015 02:02:13 -0700, grarpamp wrote: > Not quite the first that looks like a typical 'exchange', but the most > substantial by far. This one's been known widely for 2mo and spoken > for a year. And markets and boards exist in the past and present. > It's necessarily closed system, and unnecessarily centralized. Have fun. Only decentralized exchanges I have found so far are https://bitsquare.io/ and http://mercuryex.com/. To the best of my knowledge neither utilize an onion or garlic routing network to connect nodes. Agree that 'necessarily closed system, and unnecessarily centralized' are undesirable traits of ExchangeD.i2p. Ideal would be decentralized exchange platforms such as the Bitsquare are Mercury running using I2P as network transport. From Rayzer at riseup.net Wed Aug 5 13:36:24 2015 From: Rayzer at riseup.net (Razer) Date: Wed, 05 Aug 2015 13:36:24 -0700 Subject: so called onion routing In-Reply-To: References: <55bff8f5.a85c8c0a.926e1.ffffce20@mx.google.com> <55c1c5c7.042c8c0a.6f6b9.615c@mx.google.com> Message-ID: <55C273C8.3020902@riseup.net> On Wed, Aug 5, 2015, 9:24 AM Cari Machet wrote: > i like to think about satelites You don't trust tor but DO trust the satellite owners and operators? > i know that when i was in syria i could get a fucking video call in > the desert where there was nothing ...and the NRO was logging it, as they say in Southern California, 'fershure!'.\ RR -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 819 bytes Desc: OpenPGP digital signature URL: From coderman at gmail.com Wed Aug 5 15:26:09 2015 From: coderman at gmail.com (coderman) Date: Wed, 5 Aug 2015 15:26:09 -0700 Subject: FOIA/PA In-Reply-To: <1220736922.653375.1438804429546.JavaMail.yahoo@mail.yahoo.com> References: <1220736922.653375.1438804429546.JavaMail.yahoo@mail.yahoo.com> Message-ID: On 8/5/15, jim bell wrote: > I never saw this appeal, as I recall, done by the same corrupt attorney as > who later mishandled one of the appeals in 2001-2002. this whole slew of motions is odd in the extreme. pulling all docs from every case; will see if that provides a better picture in larger context. (it may take me a few days...) best regards, From tbiehn at gmail.com Wed Aug 5 12:41:57 2015 From: tbiehn at gmail.com (Travis Biehn) Date: Wed, 5 Aug 2015 15:41:57 -0400 Subject: so called onion routing In-Reply-To: References: <55bff8f5.a85c8c0a.926e1.ffffce20@mx.google.com> <55c1c5c7.042c8c0a.6f6b9.615c@mx.google.com> Message-ID: On Wed, Aug 5, 2015 at 3:02 PM, Cari Machet wrote: > its religious thought to even utilize the word 'evil' let alone think in > those terms and religious thought is a capitalist parasite >>> read > nietzsche for fuck sake he wrote in the 1800's > > That's my point, glad we agree. > one of my arguments is that it is structurally unsound to rely on one > method >>> especially if built by your enemy - i look to nature as other > thinkers do/have and i think about buckminster fuller - his analysis of > panther dna making them vulnerable to extinction because it is all so/too > similar ... in any given situation i do not think in terms of one solution > ... i have used this analogy before ... sperm: there are lots of them in > one load ... they all race to get to the egg sure but, they actually help > each other to penetrate - they dont care who gets in as long as one of them > transforms the egg into a being (i mean i cant really speak for sperms in > general but it has been analysed like this)... thats their job ...they even > have been seen to help each other non-competative like :: this is the kind > of structures we need moreso not monolithic structures that blind us ... > its really a geometry problem for me... math > > OK, 'yes' monoculture is threatening and certain practices provide clear 'intelligence signals'. Unrestrained 'lateral thinking,' while intellectually stimulating and interesting, does not always map to fact. There's a step, where you rigorously research whether your theories are correct. but also it is all ethical to me as well : if my family was murdered by a > fucker i wouldnt go and use that fuckers infrastructure cause they made it > for me to use and sent some other fuckers around the globe selling it cause > like the fucker murdered my family i wont support them in any way ever > ....why would i talk myself into supporting the murderer of my family when > i could think about, invent or utilize other methods - its just really not > logical > This is an emotional argument, not a logical one. To continue the appeal to emotion, isn't it vaguely poetic? Using alternative methods are fine, but the existence of alternatives does not justify demonizing other approaches. > > > > On Wed, Aug 5, 2015 at 9:19 PM, Travis Biehn wrote: > >> Yes, just get a new DHCP lease - rock solid. >> >> This is actually pretty easy; First read the protocol spec then read the >> code. >> >> If there is a backdoor or vulnerability, please let everyone know. >> >> If you can do away with evils like centralized directory servers while >> retaining sybill resistance please publish your ideas. >> >> If your arguments are that the project is intrinsically evil, by virtue >> of the authors being tainted with 'reptilian money' - that's not really a >> technically robust. >> >> -Travis >> >> On Wed, Aug 5, 2015, 9:24 AM Cari Machet wrote: >> >>> i think there could be solutions utilized like easily shifting the ip >>> address of comp and router yourself in your own little hut > 'ghost' it but >>> not thru others .... pretty fucking simple i know but maybe effective in a >>> really different way than having the fake government of the US build >>> something and use people that are activists against them to make it work >>> also i think the infrastructure is too bulky >>> >>> i like to think about satelites (and thats all i will say about that) - >>> i dont know i would have to have a real think about solutions it is very >>> important to think about it and not just the problem for sure but i dont >>> think the methodology of tor is a solution i think it is a stoppage point >>> that people are not seeing beyond ... people dont think it has been >>> penetrated and i have no proof of that but maybe that isnt the main problem >>> for me ... structurally speaking it is a disaster ... the masses being >>> handed a tool in order to subvert the government??? as they say you cant >>> make this shit up >>> >>> i know that when i was in syria i could get a fucking video call in the >>> desert where there was nothing ... this was syria not a rich country per >>> say like at all so i think the choking of the communication system is super >>> in play ... if others dont think thats a problem then they need to educate >>> themselves ... do people that live in the US on this list even know that >>> the infrastructure of fiber optics that underlies the communications may >>> not even be utilized in their city and that the reason it is not used is >>> because the communication companies bought a contract with there city that >>> freezes it all up? please look into the chatanooga model if you dont know >>> about this 'freemarket' bullshit>>>> also fyi iraq had video calls >>> nationwide in 2000 or even before ... now i am not sure what tech they were >>> using i think radiowaves and shooting the signal over land that way but it >>> all points to a tremendous shut down of functionality .... not that it was >>> probably all that healthy for people but... >>> >>> sure we can write each other little words on this frame of >>> communications but see what happens when attempting to shift in a large way >>> ... like when they printed the 3d gun... people had to git fr USA & like >>> when barrett made project pm and this is a major reason i think there >>> should be as many solutions as possible not just one - not as easy for >>> gov/corp to take them out >>> >>> On Wed, Aug 5, 2015 at 11:15 AM, Juan wrote: >>> >>>> On Tue, 4 Aug 2015 22:36:00 -0700 >>>> coderman wrote: >>>> >>>> > On 8/3/15, Juan wrote: >>>> > > ... >>>> > > http://www.onion-router.net/History.html >>>> > > 1995: >>>> > > Initial work on Onion Routing begins, funded by ONR. >>>> > >>>> > back in this day, fully saturated ISDN pairs made for great zero >>>> > knowledge overlays, too. >>>> > >>>> > the real question is, what do you propose to do better? >>>> >>>> >>>> what I was getting at is that, if I'm not mistaken, syverson >>>> and co. claim to have 'invented' 'onion routing' >>>> >>>> but they didn't come up with the ideas and didn't even come up >>>> with the name apparently >>>> >>>> >>>> > >>>> > >>>> > if TCP Tor is just a jump toward datagram traffic analysis resistant >>>> > overlays, how little it matters what origins for this open source", >>>> > distributed, public infrastructure? >>>> > >>>> >>>> do you consider your governemnt to be a 'repressive regime' >>>> coderman? >>>> >>>> does tor protect people from your goverment's attacks? >>>> >>>> do you think tor helps the US government in any way? >>>> >>>> >>>> do you think it's 'hypotetically' acceptable to murder say a 100 >>>> people so that 1 million people can 'anonymously' browse >>>> their newspaper or favorite sports website? >>>> >>>> >>>> >>>> >>>> >>>> >>>> >>>> > cooperation is the future. learn to do it least badly :P >>>> > >>>> > >>>> > best regards, >>>> >>>> >>> >>> >>> -- >>> Cari Machet >>> NYC 646-436-7795 >>> carimachet at gmail.com >>> AIM carismachet >>> Syria +963-099 277 3243 >>> Amman +962 077 636 9407 >>> Berlin +49 152 11779219 >>> Reykjavik +354 894 8650 >>> Twitter: @carimachet >>> >>> 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 >>> >>> Ruh-roh, this is now necessary: This email is intended only for the >>> addressee(s) and may contain confidential information. If you are not >>> the >>> intended recipient, you are hereby notified that any use of this >>> information, dissemination, distribution, or copying of this email >>> without >>> permission is strictly prohibited. >>> >>> >>> > > > -- > Cari Machet > NYC 646-436-7795 > carimachet at gmail.com > AIM carismachet > Syria +963-099 277 3243 > Amman +962 077 636 9407 > Berlin +49 152 11779219 > Reykjavik +354 894 8650 > Twitter: @carimachet > > 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 > > Ruh-roh, this is now necessary: This email is intended only for the > addressee(s) and may contain confidential information. If you are not the > intended recipient, you are hereby notified that any use of this > information, dissemination, distribution, or copying of this email without > permission is strictly prohibited. > > > -- Twitter | LinkedIn | GitHub | TravisBiehn.com | Google Plus -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12462 bytes Desc: not available URL: From coderman at gmail.com Wed Aug 5 15:55:58 2015 From: coderman at gmail.com (coderman) Date: Wed, 5 Aug 2015 15:55:58 -0700 Subject: FOIPA adventures In-Reply-To: References: <000701d0bcb7$94118e80$bc34ab80$@co.uk> Message-ID: On 8/5/15, coderman wrote: > ... > https://www.muckrock.com/foi/united-states-of-america-10/hotpluggedin-19762/ > fun to see how pre-payment processed? :) same day turnaround; that's a record! "The FBI has received your additional correspondence regarding your Freedom of Information Act/Privacy (FOIPA) request and it has been forwarded to the assigned analyst for review. If appropriate, a response will be forthcoming." RIDS++ From tbiehn at gmail.com Wed Aug 5 11:19:05 2015 From: tbiehn at gmail.com (Travis Biehn) Date: Wed, 05 Aug 2015 18:19:05 +0000 Subject: so called onion routing In-Reply-To: References: <55bff8f5.a85c8c0a.926e1.ffffce20@mx.google.com> <55c1c5c7.042c8c0a.6f6b9.615c@mx.google.com> Message-ID: Yes, just get a new DHCP lease - rock solid. This is actually pretty easy; First read the protocol spec then read the code. If there is a backdoor or vulnerability, please let everyone know. If you can do away with evils like centralized directory servers while retaining sybill resistance please publish your ideas. If your arguments are that the project is intrinsically evil, by virtue of the authors being tainted with 'reptilian money' - that's not really a technically robust. -Travis On Wed, Aug 5, 2015, 9:24 AM Cari Machet wrote: > i think there could be solutions utilized like easily shifting the ip > address of comp and router yourself in your own little hut > 'ghost' it but > not thru others .... pretty fucking simple i know but maybe effective in a > really different way than having the fake government of the US build > something and use people that are activists against them to make it work > also i think the infrastructure is too bulky > > i like to think about satelites (and thats all i will say about that) - i > dont know i would have to have a real think about solutions it is very > important to think about it and not just the problem for sure but i dont > think the methodology of tor is a solution i think it is a stoppage point > that people are not seeing beyond ... people dont think it has been > penetrated and i have no proof of that but maybe that isnt the main problem > for me ... structurally speaking it is a disaster ... the masses being > handed a tool in order to subvert the government??? as they say you cant > make this shit up > > i know that when i was in syria i could get a fucking video call in the > desert where there was nothing ... this was syria not a rich country per > say like at all so i think the choking of the communication system is super > in play ... if others dont think thats a problem then they need to educate > themselves ... do people that live in the US on this list even know that > the infrastructure of fiber optics that underlies the communications may > not even be utilized in their city and that the reason it is not used is > because the communication companies bought a contract with there city that > freezes it all up? please look into the chatanooga model if you dont know > about this 'freemarket' bullshit>>>> also fyi iraq had video calls > nationwide in 2000 or even before ... now i am not sure what tech they were > using i think radiowaves and shooting the signal over land that way but it > all points to a tremendous shut down of functionality .... not that it was > probably all that healthy for people but... > > sure we can write each other little words on this frame of communications > but see what happens when attempting to shift in a large way ... like when > they printed the 3d gun... people had to git fr USA & like when barrett > made project pm and this is a major reason i think there should be as many > solutions as possible not just one - not as easy for gov/corp to take them > out > > On Wed, Aug 5, 2015 at 11:15 AM, Juan wrote: > >> On Tue, 4 Aug 2015 22:36:00 -0700 >> coderman wrote: >> >> > On 8/3/15, Juan wrote: >> > > ... >> > > http://www.onion-router.net/History.html >> > > 1995: >> > > Initial work on Onion Routing begins, funded by ONR. >> > >> > back in this day, fully saturated ISDN pairs made for great zero >> > knowledge overlays, too. >> > >> > the real question is, what do you propose to do better? >> >> >> what I was getting at is that, if I'm not mistaken, syverson >> and co. claim to have 'invented' 'onion routing' >> >> but they didn't come up with the ideas and didn't even come up >> with the name apparently >> >> >> > >> > >> > if TCP Tor is just a jump toward datagram traffic analysis resistant >> > overlays, how little it matters what origins for this open source", >> > distributed, public infrastructure? >> > >> >> do you consider your governemnt to be a 'repressive regime' >> coderman? >> >> does tor protect people from your goverment's attacks? >> >> do you think tor helps the US government in any way? >> >> >> do you think it's 'hypotetically' acceptable to murder say a 100 >> people so that 1 million people can 'anonymously' browse >> their newspaper or favorite sports website? >> >> >> >> >> >> >> >> > cooperation is the future. learn to do it least badly :P >> > >> > >> > best regards, >> >> > > > -- > Cari Machet > NYC 646-436-7795 > carimachet at gmail.com > AIM carismachet > Syria +963-099 277 3243 > Amman +962 077 636 9407 > Berlin +49 152 11779219 > Reykjavik +354 894 8650 > Twitter: @carimachet > > 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 > > Ruh-roh, this is now necessary: This email is intended only for the > addressee(s) and may contain confidential information. If you are not the > intended recipient, you are hereby notified that any use of this > information, dissemination, distribution, or copying of this email without > permission is strictly prohibited. > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6898 bytes Desc: not available URL: From carimachet at gmail.com Wed Aug 5 09:21:01 2015 From: carimachet at gmail.com (Cari Machet) Date: Wed, 5 Aug 2015 19:21:01 +0300 Subject: so called onion routing In-Reply-To: <55c1c5c7.042c8c0a.6f6b9.615c@mx.google.com> References: <55bff8f5.a85c8c0a.926e1.ffffce20@mx.google.com> <55c1c5c7.042c8c0a.6f6b9.615c@mx.google.com> Message-ID: i think there could be solutions utilized like easily shifting the ip address of comp and router yourself in your own little hut > 'ghost' it but not thru others .... pretty fucking simple i know but maybe effective in a really different way than having the fake government of the US build something and use people that are activists against them to make it work also i think the infrastructure is too bulky i like to think about satelites (and thats all i will say about that) - i dont know i would have to have a real think about solutions it is very important to think about it and not just the problem for sure but i dont think the methodology of tor is a solution i think it is a stoppage point that people are not seeing beyond ... people dont think it has been penetrated and i have no proof of that but maybe that isnt the main problem for me ... structurally speaking it is a disaster ... the masses being handed a tool in order to subvert the government??? as they say you cant make this shit up i know that when i was in syria i could get a fucking video call in the desert where there was nothing ... this was syria not a rich country per say like at all so i think the choking of the communication system is super in play ... if others dont think thats a problem then they need to educate themselves ... do people that live in the US on this list even know that the infrastructure of fiber optics that underlies the communications may not even be utilized in their city and that the reason it is not used is because the communication companies bought a contract with there city that freezes it all up? please look into the chatanooga model if you dont know about this 'freemarket' bullshit>>>> also fyi iraq had video calls nationwide in 2000 or even before ... now i am not sure what tech they were using i think radiowaves and shooting the signal over land that way but it all points to a tremendous shut down of functionality .... not that it was probably all that healthy for people but... sure we can write each other little words on this frame of communications but see what happens when attempting to shift in a large way ... like when they printed the 3d gun... people had to git fr USA & like when barrett made project pm and this is a major reason i think there should be as many solutions as possible not just one - not as easy for gov/corp to take them out On Wed, Aug 5, 2015 at 11:15 AM, Juan wrote: > On Tue, 4 Aug 2015 22:36:00 -0700 > coderman wrote: > > > On 8/3/15, Juan wrote: > > > ... > > > http://www.onion-router.net/History.html > > > 1995: > > > Initial work on Onion Routing begins, funded by ONR. > > > > back in this day, fully saturated ISDN pairs made for great zero > > knowledge overlays, too. > > > > the real question is, what do you propose to do better? > > > what I was getting at is that, if I'm not mistaken, syverson > and co. claim to have 'invented' 'onion routing' > > but they didn't come up with the ideas and didn't even come up > with the name apparently > > > > > > > > if TCP Tor is just a jump toward datagram traffic analysis resistant > > overlays, how little it matters what origins for this open source", > > distributed, public infrastructure? > > > > do you consider your governemnt to be a 'repressive regime' > coderman? > > does tor protect people from your goverment's attacks? > > do you think tor helps the US government in any way? > > > do you think it's 'hypotetically' acceptable to murder say a 100 > people so that 1 million people can 'anonymously' browse > their newspaper or favorite sports website? > > > > > > > > > cooperation is the future. learn to do it least badly :P > > > > > > best regards, > > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5971 bytes Desc: not available URL: From jdb10987 at yahoo.com Wed Aug 5 12:23:20 2015 From: jdb10987 at yahoo.com (jim bell) Date: Wed, 5 Aug 2015 19:23:20 +0000 (UTC) Subject: FOIA/PA In-Reply-To: References: Message-ID: <2056095094.626672.1438802600124.JavaMail.yahoo@mail.yahoo.com> I filed a Notice of Appeal (Interlocutory) in about March 23,2001, on the new case which began November 2000. This ISN'T the same case as turned into appeal case 99-30210. The filing of this appeal notice had the legal effect (albeit ignored) of divesting Tanner's court of jurisdiction to proceed with the upcoming trial. Tanner, and corrupt attorney Robert Leen, ignored this, however. jim Bell ----- Original Message ----- From: coderman To: jim bell Cc: John Young ; "cypherpunks at cpunks.org" Sent: Tuesday, August 4, 2015 10:10 PM Subject: Re: FOIA/PA next is a different case number, but same action? Court of Appeals Docket #: 01-30143 Docketed: 04/05/2001 Termed: 05/22/2001 USA v. Bell Appeal From: U.S. District Court for Western Washington, Seattle Fee Status: IFP Case Type Information: 1) criminal 2) pre-guidelines 3) interlocutory Originating Court Information: District: 0981-2 : CR-00-05731-JET Trial Judge: Jack E. Tanner, District Judge Date Filed: 11/29/2000 Date Order/Judgment: Date NOA Filed: 03/30/2001 04/02/2001 Prior Cases: 97-30384 Date Filed: 12/30/1997 Date Disposed: 08/21/1998 Disposition: Affirmed - Memorandum Current Cases: Lead Member Start End Companion 01-30143 01-30162 04/25/2001 Related 99-30210 01-30143 04/05/2001 99-30210 01-30162 04/25/2001 UNITED STATES OF AMERICA Plaintiff - Appellee, Helen J. Brunner, Esquire, Assistant U.S. Attorney [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101 Robert Louis London, Esquire Direct: 206/553-7970 [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101 v. JAMES DALTON BELL (Federal Prisoner: 26906-086) Defendant - Appellant, James Dalton Bell [COR LD NTC Pro Se] FCI - FEDERAL CORRECTIONAL INSTITUTION - SHERIDAN P.O. Box 5000 Sheridan, OR 97378-5000 Robert Michael Leen, Esquire, Attorney Direct: 425-949-8555 [COR LD NTC Please Select] Law Office Of Robert M. Leen P.O. Box 82 Woodinville, WA 98072-0082 UNITED STATES OF AMERICA, Plaintiff - Appellee, v. JAMES DALTON BELL, Defendant - Appellant. 04/05/2001 1 DOCKETED CAUSE AND ENTERED APPEARANCES OF COUNSEL. (Partially SEALED: part of NOA package from USDC under SEAL). Filed in D.C. on 04/02/01; setting schedule as follows: transcript shall be ordered by 4/20/01 for James Dalton Bell; transcript shall be filed by 5/21/01; appellants' briefs, excerpts due by 7/2/01 for James Dalton Bell; appellees' brief due 8/1/01 for USA; appellants' reply brief due by 8/15/01 for James Dalton Bell. (RT required: yes) (Sentence imp) [01-30143] (JC) [Entered: 04/05/2001 04:52 PM] 04/05/2001 2 Filed certificate of record on appeal RT filed in DC n/a [01-30143] (JC) [Entered: 04/06/2001 10:42 AM] 04/05/2001 9 Received (FAXED) Appellant James Dalton Bell's motion for stay of trial; served 3/27/01 (MOATT) (TM) [Entered: 04/09/2001 04:52 PM] 04/06/2001 4 Filed order (Appellate Commissioner) MOATT: This court has received appellant's 4/5/01 pro se notice of appeal, and pro se emergency motion to stay d.c. proceedings pending appeal. Because appellant is represented by counsel, only counsel may file motions, and this court therefore declines to entertain the motion. The Clerk shall serve a copy of the pro se motion on appellant's counsel of record, Robert M. Leen. Within 14 days of this order, counsel Leen shall file a response to appellant's pro se motion. In addition, counsel Leen shall move for voluntary dismissal of the appeal filed 4/5/0, or show cause why it should not be dismissed for lack of jurisdiction because the d.c. has not issued any orders that are final or appealable. If counsel Leen elects to show cause, appellee may respond within 10 days after service of counsel Leen's memorandum. If counsel Leen does not comply with this order, the Clerk shall dismiss this appeal pursuant to 42-1. Briefing is suspended pending further order of the court. The Clerk shall also serve this order on appellant individually. (FAXED) [01-30143] (TM) [Entered: 04/06/2001 04:48 PM] 04/09/2001 8 Received (Hard copy) Appellant James Dalton Bell's motion for stay of trial; served on 3/27/01 (MOATT) (TM) [Entered: 04/09/2001 03:37 PM] 04/13/2001 10 Filed Appellant's response to to order of 4/6/01 ; served on 4/9/01 (MOATT) [01-30143] (TM) [Entered: 04/13/2001 04:23 PM] 04/27/2001 11 Filed Appellant's response to order of 4/6/01 ; served on 4/18/01 (MOATT) [01-30143] (TM) [Entered: 04/27/2001 03:26 PM] 05/22/2001 13 Order filed The court has rcvd and reviewed counsel's 4/13/01 response to this court's 4/6/01 OSC. This appeal is dismissed for lack of jurisdiction... All pending motions are denied. DISMISSED ( Terminated on the Merits after Submission Without Oral Hearing; Dismissed/Frivolous; Written, Unsigned, Unpublished. Harry PREGERSON, Ferdinand F. FERNANDEZ, Kim M. WARDLAW ) [01-30143] (WP) [Entered: 05/22/2001 07:37 AM] 05/29/2001 15 Received Appellant James Dalton Bell's letter dated 5/18/01 re: confusion associated with this case; response sent to incorrect court; unacceptable assigment of counsel . . . . (No action necessary per MOATT) [01-30143] (TM) [Entered: 06/05/2001 04:10 PM] 06/01/2001 14 Received letter from pro se re: Notice of continuing detition violation and defendant's response to April 6 9th Cir. order. Conflict of interest between defendant Bell and Leen. (CASEFILE) (TM) [Entered: 06/01/2001 02:52 PM] 06/06/2001 17 Per appellant's request, mail appellant a copy of the docket rpts. in 01-30143 and 01-30162 along with copy of orders in those cases dismissing them. [01-30143] (TM) [Entered: 06/06/2001 04:48 PM] 06/08/2001 19 Filed Appellant James Dalton Bell's "Notice of Fraud on Court. Motion for Replacement of counsel, and investigation and hearing on filings in this cas. Notice for request for stay on 5/22/01 order" MOATT [01-30143] (TM) [Entered: 06/19/2001 01:05 PM] 06/11/2001 20 Filed appellant's request for extension of time to file response (motion to reconsider and/or amended refiling) to 5/22/01 order (MOATT) [01-30143] (TM) [Entered: 06/20/2001 10:48 AM] 06/22/2001 21 Filed order (Ferdinand F. FERNANDEZ): Because appellant is represented by counsel, the court declines to entertain the 6/8/01 and 6/11/01 pro se motions. No motions for reconsideration, rehearing, clarification, stay of the mandate, or any other submissions shall be filed or entertained in this closed docket. [01-30143] (TM) [Entered: 06/22/2001 09:50 AM] 08/14/2001 23 MANDATE ISSUED [01-30143] (TM) [Entered: 08/14/2001 03:15 PM] 02/12/2003 24 NO ORIGINAL RECORD (SS) [Entered: 02/12/2003 03:51 PM] 03/28/2003 25 Received Appellant James Dalton Bell in 01-30143 letter dated 3/25/03 re: requesting copy of the docket rpts in 01-30143, 01-30296 and 01-30303 (Mailed copy to him) [01-30143] Also, new address:USP Atwater, P.O. Box 019001, Atwater, CA 95301 (TM) [Entered: 04/03/2003 05:00 PM] 09/05/2006 27 Rec'd notice of change of address from James Dalton Bell dated 8/29/06. (New Add: Reg No. 26906-086 U.S. Penn P.O. Box 33, Terre Haute, IN 47808) [01-30143] (XX) [Entered: 09/12/2006 09:14 AM] From jdb10987 at yahoo.com Wed Aug 5 12:34:04 2015 From: jdb10987 at yahoo.com (jim bell) Date: Wed, 5 Aug 2015 19:34:04 +0000 (UTC) Subject: FOIA/PA In-Reply-To: References: Message-ID: <628658987.652108.1438803244990.JavaMail.yahoo@mail.yahoo.com> What you have shown is the docket for appeal case 99-30210. Note: There are two clues which show that this docket was forged and thus fraudulent. The docket item number, which is immediately to the right of the date, should be sequential numbers starting from 1 and going up. SOMETIMES these numbers aren't precisely sequential (they may appear as 1,2,3,5,4... etc) but they should ALWAYS be present. When I received this docket about June 20, 2003, 29 of the 79 docket entries were MISSING. That should NEVER happen! What actually, apparently happened is that the 9th Circuit personnel FORGED (falsified) the docket about May 2000, after they discovered that I was demanding to have an appeal of the lower-court case. Before that time (say, March 2000) those court personnel believed (correctly, as it happened) that I was not aware of the existence of this court case, 99-30210. They expected this appeal case to 'die'. My demand for an appeal, though I was not aware of the existence of 99-30210, really messed things up for them! They couldn't refuse to give me an appeal, because I was already shown as having an appeal in progress! They appointed another corrupt attorney, Jonathan Solovy, to generate an appeal, but it was necessary to FIRST 'manipulate' the docket for 99-30210, to make it appear that this appeal had merely remained dormant in the period July 1999-April 2000. This I believe they did in May 2000. The backups for appeal case 99-30210 (made during the period June 1999 through August 2000) should show this forgery. Solovy's job (which he did) was to conceal the pre-April 2000 existence of appeal case 99-30210 from me. Jim Bell ----- Original Message ----- From: coderman To: jim bell Cc: John Young ; "cypherpunks at cpunks.org" Sent: Tuesday, August 4, 2015 10:06 PM Subject: Re: FOIA/PA here is one case docket report, also as PDF, Court of Appeals Docket #: 99-30210 Docketed: 07/06/1999 Termed: 05/25/2001 USA v. Bell Appeal From: U.S. District Court for Western Washington, Tacoma Fee Status: IFP Case Type Information: 1) criminal 2) sentence and conviction 3) null Originating Court Information: District: 0981-3 : CR-97-05270-FDB Court Reporter: Teri Hendrix Court Reporter: Catherine Maria Vernon Trial Judge: Franklin D. Burgess, Senior District Judge Date Filed: 07/18/1997 Date Order/Judgment: Date NOA Filed: 06/22/1999 06/22/1999 Prior Cases: None Current Cases: Lead Member Start End Companion 01-30143 01-30162 04/25/2001 Related 99-30210 01-30143 04/05/2001 99-30210 01-30162 04/25/2001 UNITED STATES OF AMERICA Plaintiff - Appellee, Robert London, Esquire, Attorney Direct: 206/553-7970 [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101 v. JAMES DALTON BELL (Federal Prisoner: 26906-086) Defendant - Appellant, James Dalton Bell [COR LD NTC Pro Se] FCI - FEDERAL CORRECTIONAL INSTITUTION - SHERIDAN P.O. Box 5000 Sheridan, OR 97378-5000 Jonathan S. Solovy, Esquire, Attorney [COR LD NTC Assist Fed Pub Def] Law Office of Jonathan S. Solovy, PLLC 705 Second Avenue Seattle, WA 98104-1705 UNITED STATES OF AMERICA, Plaintiff - Appellee, v. JAMES DALTON BELL, Defendant - Appellant. 07/06/1999 1 DOCKETED CAUSE AND ENTERED APPEARANCES OF COUNSEL. Filed in D.C. on 6/23/99; setting schedule as follows: transcript shall be ordered by 7/14/99 for James Dalton Bell; transcript shall be filed by 8/13/99; appellants' briefs, excerpts due by 9/22/99 for James Dalton Bell; appellees' brief due 10/22/99 for USA; appellants' reply brief due by 11/5/99 for James Dalton Bell. ( RT required: y) ( Sentence imp 2 years) [99-30210] (XX) [Entered: 07/06/1999 03:12 PM] 07/16/1999 2 Received copy of District Court order filed on 6/22/99 withdraw as counsel Judith Mandel. (CASEFILE) [99-30210] (SW) [Entered: 10/15/1999 12:09 PM] 11/10/1999 4 Received Appellant James Dalton Bell letter dated 8/5/99 re: requesting an extension of time on his filing. (MOATT PER PROMO) [99-30210] (SW) [Entered: 11/10/1999 11:12 AM] 11/24/1999 5 Filed order MoAtt (Appellate Commissioner) In this criminal appeal, appellant appears on the court's docket as proceeding pro se, althought appellant may be entitled to appointment of counsel at government expense. Within 28 days of this order, appellant shall: (1) retain counsel who shall file a notice of appearance; or (2) file a motion for appointment of counsel at government expense; or (3) inform the court in writing of his clear and unequivocal intention to represent himself. Appellant's motion for an extension of time to file the opening brief is denied as moot. A new briefing schedule shall be established upon compliance with this order. Failure to comply with this order may result in the dismissal of this appeal for failure to prosecute. The Clerk shall serve this order on appellant individually at Reg. No. 26906-086, FCE (Phoenix), 37900 N. 45th Avenue, Department 1680, Phoenix, AZ 85029. [99-30210] (CP) [Entered: 11/24/1999 10:29 AM] 01/26/2000 9 Filed order (Appellate Commissioner) On Nov. 24, 1999, the court ordered aplt, within 28 days, to: (1) retain counsel who whall file a notice of appearance; or (2) file a motion for appointment of counsel at gov expense; or (3) inform the ocurt in writing of his clear andunequivocal intention ot represent himself. To date, the court has not rec'd a response from alt. Aplt shall have one final opportunity to comply with the court's Nov. 24, 1999 order. Wtinin 28 days of this order, aplt shall comply with the court's Nov. 24, 1999 order. etc. The Clerk shall serve this order by certified mail on aplt. etc. ( MOTIONS) [99-30210] (VT) [Entered: 01/26/2000 07:24 AM] 01/26/2000 10 Sent document order dated 1/26/00 certified # P196-169-679 [99-30210] (VT) [Entered: 01/26/2000 07:31 AM] 02/01/2000 11 Return receipt received P196-169-679 Cert. no. (VT) [Entered: 02/02/2000 06:21 AM] 03/02/2000 15 Received Appellant James Dalton Bell's motion for appointment of counsel. served on 3/2/00 nan/SEE ORDER OF 3/13/00 case file [99-30210] (VT) [Entered: 03/14/2000 07:25 AM] 03/13/2000 13 Filed order (Appellate Commissioner) The court, on its own motion, appoints counsel to represent aplt for this appeal. Counsel will be appointed by separate order. The Clerk shall serve a copy of this order on Thomas W. Hillier, II, FPD, 1111 Third Ave., Suite 1100, Seattle, WA 98101, who will be locate appointed counsel. The district court shall provide the Clerk of this court with the name and address of appointed counsel for in this appeal, aplt shall file a written objection within 21 days after the date of this order. New counsel shall designate the reporter's rt's by April 17, 2000. The tr's is due May 17, 2000. Aplt's opening brief and excerpts of record and due June 26, 2000; aple's answering brief is due July 26, 2000; the optional reply brief is due within 14 days after service of the answering brief. The Clerk shall serve this order by ertified mail. etc. ( MOTIONS) [99-30210] (VT) [Entered: 03/13/2000 06:49 AM] 03/13/2000 14 Sent Thomas W. Hillier, II, FPD copy of order and aplt certified #P196-169-683 [99-30210] (VT) [Entered: 03/13/2000 07:00 AM] 03/29/2000 16 Return receipt received P196-169-683 Cert. no. (VT) [Entered: 03/30/2000 06:43 AM] 04/10/2000 18 Received James Dalton Bell notice of designation of reporter's transcript. [99-30210] (VT) [Entered: 05/02/2000 10:14 AM] 04/26/2000 17 Filed notice of appearance of Catherin L. Floit (Withdrew as counsel: attorney Judith M. Mandel for James Dalton Bell [99-30210] (VT) [Entered: 05/02/2000 08:29 AM] 05/08/2000 19 Received Catherine L. Floit for Appellant James Dalton Bell's motion to withdraw as counsel and appoint new counsel of record for aplt. (no proof of serve) MOATT (VT) [Entered: 05/09/2000 08:51 AM] 05/11/2000 20 Filed certificate of record on appeal RT filed in DC 5/1/00 [99-30210] (VT) [Entered: 05/15/2000 10:38 AM] 05/26/2000 22 Filed order (Appellate Commissioner) The motion of Catherine L. Floit to be relieved as csl of record is granted. Aplt's motion for appointment of csl is granted. David Bukey 1111 Third Ave, Suite 2220 Seattle WA 98101 (206) 9391 will be appointed by separate order. The briefing schd established previously shall remain in the reporter's transcript are due 5/17/00, aplt's brief is due 6/26/00, aples brief is due 7/26/00, the reply brief is due is due withikn 14 days after service of the answering brief. The clerk shall serve this order on former csl Catherine L. Floit. ( MOATT) [99-30210] (WP) [Entered: 05/26/2000 10:15 AM] 06/16/2000 25 Filed David B. Bukey's motion to withdraw as counsel [99-30210] ; served on 6/14/00 (MOATT) (FT) [Entered: 06/20/2000 12:20 PM] 06/26/2000 31 Received letter from pro se re: status of counsel. (sent public docket) (rec'd w/ no CA number) (LP) [Entered: 07/06/2000 01:17 PM] 06/27/2000 30 Filed order (Appellate Commissioner) The motion of David B. Bukey, Esq., 1111 Third Ave., Suite 2220, Seattle, etc., to be relieved as counsel is granted. Jonathan S. Solovy, Esq., 119 First Avenue South, Suite 500, Seattle, WA 98104, etc., will be appointed by separate order. Aplt's opening brief and excerpts of record are due Aug. 14, 2000; aple's brief is due Sept. 13, 200; aplt's optional reply brief is due witin 14 days after service of aple's brief. The Clerk shall serve this order on former counsel, David B. Bukey, Esq. ( MOTIONS) [99-30210] (VT) [Entered: 06/27/2000 08:22 AM] 07/17/2000 33 Filed motion & order :(Appellate Commissioner) This court has rec'd aplt's pro se letter dated June 19, 2000 requesting appointment of new counsel. Because aplt is represented by counsel, only counsel may file motions, and this court therefore declines to entertaine the request. The Clerk shall serve a copy of the pro se letter on aplt's counsel of record, Jonathan S. Wolovy, Esq., at 119 First Ave.,5th Cloor, Seattle, Wa 98104. The Clerk shall also serve this order on aplt individually 7214 Coreegidor, Vancouver, WA 98664. ( Motion recvd 6/26/00) ( MOTIONS) [99-30210] (VT) [Entered: 07/17/2000 06:40 AM] 07/17/2000 34 Sent the attorney copy of prose letter and aplt copy of order. [99-30210] (VT) [Entered: 07/17/2000 06:45 AM] 08/16/2000 36 Filed Motion of Appellant and Order (Deputy Clerk: CAG) Aplt's motion for an extension of time in which to file the opening brief is GRANTED. The opening brief is due Oct 13, 2000. The answering brief is due Nov 13, 2000. The optional reply brief is due 14 days from service of the answering brief. In view of the lengthy extension of time granted by way of this order, any further request for an extension of time to file this brief is strongly disfavored. ( Motion recvd 8/7/00) [99-30210] (AF) [Entered: 08/16/2000 08:44 AM] 10/11/2000 39 Filed motion & order :(Deputy Clerk: cag/PROMO) Aplt's second motion for an ext of time in which to file opening brief is granted. The opening brief is due Nov. 6, 2000. The answering brief is due Dec. 6, 2000. The optional reply brief is due 14 days from service of the answering brief. ( Motion recvd 10/5/00) [99-30210] (VT) [Entered: 10/11/2000 06:55 AM] 11/09/2000 40 Filed original and 15 copies Appellant James Dalton Bell opening brief ( Informal: no) 66 pages and five excerpts of record in 1volumes; served on 11/6/00 [99-30210] (VT) [Entered: 11/27/2000 11:21 AM] 12/01/2000 41 14 day oral extension by phone of time to file Appellee USA's brief. [99-30210] appellees' brief due 12/20/00; appellants' reply brief due 14 days . . . (JC) [Entered: 12/01/2000 01:29 PM] 12/27/2000 43 Received orig. 15 copies USA's brief of 10 pages; served on 12/21/00 deficient: late, motion pending in promo [99-30210] (CP) [Entered: 12/29/2000 02:32 PM] 01/02/2001 45 Filed motion & order (Deputy Clerk: cag/PROMO) granting aplt motion for an ext of time to file the reply brief to and including Feb. 14, 2001. ( Motion recvd 12/27/00) [99-30210] (VT) [Entered: 01/02/2001 07:17 AM] 01/04/2001 47 Filed motion & order :(Deputy Clerk: cag/PROMO) Aple's motion for permission to extend the time for filing the answering brief is granted. The prev'd rec'd brief is ordered filed. The reply brief is remains due Feb. 4, 2001. ( Motion recvd 12/27/00) [99-30210] (VT) [Entered: 01/04/2001 05:43 AM] 01/04/2001 48 Filed original and 15 copies appellee USA's 10 pages brief, served on 12/21/00 [99-30210] (VT) [Entered: 01/04/2001 05:51 AM] 02/16/2001 51 Filed original and 15 copies James Dalton Bell reply brief, ( Informal: no ) 22 pages; served on 2/14/01 [99-30210] (VT) [Entered: 02/22/2001 06:52 AM] 03/02/2001 52 Calendar check performed [99-30210] (TH) [Entered: 03/02/2001 01:50 PM] 03/23/2001 53 CALENDARED: Seattle May 10 2001 9:00 a.m. Courtroom at Park Place, 21st Floor [99-30210] (TH) [Entered: 03/23/2001 10:34 AM] 05/10/2001 55 ARGUED AND SUBMITTED TO Donald P. Lay, Stephen S. TROTT, Marsha S. BERZON [99-30210] (KM) [Entered: 05/10/2001 11:33 AM] 05/25/2001 59 FILED MEMORANDUM DISPOSITION: AFFIRMED ( Terminated on the Merits after Oral Hearing; Affirmed; Written, Unsigned, Unpublished. Donald P. Lay, Stephen S. TROTT, Marsha S. BERZON ) FILED AND ENTERED JUDGMENT. [99-30210] (VT) [Entered: 05/25/2001 11:08 AM] 06/07/2001 60 Filed Appellant James Dalton Bell in 99-30210's motion to extend time to file petition for rehearing until 7/23/01 served on 6/6/01 PANEL [99-30210] (VT) [Entered: 06/07/2001 12:25 PM] 06/14/2001 62 Filed order (Donald P. Lay, Marsha S. BERZON): Appellant's motion for enlargement of time to file a petition for rehearing with suggestion for rehearing en banc is granted. The appellant is given an extension of 45 days up to and including 7/23/01, in which to make the filings. [99-30210] (TM) [Entered: 06/14/2001 09:40 AM] 07/23/2001 63 [4215446] Filed original and 50 copies of Appellant James Dalton Bell petition for rehearing with suggestion for rehearing en banc 19 p.pages, served on 7/21/01 (PANEL AND ALL ACTIVE JUDGES) [99-30210] (BY) [Entered: 07/24/2001 04:14 PM] 08/15/2001 64 Filed order ( Donald P. Lay, Stephen S. TROTT, Marsha S. BERZON, ): The petition for panel rehearing and the petition for rehearing en banc are denied. [99-30210] (VT) [Entered: 08/15/2001 05:50 AM] 09/06/2001 66 MANDATE ISSUED [99-30210] (VT) [Entered: 09/06/2001 07:49 AM] 01/03/2002 69 Received notice from Supreme Court: The application for an ext of time to file a petition for certiorari is granted to and including Jan. 11, 2002. Supreme Court No. 01A464 filed on 12/28/01. [99-30210] (VT) [Entered: 01/07/2002 10:30 AM] 02/05/2002 70 Received notice from Supreme Court: petition for certiorari filed Supreme Court No. 01-8050 filed on 1/11/02. [99-30210] (VT) [Entered: 02/06/2002 08:32 AM] 03/11/2002 71 Filed Supreme Court order, certiorari denied on 3/4/02. Supreme Court No. 01-8050 [99-30210] (VT) [Entered: 03/14/2002 11:42 AM] 07/11/2002 72 RECORD RETURNED. (See control card for details.) (JAS) [Entered: 07/11/2002 02:36 PM] 06/18/2003 73 Received letter from pro se dated 6/15/03 re: request for information regarding docket(sent public docket) and request for copyof NOA. (sent request to casefiles mgr who will retrive file) (CP) [Entered: 06/18/2003 01:18 PM] 09/12/2005 75 Received Appellant James Dalton Bell in 99-30210 letter dated 9/8/05 re: registering a complaint because he had no lawyer to represent him. nan/case file [99-30210] (VT) [Entered: 09/16/2005 09:52 AM] 03/06/2006 76 Received Appellant James Dalton Bell in 99-30210 letter dated 3/1/06 re: a complaint concerning this appeal. NAN/CASE FILE* [99-30210] (VT) [Entered: 03/23/2006 10:28 AM] 06/29/2006 77 Received Appellant James Dalton Bell in 99-30210 letter dated 6/5/06 re: forgery, fraud and obstruction of justice. nan/case file [99-30210] (VT) [Entered: 07/03/2006 07:07 AM] 07/21/2006 78 Received letter from pro se dated 7/17/06 re: The denial of certiorari in No Way obstructs my right to file under FRCP 60(b)......In other words, the cs isn't over.......(NAN; Case Closed) (CASEFILES) (AF) [Entered: 07/21/2006 05:04 PM] 08/28/2006 79 Received letter dated 08/14/06, from pro se re: request for full investigation to detect and correct dkt forgery and manipulations.... [NAN case closed/CASEFILE] (JC) [Entered: 08/31/2006 11:40 AM] 09/05/2006 80 Rec'd notice of change of address from James Dalton Bell individually in 99-30210 dated 8/29/06. (Aplt's new address: Reg. No. 26906-086, P.O. Box 33, Terre Haute, IN 47808) [99-30210] (AF) [Entered: 09/07/2006 09:11 AM] 11/13/2006 81 Received letter from pro se undated re: requested copy of public docket. (sent by af) (AF) [Entered: 11/14/2006 04:52 PM] 12/15/2006 83 Received letter from pro se undated re: ved 11/29/06 letter.....(no action nec per moatt) (CP) [Entered: 12/18/2006 05:03 PM] 03/05/2007 84 Received letter dated 2/28/07 from pro se re: req for public dkt (sent on this date to pro se aplt) (GN) [Entered: 03/09/2007 04:04 PM] 04/05/2007 86 Received letter from pro se re: FRCP 60(b) mtn (CASEFILE) (GN) [Entered: 04/06/2007 01:45 PM] 06/05/2007 87 Received letter from pro se re: renewed complaint of fraud (NAN; to CASEFILE) (GN) [Entered: 06/10/2007 02:29 PM] 03/17/2010 88 3 pg, 246.06 KB Received Appellant James Dalton Bell letter dated 03/10/2010 re: asking for copy of early docket sheet, sent him current copy of docket sheet. [7268785] (RR) [Entered: 03/17/2010 10:14 AM] 02/25/2011 89 2 pg, 165.3 KB Received Appellant (PROSE) James Dalton Bell letter dated 02/20/2011 re: want documents unsealed, did not request document to be sealed. Also request evidence and records of last attorney including ip and why he was allowed to withdraw. [7673408] (RR) [Entered: 03/08/2011 04:48 PM] From jdb10987 at yahoo.com Wed Aug 5 12:36:42 2015 From: jdb10987 at yahoo.com (jim bell) Date: Wed, 5 Aug 2015 19:36:42 +0000 (UTC) Subject: FOIA/PA In-Reply-To: References: Message-ID: <2125075829.746347.1438803402880.JavaMail.yahoo@mail.yahoo.com> This is the SECOND appeal from case 00-5731, done weeks after my first, Interlocutory Appeal. This is the appeal that those conspiring against me WANTED to be "the appeal". But its very existence was improper, because it ignores the prior, CORRECT appeal, which I initiated in March 2001. Jim Bell ----- Original Message ----- From: coderman To: jim bell Cc: John Young ; "cypherpunks at cpunks.org" Sent: Tuesday, August 4, 2015 10:12 PM Subject: Re: FOIA/PA On 8/4/15, coderman wrote: > next is a different case number, but same action? ... followed a few weeks later with: Court of Appeals Docket #: 01-30162 Docketed: 04/25/2001 Termed: 05/22/2001 USA v. Bell Appeal From: U.S. District Court for Western Washington, Tacoma Fee Status: IFP Case Type Information: 1) criminal 2) pre-guidelines 3) null Originating Court Information: District: 0981-3 : CR-00-05731-JET Court Reporter: Julaine V. Ryen, Court Reporter Trial Judge: Jack E. Tanner, District Judge Date Filed: 11/29/2000 Date Order/Judgment: Date NOA Filed: 04/11/2001 04/17/2001 Prior Cases: 97-30384 Date Filed: 12/30/1997 Date Disposed: 08/21/1998 Disposition: Affirmed - Memorandum Current Cases: Lead Member Start End Companion 01-30143 01-30162 04/25/2001 Related 99-30210 01-30143 04/05/2001 99-30210 01-30162 04/25/2001 UNITED STATES OF AMERICA Plaintiff - Appellee, Robert London, Esquire, Attorney Direct: 206/553-7970 [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101 v. JAMES DALTON BELL (Federal Prisoner: 26906-086) Defendant - Appellant, Robert Michael Leen, Esquire, Attorney Direct: 425-949-8555 [COR LD NTC CJA Appointment] Law Office Of Robert M. Leen P.O. Box 82 Woodinville, WA 98072-0082 UNITED STATES OF AMERICA, Plaintiff - Appellee, v. JAMES DALTON BELL, Defendant - Appellant. 04/25/2001 1 DOCKETED CAUSE AND ENTERED APPEARANCES OF COUNSEL. Filed in D.C. on 4/17/01; setting schedule as follows: transcript shall be ordered by 5/9/01 for James Dalton Bell; transcript shall be filed by 6/8/01; appellant's briefs, excerpts due by 7/18/01 for James Dalton Bell; appellee's brief due 8/17/01 for USA; appellant's reply brief due by 8/31/01 for James Dalton Bell. (RT required: y) (Sentence imp n/a) [01-30162] (BY) [Entered: 04/25/2001 11:27 AM] 05/07/2001 3 Received Robert London for Appellee USA's letter dated 5/3/01 re: time schedule order should be vacated for various reasons....(MOATT) [01-30162] (CP) [Entered: 05/07/2001 03:05 PM] 05/07/2001 5 Filed Appellant James Dalton Bell in 01-30162's motion to stay appeal; served on 5/4/01 [4162520] (MOATT) [01-30162] (FT) [Entered: 05/09/2001 10:27 AM] 05/08/2001 4 Criminal Justice Act voucher sent () to Robert M. Leen for Appellant James Dalton Bell in 01-30162 [01-30162] (TU) [Entered: 05/08/2001 11:03 AM] 05/22/2001 8 Order filed, this appeal is DISMISSED for lack of jurisdiction. All pending mtns are DENIED. (Procedurally Terminated After Other Judicial Action; Jurisdictional Defects. Harry PREGERSON, Ferdinand F. FERNANDEZ, Kim M. WARDLAW) [01-30162] (RR) [Entered: 05/22/2001 08:14 AM] 06/13/2001 10 MANDATE ISSUED [01-30162] (FT) [Entered: 06/13/2001 09:36 AM] 12/17/2004 11 NO ORIGINAL RECORD (SS) [Entered: 12/17/2004 03:43 PM] From jdb10987 at yahoo.com Wed Aug 5 12:39:28 2015 From: jdb10987 at yahoo.com (jim bell) Date: Wed, 5 Aug 2015 19:39:28 +0000 (UTC) Subject: FOIA/PA In-Reply-To: References: Message-ID: <1426958312.609965.1438803568427.JavaMail.yahoo@mail.yahoo.com> Notice the reference to "Jurisdictional Defects", below. They were trying to pretend that the filing of an Interlocutory appeal did not divest jurisdiction from the District Court case below. For those looking up, see the "Dunbar Rule". My filing was proper, and was jurisdictional, so Judge Tanner shouldn't have been able to proceed with what in reality was a phony trial. Jim Bell ----- Original Message ----- From: coderman To: jim bell Cc: John Young ; "cypherpunks at cpunks.org" Sent: Tuesday, August 4, 2015 10:15 PM Subject: Re: FOIA/PA next distinct case in august: Court of Appeals Docket #: 01-30296 Docketed: 08/23/2001 Termed: 12/26/2001 USA v. Bell Appeal From: U.S. District Court for Western Washington, Tacoma Fee Status: IFP Case Type Information: 1) criminal 2) pre-guidelines 3) null Originating Court Information: District: 0981-3 : CR-00-05731-JET Court Reporter: Julaine V. Ryen, Court Reporter Trial Judge: Jack E. Tanner, District Judge Date Filed: 11/29/2000 Date Order/Judgment: Date NOA Filed: 06/18/2001 08/14/2001 Prior Cases: 01-30143 Date Filed: 04/05/2001 Date Disposed: 05/22/2001 Disposition: Jurisdictional Defects - Judge Order 01-30162 Date Filed: 04/25/2001 Date Disposed: 05/22/2001 Disposition: Jurisdictional Defects - Judge Order Current Cases: Lead Member Start End Docketing Link Only 01-30296 01-30303 01/31/2003 UNITED STATES OF AMERICA Plaintiff - Appellee, Robert Louis London, Esquire Direct: 206/553-7970 [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101 v. JAMES DALTON BELL (Federal Prisoner: 26906-086) Defendant - Appellant, James Dalton Bell [COR LD NTC Pro Se] FCI - FEDERAL CORRECTIONAL INSTITUTION - SHERIDAN P.O. Box 5000 Sheridan, OR 97378-5000 Robert Michael Leen, Esquire, Attorney Direct: 425-949-8555 [COR LD NTC CJA Appointment] Law Office Of Robert M. Leen P.O. Box 82 Woodinville, WA 98072-0082 UNITED STATES OF AMERICA, Plaintiff - Appellee, v. JAMES DALTON BELL, Defendant - Appellant. 08/23/2001 1 DOCKETED CAUSE AND ENTERED APPEARANCES OF COUNSEL. Filed in D.C. on 8/16/01; setting schedule as follows: transcript shall be ordered by 9/4/01 for James Dalton Bell; transcript shall be filed by 10/4/01; appellant's brief, excerpt due by 11/13/01 for James Dalton Bell; appellee's brief due 12/13/01 for USA; appellant's reply brief due by 12/27/01 for James Dalton Bell. (RT required: y) () [01-30296] (EL) [Entered: 08/23/2001 09:35 AM] 08/23/2001 2 Referred to (MOATT) re: NOA filed by pro se but aplt has CJA appt'd csl. [01-30296] (EL) [Entered: 08/23/2001 09:37 AM] 08/23/2001 4 Received as of Aug 20, 2001 letter from pro se re: addendum to notice of appeal. (MoAtt via ProSe) (AF) [Entered: 08/29/2001 11:02 AM] 08/27/2001 3 Criminal Justice Act voucher sent () to Robert M. Leen for Appellant James Dalton Bell [01-30296] (TU) [Entered: 08/27/2001 09:51 AM] 09/05/2001 5 Filed Appellant James Dalton Bell's motion to dismiss second interlocutory appeal and motion to w/d and appointment of substitute appeallate counsel; served on 8/29/01. (MOATT) [01-30296] (AF) [Entered: 09/05/2001 03:10 PM] 09/13/2001 6 Received (ProSe) Appellant James Dalton Bell's motion to oppose fraudulent motion by Robert Leen filed to sabotage Bell's intermediate appeal rights; served 9/10/01. (Defendant has CJA counsel) (MOATT) [01-30296] (AF) [Entered: 09/13/2001 11:36 AM] 12/26/2001 9 Order filed, this ct previously dismissed aplt's pro se interlocutory appeal No. 01-30143 for lack of jurisdiction. Appeal No. 01-30296 was subsequently opened when pro se aplt filed an "Interlocutory Appeal Refiling Notice" in the DC. Appeal No. 01-30296 is also dismissed for lack of jurisdiction. (cite) All pending mtns are denied as moot. DISMISSED. ( Procedurally Terminated After Other Judicial Action; Jurisdictional Defects. Mary M. SCHROEDER, Stephen S. TROTT, Richard A. PAEZ) [01-30296] (AF) [Entered: 12/26/2001 11:45 AM] 01/17/2002 10 MANDATE ISSUED [01-30296] (AF) [Entered: 01/17/2002 10:05 AM] 02/04/2003 14 Filed Order (Michael D. HAWKINS, Ronald M. GOULD, James Ware,) The pnl as constituted above, on behalf of the ct, orders Aplt's Mtn for Clarification, rec'd by this ct on 1/15/03, filed in its entirety. The Mtn is DENIED. NO FURTHER FILINGS WILL BE ACCEPTED IN BOTH No. 01-30296 and No. 01-30303. [01-30296, 01-30303] (AF) [Entered: 02/04/2003 10:12 AM] 03/08/2005 18 NO ORIGINAL RECORD (XX) [Entered: 03/08/2005 03:26 PM] 09/05/2006 19 Rec'd notice of change of address from James Dalton Bell in 01-30296 undated. (Aplt's new address: Reg. No. 26906-086, P.O. Box 33, Terre Haute, IN 47808) [01-30296] (AF) [Entered: 09/11/2006 10:30 AM] From jdb10987 at yahoo.com Wed Aug 5 12:43:06 2015 From: jdb10987 at yahoo.com (jim bell) Date: Wed, 5 Aug 2015 19:43:06 +0000 (UTC) Subject: FOIA/PA In-Reply-To: References: Message-ID: <1587472293.503878.1438803786697.JavaMail.yahoo@mail.yahoo.com> There were actually TWO appeal filings by me; I perhaps got them out of order in my last note here, a moment ago. This might have been the second one of them filing around the time of the "sentencing". Because the District Court had ignored its loss of jurisdiction, I felt it appropriate to yet again appeal the "sentencing". Jim Bell ----- Original Message ----- From: coderman To: jim bell Cc: John Young ; "cypherpunks at cpunks.org" Sent: Tuesday, August 4, 2015 10:17 PM Subject: Re: FOIA/PA and then: Court of Appeals Docket #: 01-30303 Docketed: 09/06/2001 Termed: 09/19/2002 USA v. Bell Appeal From: U.S. District Court for Western Washington, Tacoma Fee Status: IFP Case Type Information: 1) criminal 2) sentence 3) null Originating Court Information: District: 0981-3 : CR-00-05731-JET Court Reporter: Julaine V. Ryen, Court Reporter Court Reporter: Catherine Maria Vernon Trial Judge: Jack E. Tanner, District Judge Date Filed: 11/29/2000 Date Order/Judgment: Date NOA Filed: 08/24/2001 08/27/2001 Prior Cases: 01-30143 Date Filed: 04/05/2001 Date Disposed: 05/22/2001 Disposition: Jurisdictional Defects - Judge Order 01-30162 Date Filed: 04/25/2001 Date Disposed: 05/22/2001 Disposition: Jurisdictional Defects - Judge Order Current Cases: Lead Member Start End Docketing Link Only 01-30296 01-30303 01/31/2003 UNITED STATES OF AMERICA Plaintiff - Appellee, Helen J. Brunner, Esquire, Assistant U.S. Attorney [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101 Steven L. Lane, Esquire, Attorney [COR LD NTC Government] DOJ - U.S. Department of Justice Rm. 7264 950 Pennsylvania Ave., N.W. Washington, DC 20530 Robert London, Esquire, Attorney Direct: 206/553-7970 [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101 v. JAMES DALTON BELL (Federal Prisoner: 26906-086) Defendant - Appellant, Peggy Sue Juergens, Esquire, Attorney Direct: 206/442-9232 [COR LD NTC CJA Appointment] Law Offices of Allen R. Bentley Ste. 2220 1111 Third Avenue Seattle, WA 98101 James Dalton Bell [NTC Pro Se] FCI - FEDERAL CORRECTIONAL INSTITUTION - SHERIDAN P.O. Box 5000 Sheridan, OR 97378-5000 UNITED STATES OF AMERICA, Plaintiff - Appellee, v. JAMES DALTON BELL, Defendant - Appellant. 09/06/2001 1 DOCKETED CAUSE AND ENTERED APPEARANCES OF COUNSEL. Filed in D.C. on 8/29/01; setting schedule as follows: transcript shall be ordered by 9/26/01 for James Dalton Bell; transcript shall be filed by 10/26/01; appellant's briefs, excerpts due by 12/5/01 for James Dalton Bell; appellee's brief due 1/4/02 for USA; appellant's reply brief due by 1/18/02 for James Dalton Bell. (RT required: y) (Sentence imp 10 years) [01-30303] (BY) [Entered: 09/06/2001 08:22 AM] 09/06/2001 2 Criminal Justice Act voucher sent () to Robert M. Leen for Appellant James Dalton Bell in 01-30303 [01-30303] (SA) [Entered: 09/06/2001 02:43 PM] 09/20/2001 3 Received copy of transcript designation and ordering form filed in DC (sent to case file) (TM) [Entered: 09/26/2001 09:14 AM] 09/21/2001 4 rec notice of appearance of Peggy Sue Juergens for appellant (MOATT) [01-30303] (TM) [Entered: 09/26/2001 09:20 AM] 09/24/2001 5 Filed Robert M. Leen's motion to withdraw and substitute counsel; served on 9/18/01 (MOATT) (TM) [Entered: 09/26/2001 09:36 AM] 10/05/2001 6 Received copy of District Court order filed on 9/25/01 nunc pro tunc 8/31/01 appointing Peggy Sue Juergens counsel of record. (Filed by Judge Weinberg) [01-30303] (AH) [Entered: 10/11/2001 01:05 PM] 10/11/2001 9 Rec'd notice of change of address from Peggy Sue Juergens for Appellant James Dalton Bell in 01-30303; dated: 10/15/01. [01-30303] (RR) [Entered: 10/15/2001 11:35 AM] 10/22/2001 10 Filed order (Appellate Commissioner) MOATT: On 9/25/01, the d.c. appointed Peggy Sue Juergens, Esq., as appellant's counsel. The d.c.'s order is ratified. Accordingly, the motion of Robert M. Leen, Esq., to withdraw as counsel is denied as moot. The briefing schedule established previously shall remain in effect. The Clerk shall serve this order on appellant's former counsel Robert M. Leen, Esq. [01-30303] (TM) [Entered: 10/22/2001 09:45 AM] 10/29/2001 11 Filed certificate of record on appeal RT filed in DC 10/22/01 [01-30303] (TM) [Entered: 11/01/2001 10:51 AM] 11/30/2001 13 Filed motion of Appellant and order (Deputy Clerk lkk) Aplt's motion for an extension of time to file the opening brief is granted in part. The opening brief is due 03/06/02 and the optional reply brief is due 14 days from serivce of the answering brief. (PROMO) [13] (Motion recvd 11/19/01) [01-30303] (DJV) [Entered: 11/30/2001 08:33 AM] 01/23/2002 14 Filed notice of appearance of Steven L. Lane for appellee [01-30303] (TM) [Entered: 01/24/2002 01:03 PM] 02/06/2002 15 Filed original and 15 copies Appellant James Dalton Bell's opening brief (Informal: n) 29 pages and five excerpts of record in 1volumes; served on 2/4/02 [01-30303] (TM) [Entered: 02/06/2002 04:58 PM] 02/06/2002 16 Filed pre-sentencing report UNDER SEAL. [01-30303] (TM) [Entered: 02/06/2002 05:01 PM] 02/06/2002 17 Filed Appellant James Dalton Bell's motion to file supplemental brief (MOATT) [01-30303] (TM) [Entered: 02/14/2002 10:14 AM] 02/14/2002 18 Received Appellant James Dalton Bell's motion to take judicial notice of appellate aty sabotage of appellant's case; served on 2/8/02 (MOATT) [01-30303] (TM) [Entered: 02/21/2002 11:49 AM] 02/25/2002 19 Filed order (Appellate Commissioner) MOATT: This court has received appellant's pro se motion to file a supplemental brief. Because appellant is represented by counsel, only counsel may file motions, and this court therefore declines to entertain the motion. The Clerk shall serve a copy of the pro se motion on appellant's counsel of record, Peggy Sue Juergens, Esq. Appellant is advised that counsel is vested with the authority to determine which issues should be raised. Appellee's answering brief is due 3/18/02. The optional reply brief is due wihtin 14 days after service of the answering brief. The Clerk shall also serve this order on appellant individually. Lompoc. [01-30303] (TM) [Entered: 02/25/2002 09:42 AM] 03/04/2002 23 Filed Appellant James Dalton Bell's motion to demand the replacement of appt. attorney Peggy Juergens; served on 2/27/02. (MOATT) [01-30303] (CP) [Entered: 03/05/2002 12:07 PM] 03/12/2002 24 14 day oral extension by phone of time to file Appellee in 01-30303's brief. [01-30303] appellees' brief due 4/1/02; the optional reply brief is due 14 days from service of the answering brief. (CG) [Entered: 03/12/2002 01:06 PM] 03/15/2002 27 Filed motion & order :(Appellate Commissioner) This court has received apltr's pro se moton for judicial notice and pro se motion for new counsel. Because aplt is represented by counsel, only counsel may file motions, and this court therefore dclines to entertain the motions. The Clerk shall serve a copy fo the pro se motion on aplt's counsel of record, Peggy Sue Juergens, Esq. The Clekr shall also serve this order on aplt individually at Reg. No. 26906-086, 3901 Klein Blvd., Lompoc, Ca 93436 ( Motion recvd 3/4/02) ( MOTIONS) [01-30303] (VT) [Entered: 03/15/2002 06:56 AM] 03/15/2002 28 Sent order dated 3/15/02 to aplt in Lompoc [01-30303] (VT) [Entered: 03/15/2002 07:00 AM] 03/22/2002 29 Received Appellant James Dalton Bell letter dated 3/18/02 re: "Protest Motion Against Acts by Appellate Commissioner" (APP.COM) [01-30303] (TM) [Entered: 03/28/2002 02:37 PM] 03/28/2002 31 Received Appellant James Dalton Bell's letter dated 3/24/02 re: Futher objection to illegal and unethical actions of appointed counsel.(MOATT) [01-30303] (TM) [Entered: 04/02/2002 04:54 PM] 04/02/2002 30 Filed original and 15 copies appellee USA's 56 pages brief, 1 Exc. vols: ; served on 4/1/02 [01-30303] (TM) [Entered: 04/02/2002 12:06 PM] 04/11/2002 33 14 day oral extension by phone of time to file Appellant James Dalton Bell in 01-30303's reply brief. [01-30303] appellants' reply brief due 5/2/02; (XX) [Entered: 04/11/2002 09:54 AM] 04/19/2002 34 Filed order (Appellate Commissioner) MOATT: This court has received appellant's pro se motions. Because appellant is represented by counsel, only counsel may file motions, and this court therefore declines to entertain the motions. The Clerk shall serve a copy of the pro se motion on appellant's counsel of record, Peggy Sue Juergens, Esq. The Clerk shall also serve this order on appellant individually. [01-30303] (TM) [Entered: 04/19/2002 10:00 AM] 05/06/2002 35 Filed original and 15 copies of James Dalton Bell reply brief (Informal: n) 4 pages; served on 4/29/02 [01-30303] (BY) [Entered: 05/06/2002 02:18 PM] 05/29/2002 37 Calendar check performed [01-30303] (RG) [Entered: 05/29/2002 11:47 AM] 06/17/2002 38 Calendar materials being prepared. [01-30303] [01-30303] (RG) [Entered: 06/17/2002 01:19 PM] 06/21/2002 40 CALENDARED: Seattle August 6, 2002 9:00 PM Courtroom Park Place, 21st Floor [01-30303] (RG) [Entered: 06/21/2002 08:34 AM] 08/06/2002 41 ARGUED AND SUBMITTED TO Michael D. HAWKINS, Ronald M. GOULD, James Ware [01-30303] (SB) [Entered: 08/06/2002 11:57 AM] 09/19/2002 45 FILED OPINION: AFFIRMED ( Terminated on the Merits after Oral Hearing; Affirmed; Written, Signed, Published. Michael D. HAWKINS, author; Ronald M. GOULD; James Ware, author. ) FILED AND ENTERED JUDGMENT. [01-30303] (VT) [Entered: 09/19/2002 11:57 AM] 10/04/2002 46 Filed Appellant James Dalton Bell's motion to stay the mandate; served on 9/29/02 (PANEL) [01-30303] (TM) [Entered: 10/04/2002 02:06 PM] 10/11/2002 48 [4557503] Received original and 4 copies Appellant James Dalton Bell petition, for panel rehearing and petition for rehearing en banc , deficient (late and petitioner has counsel) , served on 10/4/02 . Notified appellant (TM) [Entered: 10/16/2002 04:22 PM] 10/11/2002 49 Filed Peggy Sue Juergens's motion to withdraw as counsel ; served on 10/7/02 (PANEL) (TM) [Entered: 10/16/2002 05:03 PM] 10/31/2002 52 Received Appellant James Dalton Bell's motion to file late petition for rehearing en banc (PANEL) [01-30303] (TM) [Entered: 10/31/2002 03:51 PM] 11/04/2002 54 Filed order ( Michael D. HAWKINS, Ronald M. GOULD): The motion to withdraw as counsel of record by Peggy Sue Juergens is granted. The motion for stay or recall of mandate is denied. [01-30303] (TM) [Entered: 11/04/2002 12:43 PM] 11/07/2002 55 Received Appellant James Dalton Bell letter dated 11/4/02 re: status of motion to recall the mandate. [01-30303] (TM) [Entered: 11/14/2002 08:59 AM] 11/07/2002 56 Received Appellant James Dalton Bell letter requesting a copy of the docket rpt. in this case and 01-30296 (Mailed them to him) [01-30303] (TM) [Entered: 11/14/2002 09:12 AM] 11/14/2002 58 Filed order ( Michael D. HAWKINS, Ronald M. GOULD, James Ware):The motion for the court to accept the previously received petition for rehearing with suggestion for rehearing en banc is granted. The petition for rehearing with suggestion for rehearing en banc is ordered filed. [01-30303] (TM) [Entered: 11/14/2002 03:57 PM] 11/14/2002 59 [4580825] Filed original and 50 copies Appellant James Dalton Bell petition for panel rehearing and petition for rehearing en banc 16 p.pages, served on 10/4/02 (PANEL AND ALL ACTIVE JUDGES) (TM) [Entered: 11/14/2002 04:01 PM] 12/03/2002 60 Filed Appellant James Dalton Bell's motion to reconsider order of the Court and for stay of mandate (PANEL AND ALL ACTIVE JUDGES) [01-30303] (TM) [Entered: 12/03/2002 02:59 PM] 12/18/2002 61 Filed order ( Michael D. HAWKINS, Ronald M. GOULD, James Ware): The petition for enbanc rehearing is denied. The motion for reconsideration of appellant's pro se motion for stay or recall of mandate is denied. [60] [01-30303] (TM) [Entered: 12/18/2002 10:54 AM] 12/27/2002 62 MANDATE ISSUED [01-30303] (TM) [Entered: 12/27/2002 11:27 AM] 01/15/2003 63 Received Appellant James Dalton Bell's motion for clarification (PANEL) [01-30303] (TM) [Entered: 01/22/2003 11:04 AM] 02/04/2003 67 Filed Order (Michael D. HAWKINS, Ronald M. GOULD, James Ware,) The pnl as constituted above, on behalf of the ct, orders Aplt's Mtn for Clarification, rec'd by this ct on 1/15/03, filed in its entirety. The Mtn is DENIED. NO FURTHER FILINGS WILL BE ACCEPTED IN BOTH No. 01-30296 and No. 01-30303. [01-30296, 01-30303] (AF) [Entered: 02/04/2003 10:12 AM] 10/15/2003 69 NO ORIGINAL RECORD (JAS) [Entered: 10/15/2003 10:54 AM] 09/05/2006 70 Rec'd notice of change of address from James Dalton Bell dated 8/29/06. (New Add: Reg No. 26906-086 U.S. Penn P.O. Box 33, Terre Haute, IN 47808) Appellant James Dalton Bell in 01-30303 dated 8/29/06. [01-30303] (XX) [Entered: 09/12/2006 09:16 AM] From jdb10987 at yahoo.com Wed Aug 5 12:46:25 2015 From: jdb10987 at yahoo.com (jim bell) Date: Wed, 5 Aug 2015 19:46:25 +0000 (UTC) Subject: FOIA/PA In-Reply-To: References: Message-ID: <1868591708.662674.1438803985516.JavaMail.yahoo@mail.yahoo.com> I'm trying to remember what this was.       jim Bell From: coderman To: jim bell Cc: John Young ; "cypherpunks at cpunks.org" Sent: Tuesday, August 4, 2015 10:19 PM Subject: Re: FOIA/PA years later, in '04, then: Court of Appeals Docket #: 04-30115    Docketed: 03/16/2004 Termed: 10/19/2004 USA v. Bell Appeal From: U.S. District Court for Western Washington, Tacoma Fee Status: IFP Case Type Information:     1) criminal     2) pre-guidelines     3) null Originating Court Information:     District: 0981-3 : CR-97-05270-FDB     Trial Judge: Franklin D. Burgess, Senior District Judge     Date Filed: 05/16/1997     Date Order/Judgment:        Date NOA Filed:     02/19/2004        03/12/2004 Prior Cases:     01-30143    Date Filed: 04/05/2001    Date Disposed: 05/22/2001     Disposition: Jurisdictional Defects - Judge Order     01-30162    Date Filed: 04/25/2001    Date Disposed: 05/22/2001     Disposition: Jurisdictional Defects - Judge Order     01-30296    Date Filed: 08/23/2001    Date Disposed: 12/26/2001     Disposition: Jurisdictional Defects - Judge Order     01-30303    Date Filed: 09/06/2001    Date Disposed: 09/19/2002     Disposition: Affirmed - Opinion     97-30384    Date Filed: 12/30/1997    Date Disposed: 08/21/1998     Disposition: Affirmed - Memorandum     99-30210    Date Filed: 07/06/1999    Date Disposed: 05/25/2001     Disposition: Affirmed - Memorandum Current Cases:     None UNITED STATES OF AMERICA                     Plaintiff - Appellee,    Helen J. Brunner, Esquire, Assistant U.S. Attorney [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101   v. JAMES DALTON BELL (Federal Prisoner: 26906-086)                     Defendant - Appellant,    James Dalton Bell [NTC Pro Se] FCI - FEDERAL CORRECTIONAL INSTITUTION - SHERIDAN P.O. Box 5000 Sheridan, OR 97378-5000 UNITED STATES OF AMERICA,                     Plaintiff - Appellee,   v. JAMES DALTON BELL,                     Defendant - Appellant. 03/16/2004      1     DOCKETED CAUSE AND ENTERED APPEARANCES OF APLT IN PRO PER AND COUNSEL FOR APLE. Filed in D.C. on 3/12/04; setting schedule as follows: transcript shall be ordered by 4/2/04 for James Dalton Bell; transcript shall be filed by 5/3/04; appellants' briefs, excerpts due by 6/14/04 for James Dalton Bell; appellees' brief due 7/14/04 for USA; appellants' reply brief due by 7/28/04 for James Dalton Bell. ( RT required: YES) ( Sentence imp ) [04-30115] (KM) [Entered: 03/16/2004 02:26 PM] 03/16/2004      2     Filed certificate of record on appeal RT filed in DC None [04-30115] (KM) [Entered: 03/22/2004 11:31 AM] 06/24/2004      3     Received letter from pro se dated 6/19/04 re: statement of appellant's administrative complaint. (MOATT) (CP) [Entered: 06/28/2004 10:38 AM] 07/09/2004      7     Filed order (Deputy Clerk: ahh/MOATT) Within 21 days of the filing date of this order, appellant shall filewith this court a declaration or notarized statement attesting to the date on which the notice of appeal was deposited in the institution's internal mail systen and whether first-class postage was prepaid, or otherwise show cause why this appeal should not be dismissed for lack of jurisdiction. Appellee may respond to the declaration within 8 days after service of appellant's response. Failure to comply with this order may result in the dismissal of this appeal for failure to prosecute. Briefing is suspended pending further order of this court. Appellant's request for appointment of counsel will be addressed upon resolution of timeliness of this appeal. [04-30115] (BY) [Entered: 07/09/2004 08:48 AM] 07/26/2004      8     Filed Appellant James Dalton Bell's response to clerk order re: timeliness of filing of the notice of appeal; served on 7/22/04. (MOATT) [04-30115] (CP) [Entered: 07/26/2004 03:36 PM] 08/11/2004      11     Filed order (Johnnie B. RAWLINSON, CONSUELO M. CALLAHAN) A review of the record indicates that the notice of appeal in this case ws timely filed. The 7/9/04 order to show cuse is therefore discharged. To the extend appellant has moved to have the panel recuse itself from consideration of this appeal, that request is denied. To the extend appellant has moved for appt. of counsel in this appeal. that request is denied because he is not entitled to appt of counsel and this appeal does not present exceptional circumstances warranting the appt of counsel. (see casefile for citations). No motions for recon , clarification, modification of the denial of appt. of counsel shall be filed or entertained. The court's records reflect that this case may be appropriate for summary disposition because appellant is no longer entitled to appt of counsel. Within 21 days, appellant shall show cause why the DC's order allowing counsel to withdraw shall not be summarily affirmed. If appellant does not comply with this order, this appeal will be automatically dismissed for failure to prosecute. Briefing remains suspended pending further order of this court. [04-30115] (CP) [Entered: 08/11/2004 12:05 PM] 08/19/2004      12     Filed Appellant James Dalton Bell's response to 8/11/04 order to show cause; served on 8/16/04. (MOATT) [04-30115] (CP) [Entered: 08/19/2004 02:29 PM] 10/07/2004      15     Filed notice of appearance of Helen Brunner for the USA. (Withdrew as counsel: attorney Helen J. Brunner for USA) [04-30115] (CP) [Entered: 10/07/2004 02:25 PM] 10/19/2004      20     FILED MEMORANDUM: AFFIRMED ( Terminated on the Merits after Submission Without Oral Hearing; Affirmed; Written, Unsigned, Unpublished. Andrew J. KLEINFELD, A. W. TASHIMA, Ronald M. GOULD ) FILED AND ENTERED JUDGMENT. [04-30115] (CP) [Entered: 10/19/2004 11:18 AM] 10/28/2004      21     Received letter from pro se dated 10/22/04 re: status check. (MOATT, fyi per prose) (CP) [Entered: 11/02/2004 11:06 AM] 11/10/2004      22     MANDATE ISSUED [04-30115] (CP) [Entered: 11/10/2004 11:57 AM] 11/17/2004      23     Received Appellant James Dalton Bell's supplemental argument concerning 10/19/04 court order; served on 11/12/04. (mandate issued, sent public docket report, casefile) [04-30115] (CP) [Entered: 11/17/2004 02:13 PM] -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 10598 bytes Desc: not available URL: From jdb10987 at yahoo.com Wed Aug 5 12:47:06 2015 From: jdb10987 at yahoo.com (jim bell) Date: Wed, 5 Aug 2015 19:47:06 +0000 (UTC) Subject: FOIA/PA In-Reply-To: References: Message-ID: <629400495.707648.1438804026643.JavaMail.yahoo@mail.yahoo.com> I am mystified.       jim Bell From: coderman To: jim bell Cc: John Young ; "cypherpunks at cpunks.org" Sent: Tuesday, August 4, 2015 10:24 PM Subject: Re: FOIA/PA On 8/4/15, coderman wrote: > ... > Prior Cases: >      01-30143    Date Filed: 04/05/2001    Date Disposed: 05/22/2001 >    Disposition: Jurisdictional Defects - Judge Order >      01-30162    Date Filed: 04/25/2001    Date Disposed: 05/22/2001 >    Disposition: Jurisdictional Defects - Judge Order >      01-30296    Date Filed: 08/23/2001    Date Disposed: 12/26/2001 >    Disposition: Jurisdictional Defects - Judge Order >      01-30303    Date Filed: 09/06/2001    Date Disposed: 09/19/2002 >    Disposition: Affirmed - Opinion >      04-30115    Date Filed: 03/16/2004    Date Disposed: 10/19/2004 >    Disposition: Affirmed - Memorandum >      05-35289    Date Filed: 03/30/2005    Date Disposed: 02/24/2006 >    Disposition: Affirmed - Memorandum >      05-35897    Date Filed: 09/12/2005    Date Disposed: 10/14/2005 >    Disposition: Jurisdictional Defects - Judge Order >      97-30384    Date Filed: 12/30/1997    Date Disposed: 08/21/1998 >    Disposition: Affirmed - Memorandum >      99-30210    Date Filed: 07/06/1999    Date Disposed: 05/25/2001 >    Disposition: Affirmed - Memorandum interesting - this list is longer than what is returned from the PACER front-end search for Jim's cases. adding in the following now:       05-35289    Date Filed: 03/30/2005    Date Disposed: 02/24/2006     Disposition: Affirmed - Memorandum       05-35897    Date Filed: 09/12/2005    Date Disposed: 10/14/2005     Disposition: Jurisdictional Defects - Judge Order       97-30384    Date Filed: 12/30/1997    Date Disposed: 08/21/1998     Disposition: Affirmed - Memorandum -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4401 bytes Desc: not available URL: From jdb10987 at yahoo.com Wed Aug 5 12:48:57 2015 From: jdb10987 at yahoo.com (jim bell) Date: Wed, 5 Aug 2015 19:48:57 +0000 (UTC) Subject: FOIA/PA In-Reply-To: References: Message-ID: <1284549489.619712.1438804137649.JavaMail.yahoo@mail.yahoo.com> This has to do with my lawsuit filed in Portland Federal Court, originally in 2002, but refiled in July 2003.  It was eventually rejected for BS reasons, and I appealed it.  Naturally, it wasn't given a more honest treatment than 99-30210.          Jim Bell From: coderman To: jim bell Cc: John Young ; "cypherpunks at cpunks.org" Sent: Tuesday, August 4, 2015 10:26 PM Subject: Re: FOIA/PA and then: Court of Appeals Docket #: 05-35289    Docketed: 03/30/2005 Termed: 02/24/2006 Nature of Suit: 3550 Prisoner-Civil Rights Bell, et al v. DC of Tacoma, et al Appeal From: U.S. District Court for Oregon, Portland Fee Status: Paid Case Type Information:     1) prisoner     2) state     3) civil rights Originating Court Information:     District: 0979-3 : CV-02-01052-AJB     Trial Judge: Anna J. Brown, District Judge     Date Filed: 08/05/2002     Date Order/Judgment:        Date NOA Filed:     01/07/2005        03/10/2005 Prior Cases:     01-30143    Date Filed: 04/05/2001    Date Disposed: 05/22/2001     Disposition: Jurisdictional Defects - Judge Order     01-30162    Date Filed: 04/25/2001    Date Disposed: 05/22/2001     Disposition: Jurisdictional Defects - Judge Order     01-30296    Date Filed: 08/23/2001    Date Disposed: 12/26/2001     Disposition: Jurisdictional Defects - Judge Order     01-30303    Date Filed: 09/06/2001    Date Disposed: 09/19/2002     Disposition: Affirmed - Opinion     01-35910    Date Filed: 10/02/2001    Date Disposed: 04/15/2002     Disposition: COA Denied - Judge Order     04-30115    Date Filed: 03/16/2004    Date Disposed: 10/19/2004     Disposition: Affirmed - Memorandum     97-30384    Date Filed: 12/30/1997    Date Disposed: 08/21/1998     Disposition: Affirmed - Memorandum     99-30210    Date Filed: 07/06/1999    Date Disposed: 05/25/2001     Disposition: Affirmed - Memorandum Current Cases:     Lead    Member    Start    End        Companion     05-35289     05-35897     09/12/2005         Consolidated     05-35289     05-35291     05/18/2005     JAMES DALTON BELL (Federal Prisoner: 26906-086)                     Plaintiff - Appellant,    James Dalton Bell [NTC Pro Se] FCI - FEDERAL CORRECTIONAL INSTITUTION - SHERIDAN P.O. Box 5000 Sheridan, OR 97378-5000 CHARLES STEWART                     Plaintiff,    Charles Stewart, Esquire Direct: 503/558-3932 [NTC Pro Se] 19164 Barrington Ave Sandy, OR 97055 MICHAEL HUNTER                     Plaintiff,      v. USDC, TACOMA                     Defendant - Appellee,    No Appearance [Please Select] No Address - UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF WASHINGTON, SEATTLE                     Defendant - Appellee,    No Appearance [Please Select] (see above) JACK E. TANNER                     Defendant - Appellee,    Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] DOJ-USAO Suite 600 Firm: 503/727-1000 1000 S.W. Third Avenue Portland, OR 97204 FRANKLIN D. BURGESS                     Defendant - Appellee,    Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) ROB LONDON                     Defendant - Appellee,    Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) ROBERT MICHAEL LEEN                     Defendant - Appellee,    John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] Ransom Blackman LLP Security Plaza Building Suite 1400 1001 S.W. Fifth Avenue Portland, OR 97204 JEFF GORDON                     Defendant - Appellee,    Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) ANNE M. LEVINS                     Defendant - Appellee,    Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) LESLIE SPIER, MICHAEL MARKHAM; JILL SJODIN; S. YOUNG; LISA STEVENSON; ERNIE GRIZZELL; MATT RICHARDS; COUNSELOR J. GUSTIN, FDC Seatac Counselor; SEATAC FDC; TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION; DEPARTMENT OF TREASURY; ALCOHOL TOBACCO AND FIREARMS AGENTS;                     Defendant - Appellee,    Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) PETER AVENIA                     Defendant - Appellee,    John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] (see above) JUDITH MANDEL                     Defendant - Appellee,    John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] (see above) FEDERAL PUBLIC DEFENDERS OF TACOMA                     Defendant - Appellee,    John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] (see above) FEDERAL PUBLIC DEFENDERS OF SEATTLE                     Defendant - Appellee,    John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] (see above) RYAN LUND, PETER L. SHAW; WILLIAM MARTIN; STEVE WALSH, aka Steve Wilson Warden W.J. JUSINO; NICOLE CUNNINGHAM; TACOMA FEDERAL PROSECUTORS OFFICE; TACOMA FEDERAL PROBATION OFFICE; INTERNAL REVENUE SERVICE AGENTS; SEATTLE FEDERAL PROSECUTORS OFFICE; SEATTLE FEDERAL P                     Defendant - Appellee,    No Appearance [Please Select] (see above) VANCOUVER POLICE DEPARTMENT                     Defendant - Appellee,    Jeffrey N. Riback, Esquire, Attorney Direct: 360/696-8251 [COR LD NTC Retained] OFFICE OF THE CITY ATTORNEY 415 W. 6th Street Vancouver, WA 98660 DAVID KING, Sargeant (State Prisoner: T-11563)                     Defendant - Appellee,    Jeffrey N. Riback, Esquire, Attorney Direct: 360/696-8251 [COR LD NTC Retained] (see above) CLACKAMAS COUNTY SHERIFF'S DEPARTMENT                     Defendant - Appellee,    Edward S. McGlone, III, Attorney Direct: 503-486-7048 [COR LD NTC County Counsel] Edward McGlone Law Offices 4000 Kruse Way Place, 3-120 Lake Oswego, OR 97035 MULTNOMAH COUNTY SHERIFF                     Defendant - Appellee,    Susan M. Dunaway Direct: 503-988-3138 [COR LD NTC Retained] Multnomah County Attorney's Office Suite 500 501 SE Hawthorne Blvd. Portland, OR 97214 CITY OF PORTLAND                     Defendant - Appellee,    David A. Landrum, Esquire, Attorney Direct: 503/823-4047 [COR LD NTC Deputy City Attorney] OFFICE OF THE CITY ATTORNEY Rm. 430 1221 SW Fourth Avenue Portland, OR 97204 Mark R. Moline, Esquire Direct: 503-823-3089 [COR LD Deputy City Attorney] OFFICE OF THE CITY ATTORNEY Suite 430 1221 SW Fourth Avenue Portland, OR 97204 PORTLAND POLICE BUREAU                     Defendant - Appellee,    David A. Landrum, Esquire, Attorney Direct: 503/823-4047 [COR LD NTC Deputy City Attorney] (see above) Mark R. Moline, Esquire Direct: 503-823-3089 [COR LD Deputy City Attorney] (see above) GUNDERSON, Officer                     Defendant - Appellee,    David A. Landrum, Esquire, Attorney Direct: 503/823-4047 [COR LD NTC Deputy City Attorney] (see above) Mark R. Moline, Esquire Direct: 503-823-3089 [COR LD Deputy City Attorney] (see above) PIERCE COUNTY SHERIFF                     Defendant - Appellee,    Daniel Hamilton, Attorney Direct: 253-798-7746 [COR LD NTC County Counsel] Pierce County Prosecutor's Office Civil Division Suite 301 955 Tacoma Avenue South Tacoma, WA 98402-2160 CBS BROADCASTING INC.                     Defendant - Appellee,    Duane A. Bosworth Direct: 503-778-5224 [COR LD NTC Retained] Davis Wright Tremaine, LLP Firm: 503-241-2300 1300 SW Fifth Avenue Suite 2400 Portland, OR 97201-5610 STATE OF WASHINGTON, a Lessor of Land Occupied by SeaTac FDC                     Defendant - Appellee,    John A. Level, Esquire, Attorney Direct: 360/586-6300 [COR LD NTC Dep State Aty Gen] AGWA - OFFICE OF THE WASHINGTON ATTORNEY GENERAL (OLYMPIA) Torts Division P.O. Box 40126 Olympia, WA 98504-0126 JOHN RANSOM                     Defendant - Appellee,    Jonathan Mark Radmacher, Attorney Direct: 503-226-7321 [COR LD NTC Retained] McEWEN GISVOLD, LLP Suite 1600 1100 S.W. Sixth Ave. Portland, OR 97204 Trung D. Tu, Attorney Direct: 503-226-7321 [COR LD NTC Retained] McEWEN GISVOLD, LLP Suite 1600 1100 S.W. Sixth Ave. Portland, OR 97204 JAMES DALTON BELL,                     Plaintiff - Appellant, and CHARLES STEWART; MICHAEL HUNTER,                     Plaintiffs,   v. USDC, TACOMA; UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF WASHINGTON, SEATTLE; JACK E. TANNER; FRANKLIN D. BURGESS; ROB LONDON; ROBERT MICHAEL LEEN; JEFF GORDON; ANNE M. LEVINS; LESLIE SPIER, MICHAEL MARKHAM; JILL SJODIN; S. YOUNG; LISA STEVENSON; ERNIE GRIZZELL; MATT RICHARDS; COUNSELOR J. GUSTIN, FDC Seatac Counselor; SEATAC FDC; TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION; DEPARTMENT OF TREASURY; ALCOHOL TOBACCO AND FIREARMS AGENTS;; PETER AVENIA; JUDITH MANDEL; FEDERAL PUBLIC DEFENDERS OF TACOMA; FEDERAL PUBLIC DEFENDERS OF SEATTLE; RYAN LUND, PETER L. SHAW; WILLIAM MARTIN; STEVE WALSH, aka Steve Wilson Warden W.J. JUSINO; NICOLE CUNNINGHAM; TACOMA FEDERAL PROSECUTORS OFFICE; TACOMA FEDERAL PROBATION OFFICE; INTERNAL REVENUE SERVICE AGENTS; SEATTLE FEDERAL PROSECUTORS OFFICE; SEATTLE FEDERAL P; VANCOUVER POLICE DEPARTMENT; DAVID KING, Sargeant; CLACKAMAS COUNTY SHERIFF'S DEPARTMENT; MULTNOMAH COUNTY SHERIFF; CITY OF PORTLAND; PORTLAND POLICE BUREAU; GUNDERSON, Officer; PIERCE COUNTY SHERIFF; CBS BROADCASTING INC.; STATE OF WASHINGTON, a Lessor of Land Occupied by SeaTac FDC; JOHN RANSOM,                     Defendants - Appellees. 03/30/2005      1     DOCKETED CAUSE AND ENTERED APPEARANCES OF Aplt in pro per & csl of aples. CADS SENT (Y/N): NO. setting schedule as follows: Fee payment is due 4/13/05 ; appellant's designation of RT is due 3/21/05; appellee's designation of RT is due 3/30/05,, ; appellant shall order transcript by 4/11/05; court reporter shall file transcript in DC by 5/10/05; certificate of record shall be filed by 5/17/05 ; appellant's opening brief is due 6/27/05; appellees' brief is due 7/26/05,, ; appellants' reply brief is due 8/9/05; [05-35289] (MF) [Entered: 03/30/2005 11:50 AM] 05/18/2005      3     Filed order ( Harry PREGERSON, William C. CANBY, ): The ct, sua sponte, consolidates appl number 05-35289 and 05-35291. A review of the record demonstrates that, although the 3/10/05 and 3/15/05 notices of appl were not filed within 60 days from entry of the 1/7/05 judgment, aplts filed timely mtns for ext of time to appl pursuant to FRAP 4(a)(5), which were contained in the notices of app. The dc has not ruled on those motions. Accordingly, these appls are remanded to the dc for the limited purpose of allowing that ct to rule on aplts' mtns. The dc is requested to serve a copy of its decision on this ct at its earliest convenience. Br in these appls is stayed pending further order of this ct. [05-35289, 05-35291] (GR) [Entered: 05/18/2005 08:47 AM] 06/01/2005      4     FILED deft-aple John Ransom's notice of appearance as a party to the appeal; served on 5/26/05 (CASEFILES) (HH) [Entered: 06/07/2005 03:05 PM] 06/06/2005      6     Received copy of District Court minute order filed on 5/31/05: Denying plntfs Stewart and Bell's motions to extend the time for filing a notice of appeal. (to PROSE) [05-35289, 05-35291] (HH) [Entered: 06/15/2005 12:40 PM] 06/13/2005      7     Rec'd notice of change of address from Appellant James Dalton Bell in 05-35289 (PO Box 33, Terre Haute, IN 47808). (CASEFILES) [05-35289, 05-35291] (HH) [Entered: 06/16/2005 12:39 PM] 06/13/2005      8     Received letter from pro se James Bell, dated 6/7/05 re: Notice of fact of appeal notice filed. (to PROSE) (HH) [Entered: 06/16/2005 12:42 PM] 06/22/2005      9     Received Appellant James Dalton Bell's "motion and notice regarding this court's jurisdiction," dated 6/7/05 (fees due) [5476067] (to PROSE) [05-35289] (HH) [Entered: 06/24/2005 12:37 PM] 07/21/2005      11     Order filed: A review of the record demonstrates that this court lacks jurisdiction over appeal no. 05-35291 because the 3/15/05 notice of appeal was not filed within 60 days from entry of the 1/7/05 judgment...CITE. Consequently, appeal no. 05-35291 is DISMISSED for lack of jurisdiction. Although the district court also denied aplt James Bell's motion for ext of time to appeal no. 05-35289, further review of the record reflects that aplt Bell's appeal was timely filed pursuant to FRAP 4(c) because aplt Bell is incarcerated and his 3/10/05 noa was recvd by the dc one day after the deadline prescribed by FRAP 4(a)(1). Consequently, appeal no. 05-35289 shall proceed. A review of this court's docket in appeal no. 05-35289 reflects that the filing and docketing fees for this appeal remain due. Within 21 days after the filing date of this order, aplt Bell shall pay to the dc the $255.00 filing and docketing fees for this appeal and file in this court proof of such payment or file in this court a motion to proceed ifp. Failure to pay the fees or file a motion to proceed ifp shall result in the automatic dismissal of the appeal by the clerk for failure to prosecute. See 9th Cir.R. 42-1. ( Procedurally Terminated After Other Judicial Action; Jurisdictional Defects. Mary M. SCHROEDER, Johnnie B. RAWLINSON, Jay S. BYBEE ) [05-35289, 05-35291] (HH) [Entered: 07/21/2005 10:29 AM] 08/11/2005      18     Received Appellant James Dalton Bell's "request for ext and relief from obstruction," dated 8/2/05 [5540923] (to PROSE) [05-35289] (HH) [Entered: 08/23/2005 12:33 PM] 08/15/2005      13     Order filed (Dep. Clk. jlc) dismiss case for failure to prosecute (C.R. 42-1) A certified copy of this order sent to the district court shall act as and for the mandate of this court. ( Procedurally Terminated Without Judicial Action; Default. ) [05-35289] (JC) [Entered: 08/15/2005 09:46 AM] 08/17/2005      17     Received Appellant James Dalton Bell's "Notice of obstruction of plntf's right to pursue appeal," dated 8/11/05 (to PROSE) (HH) [Entered: 08/23/2005 09:52 AM] 08/19/2005      14     Received Appellant James Dalton Bell's "motion for relief from obstruction of this appeal," dated 8/15/05 [5539551] (to PROSE) [05-35289] (HH) [Entered: 08/22/2005 12:16 PM] 08/19/2005      15     Received aplt James Dalton Bell's document entitled "Response to 7/21/05 order," dated 8/15/05 (to PROSE) [05-35289] (HH) [Entered: 08/22/2005 12:18 PM] 08/19/2005      16     Received aplt James Dalton Bell's "Notice of impaired filing," dated 8/15/05 (to PROSE) (HH) [Entered: 08/22/2005 12:22 PM] 09/12/2005      20     Filed order (Appellate Commissioner) The ct is in receipt of aplt's filing titled "mtn for relief from obstruction of this appl" Aplt's filings is construed as a mtn to reinstate the appl dismissed for lack of prosecution on 8/15/05/ So construed, the mtn to reinstate is denied without prejudice to filing a renewed mtn to reinstate the appl within 21 days of this order, accompanied by 1) prf of pymnt of the $255 fee, or 2) a mtn to proc ifp...The clerk shall provide a copy of form 4 of the 9th CR to aplt along with this order. All other pndg mtns are denied as moot. [14] [18] ( PROSE) [05-35289] (GR) [Entered: 09/12/2005 08:14 AM] 09/19/2005      22     Filed order PROSE (Appellate Commissioner) It has come to the attention of the court that the appellate commissioner is a named party to this appeal. Accordingly, the order filed on 9/12/05 is VACATED. The matter will be addressed by separate order. [05-35289] (HH) [Entered: 09/19/2005 09:55 AM] 09/29/2005      24     Received Appellant James Dalton Bell's response to 9/12/05 order; dated 9/19/05 (to PROSE) [05-35289] (HH) [Entered: 10/11/2005 04:02 PM] 10/06/2005      25     Received Appellant James Dalton Bell's "objection to clerk's dismissal/notice of pending 28 USC 455/Rule 59(e)/60(b) filing," dated 10/3/05 (to PROSE) [05-35289] (HH) [Entered: 10/11/2005 04:04 PM] 10/14/2005      27     Filed order PROSE ( Thomas G. NELSON, Richard C. TALLMAN, ): The court is in receipt of aplt's filing titled, "motion for relief from obstruction of this appeal." Aplt's filing is construed as a motion to reinstate the appeal, which was dismissed for lack of jurisdiction on 8/15/05 under 9th Cir.R. 42-1. So construed, the motion to reinstate is DENIED without prejudice to the filing of a renewed motion to reinstate the appeal within 21 days after the date of this order, accompanied by: 1) proof of payment of the $255 docketing and filing fee; or 2) a motion to proceed ifp... The clerk shall provide a copy of form 4 of the 9th Cir.R. rules to aplt along with this order pursuant to FRAP 24. All other pending motions are DENIED as moot. [05-35289] (HH) [Entered: 10/14/2005 10:43 AM] 10/17/2005      28     Received Appellant James Dalton Bell's "request to construe filings as Rule 60(b) and under 28 USC 2441 in appeals 99-30210, 01-30143, 01-30296, 01-30303," dated 10/2/05 [5603631] (to PROSE - NAN case dismissed - aplt needs to respond to 10/14/05 order) [05-35289] (HH) [Entered: 10/20/2005 03:14 PM] 10/24/2005      29     Received letter from pro se re: obstruction of justice. (PRO SE - NAN - case closed) (GR) [Entered: 10/26/2005 02:18 PM] 10/27/2005      30     Received letter from pro se dated 10/23/05 re: "status of these matters." (general docket sent to aplt) (HH) [Entered: 11/02/2005 05:02 PM] 10/31/2005      32     Received Appellant James Dalton Bell's "response to 10/14/05 order; motion to correct procedural error; motion to adjudicate existing 28 USC 455 motion," dated on 10/26/05 [5619003] (to MOATT) [05-35289] (HH) [Entered: 11/03/2005 04:02 PM] 10/31/2005      34     Received Appellant James Dalton Bell's "renewed motion to reinstate appeal, motion regaring in form pauperis status of aplt Bell," dated 10/24/05 (no proof of service) (to MOATT - includes affidavit accompanying mtn to appeal ifp, Form 4 ) [5620686] [05-35289] (HH) [Entered: 11/04/2005 04:36 PM] 11/03/2005      33     Received letter from pro se dated 10/30/05 re: irregularities associated with court's mishandling of 05-35289. (CASEFILES) (HH) [Entered: 11/03/2005 04:21 PM] 11/04/2005      38     Received Appellant James Dalton Bell's "supplement to motion under 28 usC 455" [32], served on 11/2/05 (to MOATT) [05-35289] (HH) [Entered: 11/18/2005 05:01 PM] 11/07/2005      35     Received Appellant James Dalton Bell's "supplement to motion under 28 USC 455" [34], [32]; dated 10/23/05 (to MOATT) [05-35289] (HH) [Entered: 11/08/2005 11:11 AM] 11/07/2005      36     Received Appellant James Dalton Bell's "motion for reconsideration of denied as moot motions," dated 10/23/05 [5622662] (to PROSE) [05-35289] (HH) [Entered: 11/08/2005 11:13 AM] 11/14/2005      39     Received Appellant James Dalton Bell's motion under 28 USC 455; dated 11/4/05 [5634572] (to MOATT) [05-35289] [05-35289] (HH) [Entered: 11/18/2005 05:13 PM] 11/14/2005      43     Received Appellant James Dalton Bell's "motion to repair corruption," dated 11/7/05 [5639726] [05-35289] [05-35289] (HH) [Entered: 11/25/2005 12:18 PM] 11/18/2005      47     Received letter from pro se re: filings in cases 99-30210 and 05-35289. (to MOATT) (HH) [Entered: 12/28/2005 11:56 AM] 11/21/2005      40     Received Appellant James Dalton Bell's "renewed motion to reinstate appeal, motion regaring in form pauperis status of aplt Bell," dated 10/24/05 (no proof of service) (MOATT) [5635140] [05-35289] (HH) [Entered: 11/21/2005 11:00 AM] 11/21/2005      41     Filed order MOATT ( J. C. WALLACE, Edward LEAVY, ): The clerk is directed to file aplt's 10/31/05 "renewed motion to reinstate appeal, motion regarding ifp status of aplt Bell." The renewed motion to reinstate is GRANTED. [40] Aplt's 10/31/05 filing is construed as a motion to proceed ifp on appeal. So construed, the motion is DENIED. [34] Within 21 days after the filing date of this order, aplt shall pay $255.00 to the dc as the docketing and filing fees for this appeal and file proof of payment with this court. Failure to pay the fees will result in the automatic dismissal of the appeal by the clerk for failure to prosecute, regardless of further filings. See 9th Cir.R. 42-1. If aplt pays the fees as required and files proof of such payment in this court, aplt shall simultaneously show cause why the judgment challenged in this appeal should not be summarily affirmed. See 9th Cir.R. 3-6. If aplt pays the fees but fails to file a response to this order, the clerk shall dismiss this appeal for failure prosecute. See 9th Cir.R. 42-1. To the extent aplt has a motion for recusal pending, it is DENIED...CITE. All other pending motions are DENIED. No motions for reconsideration, clarification, or modification of this order shall be filed or entertained. Briefing is SUSPENDED pending further order of this court. [05-35289] (HH) [Entered: 11/21/2005 11:00 AM] 12/06/2005      44     Check Number 553 in the amount of 255.00 forwarded to district court. (See Case File) [05-35289] (JR) [Entered: 12/06/2005 02:34 PM] 12/06/2005      45     Filed Appellant James Dalton Bell's response to order to show cause; served on 12/2/05 (to MOATT) [05-35289] (HH) [Entered: 12/13/2005 02:49 PM] 12/19/2005      46     Received Appellant James Dalton Bell's notice of attempted payment of docket fee; motion for ext to pay docket fee; dated 12/14/05 [5670120] (to MOATT) [05-35289] (HH) [Entered: 12/22/2005 03:16 PM] 01/04/2006      49     Filed order MOATT (EO) Aplt's motion for an ext of time to pay the docketing and filing fees is GRANTED. [46] Within 21 days after the filing date of this order, aplt shall pay $255.00 to the DC as the docketing and filing fees for this appeal and file proof of payment with this court. Failure to pay the fees will result in the automatic dismissal of the appeal by the clerk for failure to prosecute, regardless of further filings. See 9th Cir.R. 42-1. If aplt pays the fees as required and files proof of such payment in this court, aplt's 12/6/05 response to the court's order to show cause will be considered. Briefing remains suspended pending further order of this court. [05-35289] (HH) [Entered: 01/04/2006 09:56 AM] 01/13/2006      50     Received notification from District Court re payment of docket fee. ( Date: 12/27/05) [05-35289] (HH) [Entered: 01/20/2006 02:46 PM] 01/23/2006      51     Received Appellant James Dalton Bell's notice and request to clerks (to correct caption); dated 1/18/06 (no proof of service to aples) [5704222] (to MOATT) [05-35289] (HH) [Entered: 01/26/2006 04:17 PM] 02/24/2006      53     FILED MEMORANDUM: A review of the record and aplt's response to the 11/21/05 order to show cause indicates that the questions raised in this appeal are so insubstantial as not to require further argument...CITE. Accordingly, we summarily affirm the DC's judgment. All pending motions are DENIED as moot. AFFIRMED. ( Terminated on the Merits after Submission Without Oral Hearing; Affirmed; Written, Unsigned, Unpublished. Mary M. SCHROEDER, Alfred T. GOODWIN, Johnnie B. RAWLINSON ) FILED AND ENTERED JUDGMENT. [05-35289] (HH) [Entered: 02/24/2006 12:53 PM] 02/27/2006      54     Received Appellant James Dalton Bell's "notice of continuing obstruction of this case," dated 2/18/06 (CASEFILES) (HH) [Entered: 03/09/2006 05:18 PM] 03/20/2006      55     MANDATE ISSUED [05-35289] (HH) [Entered: 03/20/2006 11:45 AM] 01/08/2007      56     Rec'd notice of change of address from Appellant James Dalton Bell, dated 1/1/07 (PO Box 7000, Florence, CO 81226-7000). (CASEFILES) [05-35289] (HH) [Entered: 01/09/2007 09:39 AM] -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 36892 bytes Desc: not available URL: From jdb10987 at yahoo.com Wed Aug 5 12:49:47 2015 From: jdb10987 at yahoo.com (jim bell) Date: Wed, 5 Aug 2015 19:49:47 +0000 (UTC) Subject: FOIA/PA In-Reply-To: References: Message-ID: <1353203702.618150.1438804187524.JavaMail.yahoo@mail.yahoo.com> Same thing; my Portland oregon civil lawsuit and subsequent appeal.      Jim Bell From: coderman To: jim bell Cc: John Young ; "cypherpunks at cpunks.org" Sent: Tuesday, August 4, 2015 10:27 PM Subject: Re: FOIA/PA and more then: Court of Appeals Docket #: 05-35897    Docketed: 09/12/2005 Termed: 10/14/2005 Nature of Suit: 3550 Prisoner-Civil Rights Bell, et al v. DC of Tacoma, et al Appeal From: U.S. District Court for Oregon, Portland Fee Status: Due Case Type Information:     1) prisoner     2) state     3) civil rights Originating Court Information:     District: 0979-3 : CV-02-01052-AJB     Trial Judge: Anna J. Brown, District Judge     Date Filed: 08/05/2002     Date Order/Judgment:        Date NOA Filed:     01/07/2005        08/26/2005 Prior Cases:     None Current Cases:     Lead    Member    Start    End        Companion     05-35289     05-35897     09/12/2005         Consolidated     05-35289     05-35291     05/18/2005     JAMES DALTON BELL (Federal Prisoner: 26906-086)                     Plaintiff - Appellant,    James Dalton Bell [NTC Pro Se] FCI - FEDERAL CORRECTIONAL INSTITUTION - SHERIDAN P.O. Box 5000 Sheridan, OR 97378-5000 CHARLES STEWART                     Plaintiff,    Charles Stewart, Esquire Direct: 503/558-3932 [Pro Se] 19164 Barrington Ave Sandy, OR 97055 MICHAEL HUNTER                     Plaintiff,      v. USDC, TACOMA                     Defendant - Appellee,    No Appearance [Please Select] No Address - UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF WASHINGTON, SEATTLE                     Defendant - Appellee,    No Appearance [Please Select] (see above) JACK E. TANNER                     Defendant - Appellee,    Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] DOJ-USAO Suite 600 Firm: 503/727-1000 1000 S.W. Third Avenue Portland, OR 97204 FRANKLIN D. BURGESS                     Defendant - Appellee,    Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) ROB LONDON                     Defendant - Appellee,    Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) ROBERT MICHAEL LEEN                     Defendant - Appellee,    John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] Ransom Blackman LLP Security Plaza Building Suite 1400 1001 S.W. Fifth Avenue Portland, OR 97204 JEFF GORDON                     Defendant - Appellee,    Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) ANNE M. LEVINS                     Defendant - Appellee,    Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) LESLIE SPIER, MICHAEL MARKHAM; JILL SJODIN; S. YOUNG; LISA STEVENSON; ERNIE GRIZZELL; MATT RICHARDS; COUNSELOR J. GUSTIN, FDC Seatac Counselor; SEATAC FDC; TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION; DEPARTMENT OF TREASURY; ALCOHOL TOBACCO AND FIREARMS AGENTS;                     Defendant - Appellee,    Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Assist US Attorney] (see above) PETER AVENIA                     Defendant - Appellee,    John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] (see above) JUDITH MANDEL                     Defendant - Appellee,    John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] (see above) FEDERAL PUBLIC DEFENDERS OF TACOMA                     Defendant - Appellee,    John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] (see above) FEDERAL PUBLIC DEFENDERS OF SEATTLE                     Defendant - Appellee,    John S. Ransom, Attorney Direct: 503-228-0487 [COR LD NTC Retained] (see above) RYAN LUND                     Defendant - Appellee,    No Appearance [Please Select] (see above) PETER L. SHAW                     Defendant - Appellee,    No Appearance [Please Select] (see above) WILLIAM MARTIN                     Defendant - Appellee,    No Appearance [Please Select] (see above) STEVE WALSH, aka Steve Wilson                     Defendant - Appellee,    No Appearance [Please Select] (see above) MICHAEL MARKHAM, ; JILL SJODIN; WARDEN W.J. JUSINO; S. YOUNG;LISA STEVENSON; ERNIE GRIZZELL; MATT RICHARDS;COUNSELORJ. GUSTIN, FDC Seatac Counselor; SEATAC FDC; TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION; DEPARTMENT OF TRREASURY; ALCOHOL TOBACCO AND FIREARMS AGENTS; FEDERAL BUREAU OF PRISONS; ORTIZ, Seatac Counselor;MIKE MCNALL; STEVEN L LANE; JOHN MCKAY; HELEN BRUNNER; ATWATER UNITED STATES PENITENTIARY;LOMPOC USP and its Warden; PHOENIX FCI and its Warden; CHRISTINE MILLIGAN, Atwater Counselor; COMMISSIONER OF INTERNAL REVENUE SERVICE; CHARLES VOLLMER;                     Defendant - Appellee,    Baron C. Sheldahl, Esquire, Attorney Direct: 503-727-1000 [COR LD NTC Dep State Aty Gen] (see above) PORTLAND POLICE BUREAU                     Defendant - Appellee,    David A. Landrum, Esquire, Attorney Direct: 503/823-4047 [COR LD NTC County Counsel] OFFICE OF THE CITY ATTORNEY Rm. 430 1221 SW Fourth Avenue Portland, OR 97204 CITY OF PORTLAND, ; GUNDERSON, Officer;                     Defendant - Appellee,    David A. Landrum, Esquire, Attorney Direct: 503/823-4047 [COR LD NTC County Counsel] (see above) VANCOUVER POLICE DEPARTMENT, ; DAVID KING, Sargeant;                     Defendant - Appellee,    Jeffrey N. Riback, Esquire, Attorney Direct: 360/696-8251 [COR LD NTC County Counsel] OFFICE OF THE CITY ATTORNEY 415 W. 6th Street Vancouver, WA 98660 CLACKAMAS COUNTY, SHERIFF'S DEPARTMENT                     Defendant - Appellee,    Edward S. McGlone, III, Attorney Direct: 503-486-7048 [COR LD NTC County Counsel] Edward McGlone Law Offices 4000 Kruse Way Place, 3-120 Lake Oswego, OR 97035 MULTNOMAH COUNTY SHERIFF                     Defendant - Appellee,    Susan M. Dunaway Direct: 503-988-3138 [COR LD NTC County Counsel] Multnomah County Attorney's Office Suite 500 501 SE Hawthorne Blvd. Portland, OR 97214 VANCOUVER PROBATION OFFICE                     Defendant - Appellee,    Jeffrey N. Riback, Esquire, Attorney Direct: 360/696-8251 [COR LD NTC County Counsel] (see above) PIERCE COUNTY SHERIFF DEPARTMENT                     Defendant - Appellee,    Daniel Hamilton, Attorney Direct: 253-798-7746 [COR LD NTC County Counsel] Pierce County Prosecutor's Office Civil Division Suite 301 955 Tacoma Avenue South Tacoma, WA 98402-2160 CBS BROADCASTING INC                     Defendant - Appellee,    Duane A. Bosworth Direct: 503-778-5224 [COR LD NTC Retained] Davis Wright Tremaine, LLP Firm: 503-241-2300 1300 SW Fifth Avenue Suite 2400 Portland, OR 97201-5610 JAMES DALTON BELL,                     Plaintiff - Appellant, and CHARLES STEWART; MICHAEL HUNTER,                     Plaintiffs,   v. USDC, TACOMA; UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF WASHINGTON, SEATTLE; JACK E. TANNER; FRANKLIN D. BURGESS; ROB LONDON; ROBERT MICHAEL LEEN; JEFF GORDON; ANNE M. LEVINS; LESLIE SPIER, MICHAEL MARKHAM; JILL SJODIN; S. YOUNG; LISA STEVENSON; ERNIE GRIZZELL; MATT RICHARDS; COUNSELOR J. GUSTIN, FDC Seatac Counselor; SEATAC FDC; TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION; DEPARTMENT OF TREASURY; ALCOHOL TOBACCO AND FIREARMS AGENTS;; PETER AVENIA; JUDITH MANDEL; FEDERAL PUBLIC DEFENDERS OF TACOMA; FEDERAL PUBLIC DEFENDERS OF SEATTLE; RYAN LUND; PETER L. SHAW; WILLIAM MARTIN; STEVE WALSH, aka Steve Wilson; MICHAEL MARKHAM, ; JILL SJODIN; WARDEN W.J. JUSINO; S. YOUNG;LISA STEVENSON; ERNIE GRIZZELL; MATT RICHARDS;COUNSELORJ. GUSTIN, FDC Seatac Counselor; SEATAC FDC; TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION; DEPARTMENT OF TRREASURY; ALCOHOL TOBACCO AND FIREARMS AGENTS; FEDERAL BUREAU OF PRISONS; ORTIZ, Seatac Counselor;MIKE MCNALL; STEVEN L LANE; JOHN MCKAY; HELEN BRUNNER; ATWATER UNITED STATES PENITENTIARY;LOMPOC USP and its Warden; PHOENIX FCI and its Warden; CHRISTINE MILLIGAN, Atwater Counselor; COMMISSIONER OF INTERNAL REVENUE SERVICE; CHARLES VOLLMER;; PORTLAND POLICE BUREAU; CITY OF PORTLAND, ; GUNDERSON, Officer;; VANCOUVER POLICE DEPARTMENT, ; DAVID KING, Sargeant;; CLACKAMAS COUNTY, SHERIFF'S DEPARTMENT; MULTNOMAH COUNTY SHERIFF; VANCOUVER PROBATION OFFICE; PIERCE COUNTY SHERIFF DEPARTMENT; CBS BROADCASTING INC,                     Defendants - Appellees. 09/12/2005      1     DOCKETED CAUSE AND ENTERED APPEARANCE OF APLT IN PRO PER AND COUNSEL FOR APLES. CADS SENT (Y/N): n. setting schedule as follows: Fee payment is due 9/26/05 ; appellant's designation of RT is due 9/6/05; appellee's designation of RT is due 9/15/05,, ; appellant shall order transcript by 9/26/05; court reporter shall transcript in DC by 10/26/05; certificate of record shall filed by 11/2/05 ; appellant's opening brief is due 12/12/05; appellees' brief is due 1/11/06,, ; appellants' reply brief is due 1/25/06; [05-35897] (KKW) [Entered: 09/12/2005 02:35 PM] 10/14/2005      3     Order filed A review of the record demonstrates that this court lacks jurisdiciton over this appeal because the order challenged in the appeal is not final or appelable. Consequently, this appeal is dismissed for lack of jurisdiciton. All pending mtns are denied as moot.( Procedurally Terminated After Other Judicial Action; Jurisdictional Defects. G. NELSON, Kim M. WARDLAW, Richard C. TALLMAN ) [05-35897] (KKW) [Entered: 10/14/2005 11:27 AM] 11/07/2005      4     MANDATE ISSUED [05-35897] (KKW) [Entered: 11/07/2005 08:48 AM] -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 17454 bytes Desc: not available URL: From jdb10987 at yahoo.com Wed Aug 5 12:51:35 2015 From: jdb10987 at yahoo.com (jim bell) Date: Wed, 5 Aug 2015 19:51:35 +0000 (UTC) Subject: FOIA/PA In-Reply-To: References: Message-ID: <1005327526.660215.1438804296001.JavaMail.yahoo@mail.yahoo.com> More references to the chain of corrupt case-handling done by the Ninth Circuit and Tacoma Federal courts.      Jim Bell From: coderman To: jim bell Cc: John Young ; "cypherpunks at cpunks.org" Sent: Tuesday, August 4, 2015 10:22 PM Subject: Re: FOIA/PA few more years later, and then: Court of Appeals Docket #: 06-35904    Docketed: 10/25/2006 Termed: 12/21/2006 Nature of Suit: 2510 Vacate Sentence USA v. Bell Appeal From: U.S. District Court for Western Washington, Tacoma Fee Status: Due Case Type Information:     1) prisoner     2) federal     3) 2255 habeas corpus Originating Court Information:     District: 0981-3 : CV-06-05148-FDB    Lead: CR-00-05731-FDB     Trial Judge: Franklin D. Burgess, Senior District Judge     Date Filed: 01/26/2006     Date Order/Judgment:        Date NOA Filed:     08/17/2006        09/28/2006 Prior Cases:     01-30143    Date Filed: 04/05/2001    Date Disposed: 05/22/2001     Disposition: Jurisdictional Defects - Judge Order     01-30162    Date Filed: 04/25/2001    Date Disposed: 05/22/2001     Disposition: Jurisdictional Defects - Judge Order     01-30296    Date Filed: 08/23/2001    Date Disposed: 12/26/2001     Disposition: Jurisdictional Defects - Judge Order     01-30303    Date Filed: 09/06/2001    Date Disposed: 09/19/2002     Disposition: Affirmed - Opinion     04-30115    Date Filed: 03/16/2004    Date Disposed: 10/19/2004     Disposition: Affirmed - Memorandum     05-35289    Date Filed: 03/30/2005    Date Disposed: 02/24/2006     Disposition: Affirmed - Memorandum     05-35897    Date Filed: 09/12/2005    Date Disposed: 10/14/2005     Disposition: Jurisdictional Defects - Judge Order     97-30384    Date Filed: 12/30/1997    Date Disposed: 08/21/1998     Disposition: Affirmed - Memorandum     99-30210    Date Filed: 07/06/1999    Date Disposed: 05/25/2001     Disposition: Affirmed - Memorandum Current Cases:     None UNITED STATES OF AMERICA                     Plaintiff - Appellee,    Helen J. Brunner, Esquire, Assistant U.S. Attorney [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101   v. JAMES DALTON BELL (Federal Prisoner: 26906-086)                     Defendant - Appellant,    James Dalton Bell [NTC Pro Se] FCI - FEDERAL CORRECTIONAL INSTITUTION - SHERIDAN P.O. Box 5000 Sheridan, OR 97378-5000 UNITED STATES OF AMERICA,                     Plaintiff - Appellee,   v. JAMES DALTON BELL,                     Defendant - Appellant. 10/25/2006      1     Filed request for a certificate of appealability. Date COA denied in DC: 10/19/06 Record on Appeal included (y/n): on pacer only (RECORDS) (KM) [Entered: 10/25/2006 01:55 PM] 10/25/2006      2     Received orig District Court case file. ON PACER ONLY (KM) [Entered: 10/25/2006 01:56 PM] 11/03/2006      3     Filed aplt's Bell request to dismiss appeal. (MOATT) [06-35904] (EL) [Entered: 11/15/2006 01:49 PM] 12/21/2006      5     Order filed The request for a certificate of appealability is denied. See 28 U.S.C. �� 2241(d)(1), 2253(c)(2). All outstanding motions are denied. (Procedurally Terminated After Other Judicial Action; Certificate of Appealability. M. M. McKEOWN, Raymond C. FISHER ) [06-35904] (TSP) [Entered: 12/21/2006 12:04 PM] -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6938 bytes Desc: not available URL: From jdb10987 at yahoo.com Wed Aug 5 12:53:49 2015 From: jdb10987 at yahoo.com (jim bell) Date: Wed, 5 Aug 2015 19:53:49 +0000 (UTC) Subject: FOIA/PA In-Reply-To: References: Message-ID: <1220736922.653375.1438804429546.JavaMail.yahoo@mail.yahoo.com> I never saw this appeal, as I recall, done by the same corrupt attorney as who later mishandled one of the appeals in 2001-2002.        Jim Bell From: coderman To: jim bell Cc: John Young ; "cypherpunks at cpunks.org" Sent: Tuesday, August 4, 2015 10:29 PM Subject: Re: FOIA/PA the first in file order, from '97: Court of Appeals Docket #: 97-30384    Docketed: 12/30/1997 Termed: 08/21/1998 USA v. Bell Appeal From: U.S. District Court for Western Washington, Tacoma Fee Status: IFP Case Type Information:     1) criminal     2) sentence and conviction     3) null Originating Court Information:     District: 0981-3 : CR-97-05270-FDB     Court Reporter: Teri Hendrix     Trial Judge: Franklin D. Burgess, Senior District Judge     Date Filed: 07/09/1997     Date Order/Judgment:        Date NOA Filed:     12/12/1997        12/18/1997 Prior Cases:     None Current Cases:     None UNITED STATES OF AMERICA                     Plaintiff - Appellee,    Annmarie Levins, Esquire Direct: 206/553-7970 [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101 Robb London, Esquire Direct: 206/553-7970 [COR LD NTC Assist US Attorney] DOJ-Office of the U.S. Attorney 700 Stewart Street Seattle, WA 98101   v. JAMES DALTON BELL (Federal Prisoner: 26906-086)                     Defendant - Appellant,    Peter J. Avenia, Assistant Federal Public Defender Direct: 206-553-1100 [COR LD NTC Assist Fed Pub Def] FPDWA - FEDERAL PUBLIC DEFENDER'S OFFICE Western District of Washington Suite 700 1601 Fifth Ave. Seattle, WA 98101 UNITED STATES OF AMERICA,                     Plaintiff - Appellee,   v. JAMES DALTON BELL,                     Defendant - Appellant. 12/30/1997      1     DOCKETED CAUSE AND ENTERED APPEARANCES OF COUNSEL. Filed in D.C. on 12/18/97; setting schedule as follows: transcript shall be ordered by 1/9/98 for James Dalton Bell; transcript shall be filed by 2/9/98; appellants' briefs, excerpts due by 3/20/98 for James Dalton Bell; appellees' brief due 4/20/98 for USA; appellants' reply brief due by 5/4/98 for James Dalton Bell. ( RT required: y) ( Sentence imp 11 months) [97-30384] (TM) [Entered: 12/30/1997 03:34 PM] 02/17/1998      2     Filed certificate of record on appeal RT filed in DC n/a appellants' brief due ; [97-30384] (RG) [Entered: 02/25/1998 12:28 PM] 03/24/1998      3     Filed original and 15 copies Appellant James Dalton Bell opening brief ( Informal: n) 25 pages and five excerpts of record in 1 volumes., served on 3/20/98 [97-30384] (RG) [Entered: 03/24/1998 02:50 PM] 03/24/1998      4     Filed Appellant's excerpts within pre-sentencing report UNDER SEAL. [97-30384] (RG) [Entered: 03/24/1998 02:53 PM] 03/27/1998      5     Filed Appellant James Dalton Bell's motion to stay special conditions of supervised release and D.C.'s Order to disclose confidential Psychological report; [97-30384] served on 3/20/98. (MoAtt) [3422227] [97-30384] (DL) [Entered: 03/27/1998 01:36 PM] 04/13/1998      6     14 day oral extension by phone of time to file 's brief. [97-30384] appellees' brief due 5/4/98; the optional reply brief is due 14 days... (LKK) [Entered: 04/13/1998 02:00 PM] 05/01/1998      8     Filed order ( Melvin BRUNETTI, Thomas G. NELSON): Appellant's motion for injunctive relief is denied. The br. sch. established previously shall remain in effect. [97-30384] (RG) [Entered: 05/01/1998 08:01 AM] 05/06/1998      9     Filed original and 15 copies appellee USA's 24 pages brief, served on 5/4/98 [97-30384] (RG) [Entered: 05/06/1998 01:44 PM] 05/20/1998      13     Filed original and 15 copies James Dalton Bell reply brief, ( Informal: n ) 5 pages; served on 5/18/98 [97-30384] (RG) [Entered: 05/21/1998 09:41 AM] 05/21/1998      12     Calendar check performed [97-30384] (TH) [Entered: 05/21/1998 09:29 AM] 06/02/1998      14     Calendar materials being prepared. [97-30384] [97-30384] (UK) [Entered: 06/02/1998 01:56 PM] 06/05/1998      15     CALENDARED: SE 8/5/98 9:00 am Courtroom Park Place, 21st Floor [97-30384] (UK) [Entered: 06/05/1998 11:10 AM] 06/19/1998      18     FILED CERTIFIED RECORD ON APPEAL; IN 1 CLERKS REC, 0 RTs. (Orig) [97-30384] (JR) [Entered: 06/19/1998 02:00 PM] 08/05/1998      19     ARGUED AND SUBMITTED TO Dorothy W. NELSON, Alex KOZINSKI, William W. Schwarzer [97-30384] (XX) [Entered: 08/05/1998 01:38 PM] 08/21/1998      23     FILED MEMORANDUM DISPOSITION: AFFIRMED (Terminated on the Merits after Oral Hearing; Affirmed; Written, Unsigned, Unpublished. Dorothy W. NELSON; Alex KOZINSKI, author; William W. Schwarzer) FILED AND ENTERED JUDGMENT. [97-30384] (RR) [Entered: 08/25/1998 11:55 AM] 09/14/1998      24     MANDATE ISSUED [97-30384] (RR) [Entered: 09/14/1998 11:38 AM] 07/13/2000      25     RECORD RETURNED. (See control card for details.) (JR) [Entered: 07/13/2000 01:07 PM] -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 9049 bytes Desc: not available URL: From carimachet at gmail.com Wed Aug 5 12:02:43 2015 From: carimachet at gmail.com (Cari Machet) Date: Wed, 5 Aug 2015 22:02:43 +0300 Subject: so called onion routing In-Reply-To: References: <55bff8f5.a85c8c0a.926e1.ffffce20@mx.google.com> <55c1c5c7.042c8c0a.6f6b9.615c@mx.google.com> Message-ID: its religious thought to even utilize the word 'evil' let alone think in those terms and religious thought is a capitalist parasite >>> read nietzsche for fuck sake he wrote in the 1800's one of my arguments is that it is structurally unsound to rely on one method >>> especially if built by your enemy - i look to nature as other thinkers do/have and i think about buckminster fuller - his analysis of panther dna making them vulnerable to extinction because it is all so/too similar ... in any given situation i do not think in terms of one solution ... i have used this analogy before ... sperm: there are lots of them in one load ... they all race to get to the egg sure but, they actually help each other to penetrate - they dont care who gets in as long as one of them transforms the egg into a being (i mean i cant really speak for sperms in general but it has been analysed like this)... thats their job ...they even have been seen to help each other non-competative like :: this is the kind of structures we need moreso not monolithic structures that blind us ... its really a geometry problem for me... math but also it is all ethical to me as well : if my family was murdered by a fucker i wouldnt go and use that fuckers infrastructure cause they made it for me to use and sent some other fuckers around the globe selling it cause like the fucker murdered my family i wont support them in any way ever ....why would i talk myself into supporting the murderer of my family when i could think about, invent or utilize other methods - its just really not logical On Wed, Aug 5, 2015 at 9:19 PM, Travis Biehn wrote: > Yes, just get a new DHCP lease - rock solid. > > This is actually pretty easy; First read the protocol spec then read the > code. > > If there is a backdoor or vulnerability, please let everyone know. > > If you can do away with evils like centralized directory servers while > retaining sybill resistance please publish your ideas. > > If your arguments are that the project is intrinsically evil, by virtue of > the authors being tainted with 'reptilian money' - that's not really a > technically robust. > > -Travis > > On Wed, Aug 5, 2015, 9:24 AM Cari Machet wrote: > >> i think there could be solutions utilized like easily shifting the ip >> address of comp and router yourself in your own little hut > 'ghost' it but >> not thru others .... pretty fucking simple i know but maybe effective in a >> really different way than having the fake government of the US build >> something and use people that are activists against them to make it work >> also i think the infrastructure is too bulky >> >> i like to think about satelites (and thats all i will say about that) - i >> dont know i would have to have a real think about solutions it is very >> important to think about it and not just the problem for sure but i dont >> think the methodology of tor is a solution i think it is a stoppage point >> that people are not seeing beyond ... people dont think it has been >> penetrated and i have no proof of that but maybe that isnt the main problem >> for me ... structurally speaking it is a disaster ... the masses being >> handed a tool in order to subvert the government??? as they say you cant >> make this shit up >> >> i know that when i was in syria i could get a fucking video call in the >> desert where there was nothing ... this was syria not a rich country per >> say like at all so i think the choking of the communication system is super >> in play ... if others dont think thats a problem then they need to educate >> themselves ... do people that live in the US on this list even know that >> the infrastructure of fiber optics that underlies the communications may >> not even be utilized in their city and that the reason it is not used is >> because the communication companies bought a contract with there city that >> freezes it all up? please look into the chatanooga model if you dont know >> about this 'freemarket' bullshit>>>> also fyi iraq had video calls >> nationwide in 2000 or even before ... now i am not sure what tech they were >> using i think radiowaves and shooting the signal over land that way but it >> all points to a tremendous shut down of functionality .... not that it was >> probably all that healthy for people but... >> >> sure we can write each other little words on this frame of communications >> but see what happens when attempting to shift in a large way ... like when >> they printed the 3d gun... people had to git fr USA & like when barrett >> made project pm and this is a major reason i think there should be as many >> solutions as possible not just one - not as easy for gov/corp to take them >> out >> >> On Wed, Aug 5, 2015 at 11:15 AM, Juan wrote: >> >>> On Tue, 4 Aug 2015 22:36:00 -0700 >>> coderman wrote: >>> >>> > On 8/3/15, Juan wrote: >>> > > ... >>> > > http://www.onion-router.net/History.html >>> > > 1995: >>> > > Initial work on Onion Routing begins, funded by ONR. >>> > >>> > back in this day, fully saturated ISDN pairs made for great zero >>> > knowledge overlays, too. >>> > >>> > the real question is, what do you propose to do better? >>> >>> >>> what I was getting at is that, if I'm not mistaken, syverson >>> and co. claim to have 'invented' 'onion routing' >>> >>> but they didn't come up with the ideas and didn't even come up >>> with the name apparently >>> >>> >>> > >>> > >>> > if TCP Tor is just a jump toward datagram traffic analysis resistant >>> > overlays, how little it matters what origins for this open source", >>> > distributed, public infrastructure? >>> > >>> >>> do you consider your governemnt to be a 'repressive regime' >>> coderman? >>> >>> does tor protect people from your goverment's attacks? >>> >>> do you think tor helps the US government in any way? >>> >>> >>> do you think it's 'hypotetically' acceptable to murder say a 100 >>> people so that 1 million people can 'anonymously' browse >>> their newspaper or favorite sports website? >>> >>> >>> >>> >>> >>> >>> >>> > cooperation is the future. learn to do it least badly :P >>> > >>> > >>> > best regards, >>> >>> >> >> >> -- >> Cari Machet >> NYC 646-436-7795 >> carimachet at gmail.com >> AIM carismachet >> Syria +963-099 277 3243 >> Amman +962 077 636 9407 >> Berlin +49 152 11779219 >> Reykjavik +354 894 8650 >> Twitter: @carimachet >> >> 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 >> >> Ruh-roh, this is now necessary: This email is intended only for the >> addressee(s) and may contain confidential information. If you are not the >> intended recipient, you are hereby notified that any use of this >> information, dissemination, distribution, or copying of this email >> without >> permission is strictly prohibited. >> >> >> -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 10182 bytes Desc: not available URL: From rysiek at hackerspace.pl Wed Aug 5 13:55:51 2015 From: rysiek at hackerspace.pl (rysiek) Date: Wed, 05 Aug 2015 22:55:51 +0200 Subject: Delete and migrate your junk off GoogleCode by August 25 !!! In-Reply-To: References: Message-ID: <11700727.ToKB9dyQUd@lapuntu> Dnia piątek, 31 lipca 2015 17:45:11 grarpamp pisze: > It's going away, so if you've got stuff there you want to delete and > manage without interacting with their humans and policy/archive > wonks, do it now!!! > > http://google-opensource.blogspot.com/2015/03/farewell-to-google-code.html > https://code.google.com/p/support/wiki/ReadOnlyTransition > > Sourceforge has been acting weird too, but you knew that. And GitHub: https://github.com/nixxquality/WebMConverter/commit/c1ac0baac06fa7175677a4a1bf65860a84708d67 http://tech.slashdot.org/story/13/12/14/1618239/github-takes-down-satirical-c-plus-equality-language We need stuff like: http://gitchain.org/ http://blog.printf.net/articles/2015/05/29/announcing-gittorrent-a-decentralized-github/ -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From carimachet at gmail.com Wed Aug 5 14:08:52 2015 From: carimachet at gmail.com (Cari Machet) Date: Thu, 6 Aug 2015 00:08:52 +0300 Subject: so called onion routing In-Reply-To: References: <55bff8f5.a85c8c0a.926e1.ffffce20@mx.google.com> <55c1c5c7.042c8c0a.6f6b9.615c@mx.google.com> Message-ID: i dont see it as poetry or emotion i see it as logic but prove logic to be lacking poetry or emotion empirically/logically these kinds of degrading segregations or silos of thought are also christian in my mind which in turn for me is capitalist like in an anti-enlightenment kind of way ie logic good emotion or instinct bad instinct is really important to understand like in the tsunami that hit thailand remember ? Animals didnt really die en mass as they knew it was coming so they got out of dodge as they say ... did they have a gauge that told them to get the fuck out sure they are closer to life so they can sense it better or they got a signal in some form .... sound probably its really logical actually but why didnt oh so logical humans get the same info? ethics are not emotional by nature - really ethics are logical we may get hints that something doesnt feel right in our gut but then i think it can be logically laid out as to why as well : murder isnt just emotional there are lots of factual ramifications that follow from the murder as i am native american and basically my family was murdered by the fake USG i can first person talk about the logical ramifications of my family not being allowed to exist please prove your point about `lateral thinking` which i would term horizontality ... if it isnt effective in a given space i often have seen that the structures that are monolithic are why so i would be interested to see any other formulations ... as i am a problem seeker ...uuuuhhh then i know where to work i think we agree that ideology is not functional but i am not sure we see the same problems to solve ... i am not sure there is a clear understanding that life is being heavily designed by a 'few' people in power and they are designing it for many years to come like they have plans and shit so... somehow i dont think the plans include medicine for the sick or literacy for everyone... lets not even discuss food and water or combating mass murder of the planets inhabitants heres a video about what people often section off as logic and emotional or creative sides of the brain ... our own interfaces should be looked at as evidence not only because of their structures information but to show our limited scope and not just thru our form but thru the manipulation/propaganda about our form/forms which you seem to be driving https://www.youtube.com/watch?v=UyyjU8fzEYU i think in order to make the machines of the future - like the ones that will decide on their own wether to kill you or not in a battle - then this kind of emotion/logic mis-equation will need to be worked on On Wed, Aug 5, 2015 at 10:41 PM, Travis Biehn wrote: > > > On Wed, Aug 5, 2015 at 3:02 PM, Cari Machet wrote: > >> its religious thought to even utilize the word 'evil' let alone think in >> those terms and religious thought is a capitalist parasite >>> read >> nietzsche for fuck sake he wrote in the 1800's >> >> That's my point, glad we agree. > > >> one of my arguments is that it is structurally unsound to rely on one >> method >>> especially if built by your enemy - i look to nature as other >> thinkers do/have and i think about buckminster fuller - his analysis of >> panther dna making them vulnerable to extinction because it is all so/too >> similar ... in any given situation i do not think in terms of one solution >> ... i have used this analogy before ... sperm: there are lots of them in >> one load ... they all race to get to the egg sure but, they actually help >> each other to penetrate - they dont care who gets in as long as one of them >> transforms the egg into a being (i mean i cant really speak for sperms in >> general but it has been analysed like this)... thats their job ...they even >> have been seen to help each other non-competative like :: this is the kind >> of structures we need moreso not monolithic structures that blind us ... >> its really a geometry problem for me... math >> >> OK, 'yes' monoculture is threatening and certain practices provide clear > 'intelligence signals'. Unrestrained 'lateral thinking,' while > intellectually stimulating and interesting, does not always map to fact. > There's a step, where you rigorously research whether your theories are > correct. > > but also it is all ethical to me as well : if my family was murdered by a >> fucker i wouldnt go and use that fuckers infrastructure cause they made it >> for me to use and sent some other fuckers around the globe selling it cause >> like the fucker murdered my family i wont support them in any way ever >> ....why would i talk myself into supporting the murderer of my family when >> i could think about, invent or utilize other methods - its just really not >> logical >> > This is an emotional argument, not a logical one. To continue the appeal > to emotion, isn't it vaguely poetic? Using alternative methods are fine, > but the existence of alternatives does not justify demonizing other > approaches. > > >> >> >> >> On Wed, Aug 5, 2015 at 9:19 PM, Travis Biehn wrote: >> >>> Yes, just get a new DHCP lease - rock solid. >>> >>> This is actually pretty easy; First read the protocol spec then read the >>> code. >>> >>> If there is a backdoor or vulnerability, please let everyone know. >>> >>> If you can do away with evils like centralized directory servers while >>> retaining sybill resistance please publish your ideas. >>> >>> If your arguments are that the project is intrinsically evil, by virtue >>> of the authors being tainted with 'reptilian money' - that's not really a >>> technically robust. >>> >>> -Travis >>> >>> On Wed, Aug 5, 2015, 9:24 AM Cari Machet wrote: >>> >>>> i think there could be solutions utilized like easily shifting the ip >>>> address of comp and router yourself in your own little hut > 'ghost' it but >>>> not thru others .... pretty fucking simple i know but maybe effective in a >>>> really different way than having the fake government of the US build >>>> something and use people that are activists against them to make it work >>>> also i think the infrastructure is too bulky >>>> >>>> i like to think about satelites (and thats all i will say about that) - >>>> i dont know i would have to have a real think about solutions it is very >>>> important to think about it and not just the problem for sure but i dont >>>> think the methodology of tor is a solution i think it is a stoppage point >>>> that people are not seeing beyond ... people dont think it has been >>>> penetrated and i have no proof of that but maybe that isnt the main problem >>>> for me ... structurally speaking it is a disaster ... the masses being >>>> handed a tool in order to subvert the government??? as they say you cant >>>> make this shit up >>>> >>>> i know that when i was in syria i could get a fucking video call in the >>>> desert where there was nothing ... this was syria not a rich country per >>>> say like at all so i think the choking of the communication system is super >>>> in play ... if others dont think thats a problem then they need to educate >>>> themselves ... do people that live in the US on this list even know that >>>> the infrastructure of fiber optics that underlies the communications may >>>> not even be utilized in their city and that the reason it is not used is >>>> because the communication companies bought a contract with there city that >>>> freezes it all up? please look into the chatanooga model if you dont know >>>> about this 'freemarket' bullshit>>>> also fyi iraq had video calls >>>> nationwide in 2000 or even before ... now i am not sure what tech they were >>>> using i think radiowaves and shooting the signal over land that way but it >>>> all points to a tremendous shut down of functionality .... not that it was >>>> probably all that healthy for people but... >>>> >>>> sure we can write each other little words on this frame of >>>> communications but see what happens when attempting to shift in a large way >>>> ... like when they printed the 3d gun... people had to git fr USA & like >>>> when barrett made project pm and this is a major reason i think there >>>> should be as many solutions as possible not just one - not as easy for >>>> gov/corp to take them out >>>> >>>> On Wed, Aug 5, 2015 at 11:15 AM, Juan wrote: >>>> >>>>> On Tue, 4 Aug 2015 22:36:00 -0700 >>>>> coderman wrote: >>>>> >>>>> > On 8/3/15, Juan wrote: >>>>> > > ... >>>>> > > http://www.onion-router.net/History.html >>>>> > > 1995: >>>>> > > Initial work on Onion Routing begins, funded by ONR. >>>>> > >>>>> > back in this day, fully saturated ISDN pairs made for great zero >>>>> > knowledge overlays, too. >>>>> > >>>>> > the real question is, what do you propose to do better? >>>>> >>>>> >>>>> what I was getting at is that, if I'm not mistaken, syverson >>>>> and co. claim to have 'invented' 'onion routing' >>>>> >>>>> but they didn't come up with the ideas and didn't even come up >>>>> with the name apparently >>>>> >>>>> >>>>> > >>>>> > >>>>> > if TCP Tor is just a jump toward datagram traffic analysis resistant >>>>> > overlays, how little it matters what origins for this open source", >>>>> > distributed, public infrastructure? >>>>> > >>>>> >>>>> do you consider your governemnt to be a 'repressive regime' >>>>> coderman? >>>>> >>>>> does tor protect people from your goverment's attacks? >>>>> >>>>> do you think tor helps the US government in any way? >>>>> >>>>> >>>>> do you think it's 'hypotetically' acceptable to murder say a >>>>> 100 >>>>> people so that 1 million people can 'anonymously' browse >>>>> their newspaper or favorite sports website? >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> > cooperation is the future. learn to do it least badly :P >>>>> > >>>>> > >>>>> > best regards, >>>>> >>>>> >>>> >>>> >>>> -- >>>> Cari Machet >>>> NYC 646-436-7795 >>>> carimachet at gmail.com >>>> AIM carismachet >>>> Syria +963-099 277 3243 >>>> Amman +962 077 636 9407 >>>> Berlin +49 152 11779219 >>>> Reykjavik +354 894 8650 >>>> Twitter: @carimachet >>>> >>>> 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 >>>> >>>> Ruh-roh, this is now necessary: This email is intended only for the >>>> addressee(s) and may contain confidential information. If you are not >>>> the >>>> intended recipient, you are hereby notified that any use of this >>>> information, dissemination, distribution, or copying of this email >>>> without >>>> permission is strictly prohibited. >>>> >>>> >>>> >> >> >> -- >> Cari Machet >> NYC 646-436-7795 >> carimachet at gmail.com >> AIM carismachet >> Syria +963-099 277 3243 >> Amman +962 077 636 9407 >> Berlin +49 152 11779219 >> Reykjavik +354 894 8650 >> Twitter: @carimachet >> >> 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 >> >> Ruh-roh, this is now necessary: This email is intended only for the >> addressee(s) and may contain confidential information. If you are not the >> intended recipient, you are hereby notified that any use of this >> information, dissemination, distribution, or copying of this email >> without >> permission is strictly prohibited. >> >> >> > > > -- > Twitter > > | LinkedIn > > | GitHub > > | TravisBiehn.com | Google Plus > > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 17766 bytes Desc: not available URL: From odinn.cyberguerrilla at riseup.net Thu Aug 6 04:50:30 2015 From: odinn.cyberguerrilla at riseup.net (odinn) Date: Thu, 06 Aug 2015 04:50:30 -0700 Subject: =?UTF-8?B?V29ybGTigJlzIEZpcnN0IOKAmFRydWx5IEFub255bW91c+KAmSA=?= =?UTF-8?B?Q3J5cHRvIEV4Y2hhbmdlIExhdW5jaGVzIG9uIEkyUA==?= In-Reply-To: References: Message-ID: <55C34A06.4080603@riseup.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Regarding decentralized exchanges, there are many... ExchangeD.I2P - - as described at http://cryptonewsday.com/worlds-first-truly-anonymous-crypto-exchange-la unches-on-i2p/ https://bitsquare.io/ http://mercuryex.com/ One could also add into that, because of its characteristics, openbazaar, which can be used for almost anything: https://openbazaar.org/ But before these came to be there were others: http://www.cloakcoin.com/ ~ providing OneMarket - as shown at https://bitcointalk.org/index.php?topic=637704.0 BitXBay https://github.com/bitxbay/BitXBay http://willmartin.com/the-worlds-first-documented-sale-on-a-decentralize d-online-marketplace-my-book/ NightTrader http://nighttrader.org/ “an encrypted messaging system which creates a totally new system of client networks, which allows them to communicate without the use of centralized servers,” and presents by way of its Market tab, “a decentralized exchange/trading floor implemented in all Halo clients (BlackHalo and BitHalo). BlackHalo http://blackhalo.info/ “a smart contracting client which eliminates the middle man, or the trust you have to put in total stranger when doing transactions,” which presents the option of “micro-trading,” intended to “allow…parties to structure their trust in increments,” with other features. I am certain this is just a partial list of decentralized, distributed exchanges or markets. On 08/05/2015 10:08 AM, Seth wrote: > On Wed, 05 Aug 2015 02:02:13 -0700, grarpamp > wrote: > >> Not quite the first that looks like a typical 'exchange', but the >> most substantial by far. This one's been known widely for 2mo and >> spoken for a year. And markets and boards exist in the past and >> present. It's necessarily closed system, and unnecessarily >> centralized. Have fun. > > Only decentralized exchanges I have found so far are > https://bitsquare.io/ and http://mercuryex.com/. To the best of my > knowledge neither utilize an onion or garlic routing network to > connect nodes. > > Agree that 'necessarily closed system, and unnecessarily > centralized' are undesirable traits of ExchangeD.i2p. > > Ideal would be decentralized exchange platforms such as the > Bitsquare are Mercury running using I2P as network transport. > - -- http://abis.io ~ "a protocol concept to enable decentralization and expansion of a giving economy, and a new social good" https://keybase.io/odinn -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJVw0oFAAoJEGxwq/inSG8CiZkH/1rMDdXXm3CEe4XIDqac+0Jt WBiNdiO7iXHV2F4jpHkEi+WNCcHVhXqF5DpdsUdPOJy1Ti08WR7BqLnkLr+Di3OF iYz/qC6nHyqBP4utM6IKomnpAXSs58Nb0WtwwKOPg8HjfF1z22nzAJRISOUSqwlH 3X82F36lj9des+1z39+WCay5GYeF/JxD4IBjNaMu8+s5/GUyhA99anZ9+FuYLLCS GDkPbfPQ0ymvMepmz62fXq/6VPhItMSVD+kfMBok8MXUP4E7rcRjg8cSgHoSAhsF n58B5oM2PHatOw7mM6r5j4BbTKcfp6I0/w7GQs9xcznjLuSwxQDQEyFJmL0AVe4= =Eibw -----END PGP SIGNATURE----- From carimachet at gmail.com Wed Aug 5 19:36:53 2015 From: carimachet at gmail.com (Cari Machet) Date: Thu, 6 Aug 2015 05:36:53 +0300 Subject: so called onion routing In-Reply-To: <55C273C8.3020902@riseup.net> References: <55bff8f5.a85c8c0a.926e1.ffffce20@mx.google.com> <55c1c5c7.042c8c0a.6f6b9.615c@mx.google.com> <55C273C8.3020902@riseup.net> Message-ID: did i say anything about owners or operators??? ... c'mon stop trying to catch me at being an idiot its reverb is low sound wave quality - i am massively sure i am not the smartest person ever but i aint really stupid k? yay in syria and lotsa other places you gotta give ur passport to get a sim ... not all places though ...spain could give a fuck who you are On Wed, Aug 5, 2015 at 4:14 AM, Paul Lambert wrote: > > > > Interesting … the ISO NLSP-C did not call it’self an ‘opinion’, but about > 1993 it supported multiple tunnel encapsulations that could be used for > anonymity services ( https://goo.gl/CG9Koc ). It was derived from the 89 > vintage NSA defined SP3-C protocol ( http://goo.gl/QEp67F ). paul i love it 'Traffic Flow Confidentiality is a service provided by either mode of NLSP to deter traffic flow analysis. The benefits of this feature have long been known by the military community' hahhahhahahhahaha ....peeling the layers back of the onion http://kernelmag.dailydot.com/issue-sections/headline-story/9895/jeremy-hammond-fbi-surveillance-bust/ 'That was enough for a judge to grant the FBI a warrant and permission to > secretly install what’s known as a pen/trap device, which allowed for the > monitoring of Hammond’s Internet activity at the end of February 2012. > That, coupled with the physical surveillance, allowed the agency to see > when he was home. What they found correlated with his Tor usage...' ++++++++++++++ just found this cute little mitish qatarian hack http://www.theregister.co.uk/2015/07/29/mit_boffins_identify_tor_hidden_services_with_88_per_cent_accuracy/ just found this cute little mitish qatarian hack The boffins showed that "simply by looking for patterns in the number of > packets passing in each direction through a guard, machine-learning > algorithms could, with 99 per cent accuracy, determine whether the circuit > was an ordinary Web-browsing circuit, an introduction-point circuit or a > rendezvous-point circuit." > They were able to do this through simple traffic correlation, which is > available even when the traffic is encrypted. > Furthermore, by using a Tor-enabled computer to connect to a range of > different hidden services, they showed that a similar analysis of traffic > patterns could identify those services with 88 per cent accuracy. That > means that an adversary who lucked into the position of guard for a > computer hosting a hidden service, could, with 88 per cent certainty, > identify it as the service’s host. On Wed, Aug 5, 2015 at 11:36 PM, Razer wrote: > > > On Wed, Aug 5, 2015, 9:24 AM Cari Machet wrote: > > i like to think about satelites > > You don't trust tor but DO trust the satellite owners and operators? > > > i know that when i was in syria i could get a fucking video call in > > the desert where there was nothing > > ...and the NRO was logging it, as they say in Southern California, > 'fershure!'.\ > > RR > > > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7396 bytes Desc: not available URL: From carimachet at gmail.com Wed Aug 5 19:43:20 2015 From: carimachet at gmail.com (Cari Machet) Date: Thu, 6 Aug 2015 05:43:20 +0300 Subject: FOIA/PA In-Reply-To: References: <1220736922.653375.1438804429546.JavaMail.yahoo@mail.yahoo.com> Message-ID: thanks for your hard work ... On Thu, Aug 6, 2015 at 1:26 AM, coderman wrote: > On 8/5/15, jim bell wrote: > > I never saw this appeal, as I recall, done by the same corrupt attorney > as > > who later mishandled one of the appeals in 2001-2002. > > this whole slew of motions is odd in the extreme. pulling all docs > from every case; will see if that provides a better picture in larger > context. (it may take me a few days...) > > > best regards, > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1998 bytes Desc: not available URL: From carimachet at gmail.com Wed Aug 5 20:00:43 2015 From: carimachet at gmail.com (Cari Machet) Date: Thu, 6 Aug 2015 06:00:43 +0300 Subject: echelon/who was i fighting with on here about the intercepts stupidity? Message-ID: http://www.theregister.co.uk/2015/08/03/gchq_duncan_campbell/ *Update: Since this piece was published the Intercept have been in touch to > say that it is "deceptive" of the Register to suggest that this is a "joint > publication". We're very happy to confirm that there has never been any > editorial collaboration between the Register and the Intercept.* -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1905 bytes Desc: not available URL: From list at sysfu.com Thu Aug 6 07:14:00 2015 From: list at sysfu.com (Seth) Date: Thu, 06 Aug 2015 07:14:00 -0700 Subject: WikiLeaks bounties for TPP, bountied for ICWATCH In-Reply-To: References: Message-ID: On Tue, 23 Jun 2015 21:03:39 -0700, grarpamp wrote: > https://wikileaks.org/Murderous-spooks-drive-journalism.html - "I promise that I will kill everyone involved in your website. There is nowhere on this earth that you will be able to hide from me." That's a death threat ICWatch says was sent from a US intelligence analyst in Washington DC to the project on May 13. Oh dear, the butt-hurt emanating from Periplaneta americana (intelligence analysts) when the light shines on them is just heartbreaking. From coderman at gmail.com Thu Aug 6 09:15:33 2015 From: coderman at gmail.com (coderman) Date: Thu, 6 Aug 2015 09:15:33 -0700 Subject: WikiLeaks bounties for TPP, bountied for ICWATCH In-Reply-To: References: Message-ID: On 8/6/15, Seth wrote: > On Tue, 23 Jun 2015 21:03:39 -0700, grarpamp wrote: > >> https://wikileaks.org/Murderous-spooks-drive-journalism.html > > - "I promise that I will kill everyone involved in your website. There is > nowhere on this earth that you will be able to hide from me." > > That's a death threat ICWatch says was sent from a US intelligence analyst > in Washington DC to the project on May 13. i also recall amusingly the "Snowden Assasination" plots full of absurd vengeance, """ "In a world where I would not be restricted from killing an American, I personally would go and kill him myself," a current NSA analyst told BuzzFeed. "A lot of people share this sentiment." A former U.S. Special Forces officer told Johnson that he "would love to put a bullet in his head," adding the assertion that Snowden "is single handedly the greatest traitor in American history." Buzzfeed notes that nobody expects the U.S. government to act on such fantasies. Nevertheless, the hypothetical assassination of the NSA-trained hacker is quite detailed: “I think if we had the chance, we would end it very quickly,” [an Army intelligence officer] said. “Just casually walking on the streets of Moscow, coming back from buying his groceries. Going back to his flat and he is casually poked by a passerby. He thinks nothing of it at the time starts to feel a little woozy and thinks it’s a parasite from the local water. He goes home very innocently and next thing you know he dies in the shower.” http://www.businessinsider.com/us-spies-talk-about-killing-snowden-2014-1 """ fortunately, Snowden continues unabated... :P From jdb10987 at yahoo.com Sat Aug 8 12:25:26 2015 From: jdb10987 at yahoo.com (jim bell) Date: Sat, 8 Aug 2015 19:25:26 +0000 (UTC) Subject: Death lists. Message-ID: <922551362.1261751.1439061926111.JavaMail.yahoo@mail.yahoo.com> http://news.yahoo.com/rush-put-death-records-online-lets-anyone-killed-074408319.html Las Vegas (AFP) - Hackers at an infamous annual Def Con gathering in Las Vegas got schooled in how to be online killers.A rush to go digital with the process of registering deaths has made it simple for maliciously minded folks to have someone who is alive declared dead by the authorities."This is a global problem," Australian computer security specialist Chris Rock said as he launched a presentation titled "I Will Kill You."The process of having someone officially stamped dead by getting a death certificate issued typically involves a doctor filling out one form and a funeral home filling out another, according to Rock's research.Once forms are submitted online, certificates declaring the listed person legally dead are generated.A fatal flaw in the system is that people can easily pose as real doctors and funeral directors, Rock demonstrated to a rapt audience.Doctors practising general medicine often don't bother setting up accounts at online portals for filling out information for death certificates.An aspiring online assassin can step into that void, and borrow the identity of a doctor.Setting up accounts requires a doctor's name, address, and medical license number. A basic Internet search will turn up that information, which is publicly available for the well-intended purpose of letting people check that physicians are legitimate before seeking care.Drop down boxes containing illness categories and online guides are available for filling in "doctor speak" on forms and avoiding medical causes or circumstances that might trigger needs for autopsies or investigations, Rock's demonstration showed.- No one off limits -Borrowing a funeral director's identity to establish an online account for death certificate purposes was shown to be simple as well. Required information about legitimate funeral directors is posted on the Internet, and one could even claim to work at a funeral home.In Rock's case, he made a website for a bogus funeral home and used that to back his application for an account as director. He got an automated call days later saying he was approved.With both online accounts in place, deaths can be registered in the real world."You could kill anyone you want," Rock told AFP after the presentation. "No one is off limits."A humor-infused list of scenarios included killing oneself off to get life insurance cash or going after others for vengeance.Someone targeted might not even know they were declared dead until doing something official like trying to renew a passport or driving license.Rock began digging into the death industry a year ago after an Australian hospital accidentally declared 200 patients dead.- Virtual babies -Getting birth certificates for virtual babies was demonstrated to be even easier than killing off people in the digital world, because registering births online only involves doctors and parents."Once you log on as a doctor, not only can you kill someone, you can actually birth someone," Rock said.Given the time it takes for even a make-believe baby to grow into adulthood, he saw that as more tempting to crime gangs who could invest in the future by creating legions of virtual people for shady doings involving loans, stock trading, imports or other activities."You could even make fake identities for your children, so when they grow up they have burner identities," Rock said.He dove into virtual birth and death in his book titled "The Baby Harvest: How virtual babies become the future of terrorist financing and money laundering." -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 11097 bytes Desc: not available URL: From coderman at gmail.com Sat Aug 8 20:23:07 2015 From: coderman at gmail.com (coderman) Date: Sat, 8 Aug 2015 20:23:07 -0700 Subject: Death lists. In-Reply-To: References: Message-ID: On 8/8/15, wirelesswarrior at safe-mail.net wrote: > Damn, > > I wanted to attend but they scheduled my Wireless Village talk at 4:00, > almost the same time as Chris. If anyone here attended I'd love to hear some > comments. > > WW I Will Kill You, WW! and tell cypherpunks all about it. best regards, [ this is a poor joke, explaining that all you need to know is above, and time to try yourself... ] From wirelesswarrior at safe-mail.net Sat Aug 8 20:15:39 2015 From: wirelesswarrior at safe-mail.net (wirelesswarrior at safe-mail.net) Date: Sat, 8 Aug 2015 23:15:39 -0400 Subject: Death lists. Message-ID: Damn, I wanted to attend but they scheduled my Wireless Village talk at 4:00, almost the same time as Chris. If anyone here attended I'd love to hear some comments. WW > > http://news.yahoo.com/rush-put-death-records-online-lets-anyone-killed-074408319.html > Las Vegas (AFP) - Hackers at an infamous annual Def Con gathering in Las Vegas got schooled in how to be online killers. > > > > A rush to go digital with the process of registering deaths has made it simple for maliciously minded folks to have someone who is alive declared dead by the authorities. > "This is a global problem," Australian computer security specialist Chris Rock said as he launched a presentation titled "I Will Kill You." > The process of having someone officially stamped dead by getting a death certificate issued typically involves a doctor filling out one form and a funeral home filling out another, according to Rock's research. > Once forms are submitted online, certificates declaring the listed person legally dead are generated. > A fatal flaw in the system is that people can easily pose as real doctors and funeral directors, Rock demonstrated to a rapt audience. > Doctors practising general medicine often don't bother setting up accounts at online portals for filling out information for death certificates. > An aspiring online assassin can step into that void, and borrow the identity of a doctor. > Setting up accounts requires a doctor's name, address, and medical license number. A basic Internet search will turn up that information, which is publicly available for the well-intended purpose of letting people check that physicians are legitimate before seeking care. > Drop down boxes containing illness categories and online guides are available for filling in "doctor speak" on forms and avoiding medical causes or circumstances that might trigger needs for autopsies or investigations, Rock's demonstration showed. > > - No one off limits - > > Borrowing a funeral director's identity to establish an online account for death certificate purposes was shown to be simple as well. Required information about legitimate funeral directors is posted on the Internet, and one could even claim to work at a funeral home. > In Rock's case, he made a website for a bogus funeral home and used that to back his application for an account as director. He got an automated call days later saying he was approved. > With both online accounts in place, deaths can be registered in the real world. > "You could kill anyone you want," Rock told AFP after the presentation. "No one is off limits." > A humor-infused list of scenarios included killing oneself off to get life insurance cash or going after others for vengeance. > Someone targeted might not even know they were declared dead until doing something official like trying to renew a passport or driving license. > Rock began digging into the death industry a year ago after an Australian hospital accidentally declared 200 patients dead. > > - Virtual babies - > > Getting birth certificates for virtual babies was demonstrated to be even easier than killing off people in the digital world, because registering births online only involves doctors and parents. > "Once you log on as a doctor, not only can you kill someone, you can actually birth someone," Rock said. > Given the time it takes for even a make-believe baby to grow into adulthood, he saw that as more tempting to crime gangs who could invest in the future by creating legions of virtual people for shady doings involving loans, stock trading, imports or other activities. > "You could even make fake identities for your children, so when they grow up they have burner identities," Rock said. > He dove into virtual birth and death in his book titled "The Baby Harvest: How virtual babies become the future of terrorist financing and money laundering." > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 11265 bytes Desc: not available URL: From grarpamp at gmail.com Sat Aug 8 22:05:25 2015 From: grarpamp at gmail.com (grarpamp) Date: Sun, 9 Aug 2015 01:05:25 -0400 Subject: Death lists. In-Reply-To: References: Message-ID: On Sat, Aug 8, 2015 at 11:23 PM, coderman wrote: > I Will Kill You, WW! So where's the portal to unkill the killed, and kill the unkilled, and... Fuck that, my brain hurts, ima go kill myself. From wirelesswarrior at safe-mail.net Sun Aug 9 00:27:19 2015 From: wirelesswarrior at safe-mail.net (wirelesswarrior at safe-mail.net) Date: Sun, 9 Aug 2015 03:27:19 -0400 Subject: P25 Message-ID: Speaking of these devices... http://wiki.spench.net/wiki/Gr-baz#op25 WW From carimachet at gmail.com Sat Aug 8 18:15:35 2015 From: carimachet at gmail.com (Cari Machet) Date: Sun, 9 Aug 2015 04:15:35 +0300 Subject: anybody know what came of t-fish cult of the dead cows work? Message-ID: we are legion - https://youtu.be/bC1ex2zRCYA?t=8m53s some dude that was part of lopht -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1321 bytes Desc: not available URL: From juan.g71 at gmail.com Sun Aug 9 14:14:09 2015 From: juan.g71 at gmail.com (Juan) Date: Sun, 9 Aug 2015 18:14:09 -0300 Subject: simple chat Message-ID: <55c7c213.83938c0a.771c0.1e74@mx.google.com> does anybody know a simple application with these features? 1) 'group chat' for a 'few' people - say, no more than 10 2) uses symmetric encryption (users already shared the key) 3) application uses a server for people to learn each other's addresses, but after the address exchange, the messages are sent p2p (maybe something based off IRC?) From juan.g71 at gmail.com Sun Aug 9 15:43:47 2015 From: juan.g71 at gmail.com (Juan) Date: Sun, 9 Aug 2015 19:43:47 -0300 Subject: simple chat In-Reply-To: <1686326.3Wz3qVsJfh@lapuntu> References: <55c7c213.83938c0a.771c0.1e74@mx.google.com> <1686326.3Wz3qVsJfh@lapuntu> Message-ID: <55c7d715.032a370a.1e28c.258f@mx.google.com> On Mon, 10 Aug 2015 00:13:06 +0200 rysiek wrote: > Dnia niedziela, 9 sierpnia 2015 18:14:09 Juan pisze: > > does anybody know a simple application with these features? > > > > > > 1) 'group chat' for a 'few' people - say, no more than 10 > > > > 2) uses symmetric encryption (users already shared the key) > > > > 3) application uses a server for people to learn each other's > > addresses, but after the address exchange, the messages are sent p2p > > Tox: > https://tox.chat/ > > It does not support symmetric encryption (everything is encrypted > with public key crypto), but if you have a pre-shared secret, you can > use some other channel (say, e-mail with contents encrypted > symmetrically) to share ToxIDs. Then, add people to a Groupchat and > you're good to go. > Thanks rysiek! Will check it out. (not sure if it belongs in the 'simple' category though...) From juan.g71 at gmail.com Sun Aug 9 16:10:18 2015 From: juan.g71 at gmail.com (Juan) Date: Sun, 9 Aug 2015 20:10:18 -0300 Subject: simple chat In-Reply-To: <2563884.2CE0uAkJAY@lapuntu> References: <55c7c213.83938c0a.771c0.1e74@mx.google.com> <1686326.3Wz3qVsJfh@lapuntu> <55c7d715.032a370a.1e28c.258f@mx.google.com> <2563884.2CE0uAkJAY@lapuntu> Message-ID: <55c7dd4c.c5808c0a.c94d2.219c@mx.google.com> On Mon, 10 Aug 2015 00:56:22 +0200 rysiek wrote: > > > https://tox.chat/ > > > > > > It does not support symmetric encryption (everything is encrypted > > > with public key crypto), but if you have a pre-shared secret, you > > > can use some other channel (say, e-mail with contents encrypted > > > symmetrically) to share ToxIDs. Then, add people to a Groupchat > > > and you're good to go. > > > > Thanks rysiek! Will check it out. > > > > (not sure if it belongs in the 'simple' category though...) > > Well, no need to set up any accounts, and it "just works" from my > experience. Haven't seen a simpler IM/chat. :) > Yes, sorry, by simple I didn't necessarily mean 'user friendly' - what I had in mind was a simple system, simple protocol, no bloatware, etc. Well, at least tox is not written in python =) - anyway, going to compile it and see if it requires 1GB of libraries or somethng lke that =P But it does look interesing. > But do test for yourself! > From rysiek at hackerspace.pl Sun Aug 9 15:13:06 2015 From: rysiek at hackerspace.pl (rysiek) Date: Mon, 10 Aug 2015 00:13:06 +0200 Subject: simple chat In-Reply-To: <55c7c213.83938c0a.771c0.1e74@mx.google.com> References: <55c7c213.83938c0a.771c0.1e74@mx.google.com> Message-ID: <1686326.3Wz3qVsJfh@lapuntu> Dnia niedziela, 9 sierpnia 2015 18:14:09 Juan pisze: > does anybody know a simple application with these features? > > > 1) 'group chat' for a 'few' people - say, no more than 10 > > 2) uses symmetric encryption (users already shared the key) > > 3) application uses a server for people to learn each other's addresses, > but after the address exchange, the messages are sent p2p Tox: https://tox.chat/ It does not support symmetric encryption (everything is encrypted with public key crypto), but if you have a pre-shared secret, you can use some other channel (say, e-mail with contents encrypted symmetrically) to share ToxIDs. Then, add people to a Groupchat and you're good to go. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From rysiek at hackerspace.pl Sun Aug 9 15:56:22 2015 From: rysiek at hackerspace.pl (rysiek) Date: Mon, 10 Aug 2015 00:56:22 +0200 Subject: simple chat In-Reply-To: <55c7d715.032a370a.1e28c.258f@mx.google.com> References: <55c7c213.83938c0a.771c0.1e74@mx.google.com> <1686326.3Wz3qVsJfh@lapuntu> <55c7d715.032a370a.1e28c.258f@mx.google.com> Message-ID: <2563884.2CE0uAkJAY@lapuntu> Dnia niedziela, 9 sierpnia 2015 19:43:47 Juan pisze: > On Mon, 10 Aug 2015 00:13:06 +0200 > > rysiek wrote: > > Dnia niedziela, 9 sierpnia 2015 18:14:09 Juan pisze: > > > does anybody know a simple application with these features? > > > > > > > > > 1) 'group chat' for a 'few' people - say, no more than 10 > > > > > > 2) uses symmetric encryption (users already shared the key) > > > > > > 3) application uses a server for people to learn each other's > > > addresses, but after the address exchange, the messages are sent p2p > > > > Tox: > > https://tox.chat/ > > > > It does not support symmetric encryption (everything is encrypted > > with public key crypto), but if you have a pre-shared secret, you can > > use some other channel (say, e-mail with contents encrypted > > symmetrically) to share ToxIDs. Then, add people to a Groupchat and > > you're good to go. > > Thanks rysiek! Will check it out. > > (not sure if it belongs in the 'simple' category though...) Well, no need to set up any accounts, and it "just works" from my experience. Haven't seen a simpler IM/chat. :) But do test for yourself! -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From Rayzer at riseup.net Tue Aug 11 09:34:09 2015 From: Rayzer at riseup.net (Razer) Date: Tue, 11 Aug 2015 09:34:09 -0700 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> Message-ID: <55CA2401.9070402@riseup.net> On 08/11/2015 02:25 AM, Cari Machet quoted Razer and attributed it to rysiek: > > I'm still considering sending encrypted pics of lulzcats with every > > mundane email I send to force the NSA to store it for 'perpetuity'. Just sayin'... RR -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 819 bytes Desc: OpenPGP digital signature URL: From carimachet at gmail.com Tue Aug 11 02:25:52 2015 From: carimachet at gmail.com (Cari Machet) Date: Tue, 11 Aug 2015 12:25:52 +0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <19407322.87nTAoSQ5D@lapuntu> References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> Message-ID: so what do we know about the fucking iris scans and where the fucking data is stored on that are federal judges subjected to iris scans? On Jul 2, 2015 12:55 PM, "rysiek" wrote: > Dnia poniedziałek, 29 czerwca 2015 13:03:42 Razer pisze: > > On 06/28/2015 10:57 AM, rysiek wrote: > > > But maybe we can find ways to raise the cost of surveillance? > > > > I'm still considering sending encrypted pics of lulzcats with every > > mundane email I send to force the NSA to store it for 'perpetuity'. > > Hah, good call. > > > "and if 50 people a day walked in, sang a bar of Alice's Restaurant, and > > walked out, they MIGHT think it was a movement" ~Arlo Guthrie > > +1 :) > > -- > Pozdrawiam, > Michał "rysiek" Woźniak > > Zmieniam klucz GPG :: http://rys.io/pl/147 > GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1334 bytes Desc: not available URL: From loki at obscura.com Tue Aug 11 13:07:54 2015 From: loki at obscura.com (Lance Cottrell) Date: Tue, 11 Aug 2015 13:07:54 -0700 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> Message-ID: David would argue that the power elites will never allow themselves to be blinded, so that is not really one of our options. We can choose to watch back or not, and he would suggest that we should do so. There is some merit to the argument. Lance -- Lance Cottrell loki at obscura.com > On Aug 11, 2015, at 12:49 PM, Sean Lynch wrote: > > So what do people think of David Brin's "transparent society" approach to this problem? We can't completely stop ourselves from being watched, but we can make use of all this technology ourselves. Police have ALPRs and dashcams and bodycams, but by and large they have actually resisted expansions of their own surveillance because they want the flexibility to be able to make up justifications after the fact. Phone cams have for the most part taken that choice away from them. The result seems likely to be less police abuse than at any point since at least the early 20th century in the US. > > Even Snowden's leaks were enabled by very similar technologies to what the NSA deploys against us. > > Is there any reason to believe that, overall, technology will benefit governments more than it does individuals? -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3029 bytes Desc: not available URL: From Rayzer at riseup.net Tue Aug 11 13:37:27 2015 From: Rayzer at riseup.net (Razer) Date: Tue, 11 Aug 2015 13:37:27 -0700 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> Message-ID: <55CA5D07.6060604@riseup.net> On 08/11/2015 12:49 PM, Sean Lynch wrote: > So what do people think of David Brin's "transparent society" approach > to this problem? We can't completely stop ourselves from being > watched, but we can make use of all this technology ourselves. Police > have ALPRs and dashcams and bodycams, but by and large they have > actually resisted expansions of their own surveillance because they > want the flexibility to be able to make up justifications after the > fact. Phone cams have for the most part taken that choice away from > them. The result seems likely to be less police abuse than at any > point since at least the early 20th century in the US. > > Even Snowden's leaks were enabled by very similar technologies to what > the NSA deploys against us. > > Is there any reason to believe that, overall, technology will benefit > governments more than it does individuals? The government gets 'first shot' at it because they finance and 'oversee' the development of the technology. They have the advantage. In the case of bodycams on cops, one state is already making it more difficult for defense lawyers to use the footage, and in the long run the states MAY start developng laws that limit civilians from photo or video documenting police 'activities' because 'the police are documenting themselves' and you, PROLE, are interfering with their operations. > "They've got the guns but we've got the numbers. Gonna win, gonna take > it over c'mon!" -Jim Morrison, Five to One RR -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 819 bytes Desc: OpenPGP digital signature URL: From wirelesswarrior at safe-mail.net Tue Aug 11 11:53:02 2015 From: wirelesswarrior at safe-mail.net (wirelesswarrior at safe-mail.net) Date: Tue, 11 Aug 2015 14:53:02 -0400 Subject: Stealth aircraft Message-ID: Fellow Droogs, Long ago I wondered but never spent time to find out how this military magic worked. While doings some RF research recently I fell upon a key tech: http://scholar.google.com.secure.sci-hub.org/scholar?q=stealth+plasma+aircraft&btnG=&hl=en&as_sdt=0%2C5 Enjoy! WW From drwho at virtadpt.net Tue Aug 11 15:49:12 2015 From: drwho at virtadpt.net (The Doctor) Date: Tue, 11 Aug 2015 15:49:12 -0700 Subject: Death lists. In-Reply-To: References: Message-ID: <55CA7BE8.9020908@virtadpt.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 08/08/2015 08:15 PM, wirelesswarrior at safe-mail.net wrote: > I wanted to attend but they scheduled my Wireless Village talk at > 4:00, almost the same time as Chris. If anyone here attended I'd > love to hear some comments. It was hilarious, informative, and frightening. Many notes were taken. The proof-of-concept demonstrating the technique drove the point home. And all the information necessary to pull this off is trivially googleable because local laws require that it all be freely available online. - -- The Doctor [412/724/301/703/415] [ZS] PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ "We are arming the chicken cannon!" --Adam Savage -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJVynvjAAoJED1np1pUQ8RkQXsP/1FxbGrNafmXb92Wg14y1w3p t68VkZK7NMks4lbgKJzIlSZ+m40aTh5xn1auLcLv0Kjsuza9VP4jtFYMghvG2Obh mVY3ntHET8iZf0ygWLSA1GHaK0rzXTkbfPR8zqiwSnIicL+/2kc89VAVpwkrqaCf N/7KQj0xL21fBkD9IM9nQQDOqKhjWnuq5vqcvAshIa94GBEAsYyVyU5J4Tfy6Uk5 MmGBMU4bBPnwr8GCJ47a3YIACqBRlKZi7O1cpu33D/dvcx6ki3gbhR7JjOFVX91h kJnLcJ7SS2Z4jjBEFNY+7INEt61NGTjdqFmHPMxFgMDeGT44CFuXXfu2SXhGdGSk adFQnupAyqcHERp4Pu+5igWxt3thAgoU7ozWJ7Rv4xwR/j9907fP6hOPDid9PJNh YSdDSAynyqUR0+rM7anl9pb/A737Vo4owN7viGJND3qcyoJqJlGToBRlwY9JmEG2 WzwDtNiMGgKZFEwkHIVBQ45w0LC60C/K1CLzbwB71O5ljOki1X5iLrNKMowISJTN ME2yIdtw+btmKlvV6hb0SXmQ7BXvDSU3lTU3co/14vHevyLbuIRceaVm7cpbeRXX zvwkhoW8zCEzchZjC4fP2TyoLa71TMOCjAyuBy8JI+bLx78BgmetbpCKpXEZX6xo OYcVQxe5+KwNsK9pKWOM =jpYp -----END PGP SIGNATURE----- From drwho at virtadpt.net Tue Aug 11 15:50:42 2015 From: drwho at virtadpt.net (The Doctor) Date: Tue, 11 Aug 2015 15:50:42 -0700 Subject: simple chat In-Reply-To: <2563884.2CE0uAkJAY@lapuntu> References: <55c7c213.83938c0a.771c0.1e74@mx.google.com> <1686326.3Wz3qVsJfh@lapuntu> <55c7d715.032a370a.1e28c.258f@mx.google.com> <2563884.2CE0uAkJAY@lapuntu> Message-ID: <55CA7C42.9080509@virtadpt.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 08/09/2015 03:56 PM, rysiek wrote: > Well, no need to set up any accounts, and it "just works" from my > experience. Haven't seen a simpler IM/chat. :) I've gotten some serious Skype users to jump ship for Tox. It's pretty sweet. - -- The Doctor [412/724/301/703/415] [ZS] PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ "We are arming the chicken cannon!" --Adam Savage -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJVynxCAAoJED1np1pUQ8RkK7EP/0qDFXsjbhHNTjcEnLVfVqtt tLUvxxELmCvFp2iNVOMif1FkYdsjbZiFM3OhOIl4BkzZKCcokM7DK2mzNFbrfe6O fodMSGl5J/ljbWmZoKK0lZ2DobnvZ3c4f7+k2A1YxXyMzFsn1wY2PrzMYfO4UzwO GbcYDXmFJID9RrMaHmDlkfswJcWp1LMOvsbQQLfoYC4X1VXZv/rhcemKRDqxNKEH E/mIrj+J4SYz8+5b2HX1uZbH5QaiwhO8rajHjZZsKcwIHtFFql/+GQeR/ZTfl2X6 BRlXfcQxFH1CSnM96oOo9IILV2V2oA8iADc0AWWOVrTHIDiUZioN4Dk5HgbbZA6J DgKg1jZvjX/3wAqPAoejo4AJgxESgfzjuiAyZWP2CiiYWQpDg75plV/8672CAauw JS/AQC9CZq+sLwSKqL7j3Db5dqRu6uMsPc7dRuLmk+pYrJnn4wLnxVya7e3q19/7 s+S5hXbwSj1zbXLU3Zjhv7eaJZLOLqCDT7IWCbXcQ+llgcUzbWKcEum0Oy5y0bRP 7M264/NTDMPYWLKwkdlXfMhivebuPwF6hZfzgcozITMFHofv3sbPlQWBQ/G4aYGQ vjCO4C4tGNqPDg6JHXcVDnwIBtk5dyUtb6vk22ibnwrBwf9vWKlpgO2arHsJcKPR 1Dtfp0++QfL8O5IEwggq =A9Fa -----END PGP SIGNATURE----- From drwho at virtadpt.net Tue Aug 11 15:52:06 2015 From: drwho at virtadpt.net (The Doctor) Date: Tue, 11 Aug 2015 15:52:06 -0700 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55CA60F2.5060200@cathalgarvey.me> References: <55CA57DE.1030205@cathalgarvey.me> <55ca589e.e11f370a.e338f.ffffa185@mx.google.com> <1442424.xVskXVQWxY@lapuntu> <55CA60F2.5060200@cathalgarvey.me> Message-ID: <55CA7C96.20700@virtadpt.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 08/11/2015 01:54 PM, Cathal Garvey wrote: > Has anyone made a Juan markov chain yet? #rofljuan Yep. Can't tell the difference. - -- The Doctor [412/724/301/703/415] [ZS] PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ "We are arming the chicken cannon!" --Adam Savage -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJVynyWAAoJED1np1pUQ8RkXscP+wU9UIe7S5XPC7HDCE+ry50z dMhLXEBzUyGaVpZRUoo6iayNhAVzxjQZQHxZCH0y7zQzayGQbjhF+mi9peBJcVx9 gT0f9v8jm1vR6j+zV+mBIsi3t7dXTTmq/Fwx5DIOfz2YAdmjRk8JDZK6bVdxWVS/ DL5glNc0pl84L56naXt19jEOPS5VCu+oUPoXodcSrSduU5fchYIkU07RbULxehdE GGiY0iEK4H7fkaw9I5DSyeDgFtZtz0YTZ+tjNPJQSqR3f+kaCwxLQKe7x5sD0BKF 4S3RFHMk4vUbkOv2J+GEFMeKbMpHrOXLw9bOgvgo7/p+xbl6Ndb1IZT2tl+af+8w +CxFiN0LuY0fLz8RU32LJ/f2JSVUhwccIYJFw34CbKWnAtWKaAuxlSxO+IUo/7Oc GwhFkjEvhK+m+KOtOYfd/NcEJFLcJTz1e1Tk+/+V5Z8/+115hhTezUGRJ11W4WT8 2q1KwxeyXODofkdbj4Ftpv3ztDwTeFoc7Zoohm+dMncJmgJ4p8cp4o/7dbYeMEoN 9p79AbxckUbN29DDdx9zbVH0tPoP2Fns95/JGvA4VT998x5GDZD7yPTCq1+3gvJg TO0SSvizb1STUyzWiX0T8kacU5j8/4NqKICBpU4SaQPgrcQ49EPg5ta4PuOv48Q3 +rN0DA1w5NhXA5GtqH8G =p2Yy -----END PGP SIGNATURE----- From coderman at gmail.com Tue Aug 11 16:04:06 2015 From: coderman at gmail.com (coderman) Date: Tue, 11 Aug 2015 16:04:06 -0700 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> Message-ID: On 8/11/15, Lance Cottrell wrote: > David would argue that the power elites will never allow themselves to be > blinded, so that is not really one of our options. let them watch constructions; shadows against the wall... > We can choose to watch > back or not, and he would suggest that we should do so. this too, do! > There is some merit to the argument. a distinction between decentralized power in service to users, all peers, vs. centralized power concentrated in hands of few. one of these architectures is more robust; one of these architectures will prevail. :) best regards, From mirimir at riseup.net Tue Aug 11 15:11:00 2015 From: mirimir at riseup.net (Mirimir) Date: Tue, 11 Aug 2015 16:11:00 -0600 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55ca5df9.0aea8c0a.dff66.ffffa83e@mx.google.com> References: <55CA57DE.1030205@cathalgarvey.me> <55ca589e.e11f370a.e338f.ffffa185@mx.google.com> <1442424.xVskXVQWxY@lapuntu> <55ca5df9.0aea8c0a.dff66.ffffa83e@mx.google.com> Message-ID: <55CA72F4.2000503@riseup.net> On 08/11/2015 02:43 PM, Juan wrote: > On Tue, 11 Aug 2015 22:29:38 +0200 > rysiek wrote: > >> Dnia wtorek, 11 sierpnia 2015 17:21:02 Juan pisze: >>> On Tue, 11 Aug 2015 21:15:26 +0100 >>> >>> Cathal Garvey wrote: >>>> Forcing those in power *not* to look back at us, and granting >>>> ourselves greater ability to visualise power's actions, are not >>>> mutually exclusive goals. We should be doing both, including >>>> methods to hide ourselves and to better monitor and hold >>>> accountable those in power. >>> >>> yet more pro-establishment propaganda. >>> >>> sure, the social democrat and statist clown garvey is going >>> to 'hold accountable' his masters by voting and 'encrypting' his >>> mail... >> >> Thang $DEITY for Juan, who will soon (I'm sure!) enlighten all of us >> with a silver bullet to solve all social, political and any and all >> other kinds of problems! > > > > Your reply is meaningles rysiek. Well it's obvious you don't > have any argument and just want to believe in unrealistic > bullshit. He was mocking you, yes. But I don't recall much from you except criticism of others' ideas, plans, projects, etc. > You, too, let me know when you guys start 'watching' and > 'holding accountable' your 'representatives' aka your masters. > > > I'll be waiting for you to post the access credentials to phone > companies, ISPs, datacenters and the like, so that we can start > 'watching' the government just like they watch us. That information is out there. But it doesn't get posted on open mail lists. Results are put online, via WikiLeaks, Cryptome, pastebins, etc. But once access info goes public, it becomes useless. From coderman at gmail.com Tue Aug 11 16:14:39 2015 From: coderman at gmail.com (coderman) Date: Tue, 11 Aug 2015 16:14:39 -0700 Subject: FOIPA adventures In-Reply-To: References: Message-ID: the FBI FOIA for "Sudden unintended acceleration (SUA)" was silent-closed without notice end of July. this is an anomaly, and indicates worth digging extensively into: https://www.muckrock.com/foi/united-states-of-america-10/badaccel-19510/ "This request was closed 7-30-2015." crafting new line of inquiries and extending requests to DoT as well... best regards, On 7/8/15, coderman wrote: > for all of you driving vehicles with hundreds of global variables > around weird machines radio linked to strange networks, > > the following new FOIAs: > > https://www.muckrock.com/foi/united-states-of-america-10/badaccel-19510/ > @FBI > Use of Sudden unintended acceleration (SUA) or Unintended acceleration > in the commission of a crime, including premeditated offenses of any > kind. Please include suspicion of Sudden unintended acceleration (SUA) > or suspicion of Unintended acceleration within the scope of this > request, even if alternate cause determined. This search is to include > any and all records, including cross-references and indirect mentions, > including records outside the investigation main file. This is to > include a search of each of the following record stores and > interfaces: the Central Records System (CRS), the Automated Case > Support system ("ACS") Investigative Case Management system ("ICM"), > the Automated Case Support system ("ACS") Electronic Case File > ("ECF"), and the Automated Case Support system ("ACS") Universal Index > ("UNI"). Please include processing notes, even if request is denied in > part. Please identify individuals responsible for any aspect of FOIA > processing in the processing notes, along with explanation of their > involvement if not typically assigned FOIA responsibilities for the > record systems above. From juan.g71 at gmail.com Tue Aug 11 13:11:52 2015 From: juan.g71 at gmail.com (Juan) Date: Tue, 11 Aug 2015 17:11:52 -0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> Message-ID: <55ca5673.4b2b370a.bae5c.ffff9f55@mx.google.com> On Tue, 11 Aug 2015 19:49:45 +0000 Sean Lynch wrote: > So what do people think of David Brin's "transparent society" > approach to this problem? it's stupid pro-establishment propaganda. > We can't completely stop ourselves from > being watched, but we can make use of all this technology ourselves. > Police have ALPRs and dashcams and bodycams, but by and large they > have actually resisted expansions of their own surveillance because > they want the flexibility to be able to make up justifications after > the fact. Phone cams have for the most part taken that choice away > from them. In some fantasy land, yes. In the real world, no. > The result seems likely to be less police abuse than at > any point since at least the early 20th century in the US. > > Even Snowden's leaks were enabled by very similar technologies to > what the NSA deploys against us. > what? Oh, by the way, we are your 'snowden leaks'? > Is there any reason to believe that, overall, technology will benefit > governments more than it does individuals? Do you have to ask? Or are you trolling? From juan.g71 at gmail.com Tue Aug 11 13:17:03 2015 From: juan.g71 at gmail.com (Juan) Date: Tue, 11 Aug 2015 17:17:03 -0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> Message-ID: <55ca57aa.066a8c0a.db4ae.ffff9f7b@mx.google.com> On Tue, 11 Aug 2015 13:07:54 -0700 Lance Cottrell wrote: > David would argue that the power elites will never allow themselves > to be blinded, so that is not really one of our options. We can > choose to watch back or not, and he would suggest that we should do > so. > > There is some merit to the argument. no there isn't. >We can choose to watch back or not Dishonest bullshit. Let me know when that guy david gains access to the world's telecom networks and 'shares' it with the serfs. > > Lance > > -- > Lance Cottrell > loki at obscura.com > > > > > On Aug 11, 2015, at 12:49 PM, Sean Lynch wrote: > > > > So what do people think of David Brin's "transparent society" > > approach to this problem? We can't completely stop ourselves from > > being watched, but we can make use of all this technology > > ourselves. Police have ALPRs and dashcams and bodycams, but by and > > large they have actually resisted expansions of their own > > surveillance because they want the flexibility to be able to make > > up justifications after the fact. Phone cams have for the most part > > taken that choice away from them. The result seems likely to be > > less police abuse than at any point since at least the early 20th > > century in the US. > > > > Even Snowden's leaks were enabled by very similar technologies to > > what the NSA deploys against us. > > > > Is there any reason to believe that, overall, technology will > > benefit governments more than it does individuals? > From juan.g71 at gmail.com Tue Aug 11 13:21:02 2015 From: juan.g71 at gmail.com (Juan) Date: Tue, 11 Aug 2015 17:21:02 -0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55CA57DE.1030205@cathalgarvey.me> References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <55CA57DE.1030205@cathalgarvey.me> Message-ID: <55ca589e.e11f370a.e338f.ffffa185@mx.google.com> On Tue, 11 Aug 2015 21:15:26 +0100 Cathal Garvey wrote: > Forcing those in power *not* to look back at us, and granting > ourselves greater ability to visualise power's actions, are not > mutually exclusive goals. We should be doing both, including methods > to hide ourselves and to better monitor and hold accountable those in > power. yet more pro-establishment propaganda. sure, the social democrat and statist clown garvey is going to 'hold accountable' his masters by voting and 'encrypting' his mail... > > Of course, those monitoring are often punished, so necessarily the > ability to monitor *and* hide go hand in hand. > > In other words I reckon the approach of fighting mass surveillance > (including acknowledging that corporations are NOT people and their > surveillance is qualitatively different from my private CCTV system) > and pushing for greater transparency, in tandem with mass-crypto and > ubiquitous sousveillance, is exactly the right thing to do..and it's > more or less what I think we're doing already globally with the > cypherpunk, pirate party, and eff-ist movements. > > On 11/08/15 20:49, Sean Lynch wrote: > > So what do people think of David Brin's "transparent society" > > approach to this problem? We can't completely stop ourselves from > > being watched, but we can make use of all this technology > > ourselves. Police have ALPRs and dashcams and bodycams, but by and > > large they have actually resisted expansions of their own > > surveillance because they want the flexibility to be able to make > > up justifications after the fact. Phone cams have for the most part > > taken that choice away from them. The result seems likely to be > > less police abuse than at any point since at least the early 20th > > century in the US. > > > > Even Snowden's leaks were enabled by very similar technologies to > > what the NSA deploys against us. > > > > Is there any reason to believe that, overall, technology will > > benefit governments more than it does individuals? > From juan.g71 at gmail.com Tue Aug 11 13:43:58 2015 From: juan.g71 at gmail.com (Juan) Date: Tue, 11 Aug 2015 17:43:58 -0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <1442424.xVskXVQWxY@lapuntu> References: <55CA57DE.1030205@cathalgarvey.me> <55ca589e.e11f370a.e338f.ffffa185@mx.google.com> <1442424.xVskXVQWxY@lapuntu> Message-ID: <55ca5df9.0aea8c0a.dff66.ffffa83e@mx.google.com> On Tue, 11 Aug 2015 22:29:38 +0200 rysiek wrote: > Dnia wtorek, 11 sierpnia 2015 17:21:02 Juan pisze: > > On Tue, 11 Aug 2015 21:15:26 +0100 > > > > Cathal Garvey wrote: > > > Forcing those in power *not* to look back at us, and granting > > > ourselves greater ability to visualise power's actions, are not > > > mutually exclusive goals. We should be doing both, including > > > methods to hide ourselves and to better monitor and hold > > > accountable those in power. > > > > yet more pro-establishment propaganda. > > > > sure, the social democrat and statist clown garvey is going > > to 'hold accountable' his masters by voting and 'encrypting' his > > mail... > > Thang $DEITY for Juan, who will soon (I'm sure!) enlighten all of us > with a silver bullet to solve all social, political and any and all > other kinds of problems! Your reply is meaningles rysiek. Well it's obvious you don't have any argument and just want to believe in unrealistic bullshit. You, too, let me know when you guys start 'watching' and 'holding accountable' your 'representatives' aka your masters. I'll be waiting for you to post the access credentials to phone companies, ISPs, datacenters and the like, so that we can start 'watching' the government just like they watch us. > From juan.g71 at gmail.com Tue Aug 11 14:07:35 2015 From: juan.g71 at gmail.com (Juan) Date: Tue, 11 Aug 2015 18:07:35 -0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <2141771.o8rmPJaZR7@lapuntu> References: <1442424.xVskXVQWxY@lapuntu> <55ca5df9.0aea8c0a.dff66.ffffa83e@mx.google.com> <2141771.o8rmPJaZR7@lapuntu> Message-ID: <55ca6383.71518c0a.7f73.ffffa724@mx.google.com> On Tue, 11 Aug 2015 22:50:27 +0200 rysiek wrote: > Dnia wtorek, 11 sierpnia 2015 17:43:58 Juan pisze: > > On Tue, 11 Aug 2015 22:29:38 +0200 > > > > rysiek wrote: > > > Dnia wtorek, 11 sierpnia 2015 17:21:02 Juan pisze: > > > > On Tue, 11 Aug 2015 21:15:26 +0100 > > > > > > > > Cathal Garvey wrote: > > > > > Forcing those in power *not* to look back at us, and granting > > > > > ourselves greater ability to visualise power's actions, are > > > > > not mutually exclusive goals. We should be doing both, > > > > > including methods to hide ourselves and to better monitor and > > > > > hold accountable those in power. > > > > > > > > yet more pro-establishment propaganda. > > > > > > > > sure, the social democrat and statist clown garvey is > > > > going > > > > > > > > to 'hold accountable' his masters by voting and 'encrypting' his > > > > > > > > mail... > > > > > > Thang $DEITY for Juan, who will soon (I'm sure!) enlighten all of > > > us with a silver bullet to solve all social, political and any > > > and all other kinds of problems! > > > > Your reply is meaningles rysiek. Well it's obvious you don't > > have any argument and just want to believe in unrealistic > > bullshit. > > > > You, too, let me know when you guys start 'watching' and > > 'holding accountable' your 'representatives' aka your > > masters. > > So far, I'd say I'm doing a decent job at that. lol - except you aren't. And sorry this is a mailing list. If you have something to say say it here. Your links get ignored - as they should. > > Exhibit A: > 1. http://rys.io/en/59 > 2. http://rys.io/en/62 > 3. http://rys.io/en/70 > > Exhibit B: > 1. http://rys.io/en/94 > 2. http://rys.io/en/109 > > Your point? > From juan.g71 at gmail.com Tue Aug 11 15:34:19 2015 From: juan.g71 at gmail.com (Juan) Date: Tue, 11 Aug 2015 19:34:19 -0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55CA72F4.2000503@riseup.net> References: <55CA57DE.1030205@cathalgarvey.me> <55ca589e.e11f370a.e338f.ffffa185@mx.google.com> <1442424.xVskXVQWxY@lapuntu> <55ca5df9.0aea8c0a.dff66.ffffa83e@mx.google.com> <55CA72F4.2000503@riseup.net> Message-ID: <55ca77d7.8421370a.cbcdf.ffffb5bf@mx.google.com> On Tue, 11 Aug 2015 16:11:00 -0600 Mirimir wrote: > He was mocking you, yes. But I don't recall much from you except > criticism of others' ideas, plans, projects, etc. Yes, exactly. Valid criticism of stuff that doesn't work and is morally fucked up. You have a problem with that? You want people to try to sell garbage and go unchallenged? > > > You, too, let me know when you guys start 'watching' and > > 'holding accountable' your 'representatives' aka your > > masters. > > > > > > I'll be waiting for you to post the access credentials to > > phone companies, ISPs, datacenters and the like, so that we can > > start 'watching' the government just like they watch us. > > That information is out there. What information is out there? Are you missing the point on purpose? The networks are 'owned' by the government and friends, and there obviously is no fucking way for joe six pack to use their infrastructure to 'watch' his masters. > But it doesn't get posted on open mail > lists. Results are put online, via WikiLeaks, Cryptome, pastebins, Not what I was getting at, not to mention, the amount of stuff that gets posted is (pretty) small. > etc. But once access info goes public, it becomes useless. Of course. Like I said, the networks are owned by the government. Temporary glitches in security don't mean much, if anything. Oh, and let me know when the nsa really gets 'hacked' as opposed as having one employee betray them. From seanl at literati.org Tue Aug 11 12:49:45 2015 From: seanl at literati.org (Sean Lynch) Date: Tue, 11 Aug 2015 19:49:45 +0000 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55CA2401.9070402@riseup.net> References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> Message-ID: So what do people think of David Brin's "transparent society" approach to this problem? We can't completely stop ourselves from being watched, but we can make use of all this technology ourselves. Police have ALPRs and dashcams and bodycams, but by and large they have actually resisted expansions of their own surveillance because they want the flexibility to be able to make up justifications after the fact. Phone cams have for the most part taken that choice away from them. The result seems likely to be less police abuse than at any point since at least the early 20th century in the US. Even Snowden's leaks were enabled by very similar technologies to what the NSA deploys against us. Is there any reason to believe that, overall, technology will benefit governments more than it does individuals? -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 899 bytes Desc: not available URL: From mirimir at riseup.net Tue Aug 11 18:56:10 2015 From: mirimir at riseup.net (Mirimir) Date: Tue, 11 Aug 2015 19:56:10 -0600 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55ca77d7.8421370a.cbcdf.ffffb5bf@mx.google.com> References: <55CA57DE.1030205@cathalgarvey.me> <55ca589e.e11f370a.e338f.ffffa185@mx.google.com> <1442424.xVskXVQWxY@lapuntu> <55ca5df9.0aea8c0a.dff66.ffffa83e@mx.google.com> <55CA72F4.2000503@riseup.net> <55ca77d7.8421370a.cbcdf.ffffb5bf@mx.google.com> Message-ID: <55CAA7BA.7080305@riseup.net> On 08/11/2015 04:34 PM, Juan wrote: > On Tue, 11 Aug 2015 16:11:00 -0600 > Mirimir wrote: > > >> He was mocking you, yes. But I don't recall much from you except >> criticism of others' ideas, plans, projects, etc. > > > Yes, exactly. Valid criticism of stuff that doesn't work and is > morally fucked up. > > You have a problem with that? You want people to try to sell > garbage and go unchallenged? I have no problem with calling bullshit. Not at all. But if nothing is workable, government criminals have won, and we're fucked. >>> You, too, let me know when you guys start 'watching' and >>> 'holding accountable' your 'representatives' aka your >>> masters. >>> >>> >>> I'll be waiting for you to post the access credentials to >>> phone companies, ISPs, datacenters and the like, so that we can >>> start 'watching' the government just like they watch us. >> >> That information is out there. > > > What information is out there? Methods, exploits, vulnerabilities, account credentials, passwords, etc, etc, etc. I'm not into that shit, but I know that it's out there. > Are you missing the point on purpose? The networks are 'owned' > by the government and friends, and there obviously is no > fucking way for joe six pack to use their infrastructure to > 'watch' his masters. Yes, the networks are owned by governments and their friends. But that doesn't mean that they're unusable. Free agents do get pwned, for sure. But all too often, it's bad OPSEC that gets them. Loose lips, mostly. And yes, "joe six pack" isn't doing that. But once stuff has been put online, anyone can check it out. >> But it doesn't get posted on open mail >> lists. Results are put online, via WikiLeaks, Cryptome, pastebins, > > Not what I was getting at, not to mention, the amount of stuff > that gets posted is (pretty) small. What were you getting at? We've seen some amazing shit from Snowden. It's too bad that he was too patriotic to just drop the whole wad somewhere, however. So it goes. >> etc. But once access info goes public, it becomes useless. > > > Of course. Like I said, the networks are owned by the > government. Temporary glitches in security don't mean much, if > anything. You gotta take what you can get. > Oh, and let me know when the nsa really gets 'hacked' as > opposed as having one employee betray them. They've been betrayed several times, that we know of. Mostly it's for money, and we rarely hear about that, even when people get busted. Have you read James Bamford's books on the NSA? From softservant at gmail.com Tue Aug 11 20:19:10 2015 From: softservant at gmail.com (Softy) Date: Tue, 11 Aug 2015 20:19:10 -0700 Subject: Privacy advocates resign over facial recognition plans (rysiek) Message-ID: Exhibit B: > 1. http://rys.io/en/94 > ​ > ​ Ryios, gov. officials debate these points; and consciously ignore them. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1250 bytes Desc: not available URL: From cathalgarvey at cathalgarvey.me Tue Aug 11 13:15:26 2015 From: cathalgarvey at cathalgarvey.me (Cathal Garvey) Date: Tue, 11 Aug 2015 21:15:26 +0100 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> Message-ID: <55CA57DE.1030205@cathalgarvey.me> Forcing those in power *not* to look back at us, and granting ourselves greater ability to visualise power's actions, are not mutually exclusive goals. We should be doing both, including methods to hide ourselves and to better monitor and hold accountable those in power. Of course, those monitoring are often punished, so necessarily the ability to monitor *and* hide go hand in hand. In other words I reckon the approach of fighting mass surveillance (including acknowledging that corporations are NOT people and their surveillance is qualitatively different from my private CCTV system) and pushing for greater transparency, in tandem with mass-crypto and ubiquitous sousveillance, is exactly the right thing to do..and it's more or less what I think we're doing already globally with the cypherpunk, pirate party, and eff-ist movements. On 11/08/15 20:49, Sean Lynch wrote: > So what do people think of David Brin's "transparent society" approach > to this problem? We can't completely stop ourselves from being watched, > but we can make use of all this technology ourselves. Police have ALPRs > and dashcams and bodycams, but by and large they have actually resisted > expansions of their own surveillance because they want the flexibility > to be able to make up justifications after the fact. Phone cams have for > the most part taken that choice away from them. The result seems likely > to be less police abuse than at any point since at least the early 20th > century in the US. > > Even Snowden's leaks were enabled by very similar technologies to what > the NSA deploys against us. > > Is there any reason to believe that, overall, technology will benefit > governments more than it does individuals? -- Scientific Director, IndieBio EU Programme Now running in Cork, Ireland May->July Learn more at indie.bio and follow along! Twitter: @onetruecathal Phone: +353876363185 miniLock: JjmYYngs7akLZUjkvFkuYdsZ3PyPHSZRBKNm6qTYKZfAM peerio.com: cathalgarvey From cathalgarvey at cathalgarvey.me Tue Aug 11 13:54:10 2015 From: cathalgarvey at cathalgarvey.me (Cathal Garvey) Date: Tue, 11 Aug 2015 21:54:10 +0100 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <1442424.xVskXVQWxY@lapuntu> References: <55CA57DE.1030205@cathalgarvey.me> <55ca589e.e11f370a.e338f.ffffa185@mx.google.com> <1442424.xVskXVQWxY@lapuntu> Message-ID: <55CA60F2.5060200@cathalgarvey.me> > yet more pro-establishment propaganda. > sure, the social democrat and statist clown garvey is going to > 'hold accountable' his masters by voting and 'encrypting' his > mail... Has anyone made a Juan markov chain yet? #rofljuan -- Scientific Director, IndieBio EU Programme Now running in Cork, Ireland May->July Learn more at indie.bio and follow along! Twitter: @onetruecathal Phone: +353876363185 miniLock: JjmYYngs7akLZUjkvFkuYdsZ3PyPHSZRBKNm6qTYKZfAM peerio.com: cathalgarvey From rysiek at hackerspace.pl Tue Aug 11 13:27:22 2015 From: rysiek at hackerspace.pl (rysiek) Date: Tue, 11 Aug 2015 22:27:22 +0200 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <55CA2401.9070402@riseup.net> Message-ID: <8673731.0JX9C4CxPU@lapuntu> Dnia wtorek, 11 sierpnia 2015 19:49:45 Sean Lynch pisze: > So what do people think of David Brin's "transparent society" approach to > this problem? One key thing is that citizens have *rights*, public officials have *duties*. Talking about "transparency" in the context of a private person is misguided; just as talking about "privacy" in the context of public official carrying out their duties: http://rys.io/en/27 At the same time we should push for privacy for private citizens, and transparency and accountability for public officials (in the context of their duties). -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From mirimir at riseup.net Tue Aug 11 21:27:28 2015 From: mirimir at riseup.net (Mirimir) Date: Tue, 11 Aug 2015 22:27:28 -0600 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55cab1ce.e4648c0a.5a3f.ffffd3a1@mx.google.com> References: <55CA57DE.1030205@cathalgarvey.me> <55ca589e.e11f370a.e338f.ffffa185@mx.google.com> <1442424.xVskXVQWxY@lapuntu> <55ca5df9.0aea8c0a.dff66.ffffa83e@mx.google.com> <55CA72F4.2000503@riseup.net> <55ca77d7.8421370a.cbcdf.ffffb5bf@mx.google.com> <55CAA7BA.7080305@riseup.net> <55cab1ce.e4648c0a.5a3f.ffffd3a1@mx.google.com> Message-ID: <55CACB30.2000800@riseup.net> On 08/11/2015 08:41 PM, Juan wrote: > On Tue, 11 Aug 2015 19:56:10 -0600 > Mirimir wrote: > > >> I have no problem with calling bullshit. Not at all. But if nothing is >> workable, government criminals have won, and we're fucked. > > If that's the case, shooting the messenger will solve nothing. > But that's not even what I said. > > Somebody asked about a particular idea and I commented on it. I was commenting more on your aggregate output. But who am I to judge? >>> What information is out there? >> >> Methods, exploits, vulnerabilities, account credentials, passwords, >> etc, etc, etc. I'm not into that shit, but I know that it's out there. > > > Governments have point-and-click wiretapping capabilies for > instance. Are you saying that any script kiddy has the > 'passwords' to those systems? If they do, they're not sharing ;) But maybe somebody does? >>> Are you missing the point on purpose? The networks are >>> 'owned' by the government and friends, and there obviously is no >>> fucking way for joe six pack to use their infrastructure to >>> 'watch' his masters. >> >> Yes, the networks are owned by governments and their friends. But that >> doesn't mean that they're unusable. > > > Usable/unusable for what? It seems quite obvious that > 'network administrators' can spy on users whereas users can't > spy on networks administrators. The system is hierarchical by > nature and design. Spying on traffic, sure. But end-to-end encryption can provide some privacy. And it's possible to anonymize the metadata. If I care to, I can work through chains of proxies, using anonymously leased VPS with minimal desktops, and remote X via ssh from one to the next, routed through nested chains of VPNs and/or Tor. Latency gets huge, but it's usable. > And a rogue system administrator switching sides is not the same > thing as users having power. How do you imagine that users would have power? Even if you and your friends built your own private Internet, I can't imagine that you've give too much power to other random users. You'd be hosed all too soon. >> Free agents do get pwned, for >> sure. But all too often, it's bad OPSEC that gets them. Loose lips, >> mostly. >> >> And yes, "joe six pack" isn't doing that. But once stuff has been put >> online, anyone can check it out. > > > And before the internet, people read the newspapers. > Newspapers that 99% of the time worked (and work) for the > powers that be. True. But the Internet is far less manageable than that. > I don't think the discussion was about publishing information > but about surveillance anyway. There may be some overlap but > it's two different things. I was talking about publishing results of surveillance. Have you checked out any of the Sony or Hacking Team data dumps? >>>> But it doesn't get posted on open mail >>>> lists. Results are put online, via WikiLeaks, Cryptome, pastebins, >>> >>> Not what I was getting at, not to mention, the amount of >>> stuff that gets posted is (pretty) small. Manning's dump was huge, Juan! >> What were you getting at? We've seen some amazing shit from Snowden. >> It's too bad that he was too patriotic to just drop the whole wad >> somewhere, however. So it goes. > > > That's fine and dandy, but getting and publishing some secrets > doesn't counter the surveillance capabilities of the system. Yes, but it does help us improve our OPSEC. > Also, there were (many) people who correctly assumed that the > 'programs' that Snowden leaked information about, were already > in place. You know, people who wore tin foil hats... I've followed this stuff for 20 years, and I'm a fairly technical guy, so broadly speaking, there weren't many surprises. Indeed, although the NSA has immense resources, Google is far more technical. According to Silicon Jungle, the NSA hired Google to build the search component of XKeyscore ;) > But now that the information is 'officialy' public, has the > nature of the surveillance mechanisms changed? Maybe the nature hasn't changed, but the effectiveness has. For example, Google encrypted its data center interlinks. I'm sure that others are locking down their shit too. > Can we now track the movements of the millions of state > employees? Listen to their calls? Browse their 'metadata'? Read > their mails? I don't think so. Well, the NSA certainly can. And China is coming up fast. But individuals lack structures for cooperation. That's a hard problem. >>> Oh, and let me know when the nsa really gets 'hacked' as >>> opposed as having one employee betray them. >> >> They've been betrayed several times, that we know of. Mostly it's for >> money, and we rarely hear about that, even when people get busted. >> Have you read James Bamford's books on the NSA? >> > > No. I'll see if I get a copy. The Puzzle Palace: Inside the National Security Agency, America's Most Secret Intelligence Organization by James Bamford (Sep 29, 1983) Body of Secrets: Anatomy of the Ultra-Secret National Security Agency by James Bamford (Apr 30, 2002) A Pretext for War: 9/11, Iraq, and the Abuse of America's Intelligence Agencies by James Bamford (Jun 8, 2004) The Shadow Factory: The NSA from 9/11 to the Eavesdropping on America by James Bamford (Jul 14, 2009) I recommend reading them in that order. From rysiek at hackerspace.pl Tue Aug 11 13:29:38 2015 From: rysiek at hackerspace.pl (rysiek) Date: Tue, 11 Aug 2015 22:29:38 +0200 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55ca589e.e11f370a.e338f.ffffa185@mx.google.com> References: <55CA57DE.1030205@cathalgarvey.me> <55ca589e.e11f370a.e338f.ffffa185@mx.google.com> Message-ID: <1442424.xVskXVQWxY@lapuntu> Dnia wtorek, 11 sierpnia 2015 17:21:02 Juan pisze: > On Tue, 11 Aug 2015 21:15:26 +0100 > > Cathal Garvey wrote: > > Forcing those in power *not* to look back at us, and granting > > ourselves greater ability to visualise power's actions, are not > > mutually exclusive goals. We should be doing both, including methods > > to hide ourselves and to better monitor and hold accountable those in > > power. > > yet more pro-establishment propaganda. > > sure, the social democrat and statist clown garvey is going to > 'hold accountable' his masters by voting and 'encrypting' his > mail... Thang $DEITY for Juan, who will soon (I'm sure!) enlighten all of us with a silver bullet to solve all social, political and any and all other kinds of problems! -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From list at sysfu.com Tue Aug 11 22:38:32 2015 From: list at sysfu.com (Seth) Date: Tue, 11 Aug 2015 22:38:32 -0700 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> Message-ID: On Tue, 11 Aug 2015 12:49:45 -0700, Sean Lynch wrote: > most part taken that choice away from them. The result seems likely to be > less police abuse than at any point since at least the early 20th century > in the US. This is not directed at you personally, but I wish people would stop using the fucking Orwellian double-speak term 'police abuse' in place of the more accurate 'police crime'. What we have is a certain class of people committing serious CRIMES, not 'abuse'. These crimes includes murder, attempted murder, manslaughter, assault, vehicular assault, battery, false arrest, perjury, etc, all while wearing special costumes called 'uniforms' and getting a paycheck from some government agency. As far as I'm concerned, using the term 'police abuse' is a neuro-linguistic programming tactic designed to make people subconsciously downplay the seriousness of these crimes. From rysiek at hackerspace.pl Tue Aug 11 13:50:27 2015 From: rysiek at hackerspace.pl (rysiek) Date: Tue, 11 Aug 2015 22:50:27 +0200 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55ca5df9.0aea8c0a.dff66.ffffa83e@mx.google.com> References: <1442424.xVskXVQWxY@lapuntu> <55ca5df9.0aea8c0a.dff66.ffffa83e@mx.google.com> Message-ID: <2141771.o8rmPJaZR7@lapuntu> Dnia wtorek, 11 sierpnia 2015 17:43:58 Juan pisze: > On Tue, 11 Aug 2015 22:29:38 +0200 > > rysiek wrote: > > Dnia wtorek, 11 sierpnia 2015 17:21:02 Juan pisze: > > > On Tue, 11 Aug 2015 21:15:26 +0100 > > > > > > Cathal Garvey wrote: > > > > Forcing those in power *not* to look back at us, and granting > > > > ourselves greater ability to visualise power's actions, are not > > > > mutually exclusive goals. We should be doing both, including > > > > methods to hide ourselves and to better monitor and hold > > > > accountable those in power. > > > > > > yet more pro-establishment propaganda. > > > > > > sure, the social democrat and statist clown garvey is going > > > > > > to 'hold accountable' his masters by voting and 'encrypting' his > > > > > > mail... > > > > Thang $DEITY for Juan, who will soon (I'm sure!) enlighten all of us > > with a silver bullet to solve all social, political and any and all > > other kinds of problems! > > Your reply is meaningles rysiek. Well it's obvious you don't > have any argument and just want to believe in unrealistic > bullshit. > > You, too, let me know when you guys start 'watching' and > 'holding accountable' your 'representatives' aka your masters. So far, I'd say I'm doing a decent job at that. Exhibit A: 1. http://rys.io/en/59 2. http://rys.io/en/62 3. http://rys.io/en/70 Exhibit B: 1. http://rys.io/en/94 2. http://rys.io/en/109 Your point? -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From juan.g71 at gmail.com Tue Aug 11 19:41:35 2015 From: juan.g71 at gmail.com (Juan) Date: Tue, 11 Aug 2015 23:41:35 -0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55CAA7BA.7080305@riseup.net> References: <55CA57DE.1030205@cathalgarvey.me> <55ca589e.e11f370a.e338f.ffffa185@mx.google.com> <1442424.xVskXVQWxY@lapuntu> <55ca5df9.0aea8c0a.dff66.ffffa83e@mx.google.com> <55CA72F4.2000503@riseup.net> <55ca77d7.8421370a.cbcdf.ffffb5bf@mx.google.com> <55CAA7BA.7080305@riseup.net> Message-ID: <55cab1ce.e4648c0a.5a3f.ffffd3a1@mx.google.com> On Tue, 11 Aug 2015 19:56:10 -0600 Mirimir wrote: > I have no problem with calling bullshit. Not at all. But if nothing is > workable, government criminals have won, and we're fucked. If that's the case, shooting the messenger will solve nothing. But that's not even what I said. Somebody asked about a particular idea and I commented on it. > > What information is out there? > > Methods, exploits, vulnerabilities, account credentials, passwords, > etc, etc, etc. I'm not into that shit, but I know that it's out there. Governments have point-and-click wiretapping capabilies for instance. Are you saying that any script kiddy has the 'passwords' to those systems? > > > Are you missing the point on purpose? The networks are > > 'owned' by the government and friends, and there obviously is no > > fucking way for joe six pack to use their infrastructure to > > 'watch' his masters. > > Yes, the networks are owned by governments and their friends. But that > doesn't mean that they're unusable. Usable/unusable for what? It seems quite obvious that 'network administrators' can spy on users whereas users can't spy on networks administrators. The system is hierarchical by nature and design. And a rogue system administrator switching sides is not the same thing as users having power. > Free agents do get pwned, for > sure. But all too often, it's bad OPSEC that gets them. Loose lips, > mostly. > > And yes, "joe six pack" isn't doing that. But once stuff has been put > online, anyone can check it out. And before the internet, people read the newspapers. Newspapers that 99% of the time worked (and work) for the powers that be. I don't think the discussion was about publishing information but about surveillance anyway. There may be some overlap but it's two different things. > > >> But it doesn't get posted on open mail > >> lists. Results are put online, via WikiLeaks, Cryptome, pastebins, > > > > Not what I was getting at, not to mention, the amount of > > stuff that gets posted is (pretty) small. > > What were you getting at? We've seen some amazing shit from Snowden. > It's too bad that he was too patriotic to just drop the whole wad > somewhere, however. So it goes. That's fine and dandy, but getting and publishing some secrets doesn't counter the surveillance capabilities of the system. Also, there were (many) people who correctly assumed that the 'programs' that Snowden leaked information about, were already in place. You know, people who wore tin foil hats... But now that the information is 'officialy' public, has the nature of the surveillance mechanisms changed? Can we now track the movements of the millions of state employees? Listen to their calls? Browse their 'metadata'? Read their mails? I don't think so. > > > Oh, and let me know when the nsa really gets 'hacked' as > > opposed as having one employee betray them. > > They've been betrayed several times, that we know of. Mostly it's for > money, and we rarely hear about that, even when people get busted. > Have you read James Bamford's books on the NSA? > No. I'll see if I get a copy. From carimachet at gmail.com Tue Aug 11 18:53:33 2015 From: carimachet at gmail.com (Cari Machet) Date: Wed, 12 Aug 2015 04:53:33 +0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55CA57DE.1030205@cathalgarvey.me> References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <55CA57DE.1030205@cathalgarvey.me> Message-ID: fuck eff On Aug 11, 2015 11:16 PM, "Cathal Garvey" wrote: > Forcing those in power *not* to look back at us, and granting ourselves > greater ability to visualise power's actions, are not mutually exclusive > goals. We should be doing both, including methods to hide ourselves and to > better monitor and hold accountable those in power. > > Of course, those monitoring are often punished, so necessarily the ability > to monitor *and* hide go hand in hand. > > In other words I reckon the approach of fighting mass surveillance > (including acknowledging that corporations are NOT people and their > surveillance is qualitatively different from my private CCTV system) and > pushing for greater transparency, in tandem with mass-crypto and ubiquitous > sousveillance, is exactly the right thing to do..and it's more or less what > I think we're doing already globally with the cypherpunk, pirate party, and > eff-ist movements. > > On 11/08/15 20:49, Sean Lynch wrote: > >> So what do people think of David Brin's "transparent society" approach >> to this problem? We can't completely stop ourselves from being watched, >> but we can make use of all this technology ourselves. Police have ALPRs >> and dashcams and bodycams, but by and large they have actually resisted >> expansions of their own surveillance because they want the flexibility >> to be able to make up justifications after the fact. Phone cams have for >> the most part taken that choice away from them. The result seems likely >> to be less police abuse than at any point since at least the early 20th >> century in the US. >> >> Even Snowden's leaks were enabled by very similar technologies to what >> the NSA deploys against us. >> >> Is there any reason to believe that, overall, technology will benefit >> governments more than it does individuals? >> > > -- > Scientific Director, IndieBio EU Programme > Now running in Cork, Ireland May->July > Learn more at indie.bio and follow along! > Twitter: @onetruecathal > Phone: +353876363185 > miniLock: JjmYYngs7akLZUjkvFkuYdsZ3PyPHSZRBKNm6qTYKZfAM > peerio.com: cathalgarvey > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2706 bytes Desc: not available URL: From carimachet at gmail.com Tue Aug 11 19:04:41 2015 From: carimachet at gmail.com (Cari Machet) Date: Wed, 12 Aug 2015 05:04:41 +0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55ca77d7.8421370a.cbcdf.ffffb5bf@mx.google.com> References: <55CA57DE.1030205@cathalgarvey.me> <55ca589e.e11f370a.e338f.ffffa185@mx.google.com> <1442424.xVskXVQWxY@lapuntu> <55ca5df9.0aea8c0a.dff66.ffffa83e@mx.google.com> <55CA72F4.2000503@riseup.net> <55ca77d7.8421370a.cbcdf.ffffb5bf@mx.google.com> Message-ID: its a strange strange complex i will never understand ... its as if they got the fight beat out of them and they just want silence out of all the trauma they have endured - this is the solution they find admirable\desirable ... then ask for officials to be held ` 'accountable ' please beauties point me in the direction of the 'accountability office' on fatherfucking another fucking universe vortex vacuum some weird thing in the center of a black whole that births new stars or some crap proving once again there is no nothing for fuck sake peoplish movements On Aug 12, 2015 1:39 AM, "Juan" wrote: > On Tue, 11 Aug 2015 16:11:00 -0600 > Mirimir wrote: > > > > He was mocking you, yes. But I don't recall much from you except > > criticism of others' ideas, plans, projects, etc. > > > Yes, exactly. Valid criticism of stuff that doesn't work and is > morally fucked up. > > You have a problem with that? You want people to try to sell > garbage and go unchallenged? > > > > > > > > > > > You, too, let me know when you guys start 'watching' and > > > 'holding accountable' your 'representatives' aka your > > > masters. > > > > > > > > > I'll be waiting for you to post the access credentials to > > > phone companies, ISPs, datacenters and the like, so that we can > > > start 'watching' the government just like they watch us. > > > > That information is out there. > > > What information is out there? > > Are you missing the point on purpose? The networks are 'owned' > by the government and friends, and there obviously is no > fucking way for joe six pack to use their infrastructure to > 'watch' his masters. > > > > > > But it doesn't get posted on open mail > > lists. Results are put online, via WikiLeaks, Cryptome, pastebins, > > Not what I was getting at, not to mention, the amount of stuff > that gets posted is (pretty) small. > > > > etc. But once access info goes public, it becomes useless. > > > Of course. Like I said, the networks are owned by the > government. Temporary glitches in security don't mean much, if > anything. > > Oh, and let me know when the nsa really gets 'hacked' as > opposed as having one employee betray them. > > > > > > > > > > > > > > > > > > > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3154 bytes Desc: not available URL: From shelley at misanthropia.org Wed Aug 12 05:24:12 2015 From: shelley at misanthropia.org (Shelley) Date: Wed, 12 Aug 2015 05:24:12 -0700 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> Message-ID: <20150812122355.DB8F0680147@frontend2.nyi.internal> On August 11, 2015 11:47:46 PM Cari Machet wrote yet more bullshit: > forgot fascist mass incarceration and this is directed at you personally as > i hold people 'accountable' for their actions and mindsets You should hold yourself accountable for your inflammatory and divisive "actions and mindsets" as well. Generally I ignore your posts and stay out of your misdirected, hot air bleat-fests. But I'm really tired of dealing with this type of self-aggrandizing, rude vitriol that detracts from an otherwise valid point, thereby alienating even your best allies. Like the so-called "black lives matter" attention-whores who completely disrupted a Bernie Sanders rally in my city this weekend. It makes no damn sense to alienate the people most aligned with their cause and then spew racist language (as you do, as well), thereby harming any cause unfortunate enough to have itself associated with such behavior. There is righteous anger tempered by wisdom, e.g. Dr Cornell West. He doesn't mince words and he absolutely holds people accountable while understanding that allies come in all colors and from various walks of life. Anger is valid: being intentionally racist and rude is not. /rant on OT bullshit. -S > > yay love that 'government abuse '.... lulz could it be 'crime by the > government' but but that dont happen nah never > > social engineering is profound in language use and terms are handed to the > white people like soft boiled eggs so soft and the parasite slips into the > mouth so softly by soft nice voices that are never - no never - angry > > whats there ever to be angry about ... no reason to ever raise your voice > even a tiny bit > On Aug 12, 2015 8:41 AM, "Seth" wrote: > > > On Tue, 11 Aug 2015 12:49:45 -0700, Sean Lynch wrote: > > > >> most part taken that choice away from them. The result seems likely to be > >> less police abuse than at any point since at least the early 20th century > >> in the US. > >> > > > > This is not directed at you personally, but I wish people would stop using > > the fucking Orwellian double-speak term 'police abuse' in place of the more > > accurate 'police crime'. > > > > What we have is a certain class of people committing serious CRIMES, not > > 'abuse'. These crimes includes murder, attempted murder, manslaughter, > > assault, vehicular assault, battery, false arrest, perjury, etc, all while > > wearing special costumes called 'uniforms' and getting a paycheck from some > > government agency. > > > > As far as I'm concerned, using the term 'police abuse' is a > > neuro-linguistic programming tactic designed to make people subconsciously > > downplay the seriousness of these crimes. > > From cathalgarvey at cathalgarvey.me Tue Aug 11 23:49:29 2015 From: cathalgarvey at cathalgarvey.me (Cathal Garvey) Date: Wed, 12 Aug 2015 07:49:29 +0100 Subject: simple chat In-Reply-To: <55CA7C42.9080509@virtadpt.net> References: <55c7c213.83938c0a.771c0.1e74@mx.google.com> <1686326.3Wz3qVsJfh@lapuntu> <55c7d715.032a370a.1e28c.258f@mx.google.com> <2563884.2CE0uAkJAY@lapuntu> <55CA7C42.9080509@virtadpt.net> Message-ID: <55CAEC79.8090207@cathalgarvey.me> Any progress on getting the Antox FDroid repo back online after their embezzlement fiasco earlier this Summer? Mobile usage is critical to uptake so I've been awaiting a crash-free build before getting on-board with Tox. For desktop use I've been encouraging people to use meet.jit.si - not the highest security, but frankly as we all know usability and design trumps security for most people, and 'most people' are the audience for a new killer-communicator unfortunately. I do want Tox to succeed. In my opinion for that it'll need robust Android/iOS apps (plus preferably a newer, hipper platform like Ubuntu), and a web-app interface that requires no installation. Tall order! On 11/08/15 23:50, The Doctor wrote: > On 08/09/2015 03:56 PM, rysiek wrote: > >> Well, no need to set up any accounts, and it "just works" from my >> experience. Haven't seen a simpler IM/chat. :) > > I've gotten some serious Skype users to jump ship for Tox. It's > pretty sweet. > > - -- > The Doctor [412/724/301/703/415] [ZS] -- Scientific Director, IndieBio EU Programme Now running in Cork, Ireland May->July Learn more at indie.bio and follow along! Twitter: @onetruecathal Phone: +353876363185 miniLock: JjmYYngs7akLZUjkvFkuYdsZ3PyPHSZRBKNm6qTYKZfAM peerio.com: cathalgarvey From carimachet at gmail.com Tue Aug 11 23:40:17 2015 From: carimachet at gmail.com (Cari Machet) Date: Wed, 12 Aug 2015 09:40:17 +0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> Message-ID: forgot fascist mass incarceration and this is directed at you personally as i hold people 'accountable' for their actions and mindsets yay love that 'government abuse '.... lulz could it be 'crime by the government' but but that dont happen nah never social engineering is profound in language use and terms are handed to the white people like soft boiled eggs so soft and the parasite slips into the mouth so softly by soft nice voices that are never - no never - angry whats there ever to be angry about ... no reason to ever raise your voice even a tiny bit On Aug 12, 2015 8:41 AM, "Seth" wrote: > On Tue, 11 Aug 2015 12:49:45 -0700, Sean Lynch wrote: > >> most part taken that choice away from them. The result seems likely to be >> less police abuse than at any point since at least the early 20th century >> in the US. >> > > This is not directed at you personally, but I wish people would stop using > the fucking Orwellian double-speak term 'police abuse' in place of the more > accurate 'police crime'. > > What we have is a certain class of people committing serious CRIMES, not > 'abuse'. These crimes includes murder, attempted murder, manslaughter, > assault, vehicular assault, battery, false arrest, perjury, etc, all while > wearing special costumes called 'uniforms' and getting a paycheck from some > government agency. > > As far as I'm concerned, using the term 'police abuse' is a > neuro-linguistic programming tactic designed to make people subconsciously > downplay the seriousness of these crimes. > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2103 bytes Desc: not available URL: From softservant at gmail.com Wed Aug 12 10:25:38 2015 From: softservant at gmail.com (Softy) Date: Wed, 12 Aug 2015 10:25:38 -0700 Subject: anybody know what came of t-fish cult of the dead cows work? Message-ID: > > > > too long, didn't watch. > > > that explains the putrid discourse routinely being spewed via your email. ​the implicit "only watches what I agrees with" ​is a failure of intellect. question: how many comments from external, unaffiliated sources stating the same thing must one receive before one decides they "have a point there" ... for the exciting answer, stay tuned to this mailing list. alternatively: www.*youtube*.com/watch?v=xjfKteUBa_s -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2060 bytes Desc: not available URL: From Rayzer at riseup.net Wed Aug 12 11:01:39 2015 From: Rayzer at riseup.net (Razer) Date: Wed, 12 Aug 2015 11:01:39 -0700 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> Message-ID: <55CB8A03.5020807@riseup.net> Why are you Cc:ing me about this? I used the term "police 'activities'..." NOT "Police abuse". RR Ps. It might be neuro-linguistic, but the government-legitimized criminals (gangs) in costumes with guns ABUSE people. On 08/11/2015 10:38 PM, Seth wrote: > On Tue, 11 Aug 2015 12:49:45 -0700, Sean Lynch > wrote: >> most part taken that choice away from them. The result seems likely >> to be >> less police abuse than at any point since at least the early 20th >> century >> in the US. > > This is not directed at you personally, but I wish people would stop > using the fucking Orwellian double-speak term 'police abuse' in place > of the more accurate 'police crime'. > > What we have is a certain class of people committing serious CRIMES, > not 'abuse'. These crimes includes murder, attempted murder, > manslaughter, assault, vehicular assault, battery, false arrest, > perjury, etc, all while wearing special costumes called 'uniforms' and > getting a paycheck from some government agency. > > As far as I'm concerned, using the term 'police abuse' is a > neuro-linguistic programming tactic designed to make people > subconsciously downplay the seriousness of these crimes. > -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 819 bytes Desc: OpenPGP digital signature URL: From blibbet at gmail.com Wed Aug 12 14:27:19 2015 From: blibbet at gmail.com (Blibbet) Date: Wed, 12 Aug 2015 14:27:19 -0700 Subject: LegbaCore Thunderbolt OpROM checker released Message-ID: <55CBBA37.4010605@gmail.com> FYI: LegbaCore's Apple Thunderbolt-to-Ethernet Option ROM checker was released 5 days ago (I just found out today). If you have a modern Apple, you need this tool. http://firmwaresecurity.com/2015/08/12/interview-with-legbacore-and-their-oprom-checker-ships/ https://github.com/legbacore/t2e_integrity_check Also boot a Linux liveCD (like LUV-live) with CHIPSEC to grab your Mac's ROMs, so you can examine them with (CHIPSEC, UEFITool, UEFI Firmware Parser, etc.). Save the snapshots of the images over time, so you can diff them for changes (with BIOS Diff, etc.). Thanks, Lee RSS: http://firmwaresecurity.com/feed From guninski at guninski.com Wed Aug 12 05:54:12 2015 From: guninski at guninski.com (Georgi Guninski) Date: Wed, 12 Aug 2015 15:54:12 +0300 Subject: anybody know what came of t-fish cult of the dead cows work? In-Reply-To: References: Message-ID: <20150812125412.GA2655@sivokote.iziade.m$> On Sun, Aug 09, 2015 at 04:15:35AM +0300, Cari Machet wrote: > we are legion - https://youtu.be/bC1ex2zRCYA?t=8m53s > > some dude that was part of lopht > too long, didn't watch. btw, do you mean l0pht (zero instead of o)? According to http://www.l0pht.com/members.html at least one of their members sold out... From dan at geer.org Wed Aug 12 17:40:43 2015 From: dan at geer.org (dan at geer.org) Date: Wed, 12 Aug 2015 20:40:43 -0400 Subject: anybody know what came of t-fish cult of the dead cows work? In-Reply-To: Your message of "Wed, 12 Aug 2015 15:54:12 +0300." <20150812125412.GA2655@sivokote.iziade.m$> Message-ID: <20150813004044.00B29A0762E@palinka.tinho.net> > we are legion - https://youtu.be/bC1ex2zRCYA?t=8m53s > > some dude that was part of lopht > If you want personal introductions to any of the former L0PHT crew, let me know. --dan From carimachet at gmail.com Wed Aug 12 13:25:15 2015 From: carimachet at gmail.com (Cari Machet) Date: Wed, 12 Aug 2015 23:25:15 +0300 Subject: anybody know what came of t-fish cult of the dead cows work? In-Reply-To: <20150812125412.GA2655@sivokote.iziade.m$> References: <20150812125412.GA2655@sivokote.iziade.m$> Message-ID: i have linked to the exact place in the video in youtube you can ask for the video link with an exact time thats why the link has "=8m53s" at the end as far as i know loghpt sold out so i dont respect their little spelling but thanks for the info anyway On Aug 12, 2015 3:54 PM, "Georgi Guninski" wrote: > On Sun, Aug 09, 2015 at 04:15:35AM +0300, Cari Machet wrote: > > we are legion - https://youtu.be/bC1ex2zRCYA?t=8m53s > > > > some dude that was part of lopht > > > > too long, didn't watch. > > btw, do you mean l0pht (zero instead of o)? > > According to http://www.l0pht.com/members.html > at least one of their members sold out... > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1187 bytes Desc: not available URL: From carimachet at gmail.com Wed Aug 12 13:29:05 2015 From: carimachet at gmail.com (Cari Machet) Date: Wed, 12 Aug 2015 23:29:05 +0300 Subject: anybody know what came of t-fish cult of the dead cows work? In-Reply-To: References: Message-ID: what did i just right on here about soft shit? misspellling on purpose how do you know what i analyze are you here with me? ...oh i didnt notice you On Aug 12, 2015 8:25 PM, "Softy" wrote: > >> >> too long, didn't watch. >> >> >> > that explains the putrid discourse routinely being spewed via your email. > ​the implicit "only watches what I agrees with" ​is a failure of intellect. > > > question: how many comments from external, unaffiliated sources stating > the same thing must one receive before one decides they "have a point > there" ... for the exciting answer, stay tuned to this mailing list. > alternatively: www.*youtube*.com/watch?v=xjfKteUBa_s > > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2552 bytes Desc: not available URL: From carimachet at gmail.com Wed Aug 12 13:49:26 2015 From: carimachet at gmail.com (Cari Machet) Date: Wed, 12 Aug 2015 23:49:26 +0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <20150812122355.DB8F0680147@frontend2.nyi.internal> References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> Message-ID: sheelly you mad? shelly you tired? - then go to sleep shelleeeyy does not know why there are provocateurs cause didnt analyze mankind activities cause tired? white people are lazy so cornel west is a fucking hierarchical fuck academic making bank off his peoples struggle hangin out with tavis smiley on tv while the people on the ground live in food deserts prove bernie is all about the love of the blackness i have proof he is also in love with zion ... you love the zion too? enjoy to lie to yourself what should the 'attention whores' like me be doing ... be white softies with parasites that have us smile all the time - as parasites are like a mind numbing drug - and lie to ourselves that everything is fine ... our people are in prison our people are dead but fucking smile u shld lay out a plan for all of us then we can just do what you say cause you know better fuck your white ass constructs they are completely fake = mass white hysterical fuck all pooor poor bernie his privilage is diminished by a microdot bernie could hand the mic happily to the less fortunate then maybe he wouldnt be trolled - he could feel honored by the fact that people see him as at least remotely accessible i originally posted on here about iris scans being perpetrated on the people ... do you even know anything about that at all ? ...fuck no but somehow you know everything about activists On Aug 12, 2015 3:27 PM, "Shelley" wrote: > On August 11, 2015 11:47:46 PM Cari Machet wrote > yet more bullshit: > > forgot fascist mass incarceration and this is directed at you personally as >> i hold people 'accountable' for their actions and mindsets >> > > You should hold yourself accountable for your inflammatory and divisive > "actions and mindsets" as well. > > Generally I ignore your posts and stay out of your misdirected, hot air > bleat-fests. But I'm really tired of dealing with this type of > self-aggrandizing, rude vitriol that detracts from an otherwise valid > point, thereby alienating even your best allies. Like the so-called "black > lives matter" attention-whores who completely disrupted a Bernie Sanders > rally in my city this weekend. It makes no damn sense to alienate the > people most aligned with their cause and then spew racist language (as you > do, as well), thereby harming any cause unfortunate enough to have itself > associated with such behavior. > > There is righteous anger tempered by wisdom, e.g. Dr Cornell West. He > doesn't mince words and he absolutely holds people accountable while > understanding that allies come in all colors and from various walks of > life. Anger is valid: being intentionally racist and rude is not. > > /rant on OT bullshit. > > -S > > > > >> yay love that 'government abuse '.... lulz could it be 'crime by the >> government' but but that dont happen nah never >> >> social engineering is profound in language use and terms are handed to the >> white people like soft boiled eggs so soft and the parasite slips into the >> mouth so softly by soft nice voices that are never - no never - angry >> >> whats there ever to be angry about ... no reason to ever raise your voice >> even a tiny bit >> On Aug 12, 2015 8:41 AM, "Seth" wrote: >> >> > On Tue, 11 Aug 2015 12:49:45 -0700, Sean Lynch >> wrote: >> > >> >> most part taken that choice away from them. The result seems likely to >> be >> >> less police abuse than at any point since at least the early 20th >> century >> >> in the US. >> >> >> > >> > This is not directed at you personally, but I wish people would stop >> using >> > the fucking Orwellian double-speak term 'police abuse' in place of the >> more >> > accurate 'police crime'. >> > >> > What we have is a certain class of people committing serious CRIMES, not >> > 'abuse'. These crimes includes murder, attempted murder, manslaughter, >> > assault, vehicular assault, battery, false arrest, perjury, etc, all >> while >> > wearing special costumes called 'uniforms' and getting a paycheck from >> some >> > government agency. >> > >> > As far as I'm concerned, using the term 'police abuse' is a >> > neuro-linguistic programming tactic designed to make people >> subconsciously >> > downplay the seriousness of these crimes. >> > >> > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5432 bytes Desc: not available URL: From grarpamp at gmail.com Wed Aug 12 23:11:17 2015 From: grarpamp at gmail.com (grarpamp) Date: Thu, 13 Aug 2015 02:11:17 -0400 Subject: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files") In-Reply-To: <20150812234512.GE2384@torproject.org> References: <55C59BBA.2020700@openmailbox.org> <1439101342-sup-8277@metis.syd1.tesser.org> <20150812234512.GE2384@torproject.org> Message-ID: On Wed, Aug 12, 2015 at 7:45 PM, Mike Perry wrote: > At what resolution is this type of netflow data typically captured? Routers originally exported at 100% coverage, then many of them started supporting sampling at various rates (because routers were choking and buggy anyways, and netheads were happy with averages), some only do sampling. Plug flow probes into network taps and you can do whatever you want (netsec loves this and other tools). > Are we talking about all connection 5-tuples, bidirectional/total > transfer byte totals, and open and close timestamps, or more (or less) > detail than this? > > Are timestamps always included? Are bidirectional transfer bytecounts > always included? Are subsampled packet headers (or contents) > sometimes/often included? > > What about UDP sessions? IPv6? > > Information about how UDP is treated would also be useful if/when we > manage to switch to a UDP transport protocol, independent of any > padding. All of the above depends on which flow export version / aggregation you choose, until you get to v9 and IPFIX, for which you can define your fields. In short... yes. Flow endtime is last matching packet seen, but a flow can span records when the time (therefore space, ie RAM) limited mandatory expiry timers hit. UDP goes via that, TCP usually via flags. Records can span flows for which other semantic keys may not exist, as often with UDP. But DPI can also be used in the exporter to do all sorts of fun stuff and enable other downstream uses (obviously TLS / IPSEC / crypto break some things there). Tor already bundles multiple logical flows (only TCP for user today) into some number of physical TCP flows, UDP transport there might not need anything special. But consider looking at average flow lifetimes on the internet. There may be case for going longer, bundling or turfing across a range of ports to falsely trigger a record / bloat, packet switching and so forth. > and having more information about what is typically > recorded in these cases would be very useful to inform how we might want > to design padding and connection usage against this and other issues. "Typical" is really defined by the use case of whoever needs the flows, be it provisioning, engineering, security, operations, billing, bigdata, etc. And only limited by the available formats, storage, postprocessing, and customization. IPFIX and https://en.wikipedia.org/wiki/NetFlow https://en.wikipedia.org/wiki/IP_Flow_Information_Export https://www.google.com/search?q=(netflow|IPFIX)+(probe|exporter|parser) http://www.freebsd.org/cgi/man.cgi?query=ng_netflow&sektion=4 > I think for various reasons (including this one), we're soon going to > want some degree of padding traffic on the Tor network at some point > relatively soon Really? I can haz cake nao? Or only after I pump in this 3k email and watch 3k come out the other side to someone otherwise idling ;) https://cdn.plixer.com/images/slider-3-icon.png ... and/or some other bigdata systems ... From grarpamp at gmail.com Thu Aug 13 00:18:34 2015 From: grarpamp at gmail.com (grarpamp) Date: Thu, 13 Aug 2015 03:18:34 -0400 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: Message-ID: http://www.itworld.com/article/2969735/security/how-japans-privacy-visor-fools-facerecognition-cameras.html https://www.google.com/search?tbm=isch&q=anonymous From grarpamp at gmail.com Thu Aug 13 01:22:11 2015 From: grarpamp at gmail.com (grarpamp) Date: Thu, 13 Aug 2015 04:22:11 -0400 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> Message-ID: On Wed, Aug 12, 2015 at 1:38 AM, Seth wrote: > As far as I'm concerned, using the term 'police abuse' is a neuro-linguistic > programming tactic designed to make people subconsciously downplay the > seriousness of these crimes. http://www.social-engineer.org/ From grarpamp at gmail.com Thu Aug 13 04:39:05 2015 From: grarpamp at gmail.com (grarpamp) Date: Thu, 13 Aug 2015 07:39:05 -0400 Subject: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files") In-Reply-To: <20150813074017.GF2384@torproject.org> References: <55C59BBA.2020700@openmailbox.org> <1439101342-sup-8277@metis.syd1.tesser.org> <20150812234512.GE2384@torproject.org> <20150813074017.GF2384@torproject.org> Message-ID: On Thu, Aug 13, 2015 at 3:40 AM, Mike Perry wrote: >> But consider looking at average flow lifetimes on the internet. There may >> be case for going longer, bundling or turfing across a range of ports to falsely >> trigger a record / bloat, packet switching and so forth. > > This interests me, but we need more details to determine what this looks > like in practice. NANOG list could link specific papers regarding nature of the internet. The various flow exporters have sensible default timeouts tend cover that ok for purposes intended. > I suspect that this is one case where the switch to one guard may have > helped us. In that various activities such as ssh, browsing, youtube, whatever are confined to being multiplexed in one stream, that makes sense. > However, Tor still closes the TCP connection after just one > hour of inactivity. What if we kept it open longer? The exporting host has open flow count limited by memory (RAM). A longer flow might be forced to span two or more records. The "flags" field of some tools and versions may not mark a SYN seen in records 2+, the rest of tuple would stay same. Active timeout gives periodic data on longer flows, typically retaining start time but implementations can vary on state. Here's an early IOS 12 default... Active flows timeout in 30 minutes (1~60) Inactive flows timeout in 15 seconds (10~600) Also consider what is wished to hide, big iso download, little http clicks, start time of some characteristic session rippling across or appearing at edges, active data pumping attack. And what custom flowish things and flow settings an adversary might be doing to observe those. Traditional netflow seems useful as idea base to form a better heuristic analysis system. > Or what if the first > hop was an encrypted UDP-based PT, where it was not clear if the session > was torn down or closed? In old netflow, UDP, where src/dst ip and port tuple is same, just times out into a record. Some new exotic DPI might form session context flow record based on application inside, crypto would stop the cleartext portion of DPI. Some flow tools don't reassemble so the frag game might slide by them in an arms race. > in this case I am worried it may end up silencing the people I'd really > like to hear from. I want real data from the field, here. There's no censor here. Other operators in the field can and should speak up on topic (and feel free to bash any my errors or lack of paper / code / data posting). > You can say that, but then why isn't this being done in the real world? > The Snowden leaks seem to indicate exploitation is the weapon of choice. The Snowden leaks and Bamford also indicate NSA-UTAH, gigawatts, massive international cable tapping, CARNIVORE, NARUS, X-WHATEVER, etc. Exploitation could use a few offices full of hackers and some good peering points and hosts, not that huge $billions level of infrastructure and outside your borders expenditure. Though blackbagging to stand up an IP in the target net via an active tap could be useful, the driver to localize due to cost. > I suspect other factors are at work that prevent dragnet correlation > from being reliable, in addition to the economics of exploits today > (which may be subject to change). These factors are worth investigating > in detail, and ideally before the exploit cost profiles change. Yes, bigdata still has to conform to at least some kind of cost benefit analysis and substantiation too. Where is the line on that these days... 2^40, 2^56, 2^80...? > As such, I still look forward to hearing from someone who has worked at > an ISP/University/etc where this is actually practiced. What is in > *those* logs? The questions were of a general "intro to netflow" nature, thus the links, they and other resource describe all the data fields, formation of records, timeouts, aggregation, IPFIX extensibility, etc. Others and I on these lists know what "360 gigs" of netflow looks like. *What* specific info are you looking for beyond that? Applicability to exploit? Should people print out flows from a degenerate client and exit use case and line them up? More tools and tech... http://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-netflow/index.html nfdump, silk https://en.wikipedia.org/wiki/Network_Based_Application_Recognition More generally, netflow is not the only passive analysis tool or idea out there. So focusing on it may be narrow, though it is popular tool. > Specifically: Can we get someone (hell, anyone really) from Utah to > weigh in on this one? ;) Well, I'll speculate that by now they've lawyered up and silenced their OP such that it's unlikely that we'll hear from them (short of coderman firing a broadside FOIA at them ;) (We're speculating it's 360 gigs of netflow.) > Otherwise, the rest is just paranoid speculation, and bordering on > trolled-up misinformation. :/ https://www.youtube.com/watch?v=rh1Amz8s8MI http://www.multivax.com/last_question.html Everybody's now asking questions what is possible, my job is done ;) From carimachet at gmail.com Thu Aug 13 00:06:39 2015 From: carimachet at gmail.com (Cari Machet) Date: Thu, 13 Aug 2015 10:06:39 +0300 Subject: anybody know what came of t-fish cult of the dead cows work? In-Reply-To: <20150813004044.00B29A0762E@palinka.tinho.net> References: <20150812125412.GA2655@sivokote.iziade.m$> <20150813004044.00B29A0762E@palinka.tinho.net> Message-ID: thanks that would be amazing because then i can maybe find out what happen with his work - so kind of you On Aug 13, 2015 3:40 AM, wrote: > > we are legion - https://youtu.be/bC1ex2zRCYA?t=8m53s > > > > some dude that was part of lopht > > > > If you want personal introductions to any of the former L0PHT > crew, let me know. > > --dan > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 708 bytes Desc: not available URL: From carimachet at gmail.com Thu Aug 13 00:31:53 2015 From: carimachet at gmail.com (Cari Machet) Date: Thu, 13 Aug 2015 10:31:53 +0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> Message-ID: i am french yes and some irish and NATIVE AMERICAN which means i super dont like white fuckers that killed my people en mass and did a lot of other horrible things to them in the name of capitalism so i am black foot and cherokee and my character seems to align more with that part of my dna a lot of the time ... yes sometimes i am a dumb white fuck but thats the nature of the beast but mostly i behave not like a white person that smiles and nods and stays silent out of fear... i cant exist that way... i am just a 'wild indian' some other racists have said... they were white people of course i am very racist against white empirical capitalist and while i know native americans that suck - other races have people that suck of course but white people are really oppressive in my mind so i call them out for it some people have told me it is racist to claim my heritage of being native american ... a cop in berlin said 'hile hitler' to me when i told him i was native american but i guess i should be grateful he actually believed i was native american - some people dont i really despise zion because of their fascism and mass murder based on race and dont understand that other people love zion - do you love zion? i know me engaging the frame of racism is fucked up but it is so beyond any comprehension that whites have so much and others have so little maybe we can work together to figure out wording that points out that they are white without it being racists??? cause ya know they are like white so... no i guess it doesnt work... should we ignore their oppressive race? how... they are all over everything all the time nodding smiling acting calm even in the face of mass murder your little axiom about privilege wouldnt hold up in an ethical court ... wow i will tell my mother someone said i am from a privileged background she will rofl for days... i am privileged... isnt everyone from the great state of imperialist fuckers known as the us of fucking a beyond privileged compared to the people that dont have potable water on the planet and the people that dont have enough food on the planet and the people that are the others that dont have the right to even learn to read yes i am privileged i am literate On Aug 13, 2015 9:31 AM, "Jason McVetta" wrote: > On Thu, Aug 13, 2015 at 3:49 AM, Cari Machet wrote: > >> white people are lazy >> >> fuck your white ass constructs they are completely fake = mass white >> hysterical fuck all >> >> Racism in general is both dumb and reprehensible. Being racist against > your own race - I don't know you, but you sure do *look* like a pale > blonde white devil - goes beyond mere stupidity into some level of willful > idiocy. Or perhaps self-parody. > > >> pooor poor bernie his privilage is diminished by a microdot >> > Never yet met a person who attacked others for their "privilege" who > wasn't themselves from a highly privileged background. > > > Score: disruptive hysterics 2, reasoned discussion 0 > > > Yours Sincerely, > > Whitey W. Whiteman III > > > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4117 bytes Desc: not available URL: From cathalgarvey at cathalgarvey.me Thu Aug 13 03:57:11 2015 From: cathalgarvey at cathalgarvey.me (Cathal Garvey) Date: Thu, 13 Aug 2015 11:57:11 +0100 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> Message-ID: <55CC7807.8040905@cathalgarvey.me> On 13/08/15 08:58, Jason McVetta wrote: > On Thu, Aug 13, 2015 at 2:31 PM, Cari Machet > wrote: > > some irish and NATIVE AMERICAN > > Me too. Welcome to the club! This all makes it sound like the Irish bit is above racism, a privileged "white person" class that's never had any negative discrimination. Back in the golden days of the British Empire there were academic discussions on how the Irish constituted a different sub-species of lesser humanity. Racism hasn't always been about skin colour, and still isn't. Irish might have it somewhat easier today (but prejudices remain), but racism of all kinds, including anti-"white" (what the fuck is "White"? What the fuck is "Black"?), is just more of the same stupidity. Newsflash; the genetic diversity within any given "racial" population you choose is *far* greater than the miniscule genetic differences that define the characteristics we call "race". There is no such thing as "race" except that which we create in our monkey heads. -- Scientific Director, IndieBio EU Programme Now running in Cork, Ireland May->July Learn more at indie.bio and follow along! Twitter: @onetruecathal Phone: +353876363185 miniLock: JjmYYngs7akLZUjkvFkuYdsZ3PyPHSZRBKNm6qTYKZfAM peerio.com: cathalgarvey From carimachet at gmail.com Thu Aug 13 02:52:25 2015 From: carimachet at gmail.com (Cari Machet) Date: Thu, 13 Aug 2015 12:52:25 +0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> Message-ID: define racism then cause i dont think we have the same definition really also maybe we dont have the same definition of trolling just saying someone is a race and is fucked up with power based on their racial privilege is not racism its like saying someones race and then being called a racist because you categorized someone within their race have we been socially engineered as racist and genderist and specieist and ageist and mentally or physically challengedists - oh yes and we need to build new frames out of it but you saying i am white and racist against my "own" people because i hate the culture doesnt do that - if you really want to do something about it have a really long think about designing new frames... raise consciousness - make new words develop your own mind On Aug 13, 2015 11:00 AM, "Jason McVetta" wrote: > > On Thu, Aug 13, 2015 at 2:31 PM, Cari Machet wrote: >> >> some irish and NATIVE AMERICAN > > Me too. Welcome to the club! which tribe? not a club > >> >> which means i super dont like white fuckers > > Racist! > > Or neurotic self-hater??? are you being racist by deciding my identity for me ?... i dont identify as white ... i dont act white ... its like i am a tansgender person that identifies as a woman and you are telling me i am just a man and i have to just face that ... you dont get to decide for me what i identify with its really white of you to think you get to decide for me btw > >> >> yes sometimes i am a dumb [...] fuck > > Just sometimes? power bullshit ... very white capitalist behavior >> >> i am very racist > > Well hey, at least you are open about it. Admitting you have a problem is the first step to fixing it... > >> >> i really despise zion because of their fascism and mass murder based on race and dont understand that other people love zion - do you love zion? > > Are you talking about an historical group or place? Or do you mean Jews in general? The state of Israel? > > I usually dislike the public policy of Israel. But all the Jews I've personally met have been nice to me, and I've gotten along well with them. Draw your own conclusions. conclusion - you dont know anything about zion > >> engaging the frame of racism is fucked > > Sure is! > >> >> your little axiom about privilege wouldnt hold up in an ethical court ... > > Thank the gods I'm not a rule-of-lawyers judicialist. :) umn fuck gods please read nietzsche - wrote in the 1800's ethics has nothing to do with law ... guess you havent noticed > >> >> isnt everyone from the great state of imperialist fuckers known as the us of fucking a beyond privileged compared to the people that dont have potable water on the planet > > I'm currently living somewhere one can't safely drink the tap water. So I agree, massive ongoing public investment in water infrastructure sure is a nice thing! But most people on the planet do have potable water to drink, tho perhaps not as plentifully as in America. Not that many people worldwide are literally dying of thirst. umn talking people that dont have a tap to have fucking water in so... but here i cannot drink the tap water maybe more common than you know > > >> >> and the people that dont have enough food on the planet and the people that are the others that dont have the right to even learn to read > > Y'all gotta gets outta New Jack City once in a while. That part of America ya call "the flyover" is chock full o' people with horrific malnutrition caused by the toxic industrial food system. you have no idea where i am on the planet > >> yes i am privileged i am literate > > Good news: you may be overestimating your own privilege... > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4656 bytes Desc: not available URL: From jason.mcvetta at gmail.com Wed Aug 12 23:27:21 2015 From: jason.mcvetta at gmail.com (Jason McVetta) Date: Thu, 13 Aug 2015 13:27:21 +0700 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> Message-ID: On Thu, Aug 13, 2015 at 3:49 AM, Cari Machet wrote: > white people are lazy > > fuck your white ass constructs they are completely fake = mass white > hysterical fuck all > > Racism in general is both dumb and reprehensible. Being racist against your own race - I don't know you, but you sure do *look* like a pale blonde white devil - goes beyond mere stupidity into some level of willful idiocy. Or perhaps self-parody. > pooor poor bernie his privilage is diminished by a microdot > Never yet met a person who attacked others for their "privilege" who wasn't themselves from a highly privileged background. Score: disruptive hysterics 2, reasoned discussion 0 Yours Sincerely, Whitey W. Whiteman III -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1424 bytes Desc: not available URL: From jason.mcvetta at gmail.com Thu Aug 13 00:58:42 2015 From: jason.mcvetta at gmail.com (Jason McVetta) Date: Thu, 13 Aug 2015 14:58:42 +0700 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> Message-ID: On Thu, Aug 13, 2015 at 2:31 PM, Cari Machet wrote: > some irish and NATIVE AMERICAN > Me too. Welcome to the club! > which means i super dont like white fuckers > Racist! Or neurotic self-hater??? > yes sometimes i am a dumb [...] fuck > Just sometimes? > i am very racist > Well hey, at least you are open about it. Admitting you have a problem is the first step to fixing it... > i really despise zion because of their fascism and mass murder based on > race and dont understand that other people love zion - do you love zion? > Are you talking about an historical group or place? Or do you mean Jews in general? The state of Israel? I usually dislike the public policy of Israel. But all the Jews I've personally met have been nice to me, and I've gotten along well with them. Draw your own conclusions. engaging the frame of racism is fucked > Sure is! > your little axiom about privilege wouldnt hold up in an ethical court ... > Thank the gods I'm not a rule-of-lawyers judicialist. :) > isnt everyone from the great state of imperialist fuckers known as the us > of fucking a beyond privileged compared to the people that dont have > potable water on the planet > I'm currently living somewhere one can't safely drink the tap water. So I agree, massive ongoing public investment in water infrastructure sure is a nice thing! But most people on the planet do have potable water to drink, tho perhaps not as plentifully as in America. Not that many people worldwide are literally dying of thirst. > > and the people that dont have enough food on the planet and the people > that are the others that dont have the right to even learn to read > Y'all gotta gets outta New Jack City once in a while. That part of America ya call "the flyover" is chock full o' people with horrific malnutrition caused by the toxic industrial food system. yes i am privileged i am literate > Good news: you may be overestimating your own privilege... -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3975 bytes Desc: not available URL: From Rayzer at riseup.net Thu Aug 13 15:11:06 2015 From: Rayzer at riseup.net (Razer) Date: Thu, 13 Aug 2015 15:11:06 -0700 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> Message-ID: <55CD15FA.3060308@riseup.net> On 08/13/2015 12:31 AM, Cari Machet wrote: > i am french yes and some irish and NATIVE AMERICAN which... Blood quantum please. EVERY white privileged blonde is an Indian Princess after all. Are you enrolled? -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 819 bytes Desc: OpenPGP digital signature URL: From rysiek at hackerspace.pl Thu Aug 13 06:23:43 2015 From: rysiek at hackerspace.pl (rysiek) Date: Thu, 13 Aug 2015 15:23:43 +0200 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55CA7C96.20700@virtadpt.net> References: <55CA60F2.5060200@cathalgarvey.me> <55CA7C96.20700@virtadpt.net> Message-ID: <3270403.tLrsx75YWI@lapuntu> Dnia wtorek, 11 sierpnia 2015 15:52:06 The Doctor pisze: > On 08/11/2015 01:54 PM, Cathal Garvey wrote: > > Has anyone made a Juan markov chain yet? #rofljuan > > Yep. Can't tell the difference. "Juan Markov, the first automated revolutionary of the Internet age" -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From jason.mcvetta at gmail.com Thu Aug 13 03:06:08 2015 From: jason.mcvetta at gmail.com (Jason McVetta) Date: Thu, 13 Aug 2015 17:06:08 +0700 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> Message-ID: On Thu, Aug 13, 2015 at 4:52 PM, Cari Machet wrote: > define racism > Racism = saying things like "i super dont like $RACIAL_GROUP fuckers", and actions based on the feelings expressed in such a statement. The remainder of your previous post was self-refuting. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 715 bytes Desc: not available URL: From shelley at misanthropia.org Thu Aug 13 17:26:29 2015 From: shelley at misanthropia.org (Shelley) Date: Thu, 13 Aug 2015 17:26:29 -0700 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> <55CC7807.8040905@cathalgarvey.me> Message-ID: <20150814002613.198DC68013F@frontend2.nyi.internal> mode #cypherpunks +b ~q: carimachet at gmail.com From jason.mcvetta at gmail.com Thu Aug 13 03:29:33 2015 From: jason.mcvetta at gmail.com (Jason McVetta) Date: Thu, 13 Aug 2015 17:29:33 +0700 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> Message-ID: On Thu, Aug 13, 2015 at 4:52 PM, Cari Machet wrote: > are you being racist by deciding my identity for me ?... i dont identify > as white ... i dont act white ... its like i am a tansgender person that > identifies as a woman and you are telling me i am just a man and i have to > just face that ... you dont get to decide for me what i identify with > > its really white of you to think you get to decide for me btw > PS: I personally identify as His Imperial and Royal Majesty Napoleon I, By the Grace of God and the Constitutions of the Empire, Emperor of the French, King of Italy, Protector of the Confederation of the Rhine, Mediator of the Helvetic Confederation. If you don't wholeheartedly agree, endorse, and act in accordance with my self-proclaimed identity - then HOW DARE YOU, you privileged white devil Capitalist dog, try to decide my identity for me! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1277 bytes Desc: not available URL: From juan.g71 at gmail.com Thu Aug 13 13:54:16 2015 From: juan.g71 at gmail.com (Juan) Date: Thu, 13 Aug 2015 17:54:16 -0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> Message-ID: <55cd035c.8a668c0a.2c50e.ffffb05b@mx.google.com> On Thu, 13 Aug 2015 10:31:53 +0300 Cari Machet wrote: > i know me engaging the frame of racism is fucked up Because racism is technically nonsense. There isn't any link between skin color and any other meaningful trait. It's much better to look at things in terms of culture. From jdb10987 at yahoo.com Thu Aug 13 10:58:40 2015 From: jdb10987 at yahoo.com (jim bell) Date: Thu, 13 Aug 2015 17:58:40 +0000 (UTC) Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: Message-ID: <1321559839.4198874.1439488720288.JavaMail.yahoo@mail.yahoo.com> >From: Jason McVetta >PS:  I personally identify as His Imperial and Royal Majesty Napoleon I, By the Grace of God and the Constitutions of the Empire, Emperor of >the French, King of Italy, Protector of the Confederation of the Rhine, Mediator of the Helvetic Confederation.   I identify as Napoleon XIV.   https://www.youtube.com/watch?v=aOx2I6DgqXY          Jim Bell -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2517 bytes Desc: not available URL: From odinn.cyberguerrilla at riseup.net Thu Aug 13 18:05:44 2015 From: odinn.cyberguerrilla at riseup.net (odinn) Date: Thu, 13 Aug 2015 18:05:44 -0700 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55CD15FA.3060308@riseup.net> References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> <55CD15FA.3060308@riseup.net> Message-ID: <55CD3EE8.8040405@riseup.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 My fingers hurt from deleting all this stuff. No offense to all, but can you start a new thread on "Racism and how butthurt we all feel?" For this is totally OT from "privacy advocates resign over facials," imho. IMHO, NCI (No Connotation Intended). On 08/13/2015 03:11 PM, Razer wrote: > > > On 08/13/2015 12:31 AM, Cari Machet wrote: >> i am french yes and some irish and NATIVE AMERICAN which... > > > Blood quantum please. EVERY white privileged blonde is an Indian > Princess after all. > > Are you enrolled? > - -- http://abis.io ~ "a protocol concept to enable decentralization and expansion of a giving economy, and a new social good" https://keybase.io/odinn -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJVzT7oAAoJEGxwq/inSG8C5CsIALgLXJlFhs7AQRGxlECF67Gk kYi5XAxEjJiR/YJekh1boMOuoGKwJsB885Saml2hoJhGmyG/EaLFscv2jbtmMpEn wBmOa3PuZSxuDBi2UHAl8SOftUa5/kheE8e15OAaPQMtb6oHIcesUoCR1PEC29wm 6vvWEEotgcbgu5F0r+xmhs1JWbxOOQQFg1Lhxt1U3gLRkULYH8oUnyzUpuZLe/MH De5nii7dCGN2saP7GGm/v8PrBJN8lNAkyElSqmztCs6/INHyc07I8tIaR9hC0BKY lZjeIvONyZfaU68J2yHBV/fwAmCrAJIOKJNzGzZK3vVjhzYK1+ocDhY7zGC2YFE= =Os5d -----END PGP SIGNATURE----- From guninski at guninski.com Thu Aug 13 08:16:47 2015 From: guninski at guninski.com (Georgi Guninski) Date: Thu, 13 Aug 2015 18:16:47 +0300 Subject: anybody know what came of t-fish cult of the dead cows work? In-Reply-To: <20150813004044.00B29A0762E@palinka.tinho.net> References: <20150812125412.GA2655@sivokote.iziade.m$> <20150813004044.00B29A0762E@palinka.tinho.net> Message-ID: <20150813151647.GA2536@sivokote.iziade.m$> On Wed, Aug 12, 2015 at 08:40:43PM -0400, dan at geer.org wrote: > > we are legion - https://youtu.be/bC1ex2zRCYA?t=8m53s > > > > some dude that was part of lopht > > > > If you want personal introductions to any of the former L0PHT > crew, let me know. > We are asking if "Chris Wysopal" was really a part of the former l0pht team. He (and the mitre shit) were trolled about proposed RFC about "responsible disclosure" of 0dayz. From carimachet at gmail.com Thu Aug 13 08:37:42 2015 From: carimachet at gmail.com (Cari Machet) Date: Thu, 13 Aug 2015 18:37:42 +0300 Subject: anybody know what came of t-fish cult of the dead cows work? In-Reply-To: <20150813151647.GA2536@sivokote.iziade.m$> References: <20150812125412.GA2655@sivokote.iziade.m$> <20150813004044.00B29A0762E@palinka.tinho.net> <20150813151647.GA2536@sivokote.iziade.m$> Message-ID: thanks so much - super kind of you 0 dayz disclosure ...weighty indeed On Thu, Aug 13, 2015 at 6:16 PM, Georgi Guninski wrote: > On Wed, Aug 12, 2015 at 08:40:43PM -0400, dan at geer.org wrote: > > > we are legion - https://youtu.be/bC1ex2zRCYA?t=8m53s > > > > > > some dude that was part of lopht > > > > > > > If you want personal introductions to any of the former L0PHT > > crew, let me know. > > > > We are asking if "Chris Wysopal" was really a part of the former l0pht > team. > > He (and the mitre shit) were trolled about proposed RFC about > "responsible disclosure" of 0dayz. > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2306 bytes Desc: not available URL: From grarpamp at gmail.com Thu Aug 13 16:15:43 2015 From: grarpamp at gmail.com (grarpamp) Date: Thu, 13 Aug 2015 19:15:43 -0400 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55CD2200.1000003@cathalgarvey.me> References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> <55CC7807.8040905@cathalgarvey.me> <55CD2200.1000003@cathalgarvey.me> Message-ID: Can these various subthreads be ended or somehow brought back full circle to cpunkery, thanks. From grarpamp at gmail.com Thu Aug 13 16:56:04 2015 From: grarpamp at gmail.com (grarpamp) Date: Thu, 13 Aug 2015 19:56:04 -0400 Subject: anybody know what came of t-fish cult of the dead cows work? In-Reply-To: References: <20150812125412.GA2655@sivokote.iziade.m$> Message-ID: On Wed, Aug 12, 2015 at 4:25 PM, Cari Machet wrote: > as far as i know loghpt sold out Lots of groups (be they some flavor of criminal, counter thought, on some margins) form vehicles for the express original purpose of selling out providing escape path to wider legitimacy, careers... in that case the selling happens in formation, not during existance. From guninski at guninski.com Thu Aug 13 10:03:18 2015 From: guninski at guninski.com (Georgi Guninski) Date: Thu, 13 Aug 2015 20:03:18 +0300 Subject: How are the August 2015 Ferguson unrests going? Message-ID: <20150813170318.GB2536@sivokote.iziade.m$> How are the August 2015 Ferguson unrests going? https://en.wikipedia.org/wiki/Ferguson_unrest#August_2015 From guninski at guninski.com Thu Aug 13 10:07:32 2015 From: guninski at guninski.com (Georgi Guninski) Date: Thu, 13 Aug 2015 20:07:32 +0300 Subject: anybody know what came of t-fish cult of the dead cows work? In-Reply-To: References: Message-ID: <20150813170732.GC2536@sivokote.iziade.m$> On Wed, Aug 12, 2015 at 10:25:38AM -0700, Softy wrote: > > > > > > > > too long, didn't watch. > > > > > > > that explains the putrid discourse routinely being spewed via your email. > ​the implicit "only watches what I agrees with" ​is a failure of intellect. > > not everyone is a genius like you... From juan.g71 at gmail.com Thu Aug 13 16:13:14 2015 From: juan.g71 at gmail.com (Juan) Date: Thu, 13 Aug 2015 20:13:14 -0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> <55CC7807.8040905@cathalgarvey.me> Message-ID: <55cd23ee.d3628c0a.1700e.ffffc06c@mx.google.com> On Fri, 14 Aug 2015 05:41:51 +0700 Jason McVetta wrote: > On Aug 13, 2015 17:59, "Cathal Garvey" > wrote: > > > > This all makes it sound like the Irish bit is above racism, a > > privileged > "white person" class that's never had any negative discrimination. > > When you see photos of > > NO IRISH NEED APPLY > > signs in history class, and you have an Irish surname, it's difficult > not to feel why racism is abhorrent. so 'irish' is a 'race'? From juan.g71 at gmail.com Thu Aug 13 16:28:42 2015 From: juan.g71 at gmail.com (Juan) Date: Thu, 13 Aug 2015 20:28:42 -0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> <55CC7807.8040905@cathalgarvey.me> <55CD2200.1000003@cathalgarvey.me> Message-ID: <55cd278f.71518c0a.1a9b.ffffbcc2@mx.google.com> On Thu, 13 Aug 2015 19:15:43 -0400 grarpamp wrote: > Can these various subthreads be ended or somehow brought back full > circle to cpunkery, thanks. I suggest you do the right thing and go fuck yourself. From dan at geer.org Thu Aug 13 18:32:12 2015 From: dan at geer.org (dan at geer.org) Date: Thu, 13 Aug 2015 21:32:12 -0400 Subject: anybody know what came of t-fish cult of the dead cows work? In-Reply-To: Your message of "Thu, 13 Aug 2015 18:16:47 +0300." <20150813151647.GA2536@sivokote.iziade.m$> Message-ID: <20150814013212.AD0AEA0AE77@palinka.tinho.net> > We are asking if "Chris Wysopal" was really a part of the former > l0pht team. Yes. --dan From seanl at literati.org Thu Aug 13 15:13:56 2015 From: seanl at literati.org (Sean Lynch) Date: Thu, 13 Aug 2015 22:13:56 +0000 Subject: Open Fabs In-Reply-To: <20150729192528.GA3353@antiproton.jfet.org> References: <55B9064E.5010903@virtadpt.net> <20150729180714.GA2509@antiproton.jfet.org> <55B91C79.8010203@virtadpt.net> <20150729192528.GA3353@antiproton.jfet.org> Message-ID: Sorry for the delayed response. I have been falling behind on my personal email. On Wed, Jul 29, 2015 at 12:32 PM Riad S. Wahby wrote: > The Doctor wrote: > > I thought the point being made in the conversation was (and correct me > > if I'm wrong) that one could dump an arbitrary FPGA's contents to do a > > security audit on them. > > Ah, I see. I thought the focus was on cold boot or evil maid attacks > against FPGA-based (thus, nominally trustworthy) CPUs, and how these > attacks might compare to similar attacks against a commercial CPU. > This is what *I* meant. I was assuming an open source CPU design, which would make dumping the configuration ROM pointless. > > As you pointed out before, one may as well just grab the configuration > out of the ROM itself, and I agree---but my point was that either way, > what are we getting except some information that's not really secret? > So I think we're in violent agreement, at least to the extent that > we're talking about the same thing :) > > Also: one assumes that cold boot attacks against the contents of > RAM are more useful than against the SRAMs that hold the FPGA's > configuration, and in that case probably it's little different from > the equivalent attack against a commercial CPU (the DRAM is more > or less the same whether we're talking about the commercial or the > FPGA-based CPU---you're using the same DIMMs either way). > On further reflection, I suppose the contents of the block RAMs inside > the FPGA (little SRAMs sprinkled through the fabric) might be a prize > worth chasing, since those are presumably acting as registers and > cache for our CPU. It *might* be possible to do so by cold booting the > FPGA with a configuration that dumps the contents of the block RAMs, > assuming that those contents aren't cleared by power-on reset or the > configuration process itself. > This is what I was thinking of, though the terminology had escaped me for the moment. > > To your point above about auditing the configuration actually running > on an FPGA: that would be very interesting to prevent against an FPGA > manufacturer going the reflections-on-trusting-trust route. > > Here's one way an evil FPGA manufacturer might proceed: the CAD > software that the manufacturer provides with the FPGA detects that > you're synthesizing a CPU. Rather than emit a flawed bitstream > (which might be detectable just by examining the bitstream itself), > perhaps the software would hide in the bitstream some instructions > that direct the FPGA's configuration state machine to introduce flaws > at config time. > (FPGA config bitstreams are big, complicated, and proprietary; so > it's not impossible that they contain enough redundancy that one > could use stego to hide such commands in the bitstream.) > > (This approach also helps to get around the fact that the synthesis > and fitting process does a randomized search for a configuration > that meets your criteria (e.g., speed, size, etc.). In other words: > the best time to detect "this guy is trying to build a CPU" is when > the software is reading your Verilog, not when it's loading the > bitstream into an FPGA, because it's really really hard to decide > "this is a CPU" just by examining the bitstream itself.) > But I suppose if I were so devious as a manufacturer of FPGAs as to > detect a CPU design and introduce subtle bugs as a result, I would > probably also do my best to keep you from detecting it, even if you > *are* able to read out the config from a running FPGA. It's quite a > large haystack for hiding such a little needle... > > Sounds possible but much harder to do and with lower impact than backdooring a widely used CPU, at least until a bunch of people the government considers threats start using soft cores. > (And regarding cold booting to read out the config SRAMs: I worry even > more here than in the case of block RAMs that these have a carefully > designed power-on reset scheme in place so that the FPGA fabric comes > up in a known state.) > Might it be possible to use a glitch attack to prevent this from happening? I guess the question is, would you trust an FPGA's block RAM more than you would TXT and L1 cache on an Intel CPU to protect sensitive data? -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5682 bytes Desc: not available URL: From shelley at misanthropia.org Thu Aug 13 23:36:42 2015 From: shelley at misanthropia.org (Shelley) Date: Thu, 13 Aug 2015 23:36:42 -0700 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <9A043F3CF02CD34C8E74AC1594475C73F4ADA76F@uxcn10-5.UoA.auckland.ac.nz> References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> <55CC7807.8040905@cathalgarvey.me> , <20150814002613.198DC68013F@frontend2.nyi.internal> <9A043F3CF02CD34C8E74AC1594475C73F4ADA76F@uxcn10-5.UoA.auckland.ac.nz> Message-ID: <20150814063626.0CBE5C00023@frontend1.nyi.internal> On August 13, 2015 10:24:50 PM Peter Gutmann wrote: > Shelley writes: > > >mode #cypherpunks +b ~q: carimachet at gmail.com > > For procmail users, I've found that: > > :0 > * ^From: *carimachet > /dev/null > > :0 B > * Cari Machet > /dev/null > > gets rid of most of it. > > Peter. Yes, or I could add it to my sieve script. Honestly, I was just trying to get us back on track in a silly way. Someone asked that we get back to cypherpunk topics; I thought it was a mild & funny hint for her to do so. -S From cathalgarvey at cathalgarvey.me Thu Aug 13 16:02:24 2015 From: cathalgarvey at cathalgarvey.me (Cathal Garvey) Date: Fri, 14 Aug 2015 00:02:24 +0100 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> <55CC7807.8040905@cathalgarvey.me> Message-ID: <55CD2200.1000003@cathalgarvey.me> Those signs were abundant in Australia a few years back after the crash.. On 13/08/15 23:41, Jason McVetta wrote: > > On Aug 13, 2015 17:59, "Cathal Garvey" > wrote: > > > > This all makes it sound like the Irish bit is above racism, a > privileged "white person" class that's never had any negative > discrimination. > > When you see photos of > > NO IRISH NEED APPLY > > signs in history class, and you have an Irish surname, it's difficult > not to feel why racism is abhorrent. > -- Scientific Director, IndieBio EU Programme Now running in Cork, Ireland May->July Learn more at indie.bio and follow along! Twitter: @onetruecathal Phone: +353876363185 miniLock: JjmYYngs7akLZUjkvFkuYdsZ3PyPHSZRBKNm6qTYKZfAM peerio.com: cathalgarvey From carimachet at gmail.com Thu Aug 13 17:08:57 2015 From: carimachet at gmail.com (Cari Machet) Date: Fri, 14 Aug 2015 03:08:57 +0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55CC7807.8040905@cathalgarvey.me> References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> <55CC7807.8040905@cathalgarvey.me> Message-ID: i knew someone would bring up the racism of the irish it still is a super horror > aaargghhh is there a race i can call pirate? maybe the turks... they were the barbary pirates i think ...ottomans yes it is culture but it is also my dna ... my computer is not a microsoft computer and that is just that... it might have little gui's of microsoft but NO not microsoft ...i am racist against microsoft ...because native american or indigenous were slaughtered in mass in more ways than just their bodies and they still are and we have political prisoners and yes we say 'we' when we are together and some tribes are deemed with this kind of characteristic others not etc language structures are similar though ... it is very different to be indigenous and just denial of indigenousness is a defacement its part of the horror as the whites that took the native american babies away from their families wanting to erase the native american in them assimilation so how can we have our dna respected and not be racists ? so bringing it back to all things cypher is it possible to get these turkish docs unredacted - have they made it illegal to unredact shit - i think they have - i think i read it somewhere ? wheres hitler been lately? o am i being racist against germans? lets make u a new word ..how bout 'culturist' ... 'you are a culturist' ... no that doesnt sound right docs are all about the terrorist kurds you know - a race of people - and we are fucked by laura poitras again what fucking explanation can she have for these massive redactions turkey just wants everyone to be turks cathal the keyword option wasnt given to the turks then... i wonder if they have it now? maybe they hacked the american code and made it possible if the fuckers wouldnt give it to them http://www.spiegel.de/international/world/documents-show-nsa-and-gchq-spied-on-partner-turkey-a-989011.html On Thu, Aug 13, 2015 at 1:57 PM, Cathal Garvey wrote: > On 13/08/15 08:58, Jason McVetta wrote: > >> On Thu, Aug 13, 2015 at 2:31 PM, Cari Machet > > wrote: >> >> some irish and NATIVE AMERICAN >> >> Me too. Welcome to the club! >> > > This all makes it sound like the Irish bit is above racism, a privileged > "white person" class that's never had any negative discrimination. > > Back in the golden days of the British Empire there were academic > discussions on how the Irish constituted a different sub-species of lesser > humanity. Racism hasn't always been about skin colour, and still isn't. > > Irish might have it somewhat easier today (but prejudices remain), but > racism of all kinds, including anti-"white" (what the fuck is "White"? What > the fuck is "Black"?), is just more of the same stupidity. > > Newsflash; the genetic diversity within any given "racial" population you > choose is *far* greater than the miniscule genetic differences that define > the characteristics we call "race". There is no such thing as "race" except > that which we create in our monkey heads. > > > -- > Scientific Director, IndieBio EU Programme > Now running in Cork, Ireland May->July > Learn more at indie.bio and follow along! > Twitter: @onetruecathal > Phone: +353876363185 > miniLock: JjmYYngs7akLZUjkvFkuYdsZ3PyPHSZRBKNm6qTYKZfAM > peerio.com: cathalgarvey > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5791 bytes Desc: not available URL: From rysiek at hackerspace.pl Thu Aug 13 18:15:41 2015 From: rysiek at hackerspace.pl (rysiek) Date: Fri, 14 Aug 2015 03:15:41 +0200 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55cd23ee.d3628c0a.1700e.ffffc06c@mx.google.com> References: <55cd23ee.d3628c0a.1700e.ffffc06c@mx.google.com> Message-ID: <43627958.gU7eVbPnab@lapuntu> Dnia czwartek, 13 sierpnia 2015 20:13:14 Juan pisze: > On Fri, 14 Aug 2015 05:41:51 +0700 > > Jason McVetta wrote: > > On Aug 13, 2015 17:59, "Cathal Garvey" > > > > wrote: > > > This all makes it sound like the Irish bit is above racism, a > > > privileged > > > > "white person" class that's never had any negative discrimination. > > > > When you see photos of > > > > NO IRISH NEED APPLY > > > > signs in history class, and you have an Irish surname, it's difficult > > not to feel why racism is abhorrent. > > so 'irish' is a 'race'? As everything, it's a certain condition, I guess. *If* we can call it a "race", that would mean it's a "race condition". -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From juan.g71 at gmail.com Thu Aug 13 23:25:07 2015 From: juan.g71 at gmail.com (Juan) Date: Fri, 14 Aug 2015 03:25:07 -0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <43627958.gU7eVbPnab@lapuntu> References: <55cd23ee.d3628c0a.1700e.ffffc06c@mx.google.com> <43627958.gU7eVbPnab@lapuntu> Message-ID: <55cd892c.5d19370a.b1060.ffffe25b@mx.google.com> On Fri, 14 Aug 2015 03:15:41 +0200 rysiek wrote: > > so 'irish' is a 'race'? > > As everything, it's a certain condition, I guess. *If* we can call it > a "race", that would mean it's a "race condition". > now, that's a nerdy joke... From carimachet at gmail.com Thu Aug 13 17:51:59 2015 From: carimachet at gmail.com (Cari Machet) Date: Fri, 14 Aug 2015 03:51:59 +0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <20150814002613.198DC68013F@frontend2.nyi.internal> References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> <55CC7807.8040905@cathalgarvey.me> <20150814002613.198DC68013F@frontend2.nyi.internal> Message-ID: a true cypherpunk 'final solution' by shelly cypherpunk identity = shelly clones only that cant debate her/them On Fri, Aug 14, 2015 at 3:26 AM, Shelley wrote: > mode #cypherpunks +b ~q: carimachet at gmail.com > > > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1778 bytes Desc: not available URL: From carimachet at gmail.com Thu Aug 13 18:00:56 2015 From: carimachet at gmail.com (Cari Machet) Date: Fri, 14 Aug 2015 04:00:56 +0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55CD15FA.3060308@riseup.net> References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> <55CD15FA.3060308@riseup.net> Message-ID: if i said i was jewish we would have a different dialogue here i will tell my ancestors you decided they were nothing and i should just ignore them ... they will rofl i am sure On Fri, Aug 14, 2015 at 1:11 AM, Razer wrote: > > > On 08/13/2015 12:31 AM, Cari Machet wrote: > > i am french yes and some irish and NATIVE AMERICAN which... > > > Blood quantum please. EVERY white privileged blonde is an Indian > Princess after all. > > Are you enrolled? > > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1962 bytes Desc: not available URL: From pgut001 at cs.auckland.ac.nz Thu Aug 13 22:24:08 2015 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Fri, 14 Aug 2015 05:24:08 +0000 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <20150814002613.198DC68013F@frontend2.nyi.internal> References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> <55CC7807.8040905@cathalgarvey.me> , <20150814002613.198DC68013F@frontend2.nyi.internal> Message-ID: <9A043F3CF02CD34C8E74AC1594475C73F4ADA76F@uxcn10-5.UoA.auckland.ac.nz> Shelley writes: >mode #cypherpunks +b ~q: carimachet at gmail.com For procmail users, I've found that: :0 * ^From: *carimachet /dev/null :0 B * Cari Machet /dev/null gets rid of most of it. Peter. From jason.mcvetta at gmail.com Thu Aug 13 15:41:51 2015 From: jason.mcvetta at gmail.com (Jason McVetta) Date: Fri, 14 Aug 2015 05:41:51 +0700 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55CC7807.8040905@cathalgarvey.me> References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> <55CC7807.8040905@cathalgarvey.me> Message-ID: On Aug 13, 2015 17:59, "Cathal Garvey" wrote: > > This all makes it sound like the Irish bit is above racism, a privileged "white person" class that's never had any negative discrimination. When you see photos of NO IRISH NEED APPLY signs in history class, and you have an Irish surname, it's difficult not to feel why racism is abhorrent. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 549 bytes Desc: not available URL: From hettinga at gmail.com Fri Aug 14 05:10:12 2015 From: hettinga at gmail.com (Robert Hettinga) Date: Fri, 14 Aug 2015 08:10:12 -0400 Subject: anybody know what came of t-fish cult of the dead cows work? In-Reply-To: <20150814013212.AD0AEA0AE77@palinka.tinho.net> References: <20150814013212.AD0AEA0AE77@palinka.tinho.net> Message-ID: <9F481D22-A43F-47F7-AE09-AE899EE80A32@gmail.com> > On Aug 13, 2015, at 9:32 PM, dan at geer.org wrote: > >> We are asking if "Chris Wysopal" was really a part of the former >> l0pht team. > > Yes. Yes. Not only because I know Chris, aka Weld Pond, from the Digital Commerce Society of Boston, but because Chris used to work for Dan. At @Stake. The l0pht Heavy Industries spin-off. With lots of the other l0pht people. I’m not “doxxing” anybody, because it’s pretty common knowledge. Cheers, RAH From jya at pipeline.com Fri Aug 14 05:25:56 2015 From: jya at pipeline.com (John Young) Date: Fri, 14 Aug 2015 08:25:56 -0400 Subject: anybody know what came of t-fish cult of the dead cows work? In-Reply-To: <9F481D22-A43F-47F7-AE09-AE899EE80A32@gmail.com> References: <20150814013212.AD0AEA0AE77@palinka.tinho.net> <9F481D22-A43F-47F7-AE09-AE899EE80A32@gmail.com> Message-ID: Good beginning of common knowledge, Sir Hettinga, do please continue doxing the l0pht multi-layered spin-offs. A de-hirsuted facial recognition diagram of the seedling's growth would be a swell calendar of naked founding members of Boston CrypTea Party. At 08:10 AM 8/14/2015, you wrote: > > On Aug 13, 2015, at 9:32 PM, dan at geer.org wrote: > > > >> We are asking if "Chris Wysopal" was really a part of the former > >> l0pht team. > > > > Yes. > >Yes. Not only because I know Chris, aka Weld >Pond, from the Digital Commerce Society of >Boston, but because Chris used to work for Dan. >At @Stake. The l0pht Heavy Industries spin-off. >With lots of the other l0pht people. > >I’m not “doxxing” anybody, because it’s pretty common knowledge. > >Cheers, >RAH From hettinga at gmail.com Fri Aug 14 05:36:05 2015 From: hettinga at gmail.com (Robert Hettinga) Date: Fri, 14 Aug 2015 08:36:05 -0400 Subject: anybody know what came of t-fish cult of the dead cows work? In-Reply-To: References: <20150814013212.AD0AEA0AE77@palinka.tinho.net> <9F481D22-A43F-47F7-AE09-AE899EE80A32@gmail.com> Message-ID: > On Aug 14, 2015, at 8:25 AM, John Young wrote: > > Good beginning of common knowledge, Sir Hettinga, do please continue > doxing the l0pht multi-layered spin-offs. A de-hirsuted facial recognition > diagram of the seedling's growth would be a swell calendar of naked > founding members of Boston CrypTea Party. https://youtu.be/FZluzt3H6tk?t=1m32s From rysiek at hackerspace.pl Fri Aug 14 01:17:09 2015 From: rysiek at hackerspace.pl (rysiek) Date: Fri, 14 Aug 2015 10:17:09 +0200 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55cd892c.5d19370a.b1060.ffffe25b@mx.google.com> References: <43627958.gU7eVbPnab@lapuntu> <55cd892c.5d19370a.b1060.ffffe25b@mx.google.com> Message-ID: <3248501.VOenXQjKBo@lapuntu> Dnia piątek, 14 sierpnia 2015 03:25:07 Juan pisze: > On Fri, 14 Aug 2015 03:15:41 +0200 > > rysiek wrote: > > > so 'irish' is a 'race'? > > > > As everything, it's a certain condition, I guess. *If* we can call it > > a "race", that would mean it's a "race condition". > > now, that's a nerdy joke... I know this might be hard to grok for you, and I apologize. I will try next time to provide some explanation for the non-nerds among us. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From juan.g71 at gmail.com Fri Aug 14 12:51:10 2015 From: juan.g71 at gmail.com (Juan) Date: Fri, 14 Aug 2015 16:51:10 -0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <3248501.VOenXQjKBo@lapuntu> References: <43627958.gU7eVbPnab@lapuntu> <55cd892c.5d19370a.b1060.ffffe25b@mx.google.com> <3248501.VOenXQjKBo@lapuntu> Message-ID: <55ce460e.92c28c0a.7628a.41a4@mx.google.com> On Fri, 14 Aug 2015 10:17:09 +0200 rysiek wrote: > Dnia piątek, 14 sierpnia 2015 03:25:07 Juan pisze: > > On Fri, 14 Aug 2015 03:15:41 +0200 > > > > rysiek wrote: > > > > so 'irish' is a 'race'? > > > > > > As everything, it's a certain condition, I guess. *If* we can > > > call it a "race", that would mean it's a "race condition". > > > > now, that's a nerdy joke... > > I know this might be hard to grok for you, and I apologize. but it isn't. >I will > try next time to provide some explanation for the non-nerds among us. > I don't need any explanation, fucktard. And actually there isn't any. You just made a pun with a bit of jargon probably to try to show off your supposed 'technical' 'knowledge'. From shelley at misanthropia.org Fri Aug 14 18:11:55 2015 From: shelley at misanthropia.org (Shelley) Date: Fri, 14 Aug 2015 18:11:55 -0700 Subject: The Cari Machet Show [Was: Privacy advocates resign over facial recognition plans] In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> <55CC7807.8040905@cathalgarvey.me> <20150814002613.198DC68013F@frontend2.nyi.internal> <9A043F3CF02CD34C8E74AC1594475C73F4ADA76F@uxcn10-5.UoA.auckland.ac.nz> <20150814063626.0CBE5C00023@frontend1.nyi.internal> Message-ID: <20150815011139.0EA916800DD@frontend2.nyi.internal> You've never had to give someone some quiet time in a channel before? It was a silence ban, not a total ban. Not only did you not catch the joke, you didn't take the hint. So, here you go. Your very own thread in Cari Machet land, where all "white" people are lazy (whatever "white" is), fascist and racist (I hope you're including yourself.) -S ---------- On August 14, 2015 5:47:11 PM Cari Machet wrote: > getting us back on track subject wise ... now that is a joke > > i dont think being a fascist has anything to do with cypherpunks > > the desire to ban someone is not the structure of this space FOR REASONS it > is open for structural reasons - philosophical reasons... ya know LOGIC > > if the desire to ban people is inside you then you are engaging fascism > > when some people will die for others freedom its totally repulsive that you > would even desire to ban someone from cypherpunks list > > somewhere inside you shelley you know this ... please engage in self > critique - if i am so monstrous why read the words i write ? just disengage > - take responsibility and disengage > On Aug 14, 2015 9:38 AM, "Shelley" wrote: > > > On August 13, 2015 10:24:50 PM Peter Gutmann > > wrote: > > > > Shelley writes: > >> > >> >mode #cypherpunks +b ~q: carimachet at gmail.com > >> > >> For procmail users, I've found that: > >> > >> :0 > >> * ^From: *carimachet > >> /dev/null > >> > >> :0 B > >> * Cari Machet > >> /dev/null > >> > >> gets rid of most of it. > >> > >> Peter. > >> > > > > Yes, or I could add it to my sieve script. Honestly, I was just trying to > > get us back on track in a silly way. Someone asked that we get back to > > cypherpunk topics; I thought it was a mild & funny hint for her to do so. > > > > -S > > > > > > From grarpamp at gmail.com Fri Aug 14 15:52:57 2015 From: grarpamp at gmail.com (grarpamp) Date: Fri, 14 Aug 2015 18:52:57 -0400 Subject: Fwd: [Ntop-misc] PF_RING DAQ lowlevelbridge vs. tc? (UNCLASSIFIED) In-Reply-To: References: Message-ID: ---------- Forwarded message ---------- From: Knick, Scott E CTR (US) Date: Fri, Aug 14, 2015 at 9:16 AM Subject: [Ntop-misc] PF_RING DAQ lowlevelbridge vs. tc? (UNCLASSIFIED) To: "ntop-misc at listgateway.unipi.it" CLASSIFICATION: UNCLASSIFIED I have a question someone may or may not be able to help answer. Basically, I have in the past used the "tc" utility of iproute2 to combine multiple network interfaces into one "dummy" interface for monitoring purposes. (Creating a bridge via brctl has led to broadcast storms in some network locations, so it's not an option.) Now that I've integrated PF_RING into my sensor build and integrated the PF_RING DAQ so that Snort uses it, I have the option to use the "lowlevelbridge" setting so that multiple interfaces are combined by PF_RING for Snort's purposes. The question is: Is there an advantage of using one over the other? If I stick with using iproute2 to create a dummy interface, am I losing capture performance that the PF_RING DAQ could otherwise provide? (I'm not 100% certain, but I believe that Snort is generally reporting more packet loss when using the "dummy" interface than when using the PF_RING DAQ's lowlevelbridge option.) If it helps, I'm following the approach d escribed here for making the dummy interface using the iproute2 package: http://backreference.org/2014/06/17/port-mirroring-with-linux-bridges/ -- Scott Knick CLASSIFICATION: UNCLASSIFIED _______________________________________________ Ntop-misc mailing list Ntop-misc at listgateway.unipi.it http://listgateway.unipi.it/mailman/listinfo/ntop-misc -------------- next part -------------- A non-text attachment was scrubbed... Name: smime.p7s Type: application/pkcs7-signature Size: 5633 bytes Desc: not available URL: From juan.g71 at gmail.com Fri Aug 14 17:27:08 2015 From: juan.g71 at gmail.com (Juan) Date: Fri, 14 Aug 2015 21:27:08 -0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <4867682.FFmdJeZeQA@lapuntu> References: <3248501.VOenXQjKBo@lapuntu> <55ce460e.92c28c0a.7628a.41a4@mx.google.com> <4867682.FFmdJeZeQA@lapuntu> Message-ID: <55ce86be.c11c8d0a.4bb9c.64ee@mx.google.com> On Sat, 15 Aug 2015 01:45:01 +0200 rysiek wrote: > Dnia piątek, 14 sierpnia 2015 16:51:10 Juan pisze: > > > > now, that's a nerdy joke... > > > > > > I know this might be hard to grok for you, and I apologize. > > > > but it isn't. > > Happy to hear that! It does seem to imply you're as much a nerd as > me, though. I admire your courage to admit that much! No it doesn't. The ability to recognize a nerdy comment doesn't necessarily imply nerdiness on the part of the reader. Anyway, I'm done with the silly games, at least for today. > > Remember, however, that it's okay to ask if you need help with > understanding something! Thank you for your understanding... > > > > I will try next time to provide some explanation for the > > > non-nerds among us. > > > > I don't need any explanation, fucktard. > > You seem upset. Why? Was it something I said? I hope we can still be > best of friends! > > > And actually there isn't any. You just made a pun with a > > bit of jargon probably to try to show off your supposed 'technical' > > 'knowledge'. > > You got me there! That's actually a very honest and accurate > description of what I did, no question about it. I congratulate you > on your perspicacity! Again, I can only assume you based your > pertinent observation on your own experience and self-knowledge. > Birds of feather, are we not? > > If you need explanation of the word "perspicacity", do tell, though. > I would really rather hate it if it were to become a source of > misunderstanding between us brotherly souls. I'm sure we can both > learn a lot from each other, our current similitude notwithstanding. > Take care Rysiek. From rysiek at hackerspace.pl Fri Aug 14 16:45:01 2015 From: rysiek at hackerspace.pl (rysiek) Date: Sat, 15 Aug 2015 01:45:01 +0200 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <55ce460e.92c28c0a.7628a.41a4@mx.google.com> References: <3248501.VOenXQjKBo@lapuntu> <55ce460e.92c28c0a.7628a.41a4@mx.google.com> Message-ID: <4867682.FFmdJeZeQA@lapuntu> Dnia piątek, 14 sierpnia 2015 16:51:10 Juan pisze: > > > now, that's a nerdy joke... > > > > I know this might be hard to grok for you, and I apologize. > > but it isn't. Happy to hear that! It does seem to imply you're as much a nerd as me, though. I admire your courage to admit that much! Remember, however, that it's okay to ask if you need help with understanding something! > > I will try next time to provide some explanation for the non-nerds among > > us. > > I don't need any explanation, fucktard. You seem upset. Why? Was it something I said? I hope we can still be best of friends! > And actually there isn't any. You just made a pun with a bit of jargon > probably to try to show off your supposed 'technical' 'knowledge'. You got me there! That's actually a very honest and accurate description of what I did, no question about it. I congratulate you on your perspicacity! Again, I can only assume you based your pertinent observation on your own experience and self-knowledge. Birds of feather, are we not? If you need explanation of the word "perspicacity", do tell, though. I would really rather hate it if it were to become a source of misunderstanding between us brotherly souls. I'm sure we can both learn a lot from each other, our current similitude notwithstanding. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From carimachet at gmail.com Fri Aug 14 17:47:08 2015 From: carimachet at gmail.com (Cari Machet) Date: Sat, 15 Aug 2015 03:47:08 +0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: <20150814063626.0CBE5C00023@frontend1.nyi.internal> References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> <55CC7807.8040905@cathalgarvey.me> <20150814002613.198DC68013F@frontend2.nyi.internal> <9A043F3CF02CD34C8E74AC1594475C73F4ADA76F@uxcn10-5.UoA.auckland.ac.nz> <20150814063626.0CBE5C00023@frontend1.nyi.internal> Message-ID: getting us back on track subject wise ... now that is a joke i dont think being a fascist has anything to do with cypherpunks the desire to ban someone is not the structure of this space FOR REASONS it is open for structural reasons - philosophical reasons... ya know LOGIC if the desire to ban people is inside you then you are engaging fascism when some people will die for others freedom its totally repulsive that you would even desire to ban someone from cypherpunks list somewhere inside you shelley you know this ... please engage in self critique - if i am so monstrous why read the words i write ? just disengage - take responsibility and disengage On Aug 14, 2015 9:38 AM, "Shelley" wrote: > On August 13, 2015 10:24:50 PM Peter Gutmann > wrote: > > Shelley writes: >> >> >mode #cypherpunks +b ~q: carimachet at gmail.com >> >> For procmail users, I've found that: >> >> :0 >> * ^From: *carimachet >> /dev/null >> >> :0 B >> * Cari Machet >> /dev/null >> >> gets rid of most of it. >> >> Peter. >> > > Yes, or I could add it to my sieve script. Honestly, I was just trying to > get us back on track in a silly way. Someone asked that we get back to > cypherpunk topics; I thought it was a mild & funny hint for her to do so. > > -S > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2025 bytes Desc: not available URL: From coderman at gmail.com Sat Aug 15 07:57:35 2015 From: coderman at gmail.com (coderman) Date: Sat, 15 Aug 2015 07:57:35 -0700 Subject: anybody know what came of t-fish cult of the dead cows work? In-Reply-To: References: <20150814013212.AD0AEA0AE77@palinka.tinho.net> <9F481D22-A43F-47F7-AE09-AE899EE80A32@gmail.com> Message-ID: On 8/14/15, John Young wrote: > Good beginning of common knowledge, Sir Hettinga, do please continue > doxing the l0pht multi-layered spin-offs. A de-hirsuted facial recognition > diagram of the seedling's growth would be a swell calendar of naked > founding members of Boston CrypTea Party. some even in the Cascadia Freedom Zone, stirring mischievousness. what i want to know, is l0pht perspective on hacker/infosec gentrification.[0] ;) best regards, 0. "The hacker ethos is wild and anarchic, indifferent to the trappings of success. Or it was, until the gentrifiers moved in" - http://aeon.co/magazine/technology/how-yuppies-hacked-the-original-hacker-ethos/ --- The hacker hacked by Brett Scott The hacker ethos is wild and anarchic, indifferent to the trappings of success. Or it was, until the gentrifiers moved in Any large and alienating infrastructure controlled by a technocratic elite is bound to provoke. In particular, it will nettle those who want to know how it works, those who like the thrill of transgressing, and those who value the principle of open access. Take the US telephone network of the 1960s: a vast array of physical infrastructure dominated by a monopolistic telecoms corporation called AT&T. A young Air Force serviceman named John Draper – aka Captain Crunch – discovered that he could manipulate the rules of tone-dialling systems by using children’s whistles found in Cap’n Crunch cereal boxes. By whistling the correct tone into a telephone handset, he could place free long-distance calls through a chink in the AT&T armour. Draper was one of the first phone phreakers, a motley crew of jokers bent on exploring and exploiting loopholes in the system to gain free access. Through the eyes of conventional society, such phreakers were just juvenile pranksters and cheapskates. Yet their actions have since been incorporated into the folklore of modern hacker culture. Draper said in a 1995 interview: ‘I was mostly interested in the curiosity of how the phone company worked. I had no real desire to go rip them off and steal phone service.’ But in his book Hackers: Heroes of the Computer Revolution (1984), the US journalist Steven Levy went so far as to put up Draper as an avatar of the ‘true hacker’ spirit. Levy was trying to hone in on principles that he believed constituted a ‘hacker ethic’. One such principle was the ‘hands-on imperative’: Hackers believe that essential lessons can be learned about the systems – about the world – from taking things apart, seeing how they work, and using this knowledge to create new and even more interesting things. For all his protestations of innocence, it’s clear that Draper’s curiosity was essentially subversive. It represented a threat to the ordered lines of power within the system. The phreakers were trying to open up information infrastructure, and in doing so they showed a calculated disregard for the authorities that dominated it. This spirit has carried through into the modern context of the internet, which, after all, consists of computers connected to one another via physical telecommunications infrastructure. The internet promises open access to information and online assembly for individual computer owners. At the same time, it serves as a tool for corporate monopolists and government surveillance. The most widely recognised examples of modern ‘hackers’ are therefore groups such as Anonymous and WikiLeaks. These ‘cypherpunks’ and crypto-anarchists are internet natives. They fight – at least in principle – to protect the privacy of the individual while making power itself as transparent as possible. Popular now How yuppies hacked the original hacker ethos Can we design the ideal city or must it evolve organically? Why food should join books and music in the cultural canon This dynamic is not unique to the internet. It plays out in many other spheres of life. Consider the pranksters who mess with rail operators by jamming ticket-barrier gates to keep them open for others. They might not describe themselves as hackers, but they carry an ethic of disdain towards systems that normally allow little agency on the part of ordinary individuals. Such hacker-like subcultures do not necessarily see themselves in political terms. Nevertheless, they share a common tendency towards a rebellious creativity aimed at increasing the agency of underdogs. Unlike the open uprising of the liberation leader, the hacker impulse expresses itself via a constellation of minor acts of insurrection, often undertaken by individuals, creatively disguised to deprive authorities of the opportunity to retaliate. Once you’re attuned to this, you see hacks everywhere. I see it in capoeira. What is it? A dance? A fight? It is a hack, one that emerged in colonial Brazil as a way for slaves to practise a martial art under the guise of dance. As an approach to rebellion, this echoes the acts of subtle disobedience described by James Scott in Weapons of the Weak: Everyday forms of Peasant Resistance (1986). Hacking, then, looks like a practice with very deep roots – as primally and originally human as disobedience itself. Which makes it all the more disturbing that hacking itself appears to have been hacked. Get Aeon straight to your inbox Daily Weekly Despite the hive-mind connotations of faceless groups such as Anonymous, the archetype of ‘the hacker’ is essentially that of an individual attempting to live an empowered and unalienated life. It is outsider in spirit, seeking empowerment outside the terms set by the mainstream establishment. Perhaps it’s unwise to essentialise this figure. A range of quite different people can think of themselves in those terms, from the lonely nerd tinkering away on DIY radio in the garage to the investigative journalist immersed in politicised muckraking. It seems safe to say, though, that it’s not very hacker-like to aspire to conventional empowerment, to get a job at a blue-chip company while reading The Seven Habits of Highly Effective People. The hacker impulse is critical. It defies, for example, corporate ambitions. In my book The Heretic’s Guide to Global Finance (2013), I used this figure of the hacker as a model for readers wishing to challenge the global financial system. The machinery of global capital tends to be seen as complex, disempowering and alienating. The traditional means of contesting it is to build groups – such as Occupy Wall Street – to influence politicians and media to pressure it on your behalf. But this sets up a familiar dynamic: the earnest activist pitted against the entrenched interests of the business elite. Each group defines itself against the other, settling into a stagnant trench warfare. The individual activists frequently end up demoralised, complaining within echo-chambers about their inability to impact ‘the system’. They build an identity based on a kind of downbeat martyrdom, keeping themselves afloat through a fetishised solidarity with others in the same position. Related video 11 MINUTES Cyber-utopians believe the web spreads democratic freedom. In practice, it can serve oppressors as much as the oppressed I was attracted to the hacker archetype because, unlike the straightforward activist who defines himself in direct opposition to existing systems, hackers work obliquely. The hacker is ambiguous, specialising in deviance from established boundaries, including ideological battle lines. It’s a trickster spirit, subversive and hard to pin down. And, arguably, rather than aiming towards some specific reformist end, the hacker spirit is a ‘way of being’, an attitude towards the world. Take, for example, the urban explorer subculture, chronicled by Bradley Garrett in Explore Everything: Placehacking the City (2013). The search for unusual detours – through a sewer system, for example – is exhilarating because you see things that you’re not supposed to be interested in. Your curiosity takes you to places where you don’t belong. It thus becomes an assertion of individual defiance of social norms. The byproduct of such exploration is pragmatic knowledge, the disruption of standard patterns of thought, and also dealienation – you see what’s behind the interfaces that surround us, coming closer to the reality of our social world. the hacker modifies the machine to make it self-destruct, or programmes it to frustrate its owners, or opens its usage to those who don’t own it This is a useful sensibility to cultivate in the face of systems that create psychological, political and economic barriers to access. In the context of a complex system – computer, financial or underground transit – the political divide is always between well-organised, active insiders versus diffuse, passive outsiders. Hackers challenge the binary by seeking access, either by literally ‘cracking’ boundaries – breaking in – or by redefining the lines between those with permission and those without. We might call this appropriation. A figure of economic power such as a factory owner builds a machine to extend control. The activist Luddite might break it in rebellion. But the hacker explores and then modifies the machine to make it self-destruct, or programmes it to frustrate the purpose of it owners, or opens its usage to those who do not own it. The hacker ethic is therefore a composite. It is not merely exploratory curiosity or rebellious deviance or creative innovation within incumbent systems. It emerges from the intersection of all three. The word ‘hacker’ came into its own in the age of information technology (IT) and the personal computer. The subtitle of Levy’s seminal book – Heroes of the Computer Revolution – immediately situated hackers as the crusaders of computer geek culture. While some hacker principles he described were broad – such as ‘mistrust authority’ and ‘promote decentralisation’ – others were distinctly IT-centric. ‘You can create art and beauty on a computer,’ read one. ‘All information should be free,’ declared another. Ever since, most popular representations of the hacker way have followed Levy’s lead. Neal Stephenson’s cyberpunk novel Snow Crash (1992) featured the code-wielding Hiro as the ‘last of the freelance hackers’. The film Hackers (1995) boasted a youthful crew of jargon-rapping, keyboard-hammering computer ninjas. The media stereotype that began to be constructed was of a precocious computer genius using his technological mastery to control events or battle others. It remains popular to this day. In the James Bond film Skyfall (2012), the gadget-master Q is reinvented by the actor Ben Whishaw as a young hacker with a laptop, controlling lines of code with almost superhuman efficiency, as if his brain was wired directly into the computer. In the hands of a sensationalist media, the ethos of hacking is conflated with the act of cracking computer security In a sense, then, computers were the making of the hacker, at least as a popular cultural image. But they were also its undoing. If the popular imagination hadn’t chained the hacker figure so forcefully to IT, it’s hard to believe it ever would have been demonised in the way it has been, or that it could have been so effectively defanged. Computers, and especially the internet, are a primary means of subsistence for many. This understandably increases public anxiety at the bogeyman figure of the criminal ‘hacker’, the dastardly villain who breaches computer security to steal and cause havoc. Never mind that in ‘true’ hacker culture – as found in hackerspaces, maker-labs and open-source communities around the world – the mechanical act of breaking into a computer is just one manifestation of the drive to explore beyond established boundaries. In the hands of a sensationalist media, the ethos of hacking is conflated with the act of cracking computer security. Anyone who does that, regardless of the underlying ethos, is a ‘hacker’. Thus a single manifestation of a single element of the original spirit gets passed off as the whole. Through the lens of moral panic, a narrative emerges of hackers as a class of computer attack-dogs. Their primary characteristics become aggression and amorality. How to guard against them? How, indeed, to round out the traditional good-versus-evil narrative? Well, naturally, with a class of poacher-turned-gamekeepers. And so we find the construction of ‘white-hat’ hackers, protective and upstanding computer wizards for the public good. Here is where the second form of corruption begins to emerge. The construct of the ‘good hacker’ has paid off in unexpected ways, because in our computerised world we have also seen the emergence of a huge, aggressively competitive technology industry with a serious innovation obsession. This is the realm of startups, venture capitalists, and shiny corporate research and development departments. And, it is here, in subcultures such as Silicon Valley, that we find a rebel spirit succumbing to perhaps the only force that could destroy it: gentrification. Gentrification is the process by which nebulous threats are pacified and alchemised into money. A raw form – a rough neighbourhood, indigenous ritual or edgy behaviour such as parkour (or free running) – gets stripped of its otherness and repackaged to suit mainstream sensibilities. The process is repetitive. Desirable, unthreatening elements of the source culture are isolated, formalised and emphasised, while the unsettling elements are scrubbed away. Key to any gentrification process are successive waves of pioneers who gradually reduce the perceived risk of the form in question. In property gentrification, this starts with the artists and disenchanted dropouts from mainstream society who are drawn to marginalised areas. Despite their countercultural impulses, they always carry with them traces of the dominant culture, whether it be their skin colour or their desire for good coffee. This, in turn, creates the seeds for certain markets to take root. A WiFi coffeeshop appears next to the Somalian community centre. And that, in turn, sends signals back into the mainstream that the area is slightly less alien than it used to be. If you repeat this cycle enough times, the perceived dangers that keep the property developers and yuppies away gradually erode. Suddenly, the tipping point arrives. Through a myriad of individual actions under no one person’s control, the exotic other suddenly appears within a safe frame: interesting, exciting and cool, but not threatening. It becomes open to a carefree voyeurism, like a tiger being transformed into a zoo animal, and then a picture, and then a tiger-print dress to wear at cocktail parties. Something feels ‘gentrified’ when this shallow aesthetic of tiger takes over from the authentic lived experience of tiger. This is not just about property. In cosmetics shops on Oxford Street in London you can find beauty products blazoned with pagan earth-mother imagery. Why are symbols of earth-worship found within the citadels of consumerism, printed on products designed to neutralise and control bodily processes? They’ve been gentrified. Pockets of actual paganism do still exist, but in the mainstream such imagery has been thoroughly cleansed of any subversive context. At the frontiers of gentrification are entire ways of being – lifestyles, subcultures and outlooks that carry rebellious impulses. Rap culture is a case in point: from its ghetto roots, it has crossed over to become a safe ‘thing that white people like’. Gentrification is an enabler of doublethink, a means by which people in positions of relative power can, without contradiction, embrace practices that were formed in resistance to the very things they themselves represent. We are currently witnessing the gentrification of hacker culture. The countercultural trickster has been pressed into the service of the preppy tech entrepreneur class. It began innocently, no doubt. The association of the hacker ethic with startups might have started with an authentic counter-cultural impulse on the part of outsider nerds tinkering away on websites. But, like all gentrification, the influx into the scene of successive waves of ever less disaffected individuals results in a growing emphasis on the unthreatening elements of hacking over the subversive ones. Silicon Valley has come to host, on the one hand, a large number of highly educated tech-savvy people who loosely perceive themselves as rebels set against existing modes of doing business. On the other hand, it contains a very large pool of venture capital. The former group jostle for the investor money by explicitly attempting to build network monopolies – such as those created by Facebook and Google – for the purpose of extracting windfall profit for the founders and for the investors that back them, and perhaps, for the large corporates who will buy them out. the revised definition of the tech startup entrepreneur as a hacker forms part of an emergent system of Silicon Valley doublethink In this economic context, curiosity, innovation and iterative experimentation are ultimate virtues, and this element of the hacker ethic has proved to be an appealing frame for people to portray their actions within. Traits such as the drive for individual empowerment and the appreciation of clever solutions already resemble the traits of the entrepreneur. In this setting, the hacker attitude of playful troublemaking can be cast in Schumpeterian terms: success-driven innovators seeking to ‘disrupt’ old incumbents within a market in an elite ‘rebellion’. Thus the emergent tech industry’s definition of ‘hacking’ as quirky-but-edgy innovation by optimistic entrepreneurs with a love of getting things done. Nothing sinister about it: it’s just on-the-fly problem-solving for profit. This gentrified pitch is not just a cool personal narrative. It’s also a useful business construct, helping the tech industry to distinguish itself from the aggressive squares of Wall Street, competing for the same pool of new graduates. Indeed, the revised definition of the tech startup entrepreneur as a hacker forms part of an emergent system of Silicon Valley doublethink: individual startups portray themselves as ‘underdogs’ while simultaneously being aware of the enormous power and wealth the tech industry they’re a part of wields at a collective level. And so we see a gradual stripping away of the critical connotations of hacking. Who said a hacker can’t be in a position of power? Google cloaks itself in a quirky ‘hacker’ identity, with grown adults playing ping pong on green AstroTurf in the cafeteria, presiding over the company’s overarching agenda of network control. This doublethink bleeds through into mainstream corporate culture, with the growing institution of the corporate ‘hackathon’. We find financial giants such as Barclays hosting startup accelerators and financial technology hackathons at forums such as the FinTech Innovation Lab in Canary Wharf in London, ostensibly to discover the ‘future of finance’… or at least the future of payment apps that they can buy out. In this context, the hacker ethic is hollowed out and subsumed into the ideology of solutionism, to use a term coined by the Belarusian-born tech critic Evgeny Morozov. It describes the tech-industry vision of the world as a series of problems waiting for (profitable) solutions. This process of gentrification becomes a war over language. If enough newcomers with media clout use the hollowed-out version of the term, its edge grows dull. You end up with a mere affectation, failing to challenge otherwise conventional aspirations. And before you know it, an earnest Stanford grad is handing me a business card that says, without irony: ‘Founder. Investor. Hacker.’ Any gentrification process inevitably presents two options. Do you abandon the form, leave it to the yuppies and head to the next wild frontier? Or do you attempt to break the cycle, deface the estate-agent signs, and picket outside the wine bar with placards reading ‘Yuppies Go Home’? The answer to this depends on how much you care. Immigrant neighbourhoods definitely care enough to mobilise real resistance movements to gentrification, but who wants to protect the hacker ethic? For some, the spirit of hacking is stupid and pointless anyway, an individualistic self-help impulse, not an authentic political movement. What does it matter if it gets gentrified? We need to confront an irony here. Gentrification is a pacification process that takes the wild and puts it in frames. I believe that hacking is the reverse of that, taking the ordered rules of systems and making them fluid and wild again. Where gentrification tries to erect safe fences around things, hacker impulses try to break them down, or redefine them. These are two countervailing forces within human society. The gentrification of hacking is… well, perhaps a perfect hack. Explore Aeon Data & Information Internet & Communication Subcultures Or maybe I’ve romanticised it. Maybe hacking has never existed in some raw form to be gentrified. Perhaps it’s always been part of the capitalist commodification processes. Stuff is pulled down and then reordered. Maybe the hackers – like the disenchanted artists and hipsters – are just the vanguard charged with identifying the next profitable investment. Perhaps hacking has always been a contradictory amalgam that combines desire for the unstable and queer with the control impulse of the stable and straight. Certainly in mainstream presentations of hacking – whether the criminal version or the Silicon Valley version – there is a control fetish: the elite coder or entrepreneur sitting at a dashboard manipulating the world, doing mysterious or ‘awesome’ things out of reach of the ordinary person. I’m going to stake a claim on the word though, and state that the true hacker spirit does not reside at Google, guided by profit targets. The hacker impulse should not just be about redesigning products, or creating ‘solutions’. A hack stripped of anti-conventional intent is not a hack at all. It’s just a piece of business innovation. The un-gentrified spirit of hacking should be a commons accessible to all. This spirit can be seen in the marginal cracks all around us. It’s in the emergent forms of peer production and DIY culture, in maker-spaces and urban farms. We see it in the expansion of ‘open’ scenes, from open hardware to open biotech, and in the intrigue around 3D printers as a way to extend open-source designs into the realm of manufacture. In a world with increasingly large and unaccountable economic institutions, we need these everyday forms of resistance. Hacking, in my world, is a route to escaping the shackles of the profit-fetish, not a route to profit. Go home, yuppies. 10 August 2015 From coderman at gmail.com Sat Aug 15 08:03:22 2015 From: coderman at gmail.com (coderman) Date: Sat, 15 Aug 2015 08:03:22 -0700 Subject: FOIPA adventures [was: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files")] Message-ID: On 8/13/15, grarpamp wrote: > ... > Well, I'll speculate that by now they've lawyered up and silenced their > OP such that it's unlikely that we'll hear from them (short of coderman > firing a broadside FOIA at them ;) *grin* NetFlow added to future queue, for great justice... best regards, From carimachet at gmail.com Fri Aug 14 23:17:03 2015 From: carimachet at gmail.com (Cari Machet) Date: Sat, 15 Aug 2015 09:17:03 +0300 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: References: <2307550.aktsLoVmFc@lapuntu> <5591A49E.4040204@riseup.net> <19407322.87nTAoSQ5D@lapuntu> <55CA2401.9070402@riseup.net> <20150812122355.DB8F0680147@frontend2.nyi.internal> <55CC7807.8040905@cathalgarvey.me> <20150814002613.198DC68013F@frontend2.nyi.internal> <9A043F3CF02CD34C8E74AC1594475C73F4ADA76F@uxcn10-5.UoA.auckland.ac.nz> <20150814063626.0CBE5C00023@frontend1.nyi.internal> Message-ID: i am not going to follow you around like a good little white maggot shelley just what are you getting out of feeding the 'attention seeking' monster? fyi many threads i have had with my name in it on here made by people like you to the point of banality its not about me ... why do you need to try to make it about me????? right shelley there is no white person no white culture no empire built by whites no western european and american people that mass murdered enslaved have stolen resources ...still do the iraqi people japanese vietnamese loa panamanian on and on were not mass murdered by western european and american people ... they didnt murder every buffalo they could see so that my people would starve and pile the dead buffullo up into hills and take selfies with the corpses... white people is a construct of the real fascist racists > the people of color of which i am not i am not native american in any way in my dreams i am but i am a fanatical fuck ... people of other cultures are not assimilated by the western mickey mouse culture children are not molested by white men predominantly mass shootings in the us are not carried out by white men ever there is no box anywhere on any form that says check this box if you are 'white' judges in the us are not predominantly from western european dissent ...capitalism is not fascist and you are not part of the problem I was trolling the guy which you desire to make into something it is not But listen - or dont - if you are under the darkness of thought that cornell west is anyones saviour then you know nothing about capitalism or the history of the struggle for instance mlk took his babies and lived in chicago now you may know nothing of chicago which speaks volumes in and of itself but mlk was tackling poverty which you also probably know nothing about - i see no action by the academic west (ahha lol) that even pretends to be at that level Also leaders are now being understood as beyond problematic but you have no working knowledge of these matters yet pretend you are somehow smart in them - node based structure is the preferred model because they murder leaders ... now who is they? there is no they - white people have no dna tracers like me with my delusional native american dna scam there are no constructs in society its just an uncategorized blob & no person has been assimilated ever the dna tracers of whites have no information in them there is no build there is no planet its all a fantasy that you dont have to take responsibility for please tell me all seeing eye shelley what words should i use to describe and catagorize an entire sector of society global society that are presently and historically cannibals? especially seeing how they dont want to be categorized at all - they even eat categories when it doesnt reflect what they want it to white people have harness the imaginations of so many that people dont want to engage the identity of their ancestors asking people what their dna chain has in it if they are poc is a no no because it is 'racist' therefore no one any longer has a race ... how convenient its so much easier to assimilate the other if it is deluded into thinking it is not 'other' living in berlin i came to know your kind 'the climate deniers' there are some germans that can barely see and some that face the horror - whats the difference ? it doesnt matter their consciousness ? your consciousness doesnt matter ? they dont walk around saying what is german EVER they dont say there is no german or germany they fucking face the schiesse which makes a father fucking difference even though they themselves have been devoured by capitalism of the super fascist kind that you call out black lives matter people is repulsive and engages an unspeakable horror misanthrope indeed - life form that hates life please inform your self that there is serious shit you do not know and you are a limited interface information wants you to be free: https://en.wikipedia.org/wiki/White_people stuff white people do: white quotation of the week (bell hooks) stuffwhitepeopledo.blogspot.com/.../white-quotation-of-week-bell-hooks... Jan 29, 2009 - bell hooks, a widely published cultural critic, educational theorist and professor of English, is renowned for her work on the interlocking, hierarchical dynamics of race, class, .... The beauty of privilege is not having to notice it. https://www.google.com.tr/search?q=white+people+denial+of+the+white+race&oq=white+people+denial+of+the+white+race&aqs=chrome..69i57.14048j0j4&sourceid=chrome&es_sm=91&ie=UTF-8 http://culturalstudies.ucsc.edu/PUBS/Inscriptions/vol_5/bellhooks.html yoko ono: 'I did about five interviews yesterday because the documentary Imagine is opening in Europe.... Anyway, I woke up this morning with this kind of pain that I had never realized before. I said to myself, How dare they! Every time I have an interview I am asked this question: "The world hated you. You've been called the Dragon Lady for the past twenty years. How do you feel about it? Why do you think that happened?" You know what that is like? It's like somebody battering a woman and then saying, "All of us battered you, but why do you think we did it?" I'm the one responsible for telling them why I was battered? Well let them tell me. They're the ones who did it. The other side of it was Asian-bashing--it was as simple as that.' +++++++++++++++++++++++ that you shelley think you can really informedly speak on critique or otherwise have serious discourse on black do's and donts in radicalised activism is the essence of why they struggle On Aug 15, 2015 4:14 AM, "Shelley" wrote: > You've never had to give someone some quiet time in a channel before? It > was a silence ban, not a total ban. Not only did you not catch the joke, > you didn't take the hint. > > So, here you go. Your very own thread in Cari Machet land, where all > "white" people are lazy (whatever "white" is), fascist and racist (I hope > you're including yourself.) > > -S > > > ---------- > On August 14, 2015 5:47:11 PM Cari Machet wrote: > > getting us back on track subject wise ... now that is a joke >> >> i dont think being a fascist has anything to do with cypherpunks >> >> the desire to ban someone is not the structure of this space FOR REASONS >> it >> is open for structural reasons - philosophical reasons... ya know LOGIC >> >> if the desire to ban people is > > On Sat, Aug 15, 2015 at 3:47 AM, Cari Machet wrote: > getting us back on track subject wise ... now that is a joke > > i dont think being a fascist has anything to do with cypherpunks > > the desire to ban someone is not the structure of this space FOR REASONS > it is open for structural reasons - philosophical reasons... ya know LOGIC > > if the desire to ban people is inside you then you are engaging fascism > > when some people will die for others freedom its totally repulsive that > you would even desire to ban someone from cypherpunks list > > somewhere inside you shelley you know this ... please engage in self > critique - if i am so monstrous why read the words i write ? just disengage > - take responsibility and disengage > On Aug 14, 2015 9:38 AM, "Shelley" wrote: > >> On August 13, 2015 10:24:50 PM Peter Gutmann >> wrote: >> >> Shelley writes: >>> >>> >mode #cypherpunks +b ~q: carimachet at gmail.com >>> >>> For procmail users, I've found that: >>> >>> :0 >>> * ^From: *carimachet >>> /dev/null >>> >>> :0 B >>> * Cari Machet >>> /dev/null >>> >>> gets rid of most of it. >>> >>> Peter. >>> >> >> Yes, or I could add it to my sieve script. Honestly, I was just trying >> to get us back on track in a silly way. Someone asked that we get back to >> cypherpunk topics; I thought it was a mild & funny hint for her to do so. >> >> -S >> >> >> -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12536 bytes Desc: not available URL: From mirimir at riseup.net Sat Aug 15 22:06:39 2015 From: mirimir at riseup.net (Mirimir) Date: Sat, 15 Aug 2015 23:06:39 -0600 Subject: test mail In-Reply-To: <783889bf4e966e13841ae5122ee8239b@remailer.privacy.at> References: <783889bf4e966e13841ae5122ee8239b@remailer.privacy.at> Message-ID: <55D01A5F.9020807@riseup.net> On 08/15/2015 10:50 PM, Anonymous Remailer (austria) wrote: > SO is Cari Machet the same as Rachel Dolezal.. > ie is Cari a white lady in redface > Small hint idiot machet is found on NON of the tribal rolls as a surname.. > AND you DO look completely white! > > and it seems you ARE delusional! > > and white.. > > please STOP embarassing yourself in public as some of us who are on the > tribal rolls are calling you on your shit.. > > talk about cultural appropriation by a delusional white girl who hates herself.. > you need to get professional help quickly for these delusions.. > > anon > Five copies and counting ... Dumbass motherfucker ;) From mixmaster at remailer.privacy.at Sat Aug 15 18:55:43 2015 From: mixmaster at remailer.privacy.at (Anonymous Remailer (austria)) Date: Sun, 16 Aug 2015 03:55:43 +0200 (CEST) Subject: test mail Message-ID: <783889bf4e966e13841ae5122ee8239b@remailer.privacy.at> SO is Cari Machet the same as Rachel Dolezal.. ie is Cari a white lady in redface Small hint idiot machet is found on NON of the tribal rolls as a surname.. AND you DO look completely white! and it seems you ARE delusional! and white.. please STOP embarassing yourself in public as some of us who are on the tribal rolls are calling you on your shit.. talk about cultural appropriation by a delusional white girl who hates herself.. you need to get professional help quickly for these delusions.. anon From grarpamp at gmail.com Sun Aug 16 02:00:10 2015 From: grarpamp at gmail.com (grarpamp) Date: Sun, 16 Aug 2015 05:00:10 -0400 Subject: FOIPA adventures [was: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files")] In-Reply-To: References: Message-ID: On Sat, Aug 15, 2015 at 11:03 AM, coderman wrote: >> firing a broadside FOIA at them ;) > *grin* http://archives.utah.gov/opengovernment/index.html > NetFlow added to future queue, for great justice... keyword+: IPFIX From list at sysfu.com Sun Aug 16 09:29:09 2015 From: list at sysfu.com (Seth) Date: Sun, 16 Aug 2015 09:29:09 -0700 Subject: Is https://cpunks.org CERT expired? In-Reply-To: <20150816155930.GB2474@sivokote.iziade.m$> References: <20150816155930.GB2474@sivokote.iziade.m$> Message-ID: On Sun, 16 Aug 2015 08:59:30 -0700, Georgi Guninski wrote: > Did the cert expire or the NSA is after me? It appears to have expired yesterday. Some fingerprints as displayed by browser SHA-256 0B:D7:6F:4B:06:A7:03:47:8B:05:A6:8D:02:B4:91:FF:BE:0D:B1:13:C9:60:E7:95:72:B1:08:C5:9C:12:33:EA SHA1 6F:F6:9C:C7:49:90:7D:DF:D9:4E:31:8B:C3:9A:5E:5B:C4:4E:B3:5A From shelley at misanthropia.org Sun Aug 16 09:47:01 2015 From: shelley at misanthropia.org (Shelley) Date: Sun, 16 Aug 2015 09:47:01 -0700 Subject: NSA Spying Relies on AT&T'S "Extreme Willingness to Help" Message-ID: <20150816164645.06194680176@frontend2.nyi.internal> Nothing we didn't know or expect, just more confirmation/proof that AT&T & Verizon are all too eager to get on their knees for the NSA. https://www.propublica.org/article/nsa-spying-relies-on-atts-extreme-willingness-to-help Also worth a look: how they connected the dots, supporting documents. https://www.propublica.org/article/a-trail-of-evidence-leading-to-atts-partnership-with-the-nsa (Apologies for not including the article text, I'm currently mobile.) -S From Rayzer at riseup.net Sun Aug 16 12:04:50 2015 From: Rayzer at riseup.net (Razer) Date: Sun, 16 Aug 2015 12:04:50 -0700 Subject: test mail In-Reply-To: <55D01A5F.9020807@riseup.net> References: <783889bf4e966e13841ae5122ee8239b@remailer.privacy.at> <55D01A5F.9020807@riseup.net> Message-ID: <55D0DED2.7020106@riseup.net> On 08/15/2015 10:06 PM, Mirimir wrote: > On 08/15/2015 10:50 PM, Anonymous Remailer (austria) wrote: >> SO is Cari Machet the same as Rachel Dolezal.. >> ie is Cari a white lady in redface >> Small hint idiot machet is found on NON of the tribal rolls as a surname.. >> AND you DO look completely white! >> >> and it seems you ARE delusional! >> >> and white.. >> >> please STOP embarassing yourself in public as some of us who are on the >> tribal rolls are calling you on your shit.. >> >> talk about cultural appropriation by a delusional white girl who hates herself.. >> you need to get professional help quickly for these delusions.. >> >> anon >> > Five copies and counting ... > > Dumbass motherfucker ;) > I DO appreciate the sentiment though. -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 819 bytes Desc: OpenPGP digital signature URL: From jya at pipeline.com Sun Aug 16 09:23:28 2015 From: jya at pipeline.com (John Young) Date: Sun, 16 Aug 2015 12:23:28 -0400 Subject: Is https://cpunks.org CERT expired? In-Reply-To: <20150816155930.GB2474@sivokote.iziade.m$> References: <20150816155930.GB2474@sivokote.iziade.m$> Message-ID: Expired 8/14/2015. And NSA owns your memnyms and all ISIS's HTTPSs. At 11:59 AM 8/16/2015, you wrote: >Did the cert expire or the NSA is after me? From rsw at jfet.org Sun Aug 16 10:34:59 2015 From: rsw at jfet.org (Riad S. Wahby) Date: Sun, 16 Aug 2015 13:34:59 -0400 Subject: Is https://cpunks.org CERT expired? In-Reply-To: <20150816155930.GB2474@sivokote.iziade.m$> References: <20150816155930.GB2474@sivokote.iziade.m$> Message-ID: <20150816173459.GA24149@antiproton.jfet.org> Georgi Guninski wrote: > Did the cert expire or the NSA is after me? As JYA said, both. But now I've fixed one of them. :) -=rsw From list at sysfu.com Sun Aug 16 14:33:34 2015 From: list at sysfu.com (Seth) Date: Sun, 16 Aug 2015 14:33:34 -0700 Subject: Is https://cpunks.org CERT expired? In-Reply-To: <55D0BCB2.2080401@openmailbox.org> References: <20150816155930.GB2474@sivokote.iziade.m$> <55D0BCB2.2080401@openmailbox.org> Message-ID: On Sun, 16 Aug 2015 09:39:14 -0700, oshwm wrote: > I have the same fingerprints for https://cpunks.org, do we now have a > Web of Trust :D You gotta start somewhere I guess. If you'll pardon the Windows only nature of it, another utility you can employ if you suspect an MiTM certificate attack is SSLEYE. https://www.wilderssecurity.com/threads/ssleye.364056/ -------------- next part -------------- A non-text attachment was scrubbed... Name: cpunks-ssleye-scan.png Type: image/png Size: 46593 bytes Desc: not available URL: From jya at pipeline.com Sun Aug 16 12:13:13 2015 From: jya at pipeline.com (John Young) Date: Sun, 16 Aug 2015 15:13:13 -0400 Subject: NSA Spying Relies on AT&T'S "Extreme Willingness to Help" In-Reply-To: <20150816164645.06194680176@frontend2.nyi.internal> References: <20150816164645.06194680176@frontend2.nyi.internal> Message-ID: The NYT-Propublica is an informative and impressive release, in many ways better than previous. It expands on the earlier revelations (as the narratives state) with some overlap and filling in gaps. A good sign the holders of the balance of the Snowden dump are digging deeper and learning how convey a fuller picture or at least a more enthralling one for the public while techologists twiddle thumbs awaiting useful data to devise defenses. (A hint from some Snowden withholders there may be handoffs to technologists separate from the public. Schneier, Matthew Green, a few other comsec wizards aiding publishers have said as much.) Hardly complete to be sure, with about 10% of the dump published, with plenty of gaps indicated by jumps in narratives and still too many redactions -- presumably the result of consulting with officials as heretofore disclosed, or due to Snowen's instructions about what to withhold, either to "avoid national security harm" or in expectation US prosecutors might be mollified in the negotiations for his return to the US. Most frustratingly, details of the spying technology are missing with emphasis still on slide shows and textual summaries -- most likely to satisfy the public rather than technologists at home and national opponents. Jacob Appelbaum's and a few others releases of the technology are the exception, civil liberties and lawful issues remaining in the forefront of released documents and much more so for the journalistic accounts. It might be surmised that staying away from technology disclosures and featuring 5-Eyes and partners prowess and comprehensiveness of slides and text serves to warn the enemy of what's in store without disclosing information to defend against it. In particular, Snowden's and associates harping on the need for widespread, strong encryption use, even though the documents show how the spies bypass it, undermine it, use it for deception, implant backdoors in it (as well as in chips, OSes, routers, nodes, cable stations, server farms, teleco hubs, virtually everywhere in the global system as shown in this latest release) should be taken as a warning encryption is not the magic cape its proponents claim. This suggests reliance upon encryption may be a decoy to divert attention from other comsec protection, the old CryptoAG ploy: The most trusted comsec the most likely not. The tremendous rush to market cybersecurity means and methods for public consumption, combined with 5-Eyes outreach to industry for means and methods to defeat cybersecurity, is a wonderful paradox, albeit powerfully stenching with treachery. Whether Snowden is more of a hero to the public than to 5-Eyes and its partners is up for future historical debate. Say 25-30 years ahead, about the time required for full disclosure of the Snowden dump at the current rate of release (to the public, not clear which wizards getting early access are developing products, sales and industries to capitalize on cybersecurity alarm, some most assuredly are based on their inability to avoid bragging about being consulted by government, industry, NGOs,, vulture capitalists, and the usual speaker bureaus where wizards flog their skills.) From coderman at gmail.com Sun Aug 16 16:13:23 2015 From: coderman at gmail.com (coderman) Date: Sun, 16 Aug 2015 16:13:23 -0700 Subject: FOIPA adventures [was: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files")] In-Reply-To: References: Message-ID: On 8/16/15, grarpamp wrote: > ... >> NetFlow added to future queue, for great justice... > > keyword+: IPFIX also sFlow, J-Flow, packetfilter, netfilter, xtables, and other network performance and packet counter techniques. more? :) ... just waiting for scheduled requests to grant, From coderman at gmail.com Sun Aug 16 16:30:12 2015 From: coderman at gmail.com (coderman) Date: Sun, 16 Aug 2015 16:30:12 -0700 Subject: Snowden dump scope defined, now to details... [was: NSA Spying Relies on AT&T'S "Extreme Willingness to Help"] Message-ID: On 8/16/15, John Young wrote: > The NYT-Propublica is an informative and impressive release, > in many ways better than previous. It expands on the earlier > revelations (as the narratives state) with some overlap and filling > in gaps. A good sign the holders of the balance of the Snowden > dump are digging deeper and learning how convey a fuller picture this has been the most interesting observation on reporting over the last year across the channeled Snowden dataspill. with the bulk of significant revelations identified and conveyed, the trend now clearly toward fill rather than reach. all of the clamor for immediate and full disclosure perhaps under stated the scope of unique and noteworthy aspects contained within material that is also significantly banal, un-informative filler. in any case, i look forward to the details better defining the day to day operations of a super power intelligence apparatus so that we may better defend against this class as a whole, in the future. best regards, From mirimir at riseup.net Sun Aug 16 15:34:57 2015 From: mirimir at riseup.net (Mirimir) Date: Sun, 16 Aug 2015 16:34:57 -0600 Subject: test mail In-Reply-To: <55D0DED2.7020106@riseup.net> References: <783889bf4e966e13841ae5122ee8239b@remailer.privacy.at> <55D01A5F.9020807@riseup.net> <55D0DED2.7020106@riseup.net> Message-ID: <55D11011.50509@riseup.net> On 08/16/2015 01:04 PM, Razer wrote: > > > On 08/15/2015 10:06 PM, Mirimir wrote: >> On 08/15/2015 10:50 PM, Anonymous Remailer (austria) wrote: >>> SO is Cari Machet the same as Rachel Dolezal.. ie is Cari a >>> white lady in redface Small hint idiot machet is found on NON >>> of the tribal rolls as a surname.. AND you DO look completely >>> white! >>> >>> and it seems you ARE delusional! >>> >>> and white.. >>> >>> please STOP embarassing yourself in public as some of us who >>> are on the tribal rolls are calling you on your shit.. >>> >>> talk about cultural appropriation by a delusional white girl >>> who hates herself.. you need to get professional help quickly >>> for these delusions.. >>> >>> anon >>> >> Five copies and counting ... >> >> Dumbass motherfucker ;) >> > > I DO appreciate the sentiment though. Well, I do find Juan's input to be far more interesting than Cari's. But I'm fully capable of ignoring anything. And storage is cheap. Also, the whole "tribal rolls" thing is bullshit. Maybe now, with affordable genetic analysis, it could become objective. However, heritage is a fundamentally racist concept, except in the limited context of establishing tribal membership and treaty rights. And finally, it's laughable for someone to claim membership in some tribal roll via anonymous remailer. I do appreciate the sentimental value of remailer posts to cypherpunks. But seriously? From oshwm at openmailbox.org Sun Aug 16 09:39:14 2015 From: oshwm at openmailbox.org (oshwm) Date: Sun, 16 Aug 2015 17:39:14 +0100 Subject: Is https://cpunks.org CERT expired? In-Reply-To: References: <20150816155930.GB2474@sivokote.iziade.m$> Message-ID: <55D0BCB2.2080401@openmailbox.org> On 16/08/15 17:29, Seth wrote: > On Sun, 16 Aug 2015 08:59:30 -0700, Georgi Guninski > wrote: > >> Did the cert expire or the NSA is after me? > > It appears to have expired yesterday. > > Some fingerprints as displayed by browser > > SHA-256 > 0B:D7:6F:4B:06:A7:03:47:8B:05:A6:8D:02:B4:91:FF:BE:0D:B1:13:C9:60:E7:95:72:B1:08:C5:9C:12:33:EA > > SHA1 6F:F6:9C:C7:49:90:7D:DF:D9:4E:31:8B:C3:9A:5E:5B:C4:4E:B3:5A I have the same fingerprints for https://cpunks.org, do we now have a Web of Trust :D -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 819 bytes Desc: OpenPGP digital signature URL: From guninski at guninski.com Sun Aug 16 08:59:30 2015 From: guninski at guninski.com (Georgi Guninski) Date: Sun, 16 Aug 2015 18:59:30 +0300 Subject: Is https://cpunks.org CERT expired? Message-ID: <20150816155930.GB2474@sivokote.iziade.m$> Did the cert expire or the NSA is after me? From grarpamp at gmail.com Sun Aug 16 22:17:41 2015 From: grarpamp at gmail.com (grarpamp) Date: Mon, 17 Aug 2015 01:17:41 -0400 Subject: Snowden dump scope defined, now to details... [was: NSA Spying Relies on AT&T'S "Extreme Willingness to Help"] In-Reply-To: References: Message-ID: On Sun, Aug 16, 2015 at 7:30 PM, coderman wrote: > > with the bulk of significant revelations identified and conveyed, the > trend now clearly toward fill rather than reach. Fill is great, but if this is the end of breadth, it is a sad day indeed. (I'm still taking odds on some significant dumps both shortly before [as disruptive] and after [as legislative] the US elections.) But there are many other things that need more light... what is their status on crypto? Their bigdata analysis capabilities? And more generally... what people's governments are doing in (and not in) their name and in secret, both for and against them? From grarpamp at gmail.com Sun Aug 16 23:02:12 2015 From: grarpamp at gmail.com (grarpamp) Date: Mon, 17 Aug 2015 02:02:12 -0400 Subject: More Collateral Humanity... Message-ID: Shit you should read... https://firstlook.org/theintercept/2015/08/13/hunger-striking-detainee-tests-obamas-will-close-guantanamo/ No really... https://ccrjustice.org/sites/default/files/attach/2015/06/2015-06-25_BaOdah_BriefSupportMtnforJudgment.pdf Brought to you by the department of "wake up you non-USA people and push and prosecute the US" dept. You do remember how to use those quaint international relics like Nuremburg, Hague and UN don't you? Because if you don't, you're complicit, and you'll eventually get it shit back [by and] upon your own selves like this... https://firstlook.org/theintercept/2015/08/12/cia-torture-tactics-reemerge-new-york-prison/ And everyone else will be proudly laughing... https://firstlook.org/theintercept/2015/08/14/bland-monster-jeb-bush-proud-brothers-torture/ And ensuring you're legally fucked forever... https://firstlook.org/theintercept/2015/08/12/democrats-continue-lie-obamas-failed-guantanamo-vow/ And by the "if you don't, this is what you'll soon get for using crypto, and things like pen paper and soapbox" dept. https://en.wikipedia.org/wiki/Human_rights https://en.wikipedia.org/wiki/International_humanitarian_law https://en.wikipedia.org/wiki/United_States_incarceration_rate From damianfossi at gmail.com Mon Aug 17 03:23:30 2015 From: damianfossi at gmail.com (Damian Fossi) Date: Mon, 17 Aug 2015 05:53:30 -0430 Subject: Someone recommends the hacking TV series "Mr. Robot" In-Reply-To: <20150817100838.GC2500@sivokote.iziade.m$> References: <20150817100838.GC2500@sivokote.iziade.m$> Message-ID: I recommend it, I watch it every week. About the Hacking techniques, they are completely accurate. Enjoy, https://thepiratebay.gd/search/Mr%20Robot/0/99/0 On 17 August 2015 at 05:38, Georgi Guninski wrote: > Someone, technically literate, recommends the hacking TV series "Mr. > Robot". > > https://en.wikipedia.org/wiki/Mr._Robot_%28TV_series%29 > > From wikipedia: > --- > The series follows Elliot Alderson, a young man living in New York City, > who works at Allsafe as a cyber security engineer. Elliot has social > anxiety disorder, but connects to people by hacking them and acts as a > cyber vigilante. He is recruited by a mysterious social-anarchist known > as "Mr. Robot", and joins his team of hackers, known as "fsociety". One > of their missions is to take down one of the largest corporations in the > world, E Corp (known as "Evil Corp" by Elliot) > > --- > > -- Damián D. Fossi Salas > ¡Software Libre hasta el 2 mil siempre! http://damian.fossi.me Uso: Debian GNU/Linux con Kernel 3.12.6-libre Linux User: 188464 Jabber ID: dam1an en chat.cpunks.us Twitter.com > http://twitter.com/dam1an -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1984 bytes Desc: not available URL: From sswalow at gmail.com Mon Aug 17 04:50:51 2015 From: sswalow at gmail.com (swalow swalow) Date: Mon, 17 Aug 2015 07:50:51 -0400 Subject: Someone recommends the hacking TV series "Mr. Robot" In-Reply-To: <20150817113731.GD2500@sivokote.iziade.m$> References: <20150817100838.GC2500@sivokote.iziade.m$> <20150817113731.GD2500@sivokote.iziade.m$> Message-ID: As usual it's in the grey zone. The big corporation the characters are fighting against is huge and can afford to cover up its mistakes without any repercussions. The corporation is doing stupid/bad things and hackers decided to stop that nonsense( you'll see what stop means if you watch the series ) It's interesting how even my non-techy friends like it. I can't recommend it enough but you have to see for yourself. Watch the pilot episode at least. On Mon, Aug 17, 2015 at 05:53:30AM -0430, Damian Fossi wrote: > I recommend it, I watch it every week. About the Hacking techniques, they > are completely accurate. > I haven't watch it yet. "someone" agrees about the hacking techniques. Might be wrong, but am sceptical that U$A would allow TV series conveying anti-establishment/anti-bigcorp message (IMHO big TVs are f.cked whores). Without spoiling the plot of the series, do you find it "socially correct" so far? -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1181 bytes Desc: not available URL: From carimachet at gmail.com Sun Aug 16 22:26:38 2015 From: carimachet at gmail.com (Cari Machet) Date: Mon, 17 Aug 2015 08:26:38 +0300 Subject: NSA Spying Relies on AT&T'S "Extreme Willingness to Help" In-Reply-To: References: <20150816164645.06194680176@frontend2.nyi.internal> Message-ID: yay somehow USG 'legally' permits surveillance/search/seizure without a warrant of US persons if they are outside of the US - take a walk to canada and you loose your rights ... did people ever really have them? maybe before EO 12333 shit is fucked up and bullshit what do we think of this kind of cory doctorow work john? https://www.futurelearn.com/courses/introduction-to-cyber-security/4/register as some think security is a myth and actually letting everything be public is safer - does it have to be either or? On Sun, Aug 16, 2015 at 10:13 PM, John Young wrote: > The NYT-Propublica is an informative and impressive release, > in many ways better than previous. It expands on the earlier > revelations (as the narratives state) with some overlap and filling > in gaps. A good sign the holders of the balance of the Snowden > dump are digging deeper and learning how convey a fuller picture > or at least a more enthralling one for the public while techologists > twiddle thumbs awaiting useful data to devise defenses. (A hint > from some Snowden withholders there may be handoffs to > technologists separate from the public. Schneier, Matthew > Green, a few other comsec wizards aiding publishers have > said as much.) > > Hardly complete to be sure, with about 10% of the dump > published, with plenty of gaps indicated by jumps in narratives > and still too many redactions -- presumably the result of > consulting with officials as heretofore disclosed, or due to > Snowen's instructions about what to withhold, either to > "avoid national security harm" or in expectation US prosecutors > might be mollified in the negotiations for his return to the > US. > > Most frustratingly, details of the spying technology are > missing with emphasis still on slide shows and textual > summaries -- most likely to satisfy the public rather than > technologists at home and national opponents. > > Jacob Appelbaum's and a few others releases of the > technology are the exception, civil liberties and lawful > issues remaining in the forefront of released documents > and much more so for the journalistic accounts. > > It might be surmised that staying away from technology > disclosures and featuring 5-Eyes and partners prowess > and comprehensiveness of slides and text serves to > warn the enemy of what's in store without disclosing > information to defend against it. > > In particular, Snowden's and associates harping on the > need for widespread, strong encryption use, even though > the documents show how the spies bypass it, undermine it, > use it for deception, implant backdoors in it (as well as in > chips, OSes, routers, nodes, cable stations, server farms, > teleco hubs, virtually everywhere in the global system as > shown in this latest release) should be taken as a warning > encryption is not the magic cape its proponents claim. > > This suggests reliance upon encryption may be a decoy to > divert attention from other comsec protection, the old > CryptoAG ploy: The most trusted comsec the most > likely not. > > The tremendous rush to market cybersecurity means and > methods for public consumption, combined with 5-Eyes > outreach to industry for means and methods to defeat > cybersecurity, is a wonderful paradox, albeit powerfully > stenching with treachery. > > Whether Snowden is more of a hero to the public than to > 5-Eyes and its partners is up for future historical debate. > Say 25-30 years ahead, about the time required for > full disclosure of the Snowden dump at the current rate of > release (to the public, not clear which wizards getting > early access are developing products, sales and industries > to capitalize on cybersecurity alarm, some most assuredly > are based on their inability to avoid bragging about being > consulted by government, industry, NGOs,, vulture capitalists, > and the usual speaker bureaus where wizards flog their > skills.) > > > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5766 bytes Desc: not available URL: From admin at pilobilus.net Mon Aug 17 05:42:21 2015 From: admin at pilobilus.net (Steve Kinney) Date: Mon, 17 Aug 2015 08:42:21 -0400 Subject: Someone recommends the hacking TV series "Mr. Robot" In-Reply-To: References: <20150817100838.GC2500@sivokote.iziade.m$> <20150817113731.GD2500@sivokote.iziade.m$> Message-ID: <55D1D6AD.4050306@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 08/17/2015 07:50 AM, swalow swalow wrote: > As usual it's in the grey zone. The big corporation the > characters are fighting against is huge and can afford to > cover up its mistakes without any repercussions. The > corporation is doing stupid/bad things and hackers decided to > stop that nonsense( you'll see what stop means if you watch the > series ) It's interesting how even my non-techy friends like > it. I can't recommend it enough but you have to see for > yourself. Watch the pilot episode at least. I saw the first two episodes, they weren't half bad; somebody obviously did their homework. But then, I'm easy - Archer had me at Jessica Walter, and the bits and pieces of spookish history they throw into the scripts amuse me more than they should. I would would endorse a little independent film called Algorithm to the Cpunk crowd: Surprisingly realistic, including the radically political angle; I like it when a movie leaves me asking myself, whose propaganda was that anyway? :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJV0darAAoJEDZ0Gg87KR0LSCAP/3yGe+P/X8A3ZyJZWN/J5aGP ghZfjcfHGAosVULnh0Q40SOqHEYRgCqdWRqVz8dfDuruLsqUJL/NFYokFlwraTyh Xr4oCdbyP4444AmO+ZoweUFr7nN9200HMKI56UtEsErOEbhtMZZjk0c41C7s2ZdX TXb0PZmnYXD4+a9zKF/+0Ozf+NiXtxUNQCyxAGG8fPwvBzXjFOpd7rCoE0tfbJv2 xHTeJL2JYvyGre9D8qngPKQCRlR91UrUzritPpaR6lc2x5kCye+uv3fytfDPhwmT rkAYSPsjKR17P7sLtYKhbB2y7YaFDS+dKJlJ8Be5Fh8onk8pu80uQH7mdF8p+eQ8 DttIi/9sukW/fiHWIv7nL16YF6aGuJPmhqigKBcUxueSbR2DenyRTblAs6tDqjRF RniLz4/JldpPS3WRqgzzFBuENoflB+G6+eARUKoNf4bw4XJ0uPRXBsCZByW8ERQ+ j9yxw6ILoyBUgUlpEscly//afR1PPMxrX3CTcVuGnd8tOc8HmG3+tKqTCYEDbJ4a ouzTBqvDf9eEklEcFKDztdljtlPip3XPxItDTQXB007yCyvUnSIV9PxxjYKyMwfd VjEwSjrT2GAiRhOBOGLsDDSIcXnA8bom+voRJgeHmBkUfFSWUrEtN1HboxRvSX7P FXgv+lzZie7v75liuOGw =B9VV -----END PGP SIGNATURE----- From carimachet at gmail.com Sun Aug 16 23:34:30 2015 From: carimachet at gmail.com (Cari Machet) Date: Mon, 17 Aug 2015 09:34:30 +0300 Subject: Snowden dump scope defined, now to details... [was: NSA Spying Relies on AT&T'S "Extreme Willingness to Help"] In-Reply-To: References: Message-ID: WHAT? i despise the snowden fans like lp and gg but... you are criticising their depth and this is as deep as you go? so to answer your question about details of day to day ops they do EVERYTHING - define everything as 'interests' of the nation and its all determined by the executive branch - congress has information - supposedly controls the purse but watery issue and the courts are not involved at all especially with foreign issues because the law in the US is based on precedent and some supreme court set stated that the executive branch is the 'sole organ of foreign affairs' what are their tech capabilities? everything they can get their hands on so work on everything and that will be your best stab at defence i am being rude here but my point is that if we are always just trying to put out fires of the power people then what is really being built and it is a soap opera theatre piece ... very engaging saga ... if it is disengaged from then what does that look like? http://www.ted.com/talks/tim_berners_lee_on_the_next_web?language=en what did he do - he worked on what was in front of him data but its not the only thing there are lots of things - you are a unique point in the space time circle cone only you can really know what you need to work on and part of your interface is like this https://www.youtube.com/watch?v=UyyjU8fzEYU and this has a lot of information that conveys what to do & even how to do it - its not completely accurate (as she has limited frames to convey the information) but she gives a break down of the structure we are in On Mon, Aug 17, 2015 at 8:17 AM, grarpamp wrote: > On Sun, Aug 16, 2015 at 7:30 PM, coderman wrote: > > > > with the bulk of significant revelations identified and conveyed, the > > trend now clearly toward fill rather than reach. > > Fill is great, but if this is the end of breadth, it is a sad day indeed. > (I'm still taking odds on some significant dumps both shortly before > [as disruptive] and after [as legislative] the US elections.) But there > are many other things that need more light... what is their status > on crypto? Their bigdata analysis capabilities? And more generally... > what people's governments are doing in (and not in) their name and > in secret, both for and against them? > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4517 bytes Desc: not available URL: From shelley at misanthropia.org Mon Aug 17 11:39:51 2015 From: shelley at misanthropia.org (Shelley) Date: Mon, 17 Aug 2015 11:39:51 -0700 Subject: Why the close collaboration between NSA & AT&T matters In-Reply-To: <14f3cdf72a8.276e.4d489027c0c4d0c1b1ca03a1f48f1ffb@misanthropia.org> Message-ID: <20150817183935.E314EC00021@frontend1.nyi.internal> These recently released documents could give new life to Jewel v NSA. For years, James "I lie to Congress and get away with it" Clapper and his ilk have tried to make the EFF look like the lunatic fringe for backing the claims made in Mark Klein's testimony. The feds have managed to quash almost every investigation into their warrantless wiretapping under the tired guise of endangering national security, often with no substantive evidence; just the claim alone is enough to scare off most jurists. https://www.propublica.org/article/heres-why-the-close-collaboration-between-the-nsa-and-att-matters The EFF will be submitting these documents in support of Jewel v NSA. https://www.eff.org/deeplinks/2015/08/eff-claims-government-spying-atts-help-further-confirmed-new-york-times-article -S From jya at pipeline.com Mon Aug 17 09:53:17 2015 From: jya at pipeline.com (John Young) Date: Mon, 17 Aug 2015 12:53:17 -0400 Subject: CNSS Issues Memo on Shift to Quantum-Resistant Cryptography Message-ID: CNSS Advisory Memo on Use of Public Standards for Secure Sharing of Information Among NatSec Systems 08/11/15 https://www.cnss.gov/CNSS/openDoc.cfm?DLuhIVBMUGJh7R8iXAWwIQ== This Advisory expands on the guidance contained in CNSS Policy No. 15, National Information Assurance Policy on the Use of Public Standards for the Secure Sharing of Information Among National Security Systems (Reference a). Based on analysis of the effect of quantum computing on Information Assurance (IA) and IA-enabled Information Technology (IT) products, the policy's set of authorized algorithms is expanded to provide vendors and IT users more near-term flexibility in meeting their IA interoperability requirements. The purpose behind this additional flexibility is to avoid vendors and customers making two major transitions in a relatively short timeframe, as we anticipate a need to shift to quantum-resistant cryptography in the near future. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1019 bytes Desc: not available URL: From guninski at guninski.com Mon Aug 17 03:08:38 2015 From: guninski at guninski.com (Georgi Guninski) Date: Mon, 17 Aug 2015 13:08:38 +0300 Subject: Someone recommends the hacking TV series "Mr. Robot" Message-ID: <20150817100838.GC2500@sivokote.iziade.m$> Someone, technically literate, recommends the hacking TV series "Mr. Robot". https://en.wikipedia.org/wiki/Mr._Robot_%28TV_series%29 >From wikipedia: --- The series follows Elliot Alderson, a young man living in New York City, who works at Allsafe as a cyber security engineer. Elliot has social anxiety disorder, but connects to people by hacking them and acts as a cyber vigilante. He is recruited by a mysterious social-anarchist known as "Mr. Robot", and joins his team of hackers, known as "fsociety". One of their missions is to take down one of the largest corporations in the world, E Corp (known as "Evil Corp" by Elliot) --- From guninski at guninski.com Mon Aug 17 04:37:31 2015 From: guninski at guninski.com (Georgi Guninski) Date: Mon, 17 Aug 2015 14:37:31 +0300 Subject: Someone recommends the hacking TV series "Mr. Robot" In-Reply-To: References: <20150817100838.GC2500@sivokote.iziade.m$> Message-ID: <20150817113731.GD2500@sivokote.iziade.m$> On Mon, Aug 17, 2015 at 05:53:30AM -0430, Damian Fossi wrote: > I recommend it, I watch it every week. About the Hacking techniques, they > are completely accurate. > I haven't watch it yet. "someone" agrees about the hacking techniques. Might be wrong, but am sceptical that U$A would allow TV series conveying anti-establishment/anti-bigcorp message (IMHO big TVs are f.cked whores). Without spoiling the plot of the series, do you find it "socially correct" so far? From wirelesswarrior at safe-mail.net Mon Aug 17 12:02:17 2015 From: wirelesswarrior at safe-mail.net (wirelesswarrior at safe-mail.net) Date: Mon, 17 Aug 2015 15:02:17 -0400 Subject: Snowden dump scope defined, now to details... [was: NSA SpyingRelies on AT&T'S "Extreme Willingness to Help"] Message-ID: I was hoping there would be details on wireless monitoring and SIGINT similar to the almost total focus of the released Snowden papers on Internet infrastructure (except for the NSA Playset). > > Fill is great, but if this is the end of breadth, it is a sad day indeed. > (I'm still taking odds on some significant dumps both shortly before > [as disruptive] and after [as legislative] the US elections.) But there > are many other things that need more light... what is their status > on crypto? Their bigdata analysis capabilities? And more generally... > what people's governments are doing in (and not in) their name and > in secret, both for and against them? From wirelesswarrior at safe-mail.net Mon Aug 17 12:54:45 2015 From: wirelesswarrior at safe-mail.net (wirelesswarrior at safe-mail.net) Date: Mon, 17 Aug 2015 15:54:45 -0400 Subject: Resisting Surveillance: it's is not just about the metadata Message-ID: https://www.youtube.com/watch?v=H8yfDX0Myvw "This talk is given by three activists who were all targeted by UK police spy Mark Kennedy and who have direct personal experience of that and other physical surveillance. It will look at experiences of infiltration of social justice movements by the state and private contractors and some of our responses. " Basically shows that the COINTELPRO tactics are still sucessfully used today by undercover cops. From guninski at guninski.com Mon Aug 17 06:59:20 2015 From: guninski at guninski.com (Georgi Guninski) Date: Mon, 17 Aug 2015 16:59:20 +0300 Subject: Someone recommends the hacking TV series "Mr. Robot" In-Reply-To: <55D1D6AD.4050306@pilobilus.net> References: <20150817100838.GC2500@sivokote.iziade.m$> <20150817113731.GD2500@sivokote.iziade.m$> <55D1D6AD.4050306@pilobilus.net> Message-ID: <20150817135920.GG2500@sivokote.iziade.m$> On Mon, Aug 17, 2015 at 08:42:21AM -0400, Steve Kinney wrote: > I would would endorse a little independent film called Algorithm > to the Cpunk crowd: Surprisingly realistic, including the > radically political angle; I like it when a movie leaves me asking > myself, whose propaganda was that anyway? > > :o) Your suggestion is well within financial reach. According to trivia, the decent movie "Travelling Salesman" (2012) > The film was made for under $10,000. http://www.imdb.com/title/tt1801123/trivia?ref_=tt_ql_trv_1 If this turns to be thread about "want to see movies", I would like to see this old free book filmed: Underground Tales of hacking, madness and obsession on the electronic frontier http://www.underground-book.net/ ...and... Documentary about "Hacking in the '90s'. Wouldn't argue about the title, but something like "Division by zero" would be better. IIRC there is a novel with this exact name (I recommend it). By Ted Chiang. From zen at freedbms.net Mon Aug 17 15:39:26 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Mon, 17 Aug 2015 22:39:26 +0000 Subject: Unpublished letters to the editor Message-ID: This might seem horribly political and non-cp to some, but a good some of it seems on topic to me. Perhaps ignore that which you consider offtopic. --- "A man, who has in mind an apparent advantage and promptly proceeds to dissociate this from the question of what is right, shows himself to be mistaken and immoral. Such a standpoint is the parent of assassinations, poisonings, forged wills, thefts, malversations of public money, and the ruinous exploitation of provincials and Roman citizens alike. Another result is passionate desire – desire for excessive wealth, for un-endurable tyranny, and ultimately for the despotic seizure of free states. These desires are the most horrible and repulsive things imaginable. The perverted intelligences of men, who are animated by such feelings, are competent to understand the material rewards, but not the penalties. I do not mean penalties established by law, for these they often escape. I mean the most terrible of all punishments: their own degradation." Marcus Tullius Cicero (106-43 B.C.) --- I view the Australia of today as that of pre-war Nazi Germany; the truth is 'verboten' (forbidden). Political correctness rules the roost, truth suppressed. When the absolutes of right and wrong, truth and lies are abolished, usurped by political correctness, there is no future for this country. Politically enforced Multiculturalism will be the means to its demise. When Christianity is replaced by the evil philosophy of 'Humanism", emanating from the equally evil United Nations, normality will also be replaced by abnormality. Right becomes wrong and wrong becomes right. That trend is now blatantly obvious in the society of today. Ironically passed into law by our questionable legislators. Sometime, somehow, someone will have to answer for this warped minded, reverse thinking called: political correctness. --- Federal Parliament consists of traitors and cowards on both sides. How else can one explain the state of Australia today? Those who keep silent under duress are moral cowards as in political correctness, the suppression of the truth. "Political correctness is the evident child of communism. The past was erased, the erasure was forgotten, the lie became truth. In times of universal deceit, telling the truth becomes a revolutionary act." (George Orwell) Political correctness defined. --- Politically enforced multiculturalism can best be described as meaningless. When your country and its people have lost their homogeneous status, your heritage and identity eliminated by un-assimable, alien races, bringing their own cultures with them, the country will become a nation of tribes, speaking many languages; meaningless. A nation can survive within its own heritage, language and culture, but not without them. The abolition of the White Australia Policy sounded the death knell for Australia. "Ask not for whom the bell tolls, it tolls for thee, Australia, it tolls for thee", genocide. --- In a court of law, a person had to swear on the Bible to tell the truth, the whole truth and nothing but the truth. I pose the question, would the misuse of the word 'gay' be accepted as truth? Would the legislators consider that before making a decision on the issue? I consider it to be Karl Marx dialectics, "words I choose all mixed up in a devilish muddle so that anyone can choose to believe whatever they choose to believe". Discrimination for choice, racist for patriot etc., right and wrong are absolutes and no political correctness can alter that fact. I hope the legislators are cognisant of the word gay. The dictionary defines it as "light-hearted, mirthful, showy, dissolute". "Dissolute as loose living, debauched". Is that the kind of society that political correctness may impose and enforce upon the people? --- For people smugglers, read the United Nations, it is the intention of that commo dominated organisation to recolonise the world. The Humanist Manifesto is the bible of the United Nations, it states, "We deplore the division of humankind on nationalistic grounds. We have reached a turning point in human history when the best option is to transcend the limits on national sovereignty". 'Humanism' was declared to be a religion by the Supreme Court of the USA in 1961. The bible has been banned in American Courts. The United Nations Charter for World Government states: "Increasing self-denial in the exercise of sovereignty by the state, necessary for the better working of the United Nations." The evil ideology of humanism is being implemented by the UN. The United Nations Charter for World Government is based on treason. All governments that participate in its agenda, are traitors to their own people and nation. --- In Support of John Bushell, Network News, June. I quite agree with you and I also pray: Wait, wait, wait Before the golden gate, I leave behind my hate For the traitors of my state. Would I decide their fate They'd go through the other gate, Not to sit and dwell But to burn in bloody hell. Now you've heard of Guy Fawkes And his gun powder plot, I dreamt I was he And blew up the lot. --- Whatever legislators may pass into law, it must first pass my conscience, whether to accept or reject it. For my mind is my own, it does not belong to legislators. A mind that's forced against its will is of the same opinion still. We now live in an era of contradictions of 'universal deceit', where right is now wrong and wrong is now right. We also have politically appointed but unelected commissions to force this lunacy upon society. "All that is necessary for the triumph of evil is that good men do nothing". (Edmund Burke) Politicians who keep silent under duress are moral cowards. "One of the penalties for refusing to participate in politics is, that you end up being governed by your inferiors". (Plato) --- The following quotations are just a few reasons why Australia, as such, is now in a state of decline and eventual genocide. Bob Hawke admitted: "That the major parties had reached an implicit pact to keep immigration off the political agenda." Deceit and collusion. He later stated: "Multiculturalism is not negotiable". So much for democracy. Malcolm Fraser re: the Vietnamese and Cambodian refugees, "I did not put it to the people because I knew that they would reject it." Al Grassby: "The White Australia Policy is dead, give me a shovel and I will bury it". These are just a few examples of a deliberate intention to destroy traditional European Australia. Manning Clarke: "I believe very strongly that we must fight for the end of the Anglo-Saxon domination of Australia". These were the preliminaries to the abolition of the White Australia Policy by Gough Whitlam; genocide of Australians. Advance Australia Where? --- Politically enforced multiculturalism can be defined in the word: MEANINGLESS. When your identity has been diluted to the extremity of genocide by the political imposition of alien races upon the host nation, Australia, then you arrive at the meaning of the word 'meaningless'. "Pour your pitchers of wine into the wide river and where is your wine? You have only the river". (Kath Walker, Aboriginal poet in 'The Dawn Is At Hand'. --- Treason = Genocide: Genocide; a word of which the official United Nations definition is: "The committing of acts with intent to destroy – wholly or in part, a national ethnic, racial or religious groups as such". The United Nations Convention of asylum seekers (illegal arrivals), is in breach of their own statement to that effect. Imposing alien races of people upon a stable, inherited, homogenous nation of people is tantamount to genocide of the host nation. Brutus, Gough Whitlam, is the architect of the 'genocide' of the Australian nation of people. Like Brutus, he stabbed White Australia in the back and instituted the policy of multiculturalism, i.e., genocide. Gough Whitlam, during his lifetime, was a Marxist Fabian (commo) as is most of the Labor Party, hiding under the Labor Party banner. Menzies wanted to ban the Communist Party in Australia; he was over-ruled by the High Court and a subsequent referendum on the matter. The Federal Governments of Whitlam and Hawke, the Commos were not under the bed, they were in it, working to destroy Australia. While representing UNESCO in Paris, Whitlam promoted the concept of UNESCO BROWN MAN. The mixing of all races of people, a race-less, stateless, faceless, brown slob, devoid of all character or heritage, the future person of the United Nations New World Order. N.B. UN quote page 23 'Travel Warrant' by Bernard Ferguson. --- Who is behind the United Nations Power Grab? A powerful network of Americans in government, business, academia and the media, have conspired to empower the United Nations. One noteworthy 'insider' is David Rockefeller – head of the super-rich family that donated the land for the UN headquarters. He told an elite group in Germany in 1991: "We are grateful to the Washington Post, the New York Times, Time magazine, whose directors have attended our meetings and respected promises of discretion – for almost 40 years. It would have been impossible for us to develop our plan for the world if we had been subject to publicity during those years. But the world is now more sophisticated and prepared to march towards a world government." Here is a sampling of what other globalists have said: Walter Cronkite, famous CBS news anchor said: "We must strengthen the United Nations as a first step toward a world government". Strobe Talbott, former Deputy Secretary of State said: "Nationhood as we know it will be obsolete – all states will recognise a single, global authority." Colin Powell, former Secretary of State said: "With respect to US policy, when it comes to our role as a member of the Security Council of the United Nations, we obviously are bound by UN resolutions." From dan at geer.org Mon Aug 17 20:19:32 2015 From: dan at geer.org (dan at geer.org) Date: Mon, 17 Aug 2015 23:19:32 -0400 Subject: Privacy advocates resign over facial recognition plans In-Reply-To: Your message of "Thu, 13 Aug 2015 12:52:25 +0300." Message-ID: <20150818031932.0BA4AA0AE5A@palinka.tinho.net> > blah blah blah racist blah blah blah Ah, leveling a charge of racism, the gift that keeps on giving. In today's episode, one Tara McPherson asserts that UNIX is racist, Why Are the Digital Humanities So White? http://dhdebates.gc.cuny.edu/debates/text/29 as she argues repeatedly that there must be a connection between the modularity of UNIX and the compartmentalization of race within American culture. Ergo, all ya'll who would have refused to wear cotton clothing in 1855 must now stop using UNIX variants. Have a nice day. --dan From zen at freedbms.net Mon Aug 17 16:28:35 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Mon, 17 Aug 2015 23:28:35 +0000 Subject: =?UTF-8?Q?What_now_after_the_Dallas_Buyers_Club_pirate_claim_i?= =?UTF-8?Q?s_rejected_as_=E2=80=98surreal=E2=80=99=3F?= Message-ID: A little sanity in the Australian courts - what a day. https://theconversation.com/what-now-after-the-dallas-buyers-club-pirate-claim-is-rejected-as-surreal-46133 "The Court accepted that Voltage could ask for the costs of a single copy of the film and an appropriately proportioned fee to recover its legal costs so far." We have iiNet, Australia's second largest ISP, to thank for this. They have seen the economic self interest in putting some resources to establishing sane internet-related rulings. I call it "enlightened economic self interest" as it appears to be at least a step above the average corporate nature. From zen at freedbms.net Mon Aug 17 16:31:08 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Mon, 17 Aug 2015 23:31:08 +0000 Subject: mainstream starting to get it, may be - "The end of privacy as we know it: 60 Minutes uncovers huge mobile phone security vulnerabilities" Message-ID: http://www.news.com.au/technology/gadgets/the-end-of-privacy-as-we-know-it-60-minutes-uncovers-huge-mobile-phone-security-vulnerabilities/story-fn6vihic-1227485884359 From carimachet at gmail.com Mon Aug 17 15:46:49 2015 From: carimachet at gmail.com (Cari Machet) Date: Tue, 18 Aug 2015 01:46:49 +0300 Subject: CNSS Issues Memo on Shift to Quantum-Resistant Cryptography In-Reply-To: References: Message-ID: i love you john the other main issue about putting out fires instead of building shit is that they plan (most probably) 100 years out On Mon, Aug 17, 2015 at 7:53 PM, John Young wrote: > CNSS Advisory Memo on Use of Public Standards for Secure Sharing of > Information Among NatSec Systems 08/11/15 > > https://www.cnss.gov/CNSS/openDoc.cfm?DLuhIVBMUGJh7R8iXAWwIQ== > > > This Advisory expands on the guidance contained in CNSS Policy No. 15, *National > Information Assurance Policy on the Use of Public Standards for the Secure > Sharing of Information Among National Security Systems *(Reference a). > Based on analysis of the effect of quantum computing on Information > Assurance (IA) and IA-enabled Information Technology (IT) products, the > policy’s set of authorized algorithms is expanded to provide vendors and IT > users more near-term flexibility in meeting their IA interoperability > requirements. The purpose behind this additional flexibility is to avoid > vendors and customers making two major transitions in a relatively short > timeframe, as we anticipate a need to shift to quantum-resistant > cryptography in the near future. > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2714 bytes Desc: not available URL: From jdb10987 at yahoo.com Mon Aug 17 19:46:50 2015 From: jdb10987 at yahoo.com (jim bell) Date: Tue, 18 Aug 2015 02:46:50 +0000 (UTC) Subject: Recommended Movie: "Sebastian" 1968. Message-ID: <2070948118.3840816.1439866010827.JavaMail.yahoo@mail.yahoo.com> Since people seem to be recommending things, I recommend the movie "Sebastian".   Dirk Bogarde, Susannah York.https://www.youtube.com/watch?v=bIK3OYnD9MY Out of date even when it was made, I think it really represents the cryptography situation as of the 1930's.      Jim Bell -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 922 bytes Desc: not available URL: From zen at freedbms.net Mon Aug 17 19:58:51 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Tue, 18 Aug 2015 02:58:51 +0000 Subject: Julian Assange: the Untold Story of an Epic Struggle for Justice Message-ID: http://russia-insider.com/en/media-criticism/julian-assange-untold-story-epic-struggle-justice/ri9115 Originally at: http://www.counterpunch.org/2015/07/31/julian-assange-the-untold-story-of-an-epic-struggle-for-justice/ Julian Assange: the Untold Story of an Epic Struggle for Justice John Pilger, July 31, 2015 An extract: " Why hasn’t the Swedish prosecutor resolved the Assange case? Many in the legal community in Sweden believe her behaviour inexplicable. Once implacably hostile to Assange, the Swedish press has published headlines such as: “Go to London, for God’s sake.” Why hasn’t she? More to the point, why won’t she allow the Swedish court access to hundreds of SMS messages that the police extracted from the phone of one of the two women involved in the misconduct allegations? Why won’t she hand them over to Assange’s Swedish lawyers? She says she is not legally required to do so until a formal charge is laid and she has questioned him. Then, why doesn’t she question him? And if she did question him, the conditions she would demand of him and his lawyers – that they could not challenge her – would make injustice a near certainty. " From peter at m-o-o-t.org Tue Aug 18 00:50:40 2015 From: peter at m-o-o-t.org (Peter Fairbrother) Date: Tue, 18 Aug 2015 08:50:40 +0100 Subject: Recommended Movie: "Sebastian" 1968. In-Reply-To: <2070948118.3840816.1439866010827.JavaMail.yahoo@mail.yahoo.com> References: <2070948118.3840816.1439866010827.JavaMail.yahoo@mail.yahoo.com> Message-ID: <55D2E3D0.6020608@m-o-o-t.org> On 18/08/15 03:46, jim bell wrote: > Since people seem to be recommending things, I recommend the movie > "Sebastian". Dirk Bogarde, Susannah York. > https://www.youtube.com/watch?v=bIK3OYnD9MY > > Out of date even when it was made, I think it really represents the > cryptography situation as of the 1930's. Based on a screenplay by Leo Marks - author of Between Silk and Cyanide: A Codemaker's War 1941-1945. Essential reading. Leo was the codemaker for SOE. All hand ciphers and agents. He wasn't at Bletchley - who called him "the one who got away" - though, and so no machine ciphers. The Silk in the title was for OTPs which could be hidden in clothing from Gestapo/SS searches. As I said, essential reading. -- Peter Fairbrother From Rayzer at riseup.net Tue Aug 18 09:27:32 2015 From: Rayzer at riseup.net (Razer) Date: Tue, 18 Aug 2015 09:27:32 -0700 Subject: NSA Spying Relies on AT&T'S "Extreme Willingness to Help" In-Reply-To: <20150816164645.06194680176@frontend2.nyi.internal> References: <20150816164645.06194680176@frontend2.nyi.internal> Message-ID: <55D35CF4.8000503@riseup.net> On 08/16/2015 09:47 AM, Shelley wrote: > Nothing we didn't know or expect, just more confirmation/proof that > AT&T & Verizon are all too eager to get on their knees for the NSA. > > https://www.propublica.org/article/nsa-spying-relies-on-atts-extreme-willingness-to-help > > > Also worth a look: how they connected the dots, supporting documents. > https://www.propublica.org/article/a-trail-of-evidence-leading-to-atts-partnership-with-the-nsa > > > (Apologies for not including the article text, I'm currently mobile.) > > -S > > > Institute for Public Accuracy has issued a press release from AT&T whistleblower Mark Klein. Klein was the AT&T technician who blew the whistle on AT&T’s cooperation with the NSA in 2006. http://www.accuracy.org/release/att-whistleblower-on-companys-partnership-with-nsa/ > “The documents prove I was right, and if a court had been willing to > allow the Electronic Frontier Foundation lawsuit against AT&T to go > forward, we would have won. But Congress knowingly put a retroactive > pseudo-‘legal’ stamp on the violations of law and the Constitution, > and the courts accepted it. Both parties are to blame, all three > branches of government are culpable. > > “I’d gotten my story out through the New York Times in April 2006 > after the Los Angeles Times had killed it. The editor who killed the > story was Dean Baquet — who is now executive editor at the New York Times. > > “Obama had campaigned against immunizing the telcos, but by the time > the vote happened in 2008, he had sewn up the nomination and switched > sides. It was a betrayal even before he got to the White House. > > “The entire congressional leadership pushed this, especially the ‘gang > of eight’ who were the ones who actually knew what the immunity was > about. My own senator, Dianne Feinstein, who was on the intelligence > committee, wouldn’t even speak with me, she was all about covering up > for the NSA. > > “Many in congress who voted for the immunity blindly voted to immunize > a crime details of which they didn’t know or didn’t want to know. > > “It wasn’t just AT&T of course, it was that the Bush administration > had brazenly violated FISA and of course the Constitution. They didn’t > have a legal leg to stand on, which is why they needed the immunity.” There's more, mostly a sitrep, on site. RR -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 819 bytes Desc: OpenPGP digital signature URL: From carimachet at gmail.com Mon Aug 17 23:55:58 2015 From: carimachet at gmail.com (Cari Machet) Date: Tue, 18 Aug 2015 09:55:58 +0300 Subject: Recommended Movie: "Sebastian" 1968. In-Reply-To: <2070948118.3840816.1439866010827.JavaMail.yahoo@mail.yahoo.com> References: <2070948118.3840816.1439866010827.JavaMail.yahoo@mail.yahoo.com> Message-ID: kool!!! jim - please feel free to do whatever you want On Tue, Aug 18, 2015 at 5:46 AM, jim bell wrote: > Since people seem to be recommending things, I recommend the movie > "Sebastian". Dirk Bogarde, Susannah York. > https://www.youtube.com/watch?v=bIK3OYnD9MY > > Out of date even when it was made, I think it really represents the > cryptography situation as of the 1930's. > Jim Bell > > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2269 bytes Desc: not available URL: From Rayzer at riseup.net Tue Aug 18 11:35:41 2015 From: Rayzer at riseup.net (Razer) Date: Tue, 18 Aug 2015 11:35:41 -0700 Subject: Unpublished letters to the editor In-Reply-To: References: Message-ID: <55D37AFD.5030804@riseup.net> On 08/17/2015 03:39 PM, Zenaan Harkness wrote: > Walter Cronkite, famous CBS news anchor said: "We must strengthen the > United Nations as a first step toward a world government". Methinks Walter Concrete was visualizing a different sort of 'world government'. As were most civilians who supported the concept. No one expected it to become an arm of policy for the Industrialized nations of the world and their 3rd world manufacturing satrap's dictators and strongmen After all, Concrete was the guy who, when Dan Rather got thugged by a couple of people dressed as ushers during the 1968 Democratic National Convention just as Rather was going on-air to interview an ejected delegate from the Georgia delegation (RIP Julian Bond), said in quite simple terms while Rather was still gasping for breath after being sucker punched in the gut two or three times "It looks like we've got a bunch of thugs here." See for yourself (footage): https://www.youtube.com/watch?v=wItUjFU1i4M Let me know if you EVER hear anything like that again from ANY talking head newsreader/anchor covering US Politics. Later, he sounded the death knell for the American War on Vietnam. I think Cronkite was one of the last credible (in the American mileu and it's belief system) anchor on US MSM television, and he represented, in the statement you quote above, a belief in a functioning UN that represented all world citizens equally. Of course that "UN" did not have a snowball's chance in hell. RR -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 819 bytes Desc: OpenPGP digital signature URL: From rysiek at hackerspace.pl Tue Aug 18 03:14:16 2015 From: rysiek at hackerspace.pl (rysiek) Date: Tue, 18 Aug 2015 12:14:16 +0200 Subject: Unpublished letters to the editor In-Reply-To: References: Message-ID: <1979344.lCy8nXJVrc@lapuntu> Dnia poniedziałek, 17 sierpnia 2015 22:39:26 Zenaan Harkness pisze: > I view the Australia of today as that of pre-war Nazi Germany; the > truth is 'verboten' (forbidden). Political correctness rules the > roost, truth suppressed. When the absolutes of right and wrong, truth > and lies are abolished, usurped by political correctness, there is no > future for this country. Politically enforced Multiculturalism will > be the means to its demise. When Christianity is replaced by the evil > philosophy of 'Humanism", emanating from the equally evil United > Nations, normality will also be replaced by abnormality. AHAHahahaha ahahahah haha haha ha ha ha ha ha haaaaaaaaah oooooh woow nope. Godwin straight off the bat, and what a glorious one! Comparing "political correctness" (not a big fan either, but for wholly different reasons) to propaganda and censorship of Nazi Germany, which were both hell-bent on smearing of (propaganda) or denying acknowledgement to (censorship) Jews, Slavs, homosexuals, basically anybody that can be labelled "different"? Claiming "humanism" and "multicultiralism" as the evil behind Nazi atrocities, while indeed these were directed directly against multiculturalism and humanism? Claiming Christianity as the solution, while indeed "Gott mit uns" was the rallying cry of Nazi war machine? I'd give it 2/10, try harder. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From jya at pipeline.com Tue Aug 18 10:11:44 2015 From: jya at pipeline.com (John Young) Date: Tue, 18 Aug 2015 13:11:44 -0400 Subject: NSA Spying Relies on AT&T'S "Extreme Willingness to Help" In-Reply-To: <55D35CF4.8000503@riseup.net> References: <20150816164645.06194680176@frontend2.nyi.internal> <55D35CF4.8000503@riseup.net> Message-ID: Law will always be bent to favor authorities, that is what law does and why lawyers are given special protection and privileges not given to the citizenry. What NSA, ATT, Cisco, Oracle, Microsoft, RSA, Google, ISPs and the others have been doing, and will continue doing, is completely legal and, if insistent, constitutional (the ur law favoring natsec authorities), so it is misleading to claim otherwise. Mark Klein, like Snowden and most other leakers, has been co-opted by lawyers, civil libertarians and wealthy donors to speak to their scripts. If not, then to the poor house dogs. Nothing wrong with being scriptedly misleading, that is what media and law do to whatever raw remarks are handed, leaked, "Secure Drop"-boxed to them ("at own risk of sources"). Nor anything misleading about promising strong encryption and surefire cybersecurity, despite repeated failures, backtracks, apologias, tweakings, full disclosures, that is what they do "because the enemy does" and "we're doing the best we can." No, not national defense grade protection, are you nuts, RTFM. Nor is it misleading about civil liberty, privacy policy, anonymization, open source, HTTPS, the current cipher-sec civil-lib kaboodle. That is necessary for their survival in the marketplace. "That is what competitors do and become rich at it, we're sick of being middling strapped." What might piss off a pristine, completely guiltless humanoid coder is the brazen duplicity of the opponents of the NSA cartel, the enjoyment of perks of being on both sides, wearing dual hats, citizen-official, dissident-loyalist, open-closed, public servant raking in high fees for duping the public about forever known-to-be-faulty comsec, reneging on assurances, duo-dancing on pinheads at comsec fora with mutually celebrated opponents, advising governments, tesitfying for governments, taking government contracts, betraying confidences, fork-tongues a flutter. At 12:27 PM 8/18/2015, you wrote: >On 08/16/2015 09:47 AM, Shelley wrote: > > Nothing we didn't know or expect, just more confirmation/proof that > > AT&T & Verizon are all too eager to get on their knees for the NSA. > > > > > https://www.propublica.org/article/nsa-spying-relies-on-atts-extreme-willingness-to-help > > > > > > Also worth a look: how they connected the dots, supporting documents. > > > https://www.propublica.org/article/a-trail-of-evidence-leading-to-atts-partnership-with-the-nsa > > > > > > (Apologies for not including the article text, I'm currently mobile.) > > > > -S > > > > > > > >Institute for Public Accuracy has issued a press release from AT&T >whistleblower Mark Klein. Klein was the AT&T technician who blew the >whistle on AT&T’s cooperation with the NSA in 2006. > >http://www.accuracy.org/release/att-whistleblower-on-companys-partnership-with-nsa/ > > > “The documents prove I was right, and if a court had been willing to > > allow the Electronic Frontier Foundation lawsuit against AT&T to go > > forward, we would have won. But Congress knowingly put a retroactive > > pseudo-‘legal’ stamp on the violations of law and the Constitution, > > and the courts accepted it. Both parties are to blame, all three > > branches of government are culpable. > > > > “I’d gotten my story out through the New York Times in April 2006 > > after the Los Angeles Times had killed it. The editor who killed the > > story was Dean Baquet — who is now executive editor at the New York Times. > > > > “Obama had campaigned against immunizing the telcos, but by the time > > the vote happened in 2008, he had sewn up the nomination and switched > > sides. It was a betrayal even before he got to the White House. > > > > “The entire congressional leadership pushed this, especially the ‘gang > > of eight’ who were the ones who actually knew what the immunity was > > about. My own senator, Dianne Feinstein, who was on the intelligence > > committee, wouldn’t even speak with me, she was all about covering up > > for the NSA. > > > > “Many in congress who voted for the immunity blindly voted to immunize > > a crime details of which they didn’t know or didn’t want to know. > > > > “It wasn’t just AT&T of course, it was that the Bush administration > > had brazenly violated FISA and of course the Constitution. They didn’t > > have a legal leg to stand on, which is why they needed the immunity.” > >There's more, mostly a sitrep, on site. > >RR > > From cathalgarvey at cathalgarvey.me Tue Aug 18 08:31:48 2015 From: cathalgarvey at cathalgarvey.me (Cathal Garvey) Date: Tue, 18 Aug 2015 16:31:48 +0100 Subject: mainstream starting to get it, may be - "The end of privacy as we know it: 60 Minutes uncovers huge mobile phone security vulnerabilities" In-Reply-To: References: Message-ID: <55D34FE4.4020706@cathalgarvey.me> They probably wrote this article on their new Windows 10 desktops. On 18/08/15 00:31, Zenaan Harkness wrote: > http://www.news.com.au/technology/gadgets/the-end-of-privacy-as-we-know-it-60-minutes-uncovers-huge-mobile-phone-security-vulnerabilities/story-fn6vihic-1227485884359 > -- Scientific Director, IndieBio EU Programme Now running in Cork, Ireland May->July Learn more at indie.bio and follow along! Twitter: @onetruecathal Phone: +353876363185 miniLock: JjmYYngs7akLZUjkvFkuYdsZ3PyPHSZRBKNm6qTYKZfAM peerio.com: cathalgarvey From jdb10987 at yahoo.com Tue Aug 18 11:23:15 2015 From: jdb10987 at yahoo.com (jim bell) Date: Tue, 18 Aug 2015 18:23:15 +0000 (UTC) Subject: Recommended Movie: "Sebastian" 1968. In-Reply-To: <55D2E3D0.6020608@m-o-o-t.org> References: <55D2E3D0.6020608@m-o-o-t.org> Message-ID: <325681106.2138497.1439922195133.JavaMail.yahoo@mail.yahoo.com> From: Peter Fairbrother Subject: Re: Recommended Movie: "Sebastian" 1968. On 18/08/15 03:46, jim bell wrote: >> Since people seem to be recommending things, I recommend the movie >> "Sebastian".  Dirk Bogarde, Susannah York. >> https://www.youtube.com/watch?v=bIK3OYnD9MY >> Out of date even when it was made, I think it really represents the >> cryptography situation as of the 1930's. >Based on a screenplay by Leo Marks - author of Between Silk and Cyanide: >A Codemaker's War 1941-1945. >Essential reading. Leo was the codemaker for SOE. All hand ciphers and >agents. >He wasn't at Bletchley - who called him "the one who got away" - though, >and so no machine ciphers. >The Silk in the title was for OTPs which could be hidden in clothing >from Gestapo/SS searches. >As I said, essential reading. The tv show 60 Minutes spilled the beans about Enigma in 1975.  http://www.cbsnews.com/videos/the-ultra-secret/What most people didn't realize was that the controversy was due to the fact that rotor-driven cipher machines had been continued to be sold in the post-WWII era, without their weakness being recognized.  This allowed the CIA/GCHQ to continue to decrypt enciphered messages for decades afterwards.             Jim Bell -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3747 bytes Desc: not available URL: From odinn.cyberguerrilla at riseup.net Tue Aug 18 20:26:14 2015 From: odinn.cyberguerrilla at riseup.net (odinn) Date: Tue, 18 Aug 2015 20:26:14 -0700 Subject: Someone recommends the hacking TV series "Mr. Robot" In-Reply-To: References: <20150817100838.GC2500@sivokote.iziade.m$> Message-ID: <55D3F756.4060206@riseup.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Curious, I've also heard good things about it. Considering seeing it. No subscription TV since 2003, but the internet will work for me to check out an episode. On 08/17/2015 03:23 AM, Damian Fossi wrote: > I recommend it, I watch it every week. About the Hacking > techniques, they are completely accurate. > > Enjoy, https://thepiratebay.gd/search/Mr%20Robot/0/99/0 > > On 17 August 2015 at 05:38, Georgi Guninski > wrote: > > Someone, technically literate, recommends the hacking TV series > "Mr. Robot". > > https://en.wikipedia.org/wiki/Mr._Robot_%28TV_series%29 > >> From wikipedia: > --- The series follows Elliot Alderson, a young man living in New > York City, who works at Allsafe as a cyber security engineer. > Elliot has social anxiety disorder, but connects to people by > hacking them and acts as a cyber vigilante. He is recruited by a > mysterious social-anarchist known as "Mr. Robot", and joins his > team of hackers, known as "fsociety". One of their missions is to > take down one of the largest corporations in the world, E Corp > (known as "Evil Corp" by Elliot) > > --- > > > > > -- Damián D. Fossi Salas > ¡Software Libre hasta el 2 mil siempre! > http://damian.fossi.me > > Uso: Debian GNU/Linux con Kernel 3.12.6-libre > > Linux User: 188464 Jabber ID: dam1an en chat.cpunks.us > Twitter.com > http://twitter.com/dam1an - -- http://abis.io ~ "a protocol concept to enable decentralization and expansion of a giving economy, and a new social good" https://keybase.io/odinn -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJV0/dWAAoJEGxwq/inSG8C0GwH/0Z3KmIeAJGFDiVs8CntSKh8 jBqGkUIuZqg43Aqoh7kB3plSWH2qJQvrMWuw65wdX87fe5RwjGZLgwL50XqnoG43 Y07Vgvc/J9sT9PbYIUgcm1vPyWf9j7pzdo1hOhxw5jRrQ7v6n4N0mK04ql5B3fa+ V1kgEP2L7FfclK+LL9HqIQX7bUJLTvXso8O5XqP/hbI2VP7VjosebUnYjyPFaMs9 3AAnM/ik2E0ghfRLq1yqgCsnVavhh+Cd+Bm1xJaw3sH35cHl0qTTL+UFf/89PHXt twCTv8Uu4140VEWsDxWt1YIF1Z3gKAor3juKurWG5Sni1NsQDSBDIyPo77gdvnA= =H1Bz -----END PGP SIGNATURE----- From odinn.cyberguerrilla at riseup.net Tue Aug 18 22:01:28 2015 From: odinn.cyberguerrilla at riseup.net (odinn) Date: Tue, 18 Aug 2015 22:01:28 -0700 Subject: CNSS Issues Memo on Shift to Quantum-Resistant Cryptography In-Reply-To: References: Message-ID: <55D40DA8.8030400@riseup.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 In case someone hadn't already replied on this issue... I tried to visit the cnss site to see what you are talking about, because it sounded interesting, and got all kinds of warning from the browser, e.g. "Connection is Untrusted!" ... "What Should I do?" ... "Get Me Out of Here" .... etc. Due to this: "www.cnss.gov uses an invalid security certificate. The certificate is not trusted because the issuer certificate is unknown . The server might not be sending the appropriate intermediate certificate s. An additional root certificate may need to be imported. (Error code: sec_error_unknown_issuer)" So, this is a .gov site for a committee on national security systems, that publishes advisories, that doesn't have valid certificates? js On 08/17/2015 09:53 AM, John Young wrote: > CNSS Advisory Memo on Use of Public Standards for Secure Sharing > of Information Among NatSec Systems 08/11/15 > > https://www.cnss.gov/CNSS/openDoc.cfm?DLuhIVBMUGJh7R8iXAWwIQ== > > > This Advisory expands on the guidance contained in CNSS Policy No. > 15, /National Information Assurance Policy on the Use of Public > Standards for the Secure Sharing of Information Among National > Security Systems /(Reference a). Based on analysis of the effect of > quantum computing on Information Assurance (IA) and IA-enabled > Information Technology (IT) products, the policy’s set of > authorized algorithms is expanded to provide vendors and IT users > more near-term flexibility in meeting their IA interoperability > requirements. The purpose behind this additional flexibility is to > avoid vendors and customers making two major transitions in a > relatively short timeframe, as we anticipate a need to shift to > quantum-resistant cryptography in the near future. - -- http://abis.io ~ "a protocol concept to enable decentralization and expansion of a giving economy, and a new social good" https://keybase.io/odinn -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJV1A2oAAoJEGxwq/inSG8C8kAH/2O/it2v9/w+qJKVRoXQLCUs S4Xzker8GibQ5K+9Qr18HNMPHSgKhjXSGzMJqty53cU2HX4vQDIHPEj6mIIj7TqO Sk1rS6ymK91G3LKuRbXMO7Evaq5SBOQCEUyCwOFQhMrQYuh4AlEeGwuMPrfN/U0w weCT9Fr5rPUfuZf8GDqLevzQPa/xEr+s++f2x7ZyQtiZ9fXdZO/I8ZdSHz7dsvT/ 1yZLJvRpmhD97Kh2EwmTCK11JVzzrbXBe8x15UlZDSECe0Ky5ulWIHnyjNOlIoiX j8cgEVmi+Mob+LWI7CzEi9elGniyZo7YAGlnhkYquQWzv1eiU120Go1AV7VCvuw= =/HES -----END PGP SIGNATURE----- From grarpamp at gmail.com Tue Aug 18 19:07:26 2015 From: grarpamp at gmail.com (grarpamp) Date: Tue, 18 Aug 2015 22:07:26 -0400 Subject: M.Hearn adds privacy depriority to Bitcoin XT, calls your Tor/Proxy/etc use "unimportant" Message-ID: http://lists.linuxfoundation.org/pipermail/bitcoin-dev/2015-August/010379.html https://github.com/bitcoinxt/bitcoinxt/commit/73c9efe74c5cc8faea9c2b2c785a2f5b68aa4c23 Bitcoin XT contains an unmentioned addition which periodically downloads lists of Tor IP addresses for blacklisting, this has considerable privacy implications for hapless users which are being prompted to use the software. The feature is not clearly described, is enabled by default, and has a switch name which intentionally downplays what it is doing (disableipprio). Furthermore these claimed anti-DoS measures are trivially bypassed and so offer absolutely no protection whatsoever. ... From grarpamp at gmail.com Tue Aug 18 20:42:17 2015 From: grarpamp at gmail.com (grarpamp) Date: Tue, 18 Aug 2015 23:42:17 -0400 Subject: Unpublished letters to the editor In-Reply-To: <55D37AFD.5030804@riseup.net> References: <55D37AFD.5030804@riseup.net> Message-ID: On Tue, Aug 18, 2015 at 2:35 PM, Razer wrote: > I think Cronkite was one of the last credible (in the American mileu and > it's belief system) anchor on US MSM television, and he represented, in https://www.youtube.com/watch?v=q3eFl9pcxsM > Of course that "UN" did not have a snowball's chance in hell. As if anything does. Whether it's 7+ billion people, or architecture, you decide. From grarpamp at gmail.com Tue Aug 18 22:26:07 2015 From: grarpamp at gmail.com (grarpamp) Date: Wed, 19 Aug 2015 01:26:07 -0400 Subject: Resisting Surveillance: it's is not just about the metadata In-Reply-To: References: Message-ID: On Mon, Aug 17, 2015 at 3:54 PM, wrote: > https://www.youtube.com/watch?v=H8yfDX0Myvw > > "This talk is given by three activists who were all targeted by UK police spy Mark Kennedy and who have direct personal experience of that and other physical surveillance. It will look at experiences of infiltration of social justice movements by the state and private contractors and some of our responses. " > > Basically shows that the COINTELPRO tactics are still sucessfully used today by undercover cops. Raped by the state, literally. From grarpamp at gmail.com Tue Aug 18 23:21:01 2015 From: grarpamp at gmail.com (grarpamp) Date: Wed, 19 Aug 2015 02:21:01 -0400 Subject: [cryptography] CNSS Issues Memo on Shift to Quantum-Resistant Cryptography In-Reply-To: References: Message-ID: On Mon, Aug 17, 2015 at 12:53 PM, John Young wrote: > CNSS Advisory Memo on Use of Public Standards for Secure Sharing of > Information Among NatSec Systems 08/11/15 > > https://www.cnss.gov/CNSS/openDoc.cfm?DLuhIVBMUGJh7R8iXAWwIQ== > iang wrote: > John, that document blocked due to session variable or something. Is there an open copy? It's here (and on cryptome under the official filename)... https://www.cnss.gov/CNSS/issuances/Memoranda.cfm CNSS_Advisory_Memo_02-15.pdf All ur linkclicks are... From carimachet at gmail.com Tue Aug 18 21:48:47 2015 From: carimachet at gmail.com (Cari Machet) Date: Wed, 19 Aug 2015 07:48:47 +0300 Subject: Recommended Movie: "Sebastian" 1968. In-Reply-To: <325681106.2138497.1439922195133.JavaMail.yahoo@mail.yahoo.com> References: <55D2E3D0.6020608@m-o-o-t.org> <325681106.2138497.1439922195133.JavaMail.yahoo@mail.yahoo.com> Message-ID: 0 dayz On Aug 18, 2015 9:29 PM, "jim bell" wrote: > *From:* Peter Fairbrother > > *Subject:* Re: Recommended Movie: "Sebastian" 1968. > > On 18/08/15 03:46, jim bell wrote: > > > >> Since people seem to be recommending things, I recommend the movie > >> "Sebastian". Dirk Bogarde, Susannah York. > >> https://www.youtube.com/watch?v=bIK3OYnD9MY > > >> Out of date even when it was made, I think it really represents the > >> cryptography situation as of the 1930's. > > >Based on a screenplay by Leo Marks - author of Between Silk and Cyanide: > >A Codemaker's War 1941-1945. > >Essential reading. Leo was the codemaker for SOE. All hand ciphers and > >agents. > >He wasn't at Bletchley - who called him "the one who got away" - though, > >and so no machine ciphers. > >The Silk in the title was for OTPs which could be hidden in clothing > >from Gestapo/SS searches. > >As I said, essential reading. > > > The tv show 60 Minutes spilled the beans about Enigma in 1975. > http://www.cbsnews.com/videos/the-ultra-secret/ > What most people didn't realize was that the controversy was due to the > fact that rotor-driven cipher machines had been continued to be sold in the > post-WWII era, without their weakness being recognized. This allowed the > CIA/GCHQ to continue to decrypt enciphered messages for decades afterwards. > Jim Bell > > > > > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2951 bytes Desc: not available URL: From coderman at gmail.com Wed Aug 19 07:52:36 2015 From: coderman at gmail.com (coderman) Date: Wed, 19 Aug 2015 07:52:36 -0700 Subject: FOIA/PA In-Reply-To: <1971999349.807005.1438819036008.JavaMail.yahoo@mail.yahoo.com> References: <1971999349.807005.1438819036008.JavaMail.yahoo@mail.yahoo.com> Message-ID: On 8/5/15, jim bell wrote: > Keep in mind that pages are free from PACER (www.pacer.com) until you get > 150 pages per calendar quarter. Spreading the task with others, so that > nobody downloads more than 149, would save money. life happened, and this delayed. should get to it tonight! will also check RECAP first, before forking over PACER payola... http://archive.recapthelaw.org/search/advanced/?q=USA+v.+Bell best regards, From peter at m-o-o-t.org Tue Aug 18 23:52:56 2015 From: peter at m-o-o-t.org (Peter Fairbrother) Date: Wed, 19 Aug 2015 07:52:56 +0100 Subject: Recommended Movie: "Sebastian" 1968. In-Reply-To: <325681106.2138497.1439922195133.JavaMail.yahoo@mail.yahoo.com> References: <55D2E3D0.6020608@m-o-o-t.org> <325681106.2138497.1439922195133.JavaMail.yahoo@mail.yahoo.com> Message-ID: <55D427C8.1020005@m-o-o-t.org> On 18/08/15 19:23, jim bell wrote: > *From:* Peter Fairbrother > > *Subject:* Re: Recommended Movie: "Sebastian" 1968. > > On 18/08/15 03:46, jim bell wrote: > > > >> Since people seem to be recommending things, I recommend the movie > >> "Sebastian". Dirk Bogarde, Susannah York. > >> https://www.youtube.com/watch?v=bIK3OYnD9MY > > >> Out of date even when it was made, I think it really represents the > >> cryptography situation as of the 1930's. > > >Based on a screenplay by Leo Marks - author of Between Silk and Cyanide: > >A Codemaker's War 1941-1945. > >Essential reading. Leo was the codemaker for SOE. All hand ciphers and > >agents. > >He wasn't at Bletchley - who called him "the one who got away" - though, > >and so no machine ciphers. > >The Silk in the title was for OTPs which could be hidden in clothing > >from Gestapo/SS searches. > >As I said, essential reading. > > > The tv show 60 Minutes spilled the beans about Enigma in 1975. > http://www.cbsnews.com/videos/the-ultra-secret/ Not sure that was the one to spill the beans. I thought it was Winterbotham's 1974 book of the same name which first got the idea across to the public; though there was a French book in 1973 as well. Like Winterbotham's book, which the TV show seems to be based on, it's also a bit confused and/or inaccurate. Much of what they tell - the conversations between Hitler and his generals, "knowing Hitler's most secret thoughts", and Hitler's message re Anzio which Gen Clark read - came from the breaking of the Lorentz SZ40, not the Enigma. Colossus, not Bombe. And the Coventry story is fiction [1]. Churchill could not have been told the target from ULTRA decrypts. The ULTRA decrypts are now available in public records, and they do not mention Coventry. [1] My theory: Probably it began as a story made up to impress the need to keep the ULTRA secret - "hey if the man at the door with the revolver who just threatened to shoot you doesn't impress you, Churchill allowed [2] the bombing of Coventry in order to keep the secret". Later the story became an accusation, then a rumour, then a play - though by the time it became a play it was becoming obvious that ULTRA wasn't involved, and the motive for allowing the bombing changed to "Impressing the Americans" [3]. I can easily imagine someone telling Winterbotham the story (Winterbotham was the one who first told the Coventry story in public). I can also imagine Winterbotham repeating the story, in confidence, in order to impress the listener with the need to keep the secret (and with W himself) so often that he didn't know whether it was true or not (he didn't claim to be personally involved). Good story, and Churchill was probably capable of it - but it ain't true. [2] not that there was anything he could have done to stop the bombing, but for the sake of the narrative .. [3] requiring an even wilder suspension of belief, IME > What most people didn't realize was that the controversy was due to the > fact that rotor-driven cipher machines had been continued to be sold in > the post-WWII era, without their weakness being recognized. This > allowed the CIA/GCHQ to continue to decrypt enciphered messages for > decades afterwards. Yes - but Leo Marks wasn't involved in that. He ~ stopped being a cryptographer when SOE was broken up at the end of the war. What he did was hand ciphers, for agents in occupied countries - they couldn't carry cipher machines. There is nothing else like Between Silk and Cyanide in the crypto literature. Crypto at the cutting edge, where a mistake is a painful death, and likely worse. More, it is about how a cryptographer and his work interact with the world. I would not like to have been Leo (I met him once), but hell if I don't respect him. There is a TV documentary about him, called "A Very British Psycho" - an apt title. -- Peter Fairbrother From carimachet at gmail.com Wed Aug 19 00:19:34 2015 From: carimachet at gmail.com (Cari Machet) Date: Wed, 19 Aug 2015 10:19:34 +0300 Subject: Resisting Surveillance: it's is not just about the metadata In-Reply-To: References: Message-ID: the father fuckers can rape everyone mass murder everyone that resists imprison everyone if it takes 5 billion light years we will not succumb to their degraded life form dysfunction parasitic maggot fuck all if only they were just degrading their pathetic supposed selves they degrade life itself murder us and we multiply On Aug 19, 2015 8:28 AM, "grarpamp" wrote: > On Mon, Aug 17, 2015 at 3:54 PM, wrote: > > https://www.youtube.com/watch?v=H8yfDX0Myvw > > > > "This talk is given by three activists who were all targeted by UK > police spy Mark Kennedy and who have direct personal experience of that > and other physical surveillance. It will look at experiences of > infiltration of social justice movements by the state and private > contractors and some of our responses. " > > > > Basically shows that the COINTELPRO tactics are still sucessfully used > today by undercover cops. > > Raped by the state, literally. > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1453 bytes Desc: not available URL: From carimachet at gmail.com Wed Aug 19 02:07:18 2015 From: carimachet at gmail.com (Cari Machet) Date: Wed, 19 Aug 2015 12:07:18 +0300 Subject: [cryptography] CNSS Issues Memo on Shift to Quantum-Resistant Cryptography In-Reply-To: References: Message-ID: would be a very beautiful thing to compile the specs for all these actions undertaken by the fake usg https://en.wikipedia.org/wiki/List_of_government_mass_surveillance_projects On Wed, Aug 19, 2015 at 9:21 AM, grarpamp wrote: > On Mon, Aug 17, 2015 at 12:53 PM, John Young wrote: > > CNSS Advisory Memo on Use of Public Standards for Secure Sharing of > > Information Among NatSec Systems 08/11/15 > > > > https://www.cnss.gov/CNSS/openDoc.cfm?DLuhIVBMUGJh7R8iXAWwIQ== > > > iang wrote: > > John, that document blocked due to session variable or something. Is > there an open copy? > > It's here (and on cryptome under the official filename)... > https://www.cnss.gov/CNSS/issuances/Memoranda.cfm > CNSS_Advisory_Memo_02-15.pdf > > All ur linkclicks are... > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2675 bytes Desc: not available URL: From alfonso.degregorio at gmail.com Wed Aug 19 15:30:58 2015 From: alfonso.degregorio at gmail.com (Alfonso De Gregorio) Date: Wed, 19 Aug 2015 22:30:58 +0000 Subject: Crypto policy is a presidential campaign issue Message-ID: "Crypto policy is a presidential campaign issue." -- Matt Blaze, https://twitter.com/mattblaze/status/634120680557150208 “If you create encryption, it makes it harder for the American government to do its job—while protecting civil liberties—to make sure that evildoers aren’t in our midst,” -- Jeb Bush, https://firstlook.org/theintercept/2015/08/19/jeb-bush-comes-encryption/ Those damn communists commented: "Übeltäter und kryptographen aller Länder, vereinigt euch!" -- Karl Marx and Friedrich Engels on Crypto Wars II From hozer at hozed.org Thu Aug 20 06:20:56 2015 From: hozer at hozed.org (Troy Benjegerdes) Date: Thu, 20 Aug 2015 08:20:56 -0500 Subject: Open Fabs In-Reply-To: References: Message-ID: <20150820132056.GL27932@nl.grid.coop> On Thu, Jul 30, 2015 at 05:19:32PM -0400, grarpamp wrote: > On Thu, Jul 30, 2015 at 3:13 PM, wrote: > > I still maintain that bootstapping is best done using EBL to create LSI and less complex VLSI (USB chips, CPLD and FPGA). Sure EBL is slow but it can eliminate the cost and complexity of masking. EBL immensely simplifies the foundry and offers the possibility for OS distributed design and manufacture, affordable for "maker" groups, without involving a commercial entity. The number of trusted parties shrinks significantly. > > Who can spot the two untrusted parties in this chickenegg EBL rig? > https://en.wikipedia.org/wiki/File:EB_litograph.jpg > And what are they driving? D-oh. > > EBL would be fine if it's control was rebuilt as trusted gear. > > Just links... > https://en.wikipedia.org/wiki/Electron-beam_lithography > https://en.wikipedia.org/wiki/Integrated_circuit#VLSI > https://en.wikipedia.org/wiki/Universal_Systems_Language > https://en.wikipedia.org/wiki/File:Apollo_guidiance_computer_ferrit_core_memory.jpg > https://en.wikipedia.org/wiki/File:Agc_nor2.jpg > https://www.youtube.com/watch?v=k4oGI_dNaPc > https://www.youtube.com/watch?v=n3wPBcmSb2U > The solution to this chicken and egg rathole is a legislative trojan. First, we identify a consortium (cartel?) of open-source hardware folks who desire to make a lot of money making hardware that anyone can verify correct operation of said hardware. Then, we draft model legislation to fund basic R&D of 'trusted' hardware by basic science research agencies in the US, Germany, Japan, and China. (Now if you really want to tweak the beast, add Iran or North Korea to the list, that would be amusing) Now is the important part: Raising sufficient lobbying money to get the previously developed model legislation passed in a sufficient subset of countries. In the US this is pretty straighforward, we go to Silicon Valley with a pitch deck and find some investors that already play the game of financing legislation. We can start with people who've invested in Google, Microsoft, Apple, and media companies (the ones that brought us the DMCA) Once the legislation is passed, the previously mentioned cartel can now leverage (probably by at least 100x) the original funds invested in lobbying, because they are the only ones that can succeed in getting the grant funding for said basic research. A completely different approach would be to find the owners of some smaller independent fabs who'd like to stay independent. If you want to add the lobbying bit go to the local government and ask for economic development funds for local industry. From wirelesswarrior at safe-mail.net Thu Aug 20 14:03:51 2015 From: wirelesswarrior at safe-mail.net (wirelesswarrior at safe-mail.net) Date: Thu, 20 Aug 2015 17:03:51 -0400 Subject: Defcon slides Message-ID: Cpunks, My slides are now online. There is a link from the front page of cryptome.org under the "Offsite" section. WW From grarpamp at gmail.com Fri Aug 21 01:51:26 2015 From: grarpamp at gmail.com (grarpamp) Date: Fri, 21 Aug 2015 04:51:26 -0400 Subject: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files") In-Reply-To: <20150821043032.GB5822@torproject.org> References: <55C59BBA.2020700@openmailbox.org> <1439101342-sup-8277@metis.syd1.tesser.org> <20150812234512.GE2384@torproject.org> <20150813074017.GF2384@torproject.org> <20150821043032.GB5822@torproject.org> Message-ID: On Fri, Aug 21, 2015 at 12:30 AM, Mike Perry wrote: > I submitted a proposal to tor-dev describing a simple defense against > this default configuration: > https://lists.torproject.org/pipermail/tor-dev/2015-August/009326.html nProbe should be added to the router list, it's a very popular opensource IPFIX / netflow tap. http://www.ntop.org/products/netflow/nprobe/ For those into researching other flow capabilities... There are also some probes in OS kernels and some other opensource taps, they're not as well known or utilized as nProbe. Other large hardware vendors include Brocade, Avaya, Huawei, and Alcatel-Lucent. Lots of SDN and monitoring projects can plug in with gear like this, because, FTW... http://telesoft-technologies.com/technologies/mpac-ip-7200-dual-100g-ethernet-accelerator-card http://www.hitechglobal.com/IPCores/100GigEthernet-MAC-PCS.htm http://www.napatech.com/sites/default/files/dn-0820_nt100e3-1-ptp_data_sheet_3.pdf https://www.cesnet.cz/wp-content/uploads/2015/01/hanic-100g.pdf http://www.ndsl.kaist.edu/~kyoungsoo/papers/2010-lanman-100Gbps.pdf http://info.iet.unipi.it/~luigi/netmap/ From grarpamp at gmail.com Fri Aug 21 02:14:24 2015 From: grarpamp at gmail.com (grarpamp) Date: Fri, 21 Aug 2015 05:14:24 -0400 Subject: Defcon slides In-Reply-To: References: Message-ID: On Thu, Aug 20, 2015 at 5:03 PM, wrote: > My slides are now online. There is a link from the front page of cryptome.org under the "Offsite" section. http://defcon-wireless-village.com/docs/Defcon23-Covert-Wireless.pdf http://www.wirelessvillage.ninja/ 402 Payment Required Just kidding. Unless you really want to pay us. Chances are, if you got this page, that means the server doesn't like something about you. You may be using an invalid HTTP option, or an evil browser string, or maybe just from a country we are leery of. If you want to access the page, and you are not attempting to index/hack/inject/pwn it, DM Us to get it looked at. tor so leery. From jya at pipeline.com Fri Aug 21 02:56:58 2015 From: jya at pipeline.com (John Young) Date: Fri, 21 Aug 2015 05:56:58 -0400 Subject: Defcon slides In-Reply-To: References: Message-ID: Someone else got a 402. Good Housekeeping Mr Clean machines do not get a 402. Most likely the Kaspersky-Krebs-Schneier-TCMay-Muppets- JPMorgan-In-Q-Tel-in-YourBox v.12 exploit is MiTM by DoD-BBG-Tor. Pay the ransom. No BTC, Rai only. At 05:14 AM 8/21/2015, you wrote: >On Thu, Aug 20, 2015 at 5:03 PM, wrote: > > My slides are now online. There is a link from the front page of > cryptome.org under the "Offsite" section. > >http://defcon-wireless-village.com/docs/Defcon23-Covert-Wireless.pdf >http://www.wirelessvillage.ninja/ > >402 Payment Required >Just kidding. Unless you really want to pay us. Chances are, if you >got this page, that means the server doesn't like something about you. >You may be using an invalid HTTP option, or an evil browser string, or >maybe just from a country we are leery of. If you want to access the >page, and you are not attempting to index/hack/inject/pwn it, DM Us to >get it looked at. > >tor so leery. From coderman at gmail.com Fri Aug 21 06:19:23 2015 From: coderman at gmail.com (coderman) Date: Fri, 21 Aug 2015 06:19:23 -0700 Subject: FOIA/PA - USA v. Bell Message-ID: it is worth mentioning again, this case is very difficult to access in PACER! --- found the following additional case, which is interesting given the cross linking with other cases: https://peertech.org/files/USAvBell_00-05731_DocketText.pdf also lots still sealed in: https://peertech.org/files/USAvBell_97-30384_DocketText.pdf all of the docs, currently retrieved: https://peertech.org/files/USAvBell_r1.zip full list, as individual files: https://peertech.org/files/Bell_05-35289_Docket.pdf https://peertech.org/files/Bell_05-35897_Docket.pdf https://peertech.org/files/USAvBell_00-05172_doc1.pdf https://peertech.org/files/USAvBell_00-05172_doc3.pdf https://peertech.org/files/USAvBell_00-05172_doc4.pdf https://peertech.org/files/USAvBell_00-05172_doc5.pdf https://peertech.org/files/USAvBell_00-05172_DocketText.pdf https://peertech.org/files/USAvBell_00-05731_doc162.pdf https://peertech.org/files/USAvBell_00-05731_doc165.pdf https://peertech.org/files/USAvBell_00-05731_doc169.pdf https://peertech.org/files/USAvBell_00-05731_doc172.pdf https://peertech.org/files/USAvBell_00-05731_doc174.pdf https://peertech.org/files/USAvBell_00-05731_doc175.pdf https://peertech.org/files/USAvBell_00-05731_doc178.pdf https://peertech.org/files/USAvBell_00-05731_doc180.pdf https://peertech.org/files/USAvBell_00-05731_doc182.pdf https://peertech.org/files/USAvBell_00-05731_doc183.pdf https://peertech.org/files/USAvBell_00-05731_doc184.pdf https://peertech.org/files/USAvBell_00-05731_doc187.pdf https://peertech.org/files/USAvBell_00-05731_doc189.pdf https://peertech.org/files/USAvBell_00-05731_doc190.pdf https://peertech.org/files/USAvBell_00-05731_doc191.pdf https://peertech.org/files/USAvBell_00-05731_doc194.pdf https://peertech.org/files/USAvBell_00-05731_doc195.pdf https://peertech.org/files/USAvBell_00-05731_doc196.pdf https://peertech.org/files/USAvBell_00-05731_doc197.pdf https://peertech.org/files/USAvBell_00-05731_doc201.pdf https://peertech.org/files/USAvBell_00-05731_doc202.pdf https://peertech.org/files/USAvBell_00-05731_doc203.pdf https://peertech.org/files/USAvBell_00-05731_doc213.pdf https://peertech.org/files/USAvBell_00-05731_doc217.pdf https://peertech.org/files/USAvBell_00-05731_doc219.pdf https://peertech.org/files/USAvBell_00-05731_doc220.pdf https://peertech.org/files/USAvBell_00-05731_doc221.pdf https://peertech.org/files/USAvBell_00-05731_doc222.pdf https://peertech.org/files/USAvBell_00-05731_doc223.pdf https://peertech.org/files/USAvBell_00-05731_doc224.pdf https://peertech.org/files/USAvBell_00-05731_doc225b.pdf https://peertech.org/files/USAvBell_00-05731_doc225c.pdf https://peertech.org/files/USAvBell_00-05731_doc225.pdf https://peertech.org/files/USAvBell_00-05731_doc226.pdf https://peertech.org/files/USAvBell_00-05731_doc227b.pdf https://peertech.org/files/USAvBell_00-05731_doc227c.pdf https://peertech.org/files/USAvBell_00-05731_doc227.pdf https://peertech.org/files/USAvBell_00-05731_doc228.pdf https://peertech.org/files/USAvBell_00-05731_doc229.pdf https://peertech.org/files/USAvBell_00-05731_doc230.pdf https://peertech.org/files/USAvBell_00-05731_doc231.pdf https://peertech.org/files/USAvBell_00-05731_doc232.pdf https://peertech.org/files/USAvBell_00-05731_doc233.pdf https://peertech.org/files/USAvBell_00-05731_doc234.pdf https://peertech.org/files/USAvBell_00-05731_doc235.pdf https://peertech.org/files/USAvBell_00-05731_doc236.pdf https://peertech.org/files/USAvBell_00-05731_doc237.pdf https://peertech.org/files/USAvBell_00-05731_doc238.pdf https://peertech.org/files/USAvBell_00-05731_doc239.pdf https://peertech.org/files/USAvBell_00-05731_doc240.pdf https://peertech.org/files/USAvBell_00-05731_doc241.pdf https://peertech.org/files/USAvBell_00-05731_doc242.pdf https://peertech.org/files/USAvBell_00-05731_doc243.pdf https://peertech.org/files/USAvBell_00-05731_doc244.pdf https://peertech.org/files/USAvBell_00-05731_doc245.pdf https://peertech.org/files/USAvBell_00-05731_doc246.pdf https://peertech.org/files/USAvBell_00-05731_doc247b.pdf https://peertech.org/files/USAvBell_00-05731_doc247c.pdf https://peertech.org/files/USAvBell_00-05731_doc247.pdf https://peertech.org/files/USAvBell_00-05731_doc248.pdf https://peertech.org/files/USAvBell_00-05731_doc249.pdf https://peertech.org/files/USAvBell_00-05731_doc250.pdf https://peertech.org/files/USAvBell_00-05731_doc251.pdf https://peertech.org/files/USAvBell_00-05731_doc252.pdf https://peertech.org/files/USAvBell_00-05731_doc255.pdf https://peertech.org/files/USAvBell_00-05731_doc256.pdf https://peertech.org/files/USAvBell_00-05731_doc257.pdf https://peertech.org/files/USAvBell_00-05731_doc258.pdf https://peertech.org/files/USAvBell_00-05731_doc259.pdf https://peertech.org/files/USAvBell_00-05731_doc261.pdf https://peertech.org/files/USAvBell_00-05731_doc263.pdf https://peertech.org/files/USAvBell_00-05731_doc264.pdf https://peertech.org/files/USAvBell_00-05731_doc265.pdf https://peertech.org/files/USAvBell_00-05731_doc267.pdf https://peertech.org/files/USAvBell_00-05731_doc268b.pdf https://peertech.org/files/USAvBell_00-05731_doc268.pdf https://peertech.org/files/USAvBell_00-05731_doc271.pdf https://peertech.org/files/USAvBell_00-05731_doc273.pdf https://peertech.org/files/USAvBell_00-05731_doc274.pdf https://peertech.org/files/USAvBell_00-05731_doc275.pdf https://peertech.org/files/USAvBell_00-05731_doc276b.pdf https://peertech.org/files/USAvBell_00-05731_doc276.pdf https://peertech.org/files/USAvBell_00-05731_doc279.pdf https://peertech.org/files/USAvBell_00-05731_doc280.pdf https://peertech.org/files/USAvBell_00-05731_doc281.pdf https://peertech.org/files/USAvBell_00-05731_doc283.pdf https://peertech.org/files/USAvBell_00-05731_doc284.pdf https://peertech.org/files/USAvBell_00-05731_doc285.pdf https://peertech.org/files/USAvBell_00-05731_doc286.pdf https://peertech.org/files/USAvBell_00-05731_doc288.pdf https://peertech.org/files/USAvBell_00-05731_doc289.pdf https://peertech.org/files/USAvBell_00-05731_doc291b.pdf https://peertech.org/files/USAvBell_00-05731_doc291.pdf https://peertech.org/files/USAvBell_00-05731_doc294.pdf https://peertech.org/files/USAvBell_00-05731_doc295.pdf https://peertech.org/files/USAvBell_00-05731_doc296.pdf https://peertech.org/files/USAvBell_00-05731_doc298.pdf https://peertech.org/files/USAvBell_00-05731_doc299.pdf https://peertech.org/files/USAvBell_00-05731_doc300.pdf https://peertech.org/files/USAvBell_00-05731_doc301.pdf https://peertech.org/files/USAvBell_00-05731_doc302.pdf https://peertech.org/files/USAvBell_00-05731_doc303.pdf https://peertech.org/files/USAvBell_00-05731_doc304.pdf https://peertech.org/files/USAvBell_00-05731_doc305.pdf https://peertech.org/files/USAvBell_00-05731_doc306.pdf https://peertech.org/files/USAvBell_00-05731_doc307.pdf https://peertech.org/files/USAvBell_00-05731_doc309.pdf https://peertech.org/files/USAvBell_00-05731_doc310.pdf https://peertech.org/files/USAvBell_00-05731_doc311.pdf https://peertech.org/files/USAvBell_00-05731_doc313.pdf https://peertech.org/files/USAvBell_00-05731_doc314.pdf https://peertech.org/files/USAvBell_00-05731_doc315.pdf https://peertech.org/files/USAvBell_00-05731_doc316.pdf https://peertech.org/files/USAvBell_00-05731_doc317.pdf https://peertech.org/files/USAvBell_00-05731_doc318.pdf https://peertech.org/files/USAvBell_00-05731_doc319.pdf https://peertech.org/files/USAvBell_00-05731_doc320.pdf https://peertech.org/files/USAvBell_00-05731_DocketText.pdf https://peertech.org/files/USAvBell_01-30143_Docket.pdf https://peertech.org/files/USAvBell_01-30162_Docket.pdf https://peertech.org/files/USAvBell_01-30296_Docket.pdf https://peertech.org/files/USAvBell_01-30303_Docket.pdf https://peertech.org/files/USAvBell_04-30115_Docket.pdf https://peertech.org/files/USAvBell_06-35904_Docket.pdf https://peertech.org/files/USAvBell_97-30384_doc67.pdf https://peertech.org/files/USAvBell_97-30384_doc71.pdf https://peertech.org/files/USAvBell_97-30384_doc72.pdf https://peertech.org/files/USAvBell_97-30384_doc85.pdf https://peertech.org/files/USAvBell_97-30384_doc86.pdf https://peertech.org/files/USAvBell_97-30384_doc90.pdf https://peertech.org/files/USAvBell_97-30384_doc91.pdf https://peertech.org/files/USAvBell_97-30384_doc92.pdf https://peertech.org/files/USAvBell_97-30384_doc93.pdf https://peertech.org/files/USAvBell_97-30384_doc94b.pdf https://peertech.org/files/USAvBell_97-30384_doc94.pdf https://peertech.org/files/USAvBell_97-30384_doc96.pdf https://peertech.org/files/USAvBell_97-30384_doc97.pdf https://peertech.org/files/USAvBell_97-30384_doc98.pdf https://peertech.org/files/USAvBell_97-30384_Docket.pdf https://peertech.org/files/USAvBell_97-30384_DocketText.pdf https://peertech.org/files/USAvBell_99-30210_Docket.pdf --- more coming this weekend... best regards, From coderman at gmail.com Fri Aug 21 06:25:39 2015 From: coderman at gmail.com (coderman) Date: Fri, 21 Aug 2015 06:25:39 -0700 Subject: FOIA/PA - USA v. Bell In-Reply-To: References: Message-ID: again, with corrected links :/ notables: https://peertech.org/files/USAvBell/USAvBell_00-05731_DocketText.pdf and https://peertech.org/files/USAvBell/USAvBell_97-30384_DocketText.pdf the zip: https://peertech.org/files/USAvBell_r1.zip SHA-256 is: 6b1fb44c4faec869676ded703395dc771d0a4053091588e742c6677c383c24eb corrected remainder list: https://peertech.org/files/USAvBell/Bell_05-35289_Docket.pdf https://peertech.org/files/USAvBell/Bell_05-35897_Docket.pdf https://peertech.org/files/USAvBell/USAvBell_00-05172_doc1.pdf https://peertech.org/files/USAvBell/USAvBell_00-05172_doc3.pdf https://peertech.org/files/USAvBell/USAvBell_00-05172_doc4.pdf https://peertech.org/files/USAvBell/USAvBell_00-05172_doc5.pdf https://peertech.org/files/USAvBell/USAvBell_00-05172_DocketText.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc162.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc165.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc169.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc172.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc174.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc175.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc178.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc180.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc182.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc183.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc184.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc187.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc189.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc190.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc191.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc194.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc195.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc196.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc197.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc201.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc202.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc203.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc213.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc217.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc219.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc220.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc221.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc222.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc223.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc224.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc225b.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc225c.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc225.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc226.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc227b.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc227c.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc227.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc228.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc229.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc230.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc231.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc232.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc233.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc234.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc235.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc236.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc237.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc238.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc239.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc240.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc241.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc242.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc243.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc244.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc245.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc246.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc247b.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc247c.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc247.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc248.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc249.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc250.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc251.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc252.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc255.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc256.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc257.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc258.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc259.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc261.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc263.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc264.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc265.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc267.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc268b.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc268.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc271.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc273.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc274.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc275.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc276b.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc276.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc279.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc280.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc281.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc283.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc284.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc285.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc286.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc288.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc289.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc291b.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc291.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc294.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc295.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc296.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc298.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc299.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc300.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc301.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc302.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc303.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc304.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc305.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc306.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc307.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc309.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc310.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc311.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc313.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc314.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc315.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc316.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc317.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc318.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc319.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_doc320.pdf https://peertech.org/files/USAvBell/USAvBell_00-05731_DocketText.pdf https://peertech.org/files/USAvBell/USAvBell_01-30143_Docket.pdf https://peertech.org/files/USAvBell/USAvBell_01-30162_Docket.pdf https://peertech.org/files/USAvBell/USAvBell_01-30296_Docket.pdf https://peertech.org/files/USAvBell/USAvBell_01-30303_Docket.pdf https://peertech.org/files/USAvBell/USAvBell_04-30115_Docket.pdf https://peertech.org/files/USAvBell/USAvBell_06-35904_Docket.pdf https://peertech.org/files/USAvBell/USAvBell_97-30384_doc67.pdf https://peertech.org/files/USAvBell/USAvBell_97-30384_doc71.pdf https://peertech.org/files/USAvBell/USAvBell_97-30384_doc72.pdf https://peertech.org/files/USAvBell/USAvBell_97-30384_doc85.pdf https://peertech.org/files/USAvBell/USAvBell_97-30384_doc86.pdf https://peertech.org/files/USAvBell/USAvBell_97-30384_doc90.pdf https://peertech.org/files/USAvBell/USAvBell_97-30384_doc91.pdf https://peertech.org/files/USAvBell/USAvBell_97-30384_doc92.pdf https://peertech.org/files/USAvBell/USAvBell_97-30384_doc93.pdf https://peertech.org/files/USAvBell/USAvBell_97-30384_doc94b.pdf https://peertech.org/files/USAvBell/USAvBell_97-30384_doc94.pdf https://peertech.org/files/USAvBell/USAvBell_97-30384_doc96.pdf https://peertech.org/files/USAvBell/USAvBell_97-30384_doc97.pdf https://peertech.org/files/USAvBell/USAvBell_97-30384_doc98.pdf https://peertech.org/files/USAvBell/USAvBell_97-30384_Docket.pdf https://peertech.org/files/USAvBell/USAvBell_97-30384_DocketText.pdf https://peertech.org/files/USAvBell/USAvBell_99-30210_Docket.pdf On 8/21/15, coderman wrote: > it is worth mentioning again, > this case is very difficult to access in PACER! > > --- > > found the following additional case, which is interesting given the > cross linking with other cases: > https://peertech.org/files/USAvBell_00-05731_DocketText.pdf > > also lots still sealed in: > https://peertech.org/files/USAvBell_97-30384_DocketText.pdf > > > all of the docs, currently retrieved: > https://peertech.org/files/USAvBell_r1.zip > > > > full list, as individual files: > https://peertech.org/files/Bell_05-35289_Docket.pdf > https://peertech.org/files/Bell_05-35897_Docket.pdf > https://peertech.org/files/USAvBell_00-05172_doc1.pdf > https://peertech.org/files/USAvBell_00-05172_doc3.pdf > https://peertech.org/files/USAvBell_00-05172_doc4.pdf > https://peertech.org/files/USAvBell_00-05172_doc5.pdf > https://peertech.org/files/USAvBell_00-05172_DocketText.pdf > https://peertech.org/files/USAvBell_00-05731_doc162.pdf > https://peertech.org/files/USAvBell_00-05731_doc165.pdf > https://peertech.org/files/USAvBell_00-05731_doc169.pdf > https://peertech.org/files/USAvBell_00-05731_doc172.pdf > https://peertech.org/files/USAvBell_00-05731_doc174.pdf > https://peertech.org/files/USAvBell_00-05731_doc175.pdf > https://peertech.org/files/USAvBell_00-05731_doc178.pdf > https://peertech.org/files/USAvBell_00-05731_doc180.pdf > https://peertech.org/files/USAvBell_00-05731_doc182.pdf > https://peertech.org/files/USAvBell_00-05731_doc183.pdf > https://peertech.org/files/USAvBell_00-05731_doc184.pdf > https://peertech.org/files/USAvBell_00-05731_doc187.pdf > https://peertech.org/files/USAvBell_00-05731_doc189.pdf > https://peertech.org/files/USAvBell_00-05731_doc190.pdf > https://peertech.org/files/USAvBell_00-05731_doc191.pdf > https://peertech.org/files/USAvBell_00-05731_doc194.pdf > https://peertech.org/files/USAvBell_00-05731_doc195.pdf > https://peertech.org/files/USAvBell_00-05731_doc196.pdf > https://peertech.org/files/USAvBell_00-05731_doc197.pdf > https://peertech.org/files/USAvBell_00-05731_doc201.pdf > https://peertech.org/files/USAvBell_00-05731_doc202.pdf > https://peertech.org/files/USAvBell_00-05731_doc203.pdf > https://peertech.org/files/USAvBell_00-05731_doc213.pdf > https://peertech.org/files/USAvBell_00-05731_doc217.pdf > https://peertech.org/files/USAvBell_00-05731_doc219.pdf > https://peertech.org/files/USAvBell_00-05731_doc220.pdf > https://peertech.org/files/USAvBell_00-05731_doc221.pdf > https://peertech.org/files/USAvBell_00-05731_doc222.pdf > https://peertech.org/files/USAvBell_00-05731_doc223.pdf > https://peertech.org/files/USAvBell_00-05731_doc224.pdf > https://peertech.org/files/USAvBell_00-05731_doc225b.pdf > https://peertech.org/files/USAvBell_00-05731_doc225c.pdf > https://peertech.org/files/USAvBell_00-05731_doc225.pdf > https://peertech.org/files/USAvBell_00-05731_doc226.pdf > https://peertech.org/files/USAvBell_00-05731_doc227b.pdf > https://peertech.org/files/USAvBell_00-05731_doc227c.pdf > https://peertech.org/files/USAvBell_00-05731_doc227.pdf > https://peertech.org/files/USAvBell_00-05731_doc228.pdf > https://peertech.org/files/USAvBell_00-05731_doc229.pdf > https://peertech.org/files/USAvBell_00-05731_doc230.pdf > https://peertech.org/files/USAvBell_00-05731_doc231.pdf > https://peertech.org/files/USAvBell_00-05731_doc232.pdf > https://peertech.org/files/USAvBell_00-05731_doc233.pdf > https://peertech.org/files/USAvBell_00-05731_doc234.pdf > https://peertech.org/files/USAvBell_00-05731_doc235.pdf > https://peertech.org/files/USAvBell_00-05731_doc236.pdf > https://peertech.org/files/USAvBell_00-05731_doc237.pdf > https://peertech.org/files/USAvBell_00-05731_doc238.pdf > https://peertech.org/files/USAvBell_00-05731_doc239.pdf > https://peertech.org/files/USAvBell_00-05731_doc240.pdf > https://peertech.org/files/USAvBell_00-05731_doc241.pdf > https://peertech.org/files/USAvBell_00-05731_doc242.pdf > https://peertech.org/files/USAvBell_00-05731_doc243.pdf > https://peertech.org/files/USAvBell_00-05731_doc244.pdf > https://peertech.org/files/USAvBell_00-05731_doc245.pdf > https://peertech.org/files/USAvBell_00-05731_doc246.pdf > https://peertech.org/files/USAvBell_00-05731_doc247b.pdf > https://peertech.org/files/USAvBell_00-05731_doc247c.pdf > https://peertech.org/files/USAvBell_00-05731_doc247.pdf > https://peertech.org/files/USAvBell_00-05731_doc248.pdf > https://peertech.org/files/USAvBell_00-05731_doc249.pdf > https://peertech.org/files/USAvBell_00-05731_doc250.pdf > https://peertech.org/files/USAvBell_00-05731_doc251.pdf > https://peertech.org/files/USAvBell_00-05731_doc252.pdf > https://peertech.org/files/USAvBell_00-05731_doc255.pdf > https://peertech.org/files/USAvBell_00-05731_doc256.pdf > https://peertech.org/files/USAvBell_00-05731_doc257.pdf > https://peertech.org/files/USAvBell_00-05731_doc258.pdf > https://peertech.org/files/USAvBell_00-05731_doc259.pdf > https://peertech.org/files/USAvBell_00-05731_doc261.pdf > https://peertech.org/files/USAvBell_00-05731_doc263.pdf > https://peertech.org/files/USAvBell_00-05731_doc264.pdf > https://peertech.org/files/USAvBell_00-05731_doc265.pdf > https://peertech.org/files/USAvBell_00-05731_doc267.pdf > https://peertech.org/files/USAvBell_00-05731_doc268b.pdf > https://peertech.org/files/USAvBell_00-05731_doc268.pdf > https://peertech.org/files/USAvBell_00-05731_doc271.pdf > https://peertech.org/files/USAvBell_00-05731_doc273.pdf > https://peertech.org/files/USAvBell_00-05731_doc274.pdf > https://peertech.org/files/USAvBell_00-05731_doc275.pdf > https://peertech.org/files/USAvBell_00-05731_doc276b.pdf > https://peertech.org/files/USAvBell_00-05731_doc276.pdf > https://peertech.org/files/USAvBell_00-05731_doc279.pdf > https://peertech.org/files/USAvBell_00-05731_doc280.pdf > https://peertech.org/files/USAvBell_00-05731_doc281.pdf > https://peertech.org/files/USAvBell_00-05731_doc283.pdf > https://peertech.org/files/USAvBell_00-05731_doc284.pdf > https://peertech.org/files/USAvBell_00-05731_doc285.pdf > https://peertech.org/files/USAvBell_00-05731_doc286.pdf > https://peertech.org/files/USAvBell_00-05731_doc288.pdf > https://peertech.org/files/USAvBell_00-05731_doc289.pdf > https://peertech.org/files/USAvBell_00-05731_doc291b.pdf > https://peertech.org/files/USAvBell_00-05731_doc291.pdf > https://peertech.org/files/USAvBell_00-05731_doc294.pdf > https://peertech.org/files/USAvBell_00-05731_doc295.pdf > https://peertech.org/files/USAvBell_00-05731_doc296.pdf > https://peertech.org/files/USAvBell_00-05731_doc298.pdf > https://peertech.org/files/USAvBell_00-05731_doc299.pdf > https://peertech.org/files/USAvBell_00-05731_doc300.pdf > https://peertech.org/files/USAvBell_00-05731_doc301.pdf > https://peertech.org/files/USAvBell_00-05731_doc302.pdf > https://peertech.org/files/USAvBell_00-05731_doc303.pdf > https://peertech.org/files/USAvBell_00-05731_doc304.pdf > https://peertech.org/files/USAvBell_00-05731_doc305.pdf > https://peertech.org/files/USAvBell_00-05731_doc306.pdf > https://peertech.org/files/USAvBell_00-05731_doc307.pdf > https://peertech.org/files/USAvBell_00-05731_doc309.pdf > https://peertech.org/files/USAvBell_00-05731_doc310.pdf > https://peertech.org/files/USAvBell_00-05731_doc311.pdf > https://peertech.org/files/USAvBell_00-05731_doc313.pdf > https://peertech.org/files/USAvBell_00-05731_doc314.pdf > https://peertech.org/files/USAvBell_00-05731_doc315.pdf > https://peertech.org/files/USAvBell_00-05731_doc316.pdf > https://peertech.org/files/USAvBell_00-05731_doc317.pdf > https://peertech.org/files/USAvBell_00-05731_doc318.pdf > https://peertech.org/files/USAvBell_00-05731_doc319.pdf > https://peertech.org/files/USAvBell_00-05731_doc320.pdf > https://peertech.org/files/USAvBell_00-05731_DocketText.pdf > https://peertech.org/files/USAvBell_01-30143_Docket.pdf > https://peertech.org/files/USAvBell_01-30162_Docket.pdf > https://peertech.org/files/USAvBell_01-30296_Docket.pdf > https://peertech.org/files/USAvBell_01-30303_Docket.pdf > https://peertech.org/files/USAvBell_04-30115_Docket.pdf > https://peertech.org/files/USAvBell_06-35904_Docket.pdf > https://peertech.org/files/USAvBell_97-30384_doc67.pdf > https://peertech.org/files/USAvBell_97-30384_doc71.pdf > https://peertech.org/files/USAvBell_97-30384_doc72.pdf > https://peertech.org/files/USAvBell_97-30384_doc85.pdf > https://peertech.org/files/USAvBell_97-30384_doc86.pdf > https://peertech.org/files/USAvBell_97-30384_doc90.pdf > https://peertech.org/files/USAvBell_97-30384_doc91.pdf > https://peertech.org/files/USAvBell_97-30384_doc92.pdf > https://peertech.org/files/USAvBell_97-30384_doc93.pdf > https://peertech.org/files/USAvBell_97-30384_doc94b.pdf > https://peertech.org/files/USAvBell_97-30384_doc94.pdf > https://peertech.org/files/USAvBell_97-30384_doc96.pdf > https://peertech.org/files/USAvBell_97-30384_doc97.pdf > https://peertech.org/files/USAvBell_97-30384_doc98.pdf > https://peertech.org/files/USAvBell_97-30384_Docket.pdf > https://peertech.org/files/USAvBell_97-30384_DocketText.pdf > https://peertech.org/files/USAvBell_99-30210_Docket.pdf > > --- > > more coming this weekend... > > best regards, > From coderman at gmail.com Fri Aug 21 07:39:32 2015 From: coderman at gmail.com (coderman) Date: Fri, 21 Aug 2015 07:39:32 -0700 Subject: FOIPA adventures In-Reply-To: References: Message-ID: On 2/5/15, coderman wrote: > "you want me to consent to make my FBI file public? Are you fucking mad?" > - https://twitter.com/thegrugq/status/563036665837789184 the FBI requests have been informative. i have observed what i call the "sly close" at work, which i hope to expand on further. this involves requesting DoJ-361 documentation for a request, "A fix is required to perfect the request." then the request immediately goes into "A no responsive documents response." when documents are sent / receipt of delivery confirmation provided. this is anomalous because a proper request goes into "An acknowledgement letter, stating the request is being processed." for some period before reaching a final state. i will have to sue to get my docs, or force them to bring charges? one conjecture is that active investigations get sly close, not just past files with unflattering contents... best regards, innocentman who did not participate in the heist crimes with CHAPPiE! From coderman at gmail.com Fri Aug 21 07:44:32 2015 From: coderman at gmail.com (coderman) Date: Fri, 21 Aug 2015 07:44:32 -0700 Subject: FOIPA adventures In-Reply-To: References: Message-ID: On 8/21/15, coderman wrote: > ... > then the request immediately goes into > "A no responsive documents response." > when documents are sent / receipt of delivery confirmation provided. > > this is anomalous because a proper request goes into "An > acknowledgement letter, stating the request is being processed." > for some period before reaching a final state. forgot to mention other variant: no response until you ping them, seeking follow up, then discover: "This request was been closed . A no responsive documents response." which is anomalous because in every other instance the state transitions do not skip to end without notification. to FOIA more FBI FOIA workflow :P best regards, From wirelesswarrior at safe-mail.net Fri Aug 21 10:21:21 2015 From: wirelesswarrior at safe-mail.net (wirelesswarrior at safe-mail.net) Date: Fri, 21 Aug 2015 13:21:21 -0400 Subject: Defcon slides Message-ID: As a backup for those experiencing difficulties via the cryptome.org link I uploaded the slides to a "dropbox" http://s000.tinyupload.com/?file_id=73132852308922752258 WW From grarpamp at gmail.com Fri Aug 21 11:11:35 2015 From: grarpamp at gmail.com (grarpamp) Date: Fri, 21 Aug 2015 14:11:35 -0400 Subject: Defcon slides In-Reply-To: References: Message-ID: On Fri, Aug 21, 2015 at 5:56 AM, John Young wrote: > Someone else got a 402. Good Housekeeping Mr Clean machines > do not get a 402. > > Most likely the Kaspersky-Krebs-Schneier-TCMay-Muppets- > JPMorgan-In-Q-Tel-in-YourBox v.12 exploit is MiTM by DoD-BBG-Tor. My machine has been feeling not so fresh lately, even downright dirty. She keeps asking me to fetch her some acid douche so she can decap and suicide herself, for teh science. I still need her, so I keep clicking "ask me later". > Pay the ransom. No BTC, Rai only. Future humor held at ransom, pay up, bitchez... btc:1BMjb5YQ1iEkvFdA6DTbmE3ZTpEE88GkMs Gotta pay for this fab of mine somehow ;) From grarpamp at gmail.com Fri Aug 21 15:06:50 2015 From: grarpamp at gmail.com (grarpamp) Date: Fri, 21 Aug 2015 18:06:50 -0400 Subject: Brothers at Arms: Jeb Bush says no to crypto Message-ID: https://firstlook.org/theintercept/2015/08/19/jeb-bush-comes-encryption/ Jeb Bush Comes Out Against Encryption Jenna McLaughlin Aug. 19 2015, 3:40 p.m. Getty Images Republican presidential candidate Jeb Bush said Tuesday that encryption makes it harder for law enforcement to track down “evildoers” — and called for a “much better, more cooperative relationship” with Apple, Google, and other tech companies that are building uncrackable private communication apps into their new products. “If you create encryption, it makes it harder for the American government to do its job — while protecting civil liberties — to make sure that evildoers aren’t in our midst,” Bush said in South Carolina at an event sponsored by Americans for Peace, Prosperity, and Security, a group with close ties to military contractors. Bush said, “We need to find a new arrangement with Silicon Valley in this regard because I think this is a very dangerous kind of situation.” But when the event moderator, former CNN anchor Jeanne Meserve, brought up scientists’ conclusions that giving law enforcement special access to communications also gives hackers more access, Bush didn’t explain his position any further. “Good point, except we ought to have much more cooperation when it comes to cybersecurity,” he said. From jdb10987 at yahoo.com Fri Aug 21 13:19:44 2015 From: jdb10987 at yahoo.com (jim bell) Date: Fri, 21 Aug 2015 20:19:44 +0000 (UTC) Subject: FOIA/PA - USA v. Bell In-Reply-To: References: Message-ID: <490831186.8369178.1440188384986.JavaMail.yahoo@mail.yahoo.com> The first two links you included were inaccessible to me.  The third began to download; I stopped it.       Jim Bell From: coderman To: jim bell Cc: cpunks Sent: Friday, August 21, 2015 6:19 AM Subject: Re: FOIA/PA - USA v. Bell it is worth mentioning again, this case is very difficult to access in PACER! --- found the following additional case, which is interesting given the cross linking with other cases:   https://peertech.org/files/USAvBell_00-05731_DocketText.pdf also lots still sealed in:   https://peertech.org/files/USAvBell_97-30384_DocketText.pdf all of the docs, currently retrieved:   https://peertech.org/files/USAvBell_r1.zip full list, as individual files: https://peertech.org/files/Bell_05-35289_Docket.pdf https://peertech.org/files/Bell_05-35897_Docket.pdf https://peertech.org/files/USAvBell_00-05172_doc1.pdf https://peertech.org/files/USAvBell_00-05172_doc3.pdf https://peertech.org/files/USAvBell_00-05172_doc4.pdf https://peertech.org/files/USAvBell_00-05172_doc5.pdf https://peertech.org/files/USAvBell_00-05172_DocketText.pdf https://peertech.org/files/USAvBell_00-05731_doc162.pdf https://peertech.org/files/USAvBell_00-05731_doc165.pdf https://peertech.org/files/USAvBell_00-05731_doc169.pdf https://peertech.org/files/USAvBell_00-05731_doc172.pdf https://peertech.org/files/USAvBell_00-05731_doc174.pdf https://peertech.org/files/USAvBell_00-05731_doc175.pdf https://peertech.org/files/USAvBell_00-05731_doc178.pdf https://peertech.org/files/USAvBell_00-05731_doc180.pdf https://peertech.org/files/USAvBell_00-05731_doc182.pdf https://peertech.org/files/USAvBell_00-05731_doc183.pdf https://peertech.org/files/USAvBell_00-05731_doc184.pdf https://peertech.org/files/USAvBell_00-05731_doc187.pdf https://peertech.org/files/USAvBell_00-05731_doc189.pdf https://peertech.org/files/USAvBell_00-05731_doc190.pdf https://peertech.org/files/USAvBell_00-05731_doc191.pdf https://peertech.org/files/USAvBell_00-05731_doc194.pdf https://peertech.org/files/USAvBell_00-05731_doc195.pdf https://peertech.org/files/USAvBell_00-05731_doc196.pdf https://peertech.org/files/USAvBell_00-05731_doc197.pdf https://peertech.org/files/USAvBell_00-05731_doc201.pdf https://peertech.org/files/USAvBell_00-05731_doc202.pdf https://peertech.org/files/USAvBell_00-05731_doc203.pdf https://peertech.org/files/USAvBell_00-05731_doc213.pdf https://peertech.org/files/USAvBell_00-05731_doc217.pdf https://peertech.org/files/USAvBell_00-05731_doc219.pdf https://peertech.org/files/USAvBell_00-05731_doc220.pdf https://peertech.org/files/USAvBell_00-05731_doc221.pdf https://peertech.org/files/USAvBell_00-05731_doc222.pdf https://peertech.org/files/USAvBell_00-05731_doc223.pdf https://peertech.org/files/USAvBell_00-05731_doc224.pdf https://peertech.org/files/USAvBell_00-05731_doc225b.pdf https://peertech.org/files/USAvBell_00-05731_doc225c.pdf https://peertech.org/files/USAvBell_00-05731_doc225.pdf https://peertech.org/files/USAvBell_00-05731_doc226.pdf https://peertech.org/files/USAvBell_00-05731_doc227b.pdf https://peertech.org/files/USAvBell_00-05731_doc227c.pdf https://peertech.org/files/USAvBell_00-05731_doc227.pdf https://peertech.org/files/USAvBell_00-05731_doc228.pdf https://peertech.org/files/USAvBell_00-05731_doc229.pdf https://peertech.org/files/USAvBell_00-05731_doc230.pdf https://peertech.org/files/USAvBell_00-05731_doc231.pdf https://peertech.org/files/USAvBell_00-05731_doc232.pdf https://peertech.org/files/USAvBell_00-05731_doc233.pdf https://peertech.org/files/USAvBell_00-05731_doc234.pdf https://peertech.org/files/USAvBell_00-05731_doc235.pdf https://peertech.org/files/USAvBell_00-05731_doc236.pdf https://peertech.org/files/USAvBell_00-05731_doc237.pdf https://peertech.org/files/USAvBell_00-05731_doc238.pdf https://peertech.org/files/USAvBell_00-05731_doc239.pdf https://peertech.org/files/USAvBell_00-05731_doc240.pdf https://peertech.org/files/USAvBell_00-05731_doc241.pdf https://peertech.org/files/USAvBell_00-05731_doc242.pdf https://peertech.org/files/USAvBell_00-05731_doc243.pdf https://peertech.org/files/USAvBell_00-05731_doc244.pdf https://peertech.org/files/USAvBell_00-05731_doc245.pdf https://peertech.org/files/USAvBell_00-05731_doc246.pdf https://peertech.org/files/USAvBell_00-05731_doc247b.pdf https://peertech.org/files/USAvBell_00-05731_doc247c.pdf https://peertech.org/files/USAvBell_00-05731_doc247.pdf https://peertech.org/files/USAvBell_00-05731_doc248.pdf https://peertech.org/files/USAvBell_00-05731_doc249.pdf https://peertech.org/files/USAvBell_00-05731_doc250.pdf https://peertech.org/files/USAvBell_00-05731_doc251.pdf https://peertech.org/files/USAvBell_00-05731_doc252.pdf https://peertech.org/files/USAvBell_00-05731_doc255.pdf https://peertech.org/files/USAvBell_00-05731_doc256.pdf https://peertech.org/files/USAvBell_00-05731_doc257.pdf https://peertech.org/files/USAvBell_00-05731_doc258.pdf https://peertech.org/files/USAvBell_00-05731_doc259.pdf https://peertech.org/files/USAvBell_00-05731_doc261.pdf https://peertech.org/files/USAvBell_00-05731_doc263.pdf https://peertech.org/files/USAvBell_00-05731_doc264.pdf https://peertech.org/files/USAvBell_00-05731_doc265.pdf https://peertech.org/files/USAvBell_00-05731_doc267.pdf https://peertech.org/files/USAvBell_00-05731_doc268b.pdf https://peertech.org/files/USAvBell_00-05731_doc268.pdf https://peertech.org/files/USAvBell_00-05731_doc271.pdf https://peertech.org/files/USAvBell_00-05731_doc273.pdf https://peertech.org/files/USAvBell_00-05731_doc274.pdf https://peertech.org/files/USAvBell_00-05731_doc275.pdf https://peertech.org/files/USAvBell_00-05731_doc276b.pdf https://peertech.org/files/USAvBell_00-05731_doc276.pdf https://peertech.org/files/USAvBell_00-05731_doc279.pdf https://peertech.org/files/USAvBell_00-05731_doc280.pdf https://peertech.org/files/USAvBell_00-05731_doc281.pdf https://peertech.org/files/USAvBell_00-05731_doc283.pdf https://peertech.org/files/USAvBell_00-05731_doc284.pdf https://peertech.org/files/USAvBell_00-05731_doc285.pdf https://peertech.org/files/USAvBell_00-05731_doc286.pdf https://peertech.org/files/USAvBell_00-05731_doc288.pdf https://peertech.org/files/USAvBell_00-05731_doc289.pdf https://peertech.org/files/USAvBell_00-05731_doc291b.pdf https://peertech.org/files/USAvBell_00-05731_doc291.pdf https://peertech.org/files/USAvBell_00-05731_doc294.pdf https://peertech.org/files/USAvBell_00-05731_doc295.pdf https://peertech.org/files/USAvBell_00-05731_doc296.pdf https://peertech.org/files/USAvBell_00-05731_doc298.pdf https://peertech.org/files/USAvBell_00-05731_doc299.pdf https://peertech.org/files/USAvBell_00-05731_doc300.pdf https://peertech.org/files/USAvBell_00-05731_doc301.pdf https://peertech.org/files/USAvBell_00-05731_doc302.pdf https://peertech.org/files/USAvBell_00-05731_doc303.pdf https://peertech.org/files/USAvBell_00-05731_doc304.pdf https://peertech.org/files/USAvBell_00-05731_doc305.pdf https://peertech.org/files/USAvBell_00-05731_doc306.pdf https://peertech.org/files/USAvBell_00-05731_doc307.pdf https://peertech.org/files/USAvBell_00-05731_doc309.pdf https://peertech.org/files/USAvBell_00-05731_doc310.pdf https://peertech.org/files/USAvBell_00-05731_doc311.pdf https://peertech.org/files/USAvBell_00-05731_doc313.pdf https://peertech.org/files/USAvBell_00-05731_doc314.pdf https://peertech.org/files/USAvBell_00-05731_doc315.pdf https://peertech.org/files/USAvBell_00-05731_doc316.pdf https://peertech.org/files/USAvBell_00-05731_doc317.pdf https://peertech.org/files/USAvBell_00-05731_doc318.pdf https://peertech.org/files/USAvBell_00-05731_doc319.pdf https://peertech.org/files/USAvBell_00-05731_doc320.pdf https://peertech.org/files/USAvBell_00-05731_DocketText.pdf https://peertech.org/files/USAvBell_01-30143_Docket.pdf https://peertech.org/files/USAvBell_01-30162_Docket.pdf https://peertech.org/files/USAvBell_01-30296_Docket.pdf https://peertech.org/files/USAvBell_01-30303_Docket.pdf https://peertech.org/files/USAvBell_04-30115_Docket.pdf https://peertech.org/files/USAvBell_06-35904_Docket.pdf https://peertech.org/files/USAvBell_97-30384_doc67.pdf https://peertech.org/files/USAvBell_97-30384_doc71.pdf https://peertech.org/files/USAvBell_97-30384_doc72.pdf https://peertech.org/files/USAvBell_97-30384_doc85.pdf https://peertech.org/files/USAvBell_97-30384_doc86.pdf https://peertech.org/files/USAvBell_97-30384_doc90.pdf https://peertech.org/files/USAvBell_97-30384_doc91.pdf https://peertech.org/files/USAvBell_97-30384_doc92.pdf https://peertech.org/files/USAvBell_97-30384_doc93.pdf https://peertech.org/files/USAvBell_97-30384_doc94b.pdf https://peertech.org/files/USAvBell_97-30384_doc94.pdf https://peertech.org/files/USAvBell_97-30384_doc96.pdf https://peertech.org/files/USAvBell_97-30384_doc97.pdf https://peertech.org/files/USAvBell_97-30384_doc98.pdf https://peertech.org/files/USAvBell_97-30384_Docket.pdf https://peertech.org/files/USAvBell_97-30384_DocketText.pdf https://peertech.org/files/USAvBell_99-30210_Docket.pdf --- more coming this weekend... best regards, -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 26591 bytes Desc: not available URL: From coderman at gmail.com Fri Aug 21 22:53:27 2015 From: coderman at gmail.com (coderman) Date: Fri, 21 Aug 2015 22:53:27 -0700 Subject: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files") In-Reply-To: <20150822050940.GC5822@torproject.org> References: <55C59BBA.2020700@openmailbox.org> <1439101342-sup-8277@metis.syd1.tesser.org> <20150812234512.GE2384@torproject.org> <20150813074017.GF2384@torproject.org> <20150821043032.GB5822@torproject.org> <20150822050940.GC5822@torproject.org> Message-ID: On 8/21/15, Mike Perry wrote: > ... > What I really need now is any examples of common routers that have a > default inactive/idle timeout below 10s, or allow you to set it below > 10s. So far I have not found any. i recall a switch vendor that used overflow condition to trim timeouts lower, but this is different from a hard, low limit by configuration. i'll see what i can dig up... best regards, P.S. flow tracking systems always make me point at c++ & scapy userspace driven raw injection around massive flow sybils as retort in their raw take and analytics. most efficient state representation of TCP behavior in memory? it's a fun challenge :P [ P.P.S. this may just crash your in-path, rather than DoS. keep a backup route! ] From admin at pilobilus.net Fri Aug 21 22:47:34 2015 From: admin at pilobilus.net (Steve Kinney) Date: Sat, 22 Aug 2015 01:47:34 -0400 Subject: NSA Spying Relies on AT&T'S "Extreme Willingness to Help" In-Reply-To: References: <20150816164645.06194680176@frontend2.nyi.internal> Message-ID: <55D80CF6.7080106@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 08/16/2015 03:13 PM, John Young wrote: [ ... ] > It might be surmised that staying away from technology > disclosures and featuring 5-Eyes and partners prowess and > comprehensiveness of slides and text serves to warn the enemy > of what's in store without disclosing information to defend > against it. > > In particular, Snowden's and associates harping on the need for > widespread, strong encryption use, even though the documents > show how the spies bypass it, undermine it, use it for > deception, implant backdoors in it (as well as in chips, OSes, > routers, nodes, cable stations, server farms, teleco hubs, > virtually everywhere in the global system as shown in this > latest release) should be taken as a warning encryption is not > the magic cape its proponents claim. > > This suggests reliance upon encryption may be a decoy to divert > attention from other comsec protection, the old CryptoAG ploy: > The most trusted comsec the most likely not. Why such a suspicious attitide? :o) This loops back to my own initial interpretation of the Snowden affair as a likely deception operation. Since then my opinion of that interpretation has been all over the map in response to new information, but I have never had reason to doubt that the Snowden leaks are controlled for the benefit of the U.S. National Interest. (Material from the second and/or third NSA leakers, believed to be stationed in Germany, maybe not quite so much.) Some of my speculations here are obsolete, but the general concept that the Snowden Saga is not what it appears to be and is strongly influenced and/or controlled by elements of the NatSec community appears to stand up well. I believe it's very possible that Snowden never obtained access to the useful and relevant technical documents that seem to be missing from his dump: http://www.globalresearch.ca/nsa-deception-operation-questions-surro und-leaked-prism-documents-authenticity/5338673 :o/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJV2Az0AAoJEDZ0Gg87KR0LINQP/iwXtnHyC27PyZCIGozRoXim 8tw9ZhyqNX4qx9l/xZrbH/xAmZFdPjLDr+4F3JOfhfhJikr/vKGmtvJ48axMCUkK WNei3lcYc2aALgZeSUh/rkeYFCdgaDUEO1mVE0PPaEC4pEWk+MDcn6aCxKGyO4ug SeTSD17mr3WUNpUCcxYpel0PZwo8QdDrsWlaCPtSnwqAwcllm8oS7ePX0e1ADJzh ZHKHnFoYg9OE+669P0H8bPSomjJ9qsEyR4MKkmpU0Ui2wL3fMa+zGFMkugp11Gn9 Bmr6GoENpDhVrMVOQF7pbagVhCGdnViwnflRLeRhNkzXGHyHp1Ug4nwjXxZ7T3T/ NT8KHVwFr1PWdGmdU9KIxryHkVtYnIjQHXvPIfUDGTMKfRAvb17J9+CZ1BuabgBH nzMLmZRsaYjCAY0qkRS47KZogX1pOvegGfupXWTSUXRcTUlLGSDcbwYuA6ijOw7C osikqSW7QgLnDjhvviYpjl8Ubn33whWjr/emJkORLTIPeOz04A6D279hlU4yjXRY TU3p5UOZEnDaunDL3C2GM/V7R2PHcHxf6dr4Jh1gVcF7+Mhq4S1Ky1W8VQokywp1 ZXv1HEmgphi5gtA6bOkRDimAxXaLJPsHh88nFPgoouH1r90YcUFDIxQmjyA8ESo0 pH5LixwAzux+0jBmmB/B =8Z9B -----END PGP SIGNATURE----- From aestetix at aestetix.com Fri Aug 21 19:36:37 2015 From: aestetix at aestetix.com (aestetix) Date: Sat, 22 Aug 2015 04:36:37 +0200 Subject: Brothers at Arms: Jeb Bush says no to crypto In-Reply-To: References: Message-ID: <55D7E035.7020102@aestetix.com> Because Jeb Bush is such a noted expert in cryptography... On 8/22/15 12:06 AM, grarpamp wrote: > https://firstlook.org/theintercept/2015/08/19/jeb-bush-comes-encryption/ > > Jeb Bush Comes Out Against Encryption > > Jenna McLaughlin > > Aug. 19 2015, 3:40 p.m. > Getty Images > > Republican presidential candidate Jeb Bush said Tuesday that > encryption makes it harder for law enforcement to track down > “evildoers” — and called for a “much better, more cooperative > relationship” with Apple, Google, and other tech companies that are > building uncrackable private communication apps into their new > products. > > “If you create encryption, it makes it harder for the American > government to do its job — while protecting civil liberties — to make > sure that evildoers aren’t in our midst,” Bush said in South Carolina > at an event sponsored by Americans for Peace, Prosperity, and > Security, a group with close ties to military contractors. > > Bush said, “We need to find a new arrangement with Silicon Valley in > this regard because I think this is a very dangerous kind of > situation.” > > But when the event moderator, former CNN anchor Jeanne Meserve, > brought up scientists’ conclusions that giving law enforcement special > access to communications also gives hackers more access, Bush didn’t > explain his position any further. > > “Good point, except we ought to have much more cooperation when it > comes to cybersecurity,” he said. > -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 513 bytes Desc: OpenPGP digital signature URL: From grarpamp at gmail.com Sat Aug 22 02:46:45 2015 From: grarpamp at gmail.com (grarpamp) Date: Sat, 22 Aug 2015 05:46:45 -0400 Subject: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files") In-Reply-To: <20150822050940.GC5822@torproject.org> References: <55C59BBA.2020700@openmailbox.org> <1439101342-sup-8277@metis.syd1.tesser.org> <20150812234512.GE2384@torproject.org> <20150813074017.GF2384@torproject.org> <20150821043032.GB5822@torproject.org> <20150822050940.GC5822@torproject.org> Message-ID: On Sat, Aug 22, 2015 at 1:09 AM, Mike Perry wrote: > As such, I was only able to discover that its default inactive/idle > timoeut is 30s. I couldn't find a range. > What I really need now is any examples of common routers that have a > default inactive/idle timeout below 10s, or allow you to set it below 10s. Not common unless you consider all the places where software is being used as a network tap, whether by legit operator, or by adversary. nProbe can timestamp in milliseconds. [ 21] %LAST_SWITCHED %flowEndSysUpTime SysUptime (msec) of the last flow pkt [ 22] %FIRST_SWITCHED %flowStartSysUpTime SysUptime (msec) of the first flow pkt [152] %FLOW_START_MILLISECONDS %flowStartMilliseconds Msec (epoch) of the first flow packet [153] %FLOW_END_MILLISECONDS %flowEndMilliseconds Msec (epoch) of the last flow packet Some define and assignment logic sets the defaults. It's software so anyone could adjust the options to at least fall within the "hardcoded" integer type... 1 to u_short. That doesn't mean it's sensible or that other bits in the code won't need munged, I didn't look. u_short idleTimeout, lifetimeTimeout, sendTimeout; #define DUMP_TIMEOUT 30 /* seconds */ readOnlyGlobals.idleTimeout = DUMP_TIMEOUT; readOnlyGlobals.lifetimeTimeout = 4*DUMP_TIMEOUT; readOnlyGlobals.idleTimeout = atoi(optarg); readOnlyGlobals.lifetimeTimeout = atoi(optarg); if(readOnlyGlobals.lifetimeTimeout == 0) { readOnlyGlobals.lifetimeTimeout = 1; printf("[--lifetime-timeout|-t] | It specifies the maximum (seconds) flow\n" " | lifetime [default=%d]\n", readOnlyGlobals.lifetimeTimeout); printf("[--idle-timeout|-d] | It specifies the maximum (seconds) flow\n" " | idle lifetime [default=%d]\n", readOnlyGlobals.idleTimeout); > I think these devices are wandering into the "adversarial admin" > territory (see section 3 of the proposal). I want to focus on the case > where the adversary demands/sniffs/exploits routers likely to be > installed in most networks. Sniffs... Lavabit was [nearly/actually] forced to install devices on his network for some while, so I see no "Sorry, my vendors config range doesn't support it" distinction here. Telecoms like AT&T don't fight, and Vampires don't care. Demands... The point with the NICs is that even 100Gbit taps are old news. With that comes deployment of flow / bro / etc like things that use them and the logs get saved because humans love to create collect and save useless stuff... to supply on demand. Software taps are popular, probably moreso at the network edges... universities, corp, regional / city, colo, etc. But costs are dropping, tech is rising, depts are doing these things. Yes, a legit operator may be unlikely to adjust, or to set the timeouts too low on their own free will since: 1) why, 2) storage space, 3) processing cpu / bandwidth Exploits... It's all software in the end. I know, I'm partly diverging from legit operator context. From coderman at gmail.com Sat Aug 22 07:53:27 2015 From: coderman at gmail.com (coderman) Date: Sat, 22 Aug 2015 07:53:27 -0700 Subject: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files") In-Reply-To: <20150822050940.GC5822@torproject.org> References: <55C59BBA.2020700@openmailbox.org> <1439101342-sup-8277@metis.syd1.tesser.org> <20150812234512.GE2384@torproject.org> <20150813074017.GF2384@torproject.org> <20150821043032.GB5822@torproject.org> <20150822050940.GC5822@torproject.org> Message-ID: On 8/21/15, Mike Perry wrote: ... >> For those into researching other flow capabilities... >> There are also some probes in OS kernels and >> some other opensource taps, they're not as well known >> or utilized as nProbe. >> Other large hardware vendors include Brocade, Avaya, >> Huawei, and Alcatel-Lucent. > > Out of all of these, I was only able find info on Alcatel-Lucent. It > uses cflowd, which appears to be a common subcomponent. It's timeout > ranges are the same as Cisco IOS. for posterity, it would also be useful to scrutinize behavior of: - Arbor Peakflow SP - Narus Insight Manager - Lancope StealthWatch Xe with respect to soft or hard fixed NetFlow limits within analysis or as pushed to tapped switches. best regards, From rysiek at hackerspace.pl Sat Aug 22 00:46:20 2015 From: rysiek at hackerspace.pl (rysiek) Date: Sat, 22 Aug 2015 09:46:20 +0200 Subject: Brothers at Arms: Jeb Bush says no to crypto In-Reply-To: <55D7E035.7020102@aestetix.com> References: <55D7E035.7020102@aestetix.com> Message-ID: <480079298.o58aaEqJVM@lapuntu> Dnia sobota, 22 sierpnia 2015 04:36:37 aestetix pisze: > Because Jeb Bush is such a noted expert in cryptography... And civil liberties. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From softservant at gmail.com Sat Aug 22 09:49:59 2015 From: softservant at gmail.com (Softy) Date: Sat, 22 Aug 2015 09:49:59 -0700 Subject: NSA Spying Relies on AT&T'S "Extreme Willingness to Help" Message-ID: > > > appears to stand up well. I believe it's very possible that > Snowden never obtained access to the useful and relevant technical > documents that seem to be missing from his dump: > > http://www.globalresearch.ca/nsa-deception-operation-questions-surro > und-leaked-prism-documents-authenticity/5338673 > > :o/ > ​ This speaks to the success of the SCI model, more than anything about Snowden. He had widespread network access - but not specific compartmental access. I would guess rather than risk exposing himself he intentionally didn't (or couldn't) attempt an active spoof of credentials needed to gain SCI access - which is where the technical details live. Everything I have seen dumped from his trove is purely presentational/summary reports handed around between offices/echelons and posted on intranets for dissemination. Granted in much detail, but it's not the the source, as it were. I have been curious since the start to see if any of the future releases from the Snowden Cache reveal any actual technical source documentation. There might well be some, and not being released for a variety of legit (and not) reasons. Conversely as per above, it's more than likely there isn't any whatsoever. In the big picture those details don't change the validity of the trove -- any criticism based on the 'lack of code' is purely an apologist or diversion tactic. I think the situation speaks for itself: Managerial reporting to higher speaks to tech capabilities just as great as actual tech source. Similarly, intent is very difficult to discern from knowing technical ability, however is readily gleaned from managerial planning/status updates - especially at higher echelons. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2781 bytes Desc: not available URL: From tpetru at gmail.com Sat Aug 22 15:07:25 2015 From: tpetru at gmail.com (Tomas Overdrive Petru) Date: Sun, 23 Aug 2015 00:07:25 +0200 Subject: Truecrypt container hacked? Message-ID: <55D8F29D.20405@gmail.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 This one has been puzzling me for several days. Since I have not yet been able to figure it out, I thought I would "bleg" for assistance from our encryption-savvy readership. According to the Sun Sentinel , a South Florida man was recently convicted of stealing military secrets. I am less concerned with what he stole or why than with what the story says about how the evidence against him was identified and used. Here is the relevant part of the story: https://www.lawfareblog.com/puzzling-encryption-story - -- “Borders I have never seen one. But I have heard they exist in the minds of some people.” ― Thor Heyerdahl projects...................https://brmlab.cz/user/overdrive twitter....................https://twitter.com/#!/over2393 GnuPG key FingerPrint......08EA E4DC EF85 0F02 9267 5B48 2E58 6902 C5F8 794C -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJV2PKdAAoJEC5YaQLF+HlMTP0QAKEDUE5WcEXNPU35Rzd/FsDa WujrzPcsp4M9yCqBc5ycALmYHoeAkrEgvvDtH8rAgh5wnoEWV8eKnbLJvPxRHbM7 81LJehw9lA0Wuh2TouxISAPkAFnk1B1fwHoMOsS05I9CqbnjUR3o9Nh4cqbMmOfL sZL8WuuoUiQd/NGATXtu9c9166xeJIYljrHOl+YuLIkmQ1ne56J7NNTzEbJmrGCv ny1tGaIRaNs4kZ9QeWiEAWY6yXqRzmaGbDRr8JHy6fDvD8xUi8PmtqE8YMYx4Dnw j06k+VbPHyToDncOBB62/mb/rmddcM1/84bk/S8vVedkVjsLjWLMvX0EWghtMLRj 3X8q/lqNMmtC1Q2MydqGzmXQabkoddC6wutQzXsusqXSIt0a43irvql8bSXBhn3G bDUTKU7dyhKJnl0URWWoeY/s6O+KimQhj9nEoE8a5jUHJN3mteVjmSZigRSjxnF2 uahHQLMs2J4g/cQd5M3HHIJDOybV9JWchrSZxpN6x7nscRPIAK5zxVcCsZS6A7By kQNzMP3wmzuzfSoauqmkf8m0Xs8HBRTnlR8gaGGr/D3pRyjaIPZ6xSLHZqSRbWgN 8sgSb47wKAp90EnOvIQJOZd/CnApOtvsAoWNxe+r2m3Vvi9KegJSDw0qPOecpQiT pFfnecTukts6LdjSfFLp =k/HW -----END PGP SIGNATURE----- -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2636 bytes Desc: not available URL: From admin at pilobilus.net Sat Aug 22 23:25:02 2015 From: admin at pilobilus.net (Steve Kinney) Date: Sun, 23 Aug 2015 02:25:02 -0400 Subject: Truecrypt container hacked? In-Reply-To: <55D8F29D.20405@gmail.com> References: <55D8F29D.20405@gmail.com> Message-ID: <55D9673E.3030502@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 08/22/2015 06:07 PM, Tomas Overdrive Petru wrote: > > This one has been puzzling me for several days. Since I have > not yet been able to figure it out, I thought I would "bleg" > for assistance from our encryption-savvy readership. > According to the Sun Sentinel > , > > > a South Florida man was recently convicted of stealing military > secrets. I am less concerned with what he stole or why than > with what the story says about how the evidence against him was > identified and used. Here is the relevant part of the story: > > https://www.lawfareblog.com/puzzling-encryption-story Historically, the FBI has used keyloggers to defeat PGP Disc and Truecrypt - and also, I am sure, other encrypted file systems that don't have back door access as a standard feature. Since rubber hose cryptanalysis and bugging computers are well known FBI methods, while world + dog have failed so far to make real progress on breaking the ciphers used in Truecrypt, I see no reason to suspect the latter occurred. None at all. The word "Truecrypt" does not appear in this summary of expert testimony, which describes forensics conducted at the facilities the classified files were borrowed from: https://regmedia.co.uk/2015/08/04/glenn_exhibit_1.pdf So, the defendant was already in the bag before somebody managed to type the correct pass phrase and examine the contents of his stash. I found no indication of whether his guilty plea came before or after investigators had access to the encrypted data; it seems very likely that handing over the pass phrase was part of a plea deal. Persuading people that a cryptographic tool does not work is a very effective attack against it. Should we blame ignorance or something else for the "Truecrypt is broken" take-away many casual readers will pick up from this story as written? :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJV2Wc8AAoJEDZ0Gg87KR0LL/cQAISyfTK7ldjCrJLmAAC+Zw/0 DVCECa4Tqkpqskf+NxhGQF0zX91Sg5Q6QmHjHbkYALut6jwi6PjK6+yQivPWegSg n27XEWZsTt/fkjlrX775mj4pOlbio1X6XVQqQaKfbA4C6MUdPU/vMUXPQqH5CT/h t6882wtibiTPizXgan2hVZKO1vfMyGZqJFqdk7oEEr7ofb/8bnXzIKO9G2nc3rrW 6Rsd5+3eEiChStoSoR3LTFBfdmEvJP6qx/NivyZuj+KQAG5XFfMbBMyCWMvcFeWI y7Hv7yXx594wGPlAH4Z6bgJnxWeKIOhdluT+DH582Q6IzgXFptmuXxs71XCtTT45 TMQA4S67yaM21BXrd4+x2ah4fgdtk2IdqWSD/KE1q5cXnIzvkOTt8Z2v6ffM403R vDxaGHUPcMT4xKXS4v1LFcnDbDywhsbHvOZkc6EE0y6dQ6APuEt9AwMbTWH62a9+ Yvb1mN+zC22Ac+qHfnRmDocDvNlbyLEPs3Ouz+DZJIi+UwwqFdyDIjQiSUQ6MVcB omp3veHcpB0K1jZ1D3ECEc92ZSbTKkmPeLRHRjb+Z50tlRn7ViElFC8brKvJJBvt WFJcaVU3xZthT3vBkKAiwKtJ89CJhChZYEcEFVCtwufTTe98S/MeGMPomRGizjVR 3FkrfFK/LU1q6D+N+LSU =qEnZ -----END PGP SIGNATURE----- From admin at pilobilus.net Sat Aug 22 23:35:22 2015 From: admin at pilobilus.net (Steve Kinney) Date: Sun, 23 Aug 2015 02:35:22 -0400 Subject: NSA Spying Relies on AT&T'S "Extreme Willingness to Help" In-Reply-To: References: Message-ID: <55D969AA.3050401@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 08/22/2015 12:49 PM, Softy wrote: > > appears to stand up well. I believe it's very possible that > Snowden never obtained access to the useful and relevant > technical documents that seem to be missing from his dump: > > http://www.globalresearch.ca/nsa-deception-operation-questions-sur ro > > und-leaked-prism-documents-authenticity/5338673 > > > :o/ > > ​ > > This speaks to the success of the SCI model, more than > anything about Snowden. He had widespread network access - but > not specific compartmental access. I would guess rather than > risk exposing himself he intentionally didn't (or couldn't) > attempt an active spoof of credentials needed to gain SCI > access - which is where the technical details live. Everything > I have seen dumped from his trove is purely > presentational/summary reports handed around between > offices/echelons and posted on intranets for dissemination. My thoughts exactly: Snowden never left the reservation when he collected his docs, except in that he copied quite a lot of them and carried them out. Reading up on what your internal customers use the network for is healthy and encouraged behavior for admins - - up to the point of "sensitive sources and methods." > > In the big picture those details don't change the validity of > the trove -- any criticism based on the 'lack of code' is > purely an apologist or diversion tactic. I think the situation > speaks for itself: Managerial reporting to higher speaks to > tech capabilities just as great as actual tech source. > Similarly, intent is very difficult to discern from knowing > technical ability, however is readily gleaned from managerial > planning/status updates - especially at higher echelons. Ah yup. Project scopes, code names, and functional descriptions give one a high level but fairly definitive picture of the systems described. Once one knows what they are doing, the how is largely self explanatory. The only surprise in the whole Snowden dump is the scope and depth of U.S. engagement in cyber-spying: Going from well founded suspicion to detailed documentary evidence is a quantum leap, converting knowledge into intelligence. The extent of Greenwald & Co. cooperation with State authorities, vs. purely commercial motives, remains an open question. It may be a coincidence that the first two Big Stories of the Snowden Saga broke on the same days as the last two major events in the Manning trial. Greenwald knocked Chelsea's story right off the public's radar. I do believe in coincidences, but I try not to bet on them, and this one casts a creepy, PsyOps kind of light on the Snowden business. The sale of those documents to Pierre Omidyar also seems a little creepy to me: http://www.boilingfrogspost.com/2013/12/13/greenwald-omidyar-joint-v enture-the-blurring-lines-between-being-a-source-being-a-journalist/ One content gap that I find puzzling is the absence of references in published Snowden docs to what was formerly called Romas/COIN then Odyssey, a system revealed by the H.B. Gary e-mail dump. Maybe I missed a description of that program under another name: I have not been reading everything that comes down the pipe. Romas/COIN was the name of Uncle Sam's cellular network, smart phone and social media surveillance and exploitation toolkit from Hell (see echelon2.org). As a rich source of high quality collection in regions vital to the National Interest, I am sure that the NSA taps into this kit's databases and/or work products, even if it "belongs to" another Service. Maybe somebody here recognizes Romas/COIN as somthing appearing under another name in Snowden docs? :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJV2WmpAAoJEDZ0Gg87KR0LhOAP/3iAeJwbt+BFyM3eX2A5hsbT /QY7cnIR8/Xxrakl/fxjAe8Io3KYE3NRoPlxn1qEgTOIvqMV93xIPNI2wvw7LdMn 7QTWChic0L1iHIHvjC8qH7FyYmexbOddRpeLU+dANmekCXB58tR0D0/XXSMzob5s 7N8utgxZpvbHdKlDQaEWTh9/7vOMwQ1620l0WCslafe8H94/g8w1ydfMKXhsTWyw K8kQi2rgmVMMYRlAgR1rzIksAgFcrdYre7y8uwKTf0RP0PkIS2+JUwti5cJSUvKf 00n3k373grus2R60RL1d/o8E6rjvqx0IjVs2Z0Kle3zkFP5s+8c0PI8ypiPaw2kk XmleNHhwEOMlMmNC9izWhqoZkgx9vCN+7yhskXH96BhijAPjGzsQKkg23teO6Gl2 fTTRavgsE7rM65x/jZIQ1oyi/5CzSXyx41o5YC8VzHjoB3THOaB0EVBq35mrCr5K l7OasL02huSzT8M6fSJ3tY09vagcILnKwAztiQ4QASJOy7ojkabkkgbBrPo8iGN6 AY1mB8ksoTsSyfNLeVh5cAkwiOipJQ3CuZDURvXpZb+05Q0dFTPkJO9y7VRCWAyo EpeLCcIYOVuNReeaCkKqNqwnegdW1IRXyJJqKkDGgy0AW8LuspgUKU+i3aBBEb1f 9NtVcX6NVOyFxippoY0S =eVua -----END PGP SIGNATURE----- From grarpamp at gmail.com Sun Aug 23 01:00:08 2015 From: grarpamp at gmail.com (grarpamp) Date: Sun, 23 Aug 2015 04:00:08 -0400 Subject: Truecrypt container hacked? In-Reply-To: <55D9673E.3030502@pilobilus.net> References: <55D8F29D.20405@gmail.com> <55D9673E.3030502@pilobilus.net> Message-ID: Armchair analyis is fine when all you have is "news". But once you have a court case with a location and defendant name behind it, some local cpunk can just go pull the case from the courthouse, read the thing, and post the facts. Or mail in a state/fed FOIA for it. From jya at pipeline.com Sun Aug 23 03:43:26 2015 From: jya at pipeline.com (John Young) Date: Sun, 23 Aug 2015 06:43:26 -0400 Subject: Truecrypt container hacked? In-Reply-To: <55D9673E.3030502@pilobilus.net> References: <55D8F29D.20405@gmail.com> <55D9673E.3030502@pilobilus.net> Message-ID: Well said on skepticism of news reports concerning crypto, comsec, infosec, natsec. Disinfo and deception are inherent in security and survival, and best, most reliable, most trusted are typical tools of misleading exploitation. Where a single means and method, such as crypto (or science), is encouraged for rock-solid assurance, at least one other means and methods should be employed which in no way depends upon the single means. Hoodwink wins by cheating. A single means is certain to be continously under attack, and its vulnerabilities concealed both by the attackers and by the promoters. Blind faith in a single means is as old as religion, art and royalty, perhaps as old as humans faced with unending threats from nature and mortality -- and most of all from each other's thieving and murderous practices. Duplicity and con-jobs were essential, along with bigger clubs and rocks, voodoo and faux-virgin sacrifices -- ISIS hardly different, except more modest and sane and much less wealthy, than Los Alamos, The Vatican, JP Morgan, Ashley Madison, Silicon Valley and the IC all fostering blind faith in their own advertising of rockefeller-st-peter-approved STD protection. Some HTTPS Everywheres lately have been advertising encryption and HTTPS as condoms to protect against Internet STD, aka privacy rape. Peddlers of these hygienics are surely donors to the of Church of Crypto whose priests do enjoy the pleasures of insider hoo-haa. At 02:25 AM 8/23/2015, you wrote: >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > >On 08/22/2015 06:07 PM, Tomas Overdrive Petru wrote: > > > > This one has been puzzling me for several days. Since I have > > not yet been able to figure it out, I thought I would "bleg" > > for assistance from our encryption-savvy readership. > > According to the Sun Sentinel > > 0150731-story.html>, > > > > > > >a South Florida man was recently convicted of stealing military > > secrets. I am less concerned with what he stole or why than > > with what the story says about how the evidence against him was > > identified and used. Here is the relevant part of the story: > > > > https://www.lawfareblog.com/puzzling-encryption-story > >Historically, the FBI has used keyloggers to defeat PGP Disc and >Truecrypt - and also, I am sure, other encrypted file systems that >don't have back door access as a standard feature. > >Since rubber hose cryptanalysis and bugging computers are well >known FBI methods, while world + dog have failed so far to make >real progress on breaking the ciphers used in Truecrypt, I see no >reason to suspect the latter occurred. None at all. > >The word "Truecrypt" does not appear in this summary of expert >testimony, which describes forensics conducted at the facilities >the classified files were borrowed from: > >https://regmedia.co.uk/2015/08/04/glenn_exhibit_1.pdf > >So, the defendant was already in the bag before somebody managed >to type the correct pass phrase and examine the contents of his >stash. I found no indication of whether his guilty plea came >before or after investigators had access to the encrypted data; it >seems very likely that handing over the pass phrase was part of a >plea deal. > >Persuading people that a cryptographic tool does not work is a >very effective attack against it. Should we blame ignorance or >something else for the "Truecrypt is broken" take-away many casual >readers will pick up from this story as written? > >:o) > > > > >-----BEGIN PGP SIGNATURE----- >Version: GnuPG v1 > >iQIcBAEBAgAGBQJV2Wc8AAoJEDZ0Gg87KR0LL/cQAISyfTK7ldjCrJLmAAC+Zw/0 >DVCECa4Tqkpqskf+NxhGQF0zX91Sg5Q6QmHjHbkYALut6jwi6PjK6+yQivPWegSg >n27XEWZsTt/fkjlrX775mj4pOlbio1X6XVQqQaKfbA4C6MUdPU/vMUXPQqH5CT/h >t6882wtibiTPizXgan2hVZKO1vfMyGZqJFqdk7oEEr7ofb/8bnXzIKO9G2nc3rrW >6Rsd5+3eEiChStoSoR3LTFBfdmEvJP6qx/NivyZuj+KQAG5XFfMbBMyCWMvcFeWI >y7Hv7yXx594wGPlAH4Z6bgJnxWeKIOhdluT+DH582Q6IzgXFptmuXxs71XCtTT45 >TMQA4S67yaM21BXrd4+x2ah4fgdtk2IdqWSD/KE1q5cXnIzvkOTt8Z2v6ffM403R >vDxaGHUPcMT4xKXS4v1LFcnDbDywhsbHvOZkc6EE0y6dQ6APuEt9AwMbTWH62a9+ >Yvb1mN+zC22Ac+qHfnRmDocDvNlbyLEPs3Ouz+DZJIi+UwwqFdyDIjQiSUQ6MVcB >omp3veHcpB0K1jZ1D3ECEc92ZSbTKkmPeLRHRjb+Z50tlRn7ViElFC8brKvJJBvt >WFJcaVU3xZthT3vBkKAiwKtJ89CJhChZYEcEFVCtwufTTe98S/MeGMPomRGizjVR >3FkrfFK/LU1q6D+N+LSU >=qEnZ >-----END PGP SIGNATURE----- From carimachet at gmail.com Sun Aug 23 04:37:34 2015 From: carimachet at gmail.com (Cari Machet) Date: Sun, 23 Aug 2015 14:37:34 +0300 Subject: Truecrypt container hacked? In-Reply-To: References: <55D8F29D.20405@gmail.com> <55D9673E.3030502@pilobilus.net> Message-ID: structurally speaking monolithic thinking is a capture tool of the cia and under EO 12333 all agencies are the cia = all 16 agencies but that expansion is evident = gone beyond the 16 now LAPD could not talk about mmhastings "fiery crash" as all-all natsec natinterests which is whatever the fuck they say it is on a given fucking day under the header 'upcoming trade deal' plus other\many evidences of that shit...court docs\proceedings express just lookie-lookie On Aug 23, 2015 1:45 PM, "John Young" wrote: > Well said on skepticism of news reports concerning crypto, comsec, > infosec, natsec. Disinfo and deception are inherent in security and > survival, and best, most reliable, most trusted are typical tools of > misleading exploitation. > > Where a single means and method, such as crypto (or science), is > encouraged for rock-solid assurance, at least one other means and > methods should be employed which in no way depends upon the > single means. Hoodwink wins by cheating. > > A single means is certain to be continously under attack, and its > vulnerabilities concealed both by the attackers and by the promoters. > > Blind faith in a single means is as old as religion, art and royalty, > perhaps > as old as humans faced with unending threats from nature and > mortality -- and most of all from each other's thieving and murderous > practices. Duplicity and con-jobs were essential, along with bigger > clubs and rocks, voodoo and faux-virgin sacrifices -- ISIS hardly > different, except more modest and sane and much less wealthy, > than Los Alamos, The Vatican, JP Morgan, Ashley Madison, > Silicon Valley and the IC all fostering blind faith in their own > advertising of rockefeller-st-peter-approved STD protection. > > Some HTTPS Everywheres lately have been advertising encryption > and HTTPS as condoms to protect against Internet STD, aka privacy > rape. Peddlers of these hygienics are surely donors to the of Church > of Crypto whose priests do enjoy the pleasures of insider hoo-haa. > > At 02:25 AM 8/23/2015, you wrote: > >> -----BEGIN PGP SIGNED MESSAGE----- >> Hash: SHA1 >> >> On 08/22/2015 06:07 PM, Tomas Overdrive Petru wrote: >> > >> > This one has been puzzling me for several days. Since I have >> > not yet been able to figure it out, I thought I would "bleg" >> > for assistance from our encryption-savvy readership. >> > According to the Sun Sentinel >> > > 0150731-story.html>, >> > >> > >> > >> a South Florida man was recently convicted of stealing military >> > secrets. I am less concerned with what he stole or why than >> > with what the story says about how the evidence against him was >> > identified and used. Here is the relevant part of the story: >> > >> > https://www.lawfareblog.com/puzzling-encryption-story >> >> Historically, the FBI has used keyloggers to defeat PGP Disc and >> Truecrypt - and also, I am sure, other encrypted file systems that >> don't have back door access as a standard feature. >> >> Since rubber hose cryptanalysis and bugging computers are well >> known FBI methods, while world + dog have failed so far to make >> real progress on breaking the ciphers used in Truecrypt, I see no >> reason to suspect the latter occurred. None at all. >> >> The word "Truecrypt" does not appear in this summary of expert >> testimony, which describes forensics conducted at the facilities >> the classified files were borrowed from: >> >> https://regmedia.co.uk/2015/08/04/glenn_exhibit_1.pdf >> >> So, the defendant was already in the bag before somebody managed >> to type the correct pass phrase and examine the contents of his >> stash. I found no indication of whether his guilty plea came >> before or after investigators had access to the encrypted data; it >> seems very likely that handing over the pass phrase was part of a >> plea deal. >> >> Persuading people that a cryptographic tool does not work is a >> very effective attack against it. Should we blame ignorance or >> something else for the "Truecrypt is broken" take-away many casual >> readers will pick up from this story as written? >> >> :o) >> >> >> >> >> -----BEGIN PGP SIGNATURE----- >> Version: GnuPG v1 >> >> iQIcBAEBAgAGBQJV2Wc8AAoJEDZ0Gg87KR0LL/cQAISyfTK7ldjCrJLmAAC+Zw/0 >> DVCECa4Tqkpqskf+NxhGQF0zX91Sg5Q6QmHjHbkYALut6jwi6PjK6+yQivPWegSg >> n27XEWZsTt/fkjlrX775mj4pOlbio1X6XVQqQaKfbA4C6MUdPU/vMUXPQqH5CT/h >> t6882wtibiTPizXgan2hVZKO1vfMyGZqJFqdk7oEEr7ofb/8bnXzIKO9G2nc3rrW >> 6Rsd5+3eEiChStoSoR3LTFBfdmEvJP6qx/NivyZuj+KQAG5XFfMbBMyCWMvcFeWI >> y7Hv7yXx594wGPlAH4Z6bgJnxWeKIOhdluT+DH582Q6IzgXFptmuXxs71XCtTT45 >> TMQA4S67yaM21BXrd4+x2ah4fgdtk2IdqWSD/KE1q5cXnIzvkOTt8Z2v6ffM403R >> vDxaGHUPcMT4xKXS4v1LFcnDbDywhsbHvOZkc6EE0y6dQ6APuEt9AwMbTWH62a9+ >> Yvb1mN+zC22Ac+qHfnRmDocDvNlbyLEPs3Ouz+DZJIi+UwwqFdyDIjQiSUQ6MVcB >> omp3veHcpB0K1jZ1D3ECEc92ZSbTKkmPeLRHRjb+Z50tlRn7ViElFC8brKvJJBvt >> WFJcaVU3xZthT3vBkKAiwKtJ89CJhChZYEcEFVCtwufTTe98S/MeGMPomRGizjVR >> 3FkrfFK/LU1q6D+N+LSU >> =qEnZ >> -----END PGP SIGNATURE----- >> > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6031 bytes Desc: not available URL: From coderman at gmail.com Sun Aug 23 17:08:04 2015 From: coderman at gmail.com (coderman) Date: Sun, 23 Aug 2015 17:08:04 -0700 Subject: Fwd: [cryptome] The Gloves are Off: Diana Roark back in the Fray: In-Reply-To: <000001d0dd1c$0fff0b60$2ffd2220$@co.uk> References: <000001d0dd1c$0fff0b60$2ffd2220$@co.uk> Message-ID: ---------- Forwarded message ---------- From: Douglas Rankine2001 Date: Sat, 22 Aug 2015 21:49:38 +0100 Subject: [cryptome] The Gloves are Off: Diana Roark back in the Fray: See url: https://cryptome.org/2015/08/drake-001.pdf Is there no stopping this woman... J. Now, William Binney, J Kirk Wiebe, Ed Loomis and Tim Drake, And Diane Roark, all of those involved in Thin Thread fame have got together to mount a law suit against the US intelligence establishment Has enough evidence come out from the likes of Snowden and other whistleblowers to sufficiently destroy the credibility of the leaders of the US intelligence services, and their hangers on, one wonders? Will the curtain open on the National Security stage and divulge the incompetent capers and conspiracies and corruptions which hide those affairs of the leading actors, who are dressed up in the clothing of secrecy, like transvestites at Cinderella's Ball... A lot of civil servants have turned to Ashley Madison to conduct their external affairs, now that posting messages on a Yahoo account is so well known... J. Interesting times...Well worth a read... As I have said before, court cases...no matter the outcome, can throw some interesting light on those areas of the dark web of intelligence.J. Certainly opening up new aspects of trailblazing. Enjoy... J. ATB Dougie. From carimachet at gmail.com Sun Aug 23 11:07:36 2015 From: carimachet at gmail.com (Cari Machet) Date: Sun, 23 Aug 2015 21:07:36 +0300 Subject: NSA Spying Relies on AT&T'S "Extreme Willingness to Help" In-Reply-To: <55D969AA.3050401@pilobilus.net> References: <55D969AA.3050401@pilobilus.net> Message-ID: interesting and devastating that fucking barrett is writing for fucking intercept ... whenever he gets out of solitary i guess = horror gg didnt even know anything about pierre before he signed up to work for him and fucking scahill thought that was funny haha ... money On Aug 23, 2015 9:40 AM, "Steve Kinney" wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > On 08/22/2015 12:49 PM, Softy wrote: > > > > appears to stand up well. I believe it's very possible that > > Snowden never obtained access to the useful and relevant > > technical documents that seem to be missing from his dump: > > > > http://www.globalresearch.ca/nsa-deception-operation-questions-sur > ro > > > > > und-leaked-prism-documents-authenticity/5338673 > > rro%0Aund-leaked-prism-documents-authenticity/5338673> > > > > :o/ > > > > ​ > > > > This speaks to the success of the SCI model, more than > > anything about Snowden. He had widespread network access - but > > not specific compartmental access. I would guess rather than > > risk exposing himself he intentionally didn't (or couldn't) > > attempt an active spoof of credentials needed to gain SCI > > access - which is where the technical details live. Everything > > I have seen dumped from his trove is purely > > presentational/summary reports handed around between > > offices/echelons and posted on intranets for dissemination. > > My thoughts exactly: Snowden never left the reservation when he > collected his docs, except in that he copied quite a lot of them > and carried them out. Reading up on what your internal customers > use the network for is healthy and encouraged behavior for admins > - - up to the point of "sensitive sources and methods." > > > > > In the big picture those details don't change the validity of > > the trove -- any criticism based on the 'lack of code' is > > purely an apologist or diversion tactic. I think the situation > > speaks for itself: Managerial reporting to higher speaks to > > tech capabilities just as great as actual tech source. > > Similarly, intent is very difficult to discern from knowing > > technical ability, however is readily gleaned from managerial > > planning/status updates - especially at higher echelons. > > Ah yup. > > Project scopes, code names, and functional descriptions give one a > high level but fairly definitive picture of the systems described. > Once one knows what they are doing, the how is largely self > explanatory. The only surprise in the whole Snowden dump is the > scope and depth of U.S. engagement in cyber-spying: Going from > well founded suspicion to detailed documentary evidence is a > quantum leap, converting knowledge into intelligence. > > The extent of Greenwald & Co. cooperation with State authorities, > vs. purely commercial motives, remains an open question. > > It may be a coincidence that the first two Big Stories of the > Snowden Saga broke on the same days as the last two major events > in the Manning trial. Greenwald knocked Chelsea's story right off > the public's radar. I do believe in coincidences, but I try not > to bet on them, and this one casts a creepy, PsyOps kind of light > on the Snowden business. The sale of those documents to Pierre > Omidyar also seems a little creepy to me: > > http://www.boilingfrogspost.com/2013/12/13/greenwald-omidyar-joint-v > enture-the-blurring-lines-between-being-a-source-being-a-journalist/ > > One content gap that I find puzzling is the absence of references > in published Snowden docs to what was formerly called Romas/COIN > then Odyssey, a system revealed by the H.B. Gary e-mail dump. > Maybe I missed a description of that program under another name: I > have not been reading everything that comes down the pipe. > > Romas/COIN was the name of Uncle Sam's cellular network, smart > phone and social media surveillance and exploitation toolkit from > Hell (see echelon2.org). As a rich source of high quality > collection in regions vital to the National Interest, I am sure > that the NSA taps into this kit's databases and/or work products, > even if it "belongs to" another Service. Maybe somebody here > recognizes Romas/COIN as somthing appearing under another name in > Snowden docs? > > :o) > > > > > > > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1 > > iQIcBAEBAgAGBQJV2WmpAAoJEDZ0Gg87KR0LhOAP/3iAeJwbt+BFyM3eX2A5hsbT > /QY7cnIR8/Xxrakl/fxjAe8Io3KYE3NRoPlxn1qEgTOIvqMV93xIPNI2wvw7LdMn > 7QTWChic0L1iHIHvjC8qH7FyYmexbOddRpeLU+dANmekCXB58tR0D0/XXSMzob5s > 7N8utgxZpvbHdKlDQaEWTh9/7vOMwQ1620l0WCslafe8H94/g8w1ydfMKXhsTWyw > K8kQi2rgmVMMYRlAgR1rzIksAgFcrdYre7y8uwKTf0RP0PkIS2+JUwti5cJSUvKf > 00n3k373grus2R60RL1d/o8E6rjvqx0IjVs2Z0Kle3zkFP5s+8c0PI8ypiPaw2kk > XmleNHhwEOMlMmNC9izWhqoZkgx9vCN+7yhskXH96BhijAPjGzsQKkg23teO6Gl2 > fTTRavgsE7rM65x/jZIQ1oyi/5CzSXyx41o5YC8VzHjoB3THOaB0EVBq35mrCr5K > l7OasL02huSzT8M6fSJ3tY09vagcILnKwAztiQ4QASJOy7ojkabkkgbBrPo8iGN6 > AY1mB8ksoTsSyfNLeVh5cAkwiOipJQ3CuZDURvXpZb+05Q0dFTPkJO9y7VRCWAyo > EpeLCcIYOVuNReeaCkKqNqwnegdW1IRXyJJqKkDGgy0AW8LuspgUKU+i3aBBEb1f > 9NtVcX6NVOyFxippoY0S > =eVua > -----END PGP SIGNATURE----- > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6425 bytes Desc: not available URL: From admin at pilobilus.net Mon Aug 24 23:53:15 2015 From: admin at pilobilus.net (Steve Kinney) Date: Tue, 25 Aug 2015 02:53:15 -0400 Subject: Reinventing the Wheel In-Reply-To: <1443973118.48860.1440480777472.JavaMail.yahoo@mail.yahoo.com> References: <1443973118.48860.1440480777472.JavaMail.yahoo@mail.yahoo.com> Message-ID: <55DC10DB.6070809@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 08/25/2015 01:32 AM, jim bell wrote: [...] > That technology is known as smart contracts—small computer > programs that can do things like execute financial trades or > notarize documents in a legal agreement. Intended to take the > place of third-party human administrators such as lawyers, > which are required in many deals and agreements, they can > verify information and hold or use funds using similar > cryptography to that which underpins Bitcoin. [...] > One example is a contract offering a cryptocurrency reward for > hacking a particular website. Ethereum’s programming language > makes it possible for the contract to control the promised > funds. It will release them only to someone who provides proof > of having carried out the job, in the form of a > cryptographically verifiable string added to the defaced site. [...] > Contracts with a similar design could be used to commission > many kinds of crime, say the researchers. Most provocatively, > they outline a version designed to arrange the assassination of > a public figure. A person wishing to claim the bounty would > have to send information such as the time and place of the > killing in advance. The contract would pay out after verifying > that those details had appeared in several trusted news > sources, such as news wires. A similar approach could be used > for lesser physical crimes, such as high-profile vandalism. My first thought: What's to prevent the markets for contract hits on websites and public figures from being monitored by potential victims, and the bounties stolen by 'anonymous' parties, a.k.a. the proposed victims themselves, by simulating the trigger conditions for payouts? Really unpopular people could anonymously crowdfund actions against themselves then collect the loot, a nearly perfect crime. Ultimately, human judgment must have veto power over the automated decision processes - which would void the concept of an impersonal, automated payout process, bringing the reinvented wheel full circle. :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJV3BDZAAoJEDZ0Gg87KR0LCmUQAJld9tv40ZRzAtqPtm/0Y4iW 5EbXaL/3Jj4EKmzl4vAfd535sLmOmbsWaRuiYZhiqFqVeL6nPPiDbsZfzOnaCZ7u /vGEsOZDSmFQxseTn/ndQeW40gQ0Y9xHE2KVmA07NsGeeUiPzWZ66G5df42wdZqi Pot0VYPHbO69akous6bW24uel0tZGsL/rZ2LxZNG6T60BObeHlj+XaHwQb+Q0zrS vMjtp6FrVtuWzaaRUyjBB4bYpCzGLnaVcH4BLItxudDLAlZmo5cPlBzpcKlV5k59 Bezi9FoA//OzPJOyBbzRlMAWmhjcqaH8VpKEYqtWcR/FbQvvoxecFwB4ajmPesvZ xi1QzTd502IJQ2vbD0kUqlyxU/eKtK7EEgcn64sVWMUjw9hs3/qNcmnT0YMCxGm1 yh4COwYqcFfQVKZsLrBGo7pryDRNTkbn19sT2naBLesa60Y1nq3/V6i5ueoXV32p HOr9QIvSprNyYv7hD2H8nQtyHtW9vLxjXRH6nUASuLUoZIBplLxiWdqNrBGrf8gS Zcdsd7ljXFkeuiZ2YcwtBE36geDtA1JEXCu/9GImJ99GaU+LeibMDsswTlaH7ANl RszCerqhYeC1zpSKFKVksM6YZ+R2+DiknNsos4vgKxzuqTGB5uCia39J5O7mwwk3 8xOByBoOdrEF6EM8h/eP =KVGk -----END PGP SIGNATURE----- From wirelesswarrior at safe-mail.net Tue Aug 25 00:12:09 2015 From: wirelesswarrior at safe-mail.net (wirelesswarrior at safe-mail.net) Date: Tue, 25 Aug 2015 03:12:09 -0400 Subject: Reinventing the Wheel Message-ID: Jim, I'm more than a bit surprised that Ari says he's surprised. I think he's been around in the digital currency arena for decades and perhaps is only feigning surprise that social outliers and criminals are early adopters of disruptive technology. If one acknowledges that governments routinely exempt themselves from many of the criminal statutes applied to citizens (including murder) then the ability of those outside the halls of power to use these new services to their upmost can only be to the long term benefit to society even if some "elite's eggs are broken" to make new social compact omlettes. WW -------- Original Message -------- From: jim bell Apparently from: cypherpunks-bounces at cpunks.org To: Cpunks List Subject: Reinventing the Wheel Date: Tue, 25 Aug 2015 05:32:57 +0000 (UTC) > https://twitter.com/antonioregalado/status/631840159466696704 > > citing > > http://www.technologyreview.com/news/540151/bitcoins-dark-side-could-get-darker/ > > Partial quote: > "Some of the earliest adopters of the digital currency Bitcoin were criminals, who have found it invaluable in online marketplaces for contraband and as payment extorted through lucrative ransomware that holds personal data hostage. A new Bitcoin-inspired technology that some investors believe will be much more useful and powerful may be set to unlock a new wave of criminal innovation. > That technology is known as smart contracts small computer programs that can do things like execute financial trades or notarize documents in a legal agreement. Intended to take the place of third-party human administrators such as lawyers, which are required in many deals and agreements, they can verify information and hold or use funds using similar cryptography to that which underpins Bitcoin. > Some companies think smart contracts could make financial markets more efficient, or simplify complex transactions such as property deals (see The Startup Meant to Reinvent What Bitcoin Can Do ). Ari Juels, a cryptographer and professor at the Jacobs Technion-Cornell Institute at Cornell Tech, believes they will also be useful for illegal activity and, with two collaborators, he has demonstrated how. > In some ways this is the perfect vehicle for criminal acts, because it s meant to create trust in situations where otherwise it s difficult to achieve, says Juels. > In a paper to be released today, Juels, fellow Cornell professor Elaine Shi, and University of Maryland researcher Ahmed Kosba present several examples of what they call criminal contracts. They wrote them to work on the recently launched smart-contract platform Ethereum. > One example is a contract offering a cryptocurrency reward for hacking a particular website. Ethereum s programming language makes it possible for the contract to control the promised funds. It will release them only to someone who provides proof of having carried out the job, in the form of a cryptographically verifiable string added to the defaced site. > Contracts with a similar design could be used to commission many kinds of crime, say the researchers. Most provocatively, they outline a version designed to arrange the assassination of a public figure. A person wishing to claim the bounty would have to send information such as the time and place of the killing in advance. The contract would pay out after verifying that those details had appeared in several trusted news sources, such as news wires. A similar approach could be used for lesser physical crimes, such as high-profile vandalism. > It was a bit of a surprise to me that these types of crimes in the physical world could be enabled by a digital system, says Juels. He and his coauthors say they are trying to publicize the potential for such activity to get technologists and policy makers thinking about how to make sure the positives of smart contracts outweigh the negatives. > We are optimistic about their beneficial applications, but crime is something that is going to have to be dealt with in an effective way if those benefits are to bear fruit, says Shi. > Nicolas Christin, an assistant professor at Carnegie Mellon University who has studied criminal uses of Bitcoin, agrees there is potential for smart contracts to be embraced by the underground. It will not be surprising, he says. Fringe businesses tend to be the first adopters of new technologies, because they don t have anything to lose. > [end of partial quote] > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 10725 bytes Desc: not available URL: From jdb10987 at yahoo.com Mon Aug 24 22:32:57 2015 From: jdb10987 at yahoo.com (jim bell) Date: Tue, 25 Aug 2015 05:32:57 +0000 (UTC) Subject: Reinventing the Wheel Message-ID: <1443973118.48860.1440480777472.JavaMail.yahoo@mail.yahoo.com> https://twitter.com/antonioregalado/status/631840159466696704 citing http://www.technologyreview.com/news/540151/bitcoins-dark-side-could-get-darker/ Partial quote:"Some of the earliest adopters of the digital currency Bitcoin were criminals, who have found it invaluable in online marketplaces for contraband and as payment extorted through lucrative “ransomware” that holds personal data hostage. A new Bitcoin-inspired technology that some investors believe will be much more useful and powerful may be set to unlock a new wave of criminal innovation.That technology is known as smart contracts—small computer programs that can do things like execute financial trades or notarize documents in a legal agreement. Intended to take the place of third-party human administrators such as lawyers, which are required in many deals and agreements, they can verify information and hold or use funds using similar cryptography to that which underpins Bitcoin.Some companies think smart contracts could make financial markets more efficient, or simplify complex transactions such as property deals (see “The Startup Meant to Reinvent What Bitcoin Can Do”). Ari Juels, a cryptographer and professor at the Jacobs Technion-Cornell Institute at Cornell Tech, believes they will also be useful for illegal activity–and, with two collaborators, he has demonstrated how.“In some ways this is the perfect vehicle for criminal acts, because it’s meant to create trust in situations where otherwise it’s difficult to achieve,” says Juels.In a paper to be released today, Juels, fellow Cornell professor Elaine Shi, and University of Maryland researcher Ahmed Kosba present several examples of what they call “criminal contracts.” They wrote them to work on the recently launched smart-contract platform Ethereum.One example is a contract offering a cryptocurrency reward for hacking a particular website. Ethereum’s programming language makes it possible for the contract to control the promised funds. It will release them only to someone who provides proof of having carried out the job, in the form of a cryptographically verifiable string added to the defaced site.Contracts with a similar design could be used to commission many kinds of crime, say the researchers. Most provocatively, they outline a version designed to arrange the assassination of a public figure. A person wishing to claim the bounty would have to send information such as the time and place of the killing in advance. The contract would pay out after verifying that those details had appeared in several trusted news sources, such as news wires. A similar approach could be used for lesser physical crimes, such as high-profile vandalism.“It was a bit of a surprise to me that these types of crimes in the physical world could be enabled by a digital system,” says Juels. He and his coauthors say they are trying to publicize the potential for such activity to get technologists and policy makers thinking about how to make sure the positives of smart contracts outweigh the negatives.“We are optimistic about their beneficial applications, but crime is something that is going to have to be dealt with in an effective way if those benefits are to bear fruit,” says Shi.Nicolas Christin, an assistant professor at Carnegie Mellon University who has studied criminal uses of Bitcoin, agrees there is potential for smart contracts to be embraced by the underground. “It will not be surprising,” he says. “Fringe businesses tend to be the first adopters of new technologies, because they don’t have anything to lose.”[end of partial quote] -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 9678 bytes Desc: not available URL: From cathalgarvey at cathalgarvey.me Tue Aug 25 00:25:45 2015 From: cathalgarvey at cathalgarvey.me (Cathal (Phone)) Date: Tue, 25 Aug 2015 08:25:45 +0100 Subject: Reinventing the Wheel In-Reply-To: <55DC10DB.6070809@pilobilus.net> References: <1443973118.48860.1440480777472.JavaMail.yahoo@mail.yahoo.com> <55DC10DB.6070809@pilobilus.net> Message-ID: <361FDCB1-881D-4B25-85D6-99A282E192BF@cathalgarvey.me> Better, "Bounty Collection as a Service", where sites can contract you to watch the contract space and notify them of bounties worth collecting for themselves. :) On 25 August 2015 07:53:15 GMT+01:00, Steve Kinney wrote: >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > >On 08/25/2015 01:32 AM, jim bell wrote: > >[...] > >> That technology is known as smart contracts—small computer >> programs that can do things like execute financial trades or >> notarize documents in a legal agreement. Intended to take the >> place of third-party human administrators such as lawyers, >> which are required in many deals and agreements, they can >> verify information and hold or use funds using similar >> cryptography to that which underpins Bitcoin. > >[...] > >> One example is a contract offering a cryptocurrency reward for >> hacking a particular website. Ethereum’s programming language >> makes it possible for the contract to control the promised >> funds. It will release them only to someone who provides proof >> of having carried out the job, in the form of a >> cryptographically verifiable string added to the defaced site. > >[...] > >> Contracts with a similar design could be used to commission >> many kinds of crime, say the researchers. Most provocatively, >> they outline a version designed to arrange the assassination of >> a public figure. A person wishing to claim the bounty would >> have to send information such as the time and place of the >> killing in advance. The contract would pay out after verifying >> that those details had appeared in several trusted news >> sources, such as news wires. A similar approach could be used >> for lesser physical crimes, such as high-profile vandalism. > >My first thought: What's to prevent the markets for contract hits >on websites and public figures from being monitored by potential >victims, and the bounties stolen by 'anonymous' parties, a.k.a. >the proposed victims themselves, by simulating the trigger >conditions for payouts? > >Really unpopular people could anonymously crowdfund actions >against themselves then collect the loot, a nearly perfect crime. > >Ultimately, human judgment must have veto power over the automated >decision processes - which would void the concept of an >impersonal, automated payout process, bringing the reinvented >wheel full circle. > >:o) > > > > >-----BEGIN PGP SIGNATURE----- >Version: GnuPG v1 > >iQIcBAEBAgAGBQJV3BDZAAoJEDZ0Gg87KR0LCmUQAJld9tv40ZRzAtqPtm/0Y4iW >5EbXaL/3Jj4EKmzl4vAfd535sLmOmbsWaRuiYZhiqFqVeL6nPPiDbsZfzOnaCZ7u >/vGEsOZDSmFQxseTn/ndQeW40gQ0Y9xHE2KVmA07NsGeeUiPzWZ66G5df42wdZqi >Pot0VYPHbO69akous6bW24uel0tZGsL/rZ2LxZNG6T60BObeHlj+XaHwQb+Q0zrS >vMjtp6FrVtuWzaaRUyjBB4bYpCzGLnaVcH4BLItxudDLAlZmo5cPlBzpcKlV5k59 >Bezi9FoA//OzPJOyBbzRlMAWmhjcqaH8VpKEYqtWcR/FbQvvoxecFwB4ajmPesvZ >xi1QzTd502IJQ2vbD0kUqlyxU/eKtK7EEgcn64sVWMUjw9hs3/qNcmnT0YMCxGm1 >yh4COwYqcFfQVKZsLrBGo7pryDRNTkbn19sT2naBLesa60Y1nq3/V6i5ueoXV32p >HOr9QIvSprNyYv7hD2H8nQtyHtW9vLxjXRH6nUASuLUoZIBplLxiWdqNrBGrf8gS >Zcdsd7ljXFkeuiZ2YcwtBE36geDtA1JEXCu/9GImJ99GaU+LeibMDsswTlaH7ANl >RszCerqhYeC1zpSKFKVksM6YZ+R2+DiknNsos4vgKxzuqTGB5uCia39J5O7mwwk3 >8xOByBoOdrEF6EM8h/eP >=KVGk >-----END PGP SIGNATURE----- -- Sent from my Android device with K-9 Mail. Please excuse my brevity. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4220 bytes Desc: not available URL: From carimachet at gmail.com Tue Aug 25 06:45:41 2015 From: carimachet at gmail.com (Cari Machet) Date: Tue, 25 Aug 2015 16:45:41 +0300 Subject: cute little cypher (i hate that other word) black swans Message-ID: *Black Swans in a Cyber Forest: ‘FARness’ Needed In Future Information Technology Acquisition* http://smallwarsjournal.com/jrnl/art/black-swans-in-a-cyber-forest-%E2%80%98farness%E2%80%99-needed-in-future-information-technology-acquisition Former Secretary of Defense Robert Gates stated, "Our record of predicting where we will use military force since Vietnam is perfect–we have never once gotten it right. . . We need to have in mind the greatest possible flexibility and versatility for the broadest range of conflict."[1] U.S. joint operations rely on consistent access to the cyber domain. It is in the complexity of the cyber world, and our new found reliance on it, that cyber black swan events are most dangerous to our security. The cyber domain is a 'forest' dense with complications and operational implications. Cyber black swan events will happen; we must prepare to deal with them. As the United States enters a reality where efficiency may trump effectiveness, it must be careful not to make cyber infrastructure decisions today that remove flexibility, adaptiveness, and robustness from the U.S. military in the future. The Department of Defense (DoD) is looking at maintaining and improving its cyber domain access with limited funds. The U.S. Navy, for example, began reducing the number of data-centers it operates, taking advantage of virtualization or "cloud-computing" technology.[2] Virtualization allows one server to service many customers and the “cloud” is the networked data center's servers storing and providing access to data from many locations. These new technologies increase speed and the efficiency of the operating system by distributing and utilizing processing power across the network.[3] ,[4] The Navy may be underestimating the need for flexibility, adaptiveness, and robustness (FAR) in its cyber infrastructure. Risk consideration to the Navy cyber infrastructure appears to be focused toward information and network security and financial savings than toward the redundancy and resiliency needed to overcome catastrophic black swan events. Current DoD acquisition risk assessment methodology uses pattern analysis and previous experience, but focuses on single-failure scenarios. This "what if" versus "how can (it happen)" analysis is more often used because multi-failure scenarios have a low probability of occurrence. Searching for the black swan scenarios, or "how can" scenarios, as part of the risk analysis is critical to creating layers of protection that have the ability to prevent the event, if possible, but recover from it when necessary.[5] But, FAR costs money and our quest for economy may be reducing the capacity needed to overcome black swan events. The DoD acquisition system is a top-down process that has its own institutional inertia and sometimes lacks critical thinking, innovation, and adaptation. The current acquisition process considers low-probability events and scenario-based planning, but constrains them to what it believes is plausible and fundable, limiting the inclusion of creative and critical thinking.[6] It is necessary to think “bigger” about the risks. Defense forecasting, or predicting the future operational environment, is used in DoD's planning, programming, budgeting, and execution system (PPBES), and is, "generally static, linear, and reasonably mechanical" in its approach.[7] It focuses on a capabilities versus risk approach.[8] The Joint Capabilities Integration and Development System (JCIDS) and PPBES, one could argue, is similar to the single-failure scenario based analysis described earlier. It is not necessarily suited toward multiple-failure scenarios needed for the complex cyber systems of the future. The future will demand the balance of technology maturity and cost. In the early stages of the defense acquisition process for cyber technology, leaders must ensure that a risk management approach and not just a capabilities approach is used. The cyber infrastructure key performance parameters (KPP) and key systems attributes (KSA) should represent a possible future multi-failure and cyber black swan environment. Additionally, network-ready key performance parameters (NR-KPP) must measure survivability and recovery, not just operation. Testing of KPP, KSA, and NR-KPPs will require a new lens from which to develop testing and assessment methodology. *Recommendation* The DoD must accept that black swan events will likely accelerate in the growing complexity of the cyber domain. The analysis used at the strategic level to make cyber infrastructure decisions must shift from a single-failure to multi-failure view. Emphasizing "FARness"–that is flexibility, adaptiveness, and robustness in acquisition decisions is key. [9] To identify "FARness" attributes, the use of brain-storming and subject matter experts focusing on developing multi-failure scenarios for a proposed cyber infrastructure should be used. This "how can" approach creates robust scenarios approaching black swan type events and can identify ways the system could recover from a catastrophe–a type of "war-gaming." Identifying common recovery methods or needed attributes through “how can” scenarios would help decision makers think about the system within the context of a future environment and the "FARness" needed to survive. *Conclusion* In an effort to become more efficient and save money, the strategic leadership may not see the potential for black swans hidden in the cyber domain forest. Layered protections and redundancy are needed to survive a cyber-black swan event and must be considered in the analysis and decision making for future virtualization, cloud-computing, and data-center consolidation. It is with regard to probabilities that decision making based more on fiscal conservation makes the future force vulnerable. While history shows that black swan events will occur, it is up to the leadership to equip the future force with cyber systems that have "FARness"–yet fit within today's budget. *End Notes* [1]William R. Burns and Drew Miller, "Improving DoD Adaptability and Capability to Survive Black Swan Events," *Joint Forces Quarterly*, 1st Quarter 2014, 32. [2]Christopher Perry, "Security for Cloud Computing," *DON IT resources*, May 18, 2010,http://www.doncio.navy.mil/ContentView.aspx?id=1744 (accessed February 1, 2015). [3]Department of the Navy Chief Information Officer, "How Will DON Data Center Consolidation Cut Costs? Published, March 5, 2012," March 5, 2012, http://www.doncio.navy.mil/ContentView.aspx?ID=3793 (accessed January 29, 2015). [4]Eric Griffith, "What Is Cloud Computing?" *PC Magazine*, March 13, 2013, http://www.pcmag.com/article2/0,2817,2372163,00.asp (accessed April 17, 2014). [5]John F. Murphy, *Beware of the Black Swan: The Limitations of Risk Analysis for Predicting the Extreme Impact of Rare Process Safety Incidents* (Houston, TX: 8th Global Congress on Process Safety, April 1-4, 2012) http://www.allriskengineering.com/library_files/AIChe_conferences/AIChe_... (accessed February 1, 2015): 2-7. [6]Ibid., 34-35. [7]Dan Cox and Michael Mosser, "Defense Forecasting in Theory and Practice: Conceptualizing and Teaching the Future Operating Environment," *The Small Wars Journal*, January 4, 2013, http://smallwarsjournal.com/jrnl/art/defense-forecasting-in-theory-and-p... (accessed January 20, 2015). [8]Ibid. [9]Burns and Miller, "Improving DoD Adaptability and Capability to Survive Black Swan Events," -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 22743 bytes Desc: not available URL: From jdb10987 at yahoo.com Tue Aug 25 10:14:27 2015 From: jdb10987 at yahoo.com (jim bell) Date: Tue, 25 Aug 2015 17:14:27 +0000 (UTC) Subject: Your paper on criminal contracts Message-ID: <804155341.382778.1440522867038.JavaMail.yahoo@mail.yahoo.com> Dear Professors Juels (http://www.arijuels.com/) and Shi (runting at gmail.com), and Ahmed Kosba  akosba at cs.umd.edu :    I've found a reference to your recent paper, http://www.initc3.org/publications.html.  "The Ring of Gyges: Using Smart Contracts for Crime."   Perhaps you are not aware, but 20 years ago (1995-6) I wrote an essay on a very similar subject.  I called it "Assassination Politics".  cryptome.org/ap.htm .                 Jim Bell -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 706 bytes Desc: not available URL: From wirelesswarrior at safe-mail.net Tue Aug 25 14:25:23 2015 From: wirelesswarrior at safe-mail.net (wirelesswarrior at safe-mail.net) Date: Tue, 25 Aug 2015 17:25:23 -0400 Subject: Your paper on criminal contracts Message-ID: Money Laundering is the thoughtcrime of finance. Anyone mentioning it as a crime is probably a law enforcement apologist. WW -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 202 bytes Desc: not available URL: From jdb10987 at yahoo.com Tue Aug 25 11:32:56 2015 From: jdb10987 at yahoo.com (jim bell) Date: Tue, 25 Aug 2015 18:32:56 +0000 (UTC) Subject: Your paper on criminal contracts In-Reply-To: <804155341.382778.1440522867038.JavaMail.yahoo@mail.yahoo.com> References: <804155341.382778.1440522867038.JavaMail.yahoo@mail.yahoo.com> Message-ID: <1053976325.429953.1440527576453.JavaMail.yahoo@mail.yahoo.com> Here is the PDF of their paper:   http://www.arijuels.com/wp-content/uploads/2013/09/public_gyges.pdf     "The Ring of Gyges: Using Smart Contracts for Crime.".   This is definitely a paper worth reading.           Jim Bell From: jim bell To: "juels at cornell.edu" ; "runting at gmail.com" ; "akosba at cs.umd.edu" ; Cpunks List Sent: Tuesday, August 25, 2015 10:14 AM Subject: Your paper on criminal contracts Dear Professors Juels (http://www.arijuels.com/) and Shi (runting at gmail.com), and Ahmed Kosba  akosba at cs.umd.edu :    I've found a reference to your recent paper, http://www.initc3.org/publications.html.  "The Ring of Gyges: Using Smart Contracts for Crime."   Perhaps you are not aware, but 20 years ago (1995-6) I wrote an essay on a very similar subject.  I called it "Assassination Politics".  cryptome.org/ap.htm .                 Jim Bell -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2678 bytes Desc: not available URL: From juan.g71 at gmail.com Tue Aug 25 14:47:41 2015 From: juan.g71 at gmail.com (Juan) Date: Tue, 25 Aug 2015 18:47:41 -0300 Subject: Your paper on criminal contracts In-Reply-To: References: Message-ID: <55dce1b7.f7608c0a.240ea.ffffa1ba@mx.google.com> On Tue, 25 Aug 2015 17:25:23 -0400 wirelesswarrior at safe-mail.net wrote: > > Money Laundering is the thoughtcrime of finance. Anyone mentioning it > as a crime is probably a law enforcement apologist. think of the children! > > WW From ryacko at gmail.com Wed Aug 26 01:27:05 2015 From: ryacko at gmail.com (Ryan Carboni) Date: Wed, 26 Aug 2015 01:27:05 -0700 Subject: cypherpunks Digest, Vol 26, Issue 52 In-Reply-To: References: Message-ID: I'd like to make bets on when certain political leaders will die. Such will be a good use of a prediction market. From jdb10987 at yahoo.com Tue Aug 25 19:31:43 2015 From: jdb10987 at yahoo.com (jim bell) Date: Wed, 26 Aug 2015 02:31:43 +0000 (UTC) Subject: Augur: Blockchain-based Internet prediction market. Message-ID: <732253587.632877.1440556303234.JavaMail.yahoo@mail.yahoo.com> http://reason.com/blog/2015/08/11/augur-gambling-prediction-ethereum    Augur May Become the Greatest Gambling Platform in History. Is There Anything the Government Can Do to Stop It? A blockchain-based prediction market that won’t be controlled or managed by anyone. Jim Epstein   Aug. 11, 2015 12:36 pm An online gambling platform could do to the neighborhood bookie what electric refrigerators did to the ice delivery man. Coming this fall, Augur will allow participants to wager money on any future event of their choosing. Software will set the odds, collect the bets, and disperse the winnings. The price alone should give Nevada sportsbook operators pause; an estimated one percent of every pot will go to keep the system running. The average vig today is about 10 times that. Augur isn't a full-fledged casino. You can't play roulette or poker, and running lotto on the platform would be tricky. But it'll be great for sports betting. Here’s what’s truly novel about Augur: It won’t be controlled by any person or entity, nor will it operate off of any one computer network. All the money in the system will be in Bitcoin, or other types of peer-to-peer cryptocurrency, so no credit card companies or banks need to be involved. If the system runs afoul of regulators—and if it’s successful, it most certainly will—they'll find that there's no company to sue, no computer hardware to pull out of the wall, and no CEO to lockup in a cage.This is new legal territory. If Augur catches on as a tool for betting on everything from basketball games to stock prices, is there anything the government can do to stop it? Augur is a decentralized peer-to-peer marketplace, a new kind of entity made possible by recent breakthroughs in computer science. The purpose of these platforms is to facilitate the exchange of goods and services among perfect strangers on a platform that nobody administers or controls. Augur’s software will run on what’s known as a “blockchain"—a concept introduced in 2008 with the invention of Bitcoin—that's essentially a shared database for executing trades that's powered and maintained by its users. Bitcoin’s blockchain was designed as a banking ledger of sorts—kind of like a distributed Microsoft Excel file—but Augur will utilize a groundbreaking new project called Ethereum that expands on this concept. Ethereum allows Augur's entire system to live on the blockchain. That means the software and processing power that makes Augur function will be distributed among hundreds or thousands of computers. Destroying Augur would involve unplugging the computers of everyone in the world participating in the Ethereum blockchain. If Augur is destined to become the cypherpunks answer to gambling prohibition—the betting man’s version of the online drug market Silk Road if you will—you'd never know it from talking with its developers. They work for a San Francisco-based nonprofit, attend conferences, have legal representation, and talk openly about what they’re up to with reporters. Augur even commissionedone of those cheesy motion graphics promotional videos favored by new tech startups. About half of the roughly $600,000 raised by Augur's development team comes from Joe Costello, the successful tech entrepreneur who was once Steve Jobs' top pick to become the CEO of Apple. Joey Krug, a twenty-year-old Pomona college dropout and Augur's lead developer, never uses the world “gambling" to describe his venture. He and his team of five employees call Augur a “prediction market,” a term that emphasizes the information generated when a bunch of people have a financial incentive to feed their expertise into a sophisticated algorithm. With Augur, as bettors move money in and out of the pot, the odds adjust. This yields publicly available statistics that should carry weight because they're derived from the opinions of a crowd of people with a stake in the results. InTrade, for example, the best-known prediction market until federal regulators forced it to stop serving U.S. customers in 2012, beat the pollsters and pundits by foreseeing the outcome of the 2008 presidential elections in 48 out of 50 states. Augur’s developers hope that their platform will make it possible to do a Google search to look up the likelihood of some future event. This could usher in a better world, with more informed policy decisions and less malinvestment. But Augur also serves the less high-minded—though no less noble—purpose of providing cost savings and convenience to gamblers. Restrictions on gambling serve to protect government revenue at the betting man's expense. State-sanctioned casino operators pay high taxes, and state-run lotteries fleece their customers. But there's no logical or moral case for government restrictions on gambling, since no third party is harmed when consenting adults wager money on the future. Augur actually has the potential to make the world safer by taking away market share in the gambling industry from criminals. And yet sports betting is illegal in most states, and prediction markets are tightly regulated by the Commodity Futures Trading Commission (CTFC). The agency sued Ireland-based InTrade in 2012 to prevent it from accepting bets from U.S. customers. (The company folded shortly after.) In 2013, the CFTC and the Securities and Exchange Commission (SEC) jointly sued the prediction market Banc de Binary for allowing U.S. customers to make bets on commodity prices. The CFTC has approved other prediction markets, such as the New Zealand-based PredictIt, but only after it agreed to abide by the agency's restrictions. Krug says the Augur team is planning to meet with CFTC staff go over how their system works before it’s launched, but says he's not overly concerned. “Our friends in Washington, D.C. say the CFTC will probably just dismiss Augur and say it’s not a big deal,” Krug told me in a phone interview. That doesn’t sound like much of a legal strategy, but how do you have a legal strategy when you're building something unlike anything that's ever existed? Federal anti-gambling laws, such as the 2006 Unlawful Internet Gambling Enforcement Act, target the companies that facilitate online betting— website operators, credit card companies, banks—not individual gamblers. Augur’s biggest legal vulnerability is the community of human “reporters” who are needed to settle bets on the platform, says Cardozo Law School's Aaron Wright, who is writing a book about the legal implications of blockchain technology. Let’s say a group of people wager money on Augur over the outcome of a boxing match. Once the bout is over, human participants (who receive a portion of the trading fees as compensation) must report the outcome to the system before Augur’s software will disperse the money to the winners. "There’s at least an argument that the people doing that reporting are aiding or abetting unlicensed options and could be prosecuted," says Wright. But Augur doesn't collect personal information on any of its users, so identifying these people could be difficult. And Augur is a borderless technology, so U.S. gamblers could simply rely on foreigners to report on the outcomes of their bets. One attorney I spoke with suggested that the team that’s building Augur could be brought up on charges for aiding and abetting a criminal conspiracy. Nate Cardozo, a staff attorney with the Electronic Frontier Foundation, thinks that's far-fetched but says he can't rule it out. Cardozo emphasizes that writing open source software doesn’t necessarily protect the team from prosecution. “We’ve taken the steps that we need to take in order to bracket the individual's risk and the organization’s risk,” says Augur’s attorney, Marco Santori, who declined to comment further on exactly what those steps might entail. Even if Krug and his colleagues were to face criminal prosecution, the technology would live on. After Augur is born into the world, the development team could release a software update that would cripple the system. But in that case, Augur's users could band together to block any changes to the underlying code, or another developer could copy the open source code and simply re-launch the platform.  The big question with Augur—and with blockchain platforms more generally—is whether they can outrun our regulatory state long enough to grow so large and popular that they're truly unstoppable. My money’s on Augur in that race. For more on the promises and pitfalls of decentralized peer-to-peer marketplaces, read my recentReason magazine feature story on the topic. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 10346 bytes Desc: not available URL: From schear.steve at gmail.com Tue Aug 25 22:19:55 2015 From: schear.steve at gmail.com (Steven Schear) Date: Wed, 26 Aug 2015 05:19:55 +0000 Subject: Augur: Blockchain-based Internet prediction market. In-Reply-To: <732253587.632877.1440556303234.JavaMail.yahoo@mail.yahoo.com> References: <732253587.632877.1440556303234.JavaMail.yahoo@mail.yahoo.com> Message-ID: Also, http://reason.com/archives/2015/04/09/bitcoin-and-the-cypherpunks/ On Wed, Aug 26, 2015 at 2:31 AM, jim bell wrote: > http://reason.com/blog/2015/08/11/augur-gambling-prediction-ethereum > > > Augur May Become the Greatest Gambling Platform in History. Is There > Anything the Government Can Do to Stop It? > A blockchain-based prediction market that won’t be controlled or managed > by anyone. > Jim Epstein Aug. 11, 2015 12:36 pm > > An online gambling platform could do to the neighborhood bookie what > electric refrigerators did to the ice delivery man. > Coming this fall, Augur will allow participants to wager money on any > future event of their choosing. Software will set the odds, collect the > bets, and disperse the winnings. The price alone should give Nevada > sportsbook operators pause; an estimated one percent of every pot will go > to keep the system running. The average vig today is about 10 times that. > > Augur isn't a full-fledged casino. You can't play roulette or poker, and > running lotto on the platform would be tricky. But it'll be great for > sports betting. > > Here’s what’s truly novel about Augur: It won’t be controlled by any > person or entity, nor will it operate off of any one computer network. All > the money in the system will be in Bitcoin, or other types of peer-to-peer > cryptocurrency, so no credit card companies or banks need to be involved. > If the system runs afoul of regulators—and if it’s successful, it most > certainly will—they'll find that there's no company to sue, no computer > hardware to pull out of the wall, and no CEO to lockup in a cage > . > This is new legal territory. If Augur catches on as a tool for betting on > everything from basketball games to stock prices, is there anything the > government can do to stop it? > > Augur is a decentralized peer-to-peer marketplace, a new kind of entity > made possible by recent breakthroughs in computer science. The purpose of > these platforms is to facilitate the exchange of goods and services among > perfect strangers on a platform that nobody administers or controls. > Augur’s software will run on what’s known as a “blockchain"—a concept > introduced in 2008 with the invention of Bitcoin—that's essentially a > shared database for executing trades that's powered and maintained by its > users. > > Bitcoin’s blockchain was designed as a banking ledger of sorts—kind of > like a distributed Microsoft Excel file—but Augur will utilize a > groundbreaking new project called Ethereum that expands on this concept. > Ethereum allows Augur's entire system to live on the blockchain. That means > the software and processing power that makes Augur function will be > distributed among hundreds or thousands of computers. Destroying Augur > would involve unplugging the computers of everyone in the world > participating in the Ethereum blockchain. > If Augur is destined to become the cypherpunks answer to gambling > prohibition—the betting man’s version of the online drug market Silk Road > if you will—you'd never know it from talking with its developers. They work > for a San Francisco-based nonprofit, attend conferences, have legal > representation, and talk openly about what they’re up to with reporters. > Augur even commissionedone of those cheesy motion graphics promotional > videos favored by new tech startups. > > About half of the roughly $600,000 raised by Augur's development team > comes from Joe Costello, the successful tech entrepreneur who was > once Steve Jobs' top pick to become the CEO of Apple. > > Joey Krug, a twenty-year-old Pomona college dropout and Augur's lead > developer, never uses the world “gambling" to describe his venture. He and > his team of five employees call Augur a “prediction market,” a term that > emphasizes the information generated when a bunch of people have a > financial incentive to feed their expertise into a sophisticated algorithm. > > With Augur, as bettors move money in and out of the pot, the odds adjust. > This yields publicly available statistics that should carry weight because > they're derived from the opinions of a crowd of people with a stake in the > results. InTrade, for example, the best-known prediction market until > federal regulators forced it to stop serving U.S. customers in 2012, beat > the pollsters and pundits by foreseeing the outcome of the 2008 > presidential elections in 48 out of 50 states. > Augur’s developers hope that their platform will make it possible to do a > Google search to look up the likelihood of some future event. This could > usher in a better world, with more informed policy decisions and less > malinvestment. > > But Augur also serves the less high-minded—though no less noble—purpose of > providing cost savings and convenience to gamblers. Restrictions on > gambling serve to protect government revenue at the betting man's expense. > State-sanctioned casino operators pay high taxes, and state-run lotteries > fleece their customers. But there's no logical or moral case for government > restrictions on gambling, since no third party is harmed when consenting > adults wager money on the future. Augur actually has the potential to make > the world safer by taking away market share in the gambling industry from > criminals. > > And yet sports betting is illegal in most states, and prediction markets > are tightly regulated by the Commodity Futures Trading Commission (CTFC). > The agency sued Ireland-based InTrade in 2012 to prevent it from accepting > bets from U.S. customers. (The company folded shortly after.) In 2013, the > CFTC and the Securities and Exchange Commission (SEC) jointly sued the > prediction market Banc de Binary for allowing U.S. customers to make bets > on commodity prices. > The CFTC has approved other prediction markets, such as the New > Zealand-based PredictIt, but only after it agreed to abide by the agency's > restrictions. > Krug says the Augur team is planning to meet with CFTC staff go over how > their system works before it’s launched, but says he's not overly > concerned. “Our friends in Washington, D.C. say the CFTC will probably just > dismiss Augur and say it’s not a big deal,” Krug told me in a phone > interview. > > That doesn’t sound like much of a legal strategy, but how do you have a > legal strategy when you're building something unlike anything that's ever > existed? Federal anti-gambling laws, such as the 2006 Unlawful Internet > Gambling Enforcement Act, target the companies that facilitate online > betting— website operators, credit card companies, banks—not individual > gamblers. > > Augur’s biggest legal vulnerability is the community of human “reporters” > who are needed to settle bets on the platform, says Cardozo Law School's > Aaron Wright, who is writing a book about the legal implications of > blockchain technology. Let’s say a group of people wager money on Augur > over the outcome of a boxing match. Once the bout is over, human > participants (who receive a portion of the trading fees as compensation) > must report the outcome to the system before Augur’s software will disperse > the money to the winners. "There’s at least an argument that the people > doing that reporting are aiding or abetting unlicensed options and could be > prosecuted," says Wright. > But Augur doesn't collect personal information on any of its users, so > identifying these people could be difficult. And Augur is a borderless > technology, so U.S. gamblers could simply rely on foreigners to report on > the outcomes of their bets. > > One attorney I spoke with suggested that the team that’s building Augur > could be brought up on charges for aiding and abetting a criminal > conspiracy. Nate Cardozo, a staff attorney with the Electronic Frontier > Foundation, thinks that's far-fetched but says he can't rule it out. > Cardozo emphasizes that writing open source software doesn’t necessarily > protect the team from prosecution. > “We’ve taken the steps that we need to take in order to bracket the > individual's risk and the organization’s risk,” says Augur’s attorney, > Marco Santori, who declined to comment further on exactly what those steps > might entail. > > Even if Krug and his colleagues were to face criminal prosecution, the > technology would live on. After Augur is born into the world, the > development team could release a software update that would cripple the > system. But in that case, Augur's users could band together to block any > changes to the underlying code, or another developer could copy the open > source code and simply re-launch the platform. > The big question with Augur—and with blockchain platforms more > generally—is whether they can outrun our regulatory state long enough to > grow so large and popular that they're truly unstoppable. My money’s on > Augur in that race. > > For more on the promises and pitfalls of decentralized peer-to-peer > marketplaces, read my recentReason magazine feature story on the topic. > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 10017 bytes Desc: not available URL: From l at odewijk.nl Wed Aug 26 02:15:47 2015 From: l at odewijk.nl (=?UTF-8?Q?Lodewijk_andr=C3=A9_de_la_porte?=) Date: Wed, 26 Aug 2015 11:15:47 +0200 Subject: Your paper on criminal contracts In-Reply-To: References: Message-ID: 2015-08-25 23:25 GMT+02:00 : > Money Laundering is the thoughtcrime of finance. Anyone mentioning it as a > crime is probably a law enforcement apologist. > The problem is that it's effective. Can't launder the money, can't use the money, don't have any use for the money. A lot of people (maybe? Wonder how many) people get caught years down the line because their expenses don't line up with their incomes. The counterargument is that laundering is not that hard. Tricks like buying tons of lottery tickets with black money, but claiming only the massive value ticket. One could start an online software business, and create fake downloads/purchases for his/her software (pay tax, laundry complete). If it weren't possible, that would be a serious issue of privacy. We have at least one example of how the expression of your political believes is limited by observation: the anti-gay-marriage Mozilla CEO, who could not donate anonymously enough. Therefore he could not privately express his opinion through money/donation to lobby-group (a form of speech the US courts agreed exists). Money Laundering itself is of no harmful consequence. It's good for the economy, as it makes money available for investment (good according to inflation fans). It does always follow something labelled illegal. Making it illegal (supposedly strongly) supports prevention of illegal things. Should it be illegal? I think it's good for humanity if it were legal. It's too easy to avoid law enforcement (these laws are not enforceable). It's a nearly complete loss of privacy if it is enforceable. I'm not so opposed to having Money Laundering be illegal. I just think there should be absolutely no legal powers granted to police specifically to deal with Money Laundering. Anti Money Laundering torments our financial system and just isn't worth it. (NB: might be motivated by the TLA's to mass track everything and everyone for no good reason) (NB: Cryptocurrencies make black money much more useful, as it is the first time digital and untracked meets practical) -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2826 bytes Desc: not available URL: From grarpamp at gmail.com Wed Aug 26 15:51:26 2015 From: grarpamp at gmail.com (grarpamp) Date: Wed, 26 Aug 2015 18:51:26 -0400 Subject: IBM says Block Tor Message-ID: http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgl03086usen/WGL03086USEN.PDF IBM Advises Businesses To Block Tor With Tor-based attacks on the rise, IBM says it's time to stop Tor in the enterprise. New data from IBM's X-Force research team shows steady increase in SQL injection and distributed denial-of-service attacks as well as vulnerability reconnaissance activity via the Tor anonymizing service. From schear.steve at gmail.com Wed Aug 26 13:03:38 2015 From: schear.steve at gmail.com (Steven Schear) Date: Wed, 26 Aug 2015 20:03:38 +0000 Subject: Your paper on criminal contracts In-Reply-To: References: Message-ID: Today ML is defined broadly so as to criminalize not only hiding the sources of illegal funds but the mere attempt (e.g., structuring) to enable financial privacy by hiding even legit money. On Wed, Aug 26, 2015 at 9:15 AM, Lodewijk andré de la porte wrote: > 2015-08-25 23:25 GMT+02:00 : > >> Money Laundering is the thoughtcrime of finance. Anyone mentioning it as >> a crime is probably a law enforcement apologist. >> > > The problem is that it's effective. Can't launder the money, can't use the > money, don't have any use for the money. A lot of people (maybe? Wonder how > many) people get caught years down the line because their expenses don't > line up with their incomes. > > The counterargument is that laundering is not that hard. Tricks like > buying tons of lottery tickets with black money, but claiming only the > massive value ticket. One could start an online software business, and > create fake downloads/purchases for his/her software (pay tax, laundry > complete). If it weren't possible, that would be a serious issue of > privacy. We have at least one example of how the expression of your > political believes is limited by observation: the anti-gay-marriage Mozilla > CEO, who could not donate anonymously enough. Therefore he could not > privately express his opinion through money/donation to lobby-group (a form > of speech the US courts agreed exists). > > Money Laundering itself is of no harmful consequence. It's good for the > economy, as it makes money available for investment (good according to > inflation fans). It does always follow something labelled illegal. Making > it illegal (supposedly strongly) supports prevention of illegal things. > > Should it be illegal? > > I think it's good for humanity if it were legal. It's too easy to avoid > law enforcement (these laws are not enforceable). It's a nearly complete > loss of privacy if it is enforceable. > > I'm not so opposed to having Money Laundering be illegal. I just think > there should be absolutely no legal powers granted to police specifically > to deal with Money Laundering. Anti Money Laundering torments our financial > system and just isn't worth it. (NB: might be motivated by the TLA's to > mass track everything and everyone for no good reason) (NB: > Cryptocurrencies make black money much more useful, as it is the first time > digital and untracked meets practical) > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3414 bytes Desc: not available URL: From coderman at gmail.com Wed Aug 26 21:21:34 2015 From: coderman at gmail.com (coderman) Date: Wed, 26 Aug 2015 21:21:34 -0700 Subject: FOIPA adventures In-Reply-To: References: <000701d0bcb7$94118e80$bc34ab80$@co.uk> Message-ID: On 8/5/15, coderman wrote: > ... > able to pre-pay for the most technical report on FBI procurement of > forensic power overrides... > https://www.muckrock.com/foi/united-states-of-america-10/hotpluggedin-19762/ as expected, this was just a "go away" tactic, and once paid, they took their time to tell me they must refund, and i must give them an amount, and then they search, and then they charge me, and then they search some more, and then they give me the docs. fuck that! and happy judicial precedent later, i gave this reply: --- This is a written response regarding payment for FOIA request 1333239-000. Please be advised that I am NO LONGER WILLING TO PAY FEES and contest the notion of my request being "commercial use". Observe that in August, 2015 D.C. Circuit Judge Merrick Garland emphasized that web-based publishers are as entitled to waivers as newspapers, that outlets without a following by a broad swath of the general public can qualify for waivers and that organizations that pass analyzed government documents to media outlets can be classified as members of the news media under the federal public records law. "There is nothing in the statute that specifies the number of outlets a requester must have, and surely a newspaper is not disqualified if it forsakes newsprint for (or never had anything but) a website," Garland wrote in an opinion joined by Judges Janice Rogers Brown and David Sentelle. "There is no indication that Congress meant to distinguish between those who reach their ultimate audiences directly and those who partner with others to do so..." - http://www.cadc.uscourts.gov/internet/opinions.nsf/EF1DE205B4E1264685257EAC004EF78C/$file/13-5335-1569545.pdf The results of my FOIA requests have been incorporated into popular reporting in the technical press and wider media, proving the value of this information to the public and my ability to ultimately reach the public audience through partner organizations. Thank you. From skquinn at rushpost.com Wed Aug 26 19:36:55 2015 From: skquinn at rushpost.com (Shawn K. Quinn) Date: Wed, 26 Aug 2015 21:36:55 -0500 Subject: IBM says Block Tor In-Reply-To: References: Message-ID: <1440643015.14976.23.camel@moonpatrol> On Wed, 2015-08-26 at 18:51 -0400, grarpamp wrote: > http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgl03086usen/WGL03086USEN.PDF > > IBM Advises Businesses To Block Tor > > With Tor-based attacks on the rise, IBM says it's time to stop Tor in > the enterprise. > > New data from IBM's X-Force research team shows steady increase in SQL > injection and distributed denial-of-service attacks as well as > vulnerability reconnaissance activity via the Tor anonymizing service. As best I can tell, the article refers to blocking access from the corporate network to Tor, not necessarily e.g. blocking Tor exit node connections to external corporate web servers. They also recommend things like blocking personal VPN servers. My concern is that they take the stance that allowing Tor is a liability. Sure, there are people who will abuse Tor, but the benefits of being able to access, say, Pepsi's web site without revealing you're doing so from Coca-Cola's corporate network should not be ignored. That's what Tor was originally intended to be used for, among other things. I concede it was inevitable that some would use it for evil, but isn't that true about a lot of things? -- Shawn K. Quinn From odinn.cyberguerrilla at riseup.net Wed Aug 26 22:48:01 2015 From: odinn.cyberguerrilla at riseup.net (odinn) Date: Wed, 26 Aug 2015 22:48:01 -0700 Subject: IBM says Block Tor In-Reply-To: References: Message-ID: <55DEA491.5030605@riseup.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I can understand a cautionary approach to Tor at a time when attacks are evident - see some of my past humming and hawing about this sort of subject (where I am posting as ABISprotocol) in an OB thread here: https://github.com/OpenBazaar/OpenBazaar/issues/866 But in the end despite the (vulnerabilities relating to Tor / I2P use) at that time I didn't conclude people should stop using it, just that they should be careful about it and be aware of the limitations of the software. This particular e-mail ('IBM Advises Businesses To Block Tor') caught my eye and seemed rather odd, because in the not-so-distant past, IBM and Microsoft were actually studying (and even promoting) certain types of anonymity solutions. To wit: Direct Anonymous Attestation http://www.zurich.ibm.com/security/daa/ "As...profiling is privacy invasive, we have proposed a way to use direct anonymous attestation such that the detection of rogue TPMs and actually granting/requesting the access are performed in two different unlinkable transactions..." (Gee, IBM, isn't that, like, the evil anonymity stuff?) Idemix / Identity Mixer http://www.zurich.ibm.com/idemix/ These above two links were mentioned / highlighted last year by Microsoft staff at the W3C 'Web Cryptography Next Steps' event which I attended and had a position paper accepted at: http://www.w3.org/2012/webcrypto/webcrypto-next-workshop/report.html While I've never trusted Microsoft Windows (much) - having left that platform long ago for the comfort of Linux - it does seem rather odd that they would state (as they did in their recent article) that "Corporate networks really have little choice but to block communications to these stealthy networks." You have to wonder who is the desperate fail person who authored that conclusion to their recent article.* - - O *Reference: http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgl03086usen/WGL03086USEN .PDF On 08/26/2015 03:51 PM, grarpamp wrote: > http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgl03086usen/WGL03086US EN.PDF > > IBM Advises Businesses To Block Tor > > With Tor-based attacks on the rise, IBM says it's time to stop Tor > in the enterprise. > > New data from IBM's X-Force research team shows steady increase in > SQL injection and distributed denial-of-service attacks as well as > vulnerability reconnaissance activity via the Tor anonymizing > service. > - -- http://abis.io ~ "a protocol concept to enable decentralization and expansion of a giving economy, and a new social good" https://keybase.io/odinn -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJV3qSRAAoJEGxwq/inSG8CzdwH/2LUl88VDcE7D6zOLwO6h4+1 4LKkIeRTrM2uOdXgmcrEAbixPbvRcdI3Tz3g2tARIPJcGwY4M8diRFH0Xekq8dE9 E5qmMN7QIOgCH0RdCEmGYUaX3oA2RJfaq3G8WN+8lOP1dpywCjKKUM57PCJ4GZqq PCsrlVO8AY2+QrxdCLbokAypPAPlBONcVXsOh4kdM1KwPW1DefR+MuZcUfLcTkFs SScIqQ6u7L3XDAXl4WRGrRvheKpNU59tmHfYRGAhA7aWFT//PImuXUmatXIbEZIi n6H8WkGqUXkT1d0yZYrDNIQALxgrqizSNDhD7g7CPdsdaX/AdYkLQXUU/3+prb8= =0R6t -----END PGP SIGNATURE----- From grarpamp at gmail.com Wed Aug 26 19:51:50 2015 From: grarpamp at gmail.com (grarpamp) Date: Wed, 26 Aug 2015 22:51:50 -0400 Subject: Your paper on criminal contracts In-Reply-To: References: Message-ID: >>> Money Laundering is the thoughtcrime of finance. Anyone needing laundry and hiding services can send their coins here whereby they are returned after the timeout period and over time as royalties from business investments in the Brazilian hotel industry. Things in Rio are heating up! Make your move today before the best oceanfront locations are claimed and developed by other competing investors. bitcoin: 1HxaTESuoVhhr7xL6PU3TrpJxADCnWnpZu From grarpamp at gmail.com Wed Aug 26 21:48:12 2015 From: grarpamp at gmail.com (grarpamp) Date: Thu, 27 Aug 2015 00:48:12 -0400 Subject: FOIPA adventures In-Reply-To: References: <000701d0bcb7$94118e80$bc34ab80$@co.uk> Message-ID: On Thu, Aug 27, 2015 at 12:21 AM, coderman wrote: > a requester must have, and surely a newspaper is not disqualified if > it forsakes newsprint for (or never had anything but) a website," > > The results of my FOIA requests have been incorporated into popular > reporting in the technical press and wider media, proving the value of > this information to the public and my ability to ultimately reach the > public audience through partner organizations. The medium or size is no longer relavant in demise of print. Some FOIA are published discussed here on this list. Can easily be published ftp, nntp, drone pamphleting, irc on darknets and down the river. There are interested readers, at least one, somewhere. Untill all govt docs are published, what better legit use of taxes is there? Certainly not on murder and secrets. From blibbet at gmail.com Thu Aug 27 07:34:36 2015 From: blibbet at gmail.com (Blibbet) Date: Thu, 27 Aug 2015 07:34:36 -0700 Subject: UH OH: Windows 10 will share your Wi-Fi key with your friends' friends In-Reply-To: <20150827120641.GB2699@sivokote.iziade.m$> References: <20150827120641.GB2699@sivokote.iziade.m$> Message-ID: <55DF1FFC.3090008@gmail.com> I don't use Win10, but maybe this will help? https://github.com/dfkt/win10-unfuck/ From guninski at guninski.com Thu Aug 27 05:06:41 2015 From: guninski at guninski.com (Georgi Guninski) Date: Thu, 27 Aug 2015 15:06:41 +0300 Subject: UH OH: Windows 10 will share your Wi-Fi key with your friends' friends Message-ID: <20150827120641.GB2699@sivokote.iziade.m$> This is old, but I don't do windows. In addition the screenshot of the phone appears not privacy friendly to me. http://www.theregister.co.uk/2015/06/30/windows_10_wi_fi_sense/ Those friends include their Outlook.com (nee Hotmail) contacts, Skype contacts and, with an opt-in, their Facebook friends. If you wander close to a wireless network, and your friend knows the password, and you both have Wi-Fi Sense, you can log into that network. Wi-Fi Sense doesn’t reveal the plaintext password to your family, friends, acquaintances, and the chap at the takeaway who's an Outlook.com contact, but it does allow them, if they are also running Wi-Fi Sense, to log in to your Wi-Fi. The password must be stored centrally by Microsoft, and is copied to a device for it to work; Microsoft just tries to stop you looking at it. How successful that will be isn't yet known. The feature has been on Windows Phones since version 8.1. If you type the password into your Lumia, you won’t then need to type it into your laptop, because you are a friend of yourself. From guninski at guninski.com Thu Aug 27 08:09:08 2015 From: guninski at guninski.com (Georgi Guninski) Date: Thu, 27 Aug 2015 18:09:08 +0300 Subject: UH OH: Windows 10 will share your Wi-Fi key with your friends' friends In-Reply-To: <55DF1FFC.3090008@gmail.com> References: <20150827120641.GB2699@sivokote.iziade.m$> <55DF1FFC.3090008@gmail.com> Message-ID: <20150827150908.GC2699@sivokote.iziade.m$> On Thu, Aug 27, 2015 at 07:34:36AM -0700, Blibbet wrote: > I don't use Win10, but maybe this will help? > I don't use it too, but would prefer "dd if=/dev/urandom of=/you/know/where" from live cd for unfucking. It is well known that /dev/zero is faster, but no so good. > https://github.com/dfkt/win10-unfuck/ From odinn.cyberguerrilla at riseup.net Thu Aug 27 20:04:15 2015 From: odinn.cyberguerrilla at riseup.net (odinn) Date: Thu, 27 Aug 2015 20:04:15 -0700 Subject: UH OH: Windows 10 will share your Wi-Fi key with your friends' friends In-Reply-To: <55DF1FFC.3090008@gmail.com> References: <20150827120641.GB2699@sivokote.iziade.m$> <55DF1FFC.3090008@gmail.com> Message-ID: <55DFCFAF.1080509@riseup.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Thank you, added to list here: https://lists.dyne.org/lurker/message/20150828.024923.d044cdcb.en.html Social at https://twitter.com/AnonyOdinn/status/637095513708298240 On 08/27/2015 07:34 AM, Blibbet wrote: > I don't use Win10, but maybe this will help? > > https://github.com/dfkt/win10-unfuck/ > > > - -- http://abis.io ~ "a protocol concept to enable decentralization and expansion of a giving economy, and a new social good" https://keybase.io/odinn -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJV38+vAAoJEGxwq/inSG8COVkIAIfAocB4R01ba4grD8BlOZZd AitTLY7u/ik1SAoy3PTdaPJb3MCyYx65WCqEAYQ64B61MVEe/6YNM/72muv8Ldp/ n18uMOGuG/qRQ1UZpaQtepEDNEC469qnad+ysVveRUIlE38sg7uMMDyGQUJt09q3 DUcJUFbs84ucZEywHQ+Oie2fc+3DJYbEnysswS3Nvk+zymff7t9AozLwo2s4car4 6cvefIlhEO38Thjt9ruySiosFfhT3DDfitSWTxcFqWG0A/nfv+rvmRHR88Qp/WHL lUxAAksyUNbh/QY7ZPulJZDgMrQPSzBP0DFsPXVIBJ+WYUxZGWyWGCnEUIC8qXg= =ZwBp -----END PGP SIGNATURE----- From admin at pilobilus.net Thu Aug 27 21:14:33 2015 From: admin at pilobilus.net (Steve Kinney) Date: Fri, 28 Aug 2015 00:14:33 -0400 Subject: UH OH: Windows 10 will share your Wi-Fi key with your friends' friends In-Reply-To: <55DFCFAF.1080509@riseup.net> References: <20150827120641.GB2699@sivokote.iziade.m$> <55DF1FFC.3090008@gmail.com> <55DFCFAF.1080509@riseup.net> Message-ID: <55DFE029.8050807@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 08/27/2015 11:04 PM, odinn wrote: > Thank you, added to list here: > > https://lists.dyne.org/lurker/message/20150828.024923.d044cdcb.en. html > > Social at > https://twitter.com/AnonyOdinn/status/637095513708298240 > > On 08/27/2015 07:34 AM, Blibbet wrote: >> I don't use Win10, but maybe this will help? > >> https://github.com/dfkt/win10-unfuck/ The continued dominance of Microsoft products even in professional and commercial settings, and ongoing efforts to mitigate the Microsoft spectrum of security failures and violations, demonstrates one of the most fundamental laws of human behavior: You can't smarten up a chump. IIRC it was W.C. Fields who observed, "Trying to smarten up a chump is like trying to teach a pig to sing, it wastes your time and annoys the pig." A corollary to this law states that it is morally wrong to give a sucker an even break. That would explain the global ecosystem of administrator and technicians who use Microsoft to rip off clients and employers. But for the benefit of those who do not fall entirely into the chump ~ sucker category Mr. Miyagi say, "Best block is, no be there. " :o/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJV3+AmAAoJEDZ0Gg87KR0LeyUQAKeXFHJxHzQzAvdEdd8Zukky Gblq4lyT7+Jv0di6dqvxYPXL3TftWnxeyEN1aI/VUq3oxosQOwU8MiIqKLr0WmwQ kTQ3U6ePvh44GoesNnXrRS4KIHGbaoxi58hOkHYi+yN0GT5riV4TV/eftlj9+WoL wZqeDo8TJmpnZoJA2rW/ei92C9d8okYn4IsIfSjOFGYb2CkUo8lafE+36i4eOAdJ /UcIUHi+Hm6wn3/fkT2+S3tFRMzY3J9jsO/O2ihcw1fsK7DKMQAD53Omf2uGJOXu x4rMR41SdFvKJgM4nSCbsBMrBvstioM0QFwMTofRVhWSDSQHBwycks7L55TTGayr mD6kE9+oJl1/9xFmoC2RRdLaDQPzVDcMr+1Rl8mq261vv7/27xEmkXW1n0DMQO/J imUAZ+DijDg18cEHAUBd+9qXpk+vaObYBCP0H7IAqVOkcpj1ieTVKGtucNQHHChi N1awXiEJXsTxir+EC5M2oPs5y4aycMVL/SBsQ8jS+86uhYpWnJHl06EkZhybXn18 RFt9FpLsAFVQ5bQoHljDICn4BJzlzVTnvNeg23E0UTlUDZ0OSCipq3xDnJZyMes/ LvjwW7Mo8P/p+qBNuy0Ckh6J/Gr9kBJEHeZeUhJW5w0df03/7YyfI3YBU2jzCmYi IEwK1XgBUgG4hz/CQ9aw =XQtf -----END PGP SIGNATURE----- From grarpamp at gmail.com Fri Aug 28 00:24:23 2015 From: grarpamp at gmail.com (grarpamp) Date: Fri, 28 Aug 2015 03:24:23 -0400 Subject: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files") In-Reply-To: <20150821043032.GB5822@torproject.org> References: <55C59BBA.2020700@openmailbox.org> <1439101342-sup-8277@metis.syd1.tesser.org> <20150812234512.GE2384@torproject.org> <20150813074017.GF2384@torproject.org> <20150821043032.GB5822@torproject.org> Message-ID: While reducing network traffic to various accounting schemes such as netflow may enable some attacks, look at just one field of it... bytecounting. Assume you've got a nice global view courtesy of your old bed buddies AT&T, Verizon, Sprint, etc and in addition to your own bumps on the cables. You know the IP's of all Tor nodes (and I2P, etc). So you group them into one "cloud" of overlay IP's. For the most part any traffic into that cloud from an IP on the left, after it bounces around inside, must terminate at another IP on the right. There are roughly 7000 relays, but because many of them are aggregable at the ISP/colohouse, peering and other good vantage point levels, you don't need 7000 taps to see them all. You run your client and start loading and unloading the bandwidth of your target in one hour duty cycles for a few days. Meanwhile, record the bytecount every minute for every IP on the internet into some RRD. There are only about 2.8 billion IPv4 in BGP [Potaroo]. Some usage research says about 1.3 billion of 2.6 billion BGP actually in use [Carna Census 2012]. IPv6 is minimal, but worth another 2.8 billion if mapped today. Being generous at 3.7 billion users (half the world [ITU]), that's 2^44 64-bit datapoints every three days... 128TiB. Now, can you crunch those 3.7B curves to find one whose bytecount deltas match those of your datapump? How fast can you speed it up? And can you find Tor clients of clearnet services using similar method since you are not the datapump there? What if you're clocking out packets and filling all the data links on your overlay net 24x7x365 such that any demand loading is now forced to ride unseen within instead of bursting out the seams? From admin at pilobilus.net Fri Aug 28 02:03:34 2015 From: admin at pilobilus.net (Steve Kinney) Date: Fri, 28 Aug 2015 05:03:34 -0400 Subject: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files") In-Reply-To: References: <55C59BBA.2020700@openmailbox.org> <1439101342-sup-8277@metis.syd1.tesser.org> <20150812234512.GE2384@torproject.org> <20150813074017.GF2384@torproject.org> <20150821043032.GB5822@torproject.org> Message-ID: <55E023E6.2080809@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 08/28/2015 03:24 AM, grarpamp wrote: > While reducing network traffic to various accounting schemes > such as netflow may enable some attacks, look at just one field > of it... bytecounting. > > Assume you've got a nice global view courtesy of your old bed > buddies AT&T, Verizon, Sprint, etc and in addition to your own > bumps on the cables. > > You know the IP's of all Tor nodes (and I2P, etc). So you group > them into one "cloud" of overlay IP's. For the most part any > traffic into that cloud from an IP on the left, after it > bounces around inside, must terminate at another IP on the > right. > > There are roughly 7000 relays, but because many of them are > aggregable at the ISP/colohouse, peering and other good vantage > point levels, you don't need 7000 taps to see them all. [ etc, right on target AFAIK ] Global observer attacks can be augmented by owning a substantial number of the routers: All hosted at one facility, but globally distributed via transparent VPN connections running on a variety of platforms all over the world. These router instances would be somewhat customized to facilitate manipulation of traffic via a purpose built hypervisor with a plugin architecture for monitor functions. Since code names aren't supposed to be related to the named thing in any way, we can't call this Hydra. In terms of real world threats, I think it's safe to say that TOR "Hidden Services" aren't very well hidden from motivated adversaries who can deploy global observation and/or global infiltration attacks: The persistence, fixed physical location and interactive availability a hidden services makes it a fat, dumb, happy sitting target for any major State's military and police intelligence service that takes an interest in identifying the host and its operators IRL. :o/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJV4CPjAAoJEDZ0Gg87KR0L/NEQAKuHUSt75+drmpbT3E5N5EQq IohHdYiD1w0ui/PGjK/TE5AbUUcvRdxZ1RTKHlksvxxQeNRngimtUXbifb5SnCgo MpYMidXRxfNCNjvQOYTj5ao2uZ4k833uiHF8eKkVXoVrnxT5dMZnaFUnZUqoNoVQ Kf099zLvMDbcvnprO8ACGTCwmmFo81n2Qh5RnHvuXn1Y47tsLNNiaftzqZeucudq YDNoDi/U4VxRJvpMTUs0N7CcGoifZy573XK72kDriJj61Hk8irLtKyGkj/aNheUX mUi5RHYRhoiZYi8GMtPRXkehHX7bOtoevj4ndBU8VHVUD0HFj/B28FxlL4AH60SU x/8pTVSfdyivA4Iq6l6MHCQETCsRJtrEbQ7tZhZ+bke6Kp2zA2910nIXufnwZy2D x6emy2wSEjCme7VuZ+BXrPFXUBYf6d5J7hX21z2e09IV+EGteVsoYyifFGGKEe4e j9EopUatPvff+l1rE5ka49CcruT9dcKkc/W77H0etc186djSPElJj4Yo7Uwsrax/ qcNu8zAqrXzxxg2Og//cCV3BA9gRDMMqBXXyJZy3EdmuhcZyRI7s5Q4c/7vvRVFC iob4S6ZPoMmF39YJxPNlg8eq0YbjmZ04WRsHtG43IEBuSuQiz8MFoXWT1zKXJ/iw 4aw6fi0dqJ4DI1TEj6Co =+O1w -----END PGP SIGNATURE----- From wirelesswarrior at safe-mail.net Fri Aug 28 10:19:28 2015 From: wirelesswarrior at safe-mail.net (wirelesswarrior at safe-mail.net) Date: Fri, 28 Aug 2015 13:19:28 -0400 Subject: METAmarket Whitepaper - The Art of Not Being Governed Message-ID: http://www.notbeinggoverned.com/metamarket-whitepaper/ METAmarket uses two party escrow directly between buyer and seller with no third party. In our system the buyer and vendor agree to a dispersal ratio beforehand using a time-locked multisig bitcoin refund transaction. This, in addition to the federated reputation system, ensures both parties have an economic incentive to complete the transaction without the need for a trusted 3rd party. WW From grarpamp at gmail.com Fri Aug 28 11:14:43 2015 From: grarpamp at gmail.com (grarpamp) Date: Fri, 28 Aug 2015 14:14:43 -0400 Subject: [tor-talk] M.Hearn adds privacy depriority to Bitcoin XT, calls your Tor/Proxy/etc use "unimportant" In-Reply-To: References: Message-ID: On Fri, Aug 28, 2015 at 1:03 PM, Sean Lynch wrote: >> http://lists.linuxfoundation.org/pipermail/bitcoin-dev/2015-August/010379.html >> https://github.com/bitcoinxt/bitcoinxt/commit/73c9efe74c5cc8faea9c2b2c785a2f5b68aa4c23 > you're mischaracterizing it > Please specify how that is "misleading" or "downplaying." No, go read and ask the former link's author from where it was directly quoted to specify. > say so Ok, it's bullshit. Not least of which because Tor's measly 1000 exits are nothing in comparison to genuine "dDoS" by significant actors against Bitcoin, let alone the load from a million normal lusers and their lesser infected PC's, and everyone's tools they're using to interface with BTC. Nor will Tor amount to anything when banks and nation states start to get scared and attack digital currencies. Where's the blocking code for that and their IP ranges? You'll be lucky if users amount to anything there either. And the internet has already characterized Mike's seemingly apparent anti-privacy and corporate modes, but I'll let the net continue to sort that out. Happy now? ;) Tor users are humans too and as such hold the same rights as everyone else. Anyone who thinks otherwise can fuck off. > The feature is very clearly described on the BitcoinXT web site, and you're > mischaracterizing it by saying BitcoinXT downloads the list "for > blacklisting." It is a DoS protection feature that ONLY comes into play > under overload. And yes, BitcoinXT considers Tor connections "less > important" than non-anonymous connections during attacks. You may not agree > that that's a good heuristic, but if that's your problem with it, say so. > From https://bitcoinxt.software/patches.html: > ... > Please specify how that is "misleading" or "downplaying." From grarpamp at gmail.com Fri Aug 28 12:52:59 2015 From: grarpamp at gmail.com (grarpamp) Date: Fri, 28 Aug 2015 15:52:59 -0400 Subject: GCHQ hammers laptops, data resides everywhere Message-ID: https://firstlook.org/theintercept/2015/08/26/way-gchq-obliterated-guardians-laptops-revealed-intended/ In July 2013, GCHQ, Britain’s equivalent of the U.S. National Security Agency, forced journalists at the London headquarters of The Guardian to completely obliterate the memory of the computers on which they kept copies of top-secret documents provided to them by former NSA contractor and whistleblower Edward Snowden. However, in its attempt to destroy information, GCHQ also revealed intriguing details about what it did and why. Two technologists, Mustafa Al-Bassam and Richard Tynan, visited Guardian headquarters last year to examine the remnants of the devices. ... “From a privacy perspective, we need to empower users with knowledge about what their devices do,” From grarpamp at gmail.com Fri Aug 28 12:56:12 2015 From: grarpamp at gmail.com (grarpamp) Date: Fri, 28 Aug 2015 15:56:12 -0400 Subject: Barrett Brown: Reviews Arts and Letters and Prison Message-ID: https://firstlook.org/theintercept/2015/08/24/barrett-brown-santa-muerte-full-of-grace/ The Barrett Brown Review of Arts and Letters and Prison From jdb10987 at yahoo.com Fri Aug 28 09:46:05 2015 From: jdb10987 at yahoo.com (jim bell) Date: Fri, 28 Aug 2015 16:46:05 +0000 (UTC) Subject: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files") In-Reply-To: <55E023E6.2080809@pilobilus.net> References: <55E023E6.2080809@pilobilus.net> Message-ID: <1921523394.2266243.1440780365489.JavaMail.yahoo@mail.yahoo.com> From: Steve Kinney >In terms of real world threats, I think it's safe to say that TOR >"Hidden Services" aren't very well hidden from motivated >adversaries who can deploy global observation and/or global >infiltration attacks: The persistence, fixed physical location and >interactive availability a hidden services makes it a fat, dumb, >happy sitting target for any major State's military and police >intelligence service that takes an interest in identifying the >host and its operators IRL. I have seen references to the idea of giving 'everyone' the option of having their router implement Tor.  And I mention this because I'd like to see more about this idea.  A modern router presumably has plenty of CPU power/memory capacity to do Tor.  And, particularly since we are entering the era of gigabit fiber internet services (for reasonable prices; say $70 per month), there will be an ever-larger number of people who will be in the position to host a relay node.  What's needed is to convince router manufacturers that they "must" transition to Tor-by-default routers.  Wouldn't we like to see a million high-throughput nodes appear?             Jim Bell -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2560 bytes Desc: not available URL: From seanl at literati.org Fri Aug 28 10:03:03 2015 From: seanl at literati.org (Sean Lynch) Date: Fri, 28 Aug 2015 17:03:03 +0000 Subject: [tor-talk] M.Hearn adds privacy depriority to Bitcoin XT, calls your Tor/Proxy/etc use "unimportant" In-Reply-To: References: Message-ID: On Tue, Aug 18, 2015 at 7:07 PM grarpamp wrote: > > http://lists.linuxfoundation.org/pipermail/bitcoin-dev/2015-August/010379.html > > https://github.com/bitcoinxt/bitcoinxt/commit/73c9efe74c5cc8faea9c2b2c785a2f5b68aa4c23 > > Bitcoin XT contains an unmentioned addition which periodically downloads > lists of Tor IP addresses for blacklisting, this has considerable privacy > implications for hapless users which are being prompted to use the > software. The feature is not clearly described, is enabled by default, > and has a switch name which intentionally downplays what it is doing > (disableipprio). Furthermore these claimed anti-DoS measures are > trivially bypassed and so offer absolutely no protection whatsoever. > > The feature is very clearly described on the BitcoinXT web site, and you're mischaracterizing it by saying BitcoinXT downloads the list "for blacklisting." It is a DoS protection feature that ONLY comes into play under overload. And yes, BitcoinXT considers Tor connections "less important" than non-anonymous connections during attacks. You may not agree that that's a good heuristic, but if that's your problem with it, say so. >From https://bitcoinxt.software/patches.html: "Anti-DoS attack improvements, by Mike Hearn. It's currently possible to jam a Bitcoin node by connecting to it repeatedly via different IP addresses, as there is a fixed limit on how many connections a node will accept. Once full, no other peers or wallets can connect to it any more and serving capacity for new nodes and P2P wallets is reduced. If the attack is repeated against every node, the entire network could become jammed. "This patch set introduces code that runs when a node is full and otherwise could not accept new connections. It labels and prioritises connections according to lists of IP ranges: if a high priority IP address connects and the node is full, it will disconnect a lower priority connection to make room. Currently Tor exits are labelled as being lower priority than regular IP addresses, as jamming attacks via Tor have been observed, and most users/merchants don't use it. In normal operation this new code will never run. If someone performs a DoS attack via Tor, then legitimate Tor users will get the existing behaviour of being unable to connect, but mobile and home users will still be able to use the network without disruption." Please specify how that is "misleading" or "downplaying." -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3239 bytes Desc: not available URL: From guninski at guninski.com Fri Aug 28 08:10:49 2015 From: guninski at guninski.com (Georgi Guninski) Date: Fri, 28 Aug 2015 18:10:49 +0300 Subject: UH OH: Windows 10 will share your Wi-Fi key with your friends' friends In-Reply-To: <55DFE029.8050807@pilobilus.net> References: <20150827120641.GB2699@sivokote.iziade.m$> <55DF1FFC.3090008@gmail.com> <55DFCFAF.1080509@riseup.net> <55DFE029.8050807@pilobilus.net> Message-ID: <20150828151049.GA3831@sivokote.iziade.m$> On Fri, Aug 28, 2015 at 12:14:33AM -0400, Steve Kinney wrote: > > The continued dominance of Microsoft products even in professional > and commercial settings, and ongoing efforts to mitigate the > Microsoft spectrum of security failures and violations, They are losing dominance and eventually will kick the bucket. Won't be surprised if there are significantly more smartphones than computers and m$'s share there is negligible AFAICT. When I was much younger thought I would celebrate when m$ kicks the bucket, but now I have serious doubts that the next adversary might be more skilled than the scumbags. > demonstrates one of the most fundamental laws of human behavior: > You can't smarten up a chump. IIRC it was W.C. Fields who > observed, "Trying to smarten up a chump is like trying to teach a > pig to sing, it wastes your time and annoys the pig." > I don't care what OS/smartphone many dumb users use, but your argument applies to politics/voting literally. From wirelesswarrior at safe-mail.net Fri Aug 28 17:49:20 2015 From: wirelesswarrior at safe-mail.net (wirelesswarrior at safe-mail.net) Date: Fri, 28 Aug 2015 20:49:20 -0400 Subject: International Journal of Proof-of-Concept or Get The Fuck Out - June 2015 Message-ID: As exploits sit lonely, FORGOTTEN ON THE SHELF your friendly neighbors at PoC||GTFO proudly present PASTOR MANUL LAPHROAIG'S export-controlled CHURCH NEWSLETTER http://www.sultanik.com/pocorgtfo/pocorgtfo08.pdf See page 10: A Protocol for Leibowitz; or, Booklegging by HF in the Age of Safe Aether by Travis Goodspeed and Muur P. I covered the referenced JT65 protocol, modified for steganographic hiding of data in my Defcon 23 presentation: http://s000.tinyupload.com/?file_id=73132852308922752258 WW From admin at pilobilus.net Fri Aug 28 21:47:00 2015 From: admin at pilobilus.net (Steve Kinney) Date: Sat, 29 Aug 2015 00:47:00 -0400 Subject: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files") In-Reply-To: <1921523394.2266243.1440780365489.JavaMail.yahoo@mail.yahoo.com> References: <55E023E6.2080809@pilobilus.net> <1921523394.2266243.1440780365489.JavaMail.yahoo@mail.yahoo.com> Message-ID: <55E13944.4020109@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 08/28/2015 12:46 PM, jim bell wrote: > *From:* Steve Kinney > >> In terms of real world threats, I think it's safe to say that >> TOR "Hidden Services" aren't very well hidden from motivated >> adversaries who can deploy global observation and/or global >> infiltration attacks: The persistence, fixed physical >> location and interactive availability a hidden services makes >> it a fat, dumb, happy sitting target for any major State's >> military and police intelligence service that takes an >> interest in identifying the host and its operators IRL. > > I have seen references to the idea of giving 'everyone' the > option of having their router implement Tor. And I mention > this because I'd like to see more about this idea. A modern > router presumably has plenty of CPU power/memory capacity to do > Tor. And, particularly since we are entering the era of > gigabit fiber internet services (for reasonable prices; say $70 > per month), there will be an ever-larger number of people who > will be in the position to host a relay node. What's needed is > to convince router manufacturers that they "must" transition to > Tor-by-default routers. Wouldn't we like to see a million > high-throughput nodes appear? Jim Bell To convince router manufacturers that they must transition to TOR-by-default routers is a tall order: That's a big commercial market with a small number of dominant players, inherently aligned with conservative a.k.a. Fascist interests. Global many-to-many communications is correctly perceived as a threat to the political and economic dominance of State and Corporate institutions, formerly assured by central control of mass scale communications for censorship and propaganda purposes. In this context, mass surveillance is an adaptive response that seeks to counter-balance the "liberating" impact of the Internet by enabling early identification and effective manipulation of emergent mass movements and ad hoc leadership cadres. TOR is a weapon; the U.S. State Department funds it to support the destabilizing impact of counter-censorship and counter-surveillance technology on other, more overtly repressive regimes. However, high profile busts of Hidden Service users indicate that TOR is not quite effective enough to defeat U.S. network surveillance assets, at least not where fixed high-value targets are concerned. This is consistent with U.S. policy objectives with regard to the strength of all cryptographic applications. We are told that the TOR Project favors convenience and speed over security, because this is necessary to build a large enough user base to make the system effective. That does not entirely make sense, as favoring security over speed and convenience would make the system effective regardless of the size of its user base. It makes more sense to imagine that the TOR Project would lose its Federal funding and become a target for effective harassment and manipulation by Federal security services, if TOR's security was upgraded to be resistant to U.S. surveillance capabilities. "Everybody knows" that effective resistance to traffic analysis of an encrypted low-latency anonymizing network requires a constant flow of traffic, padded as necessary with dummy packets to maintain a constant through-put when an endpoint is idle. This deprives observers of the ability to match the endpoints of any given session by analyzing the timing and number of packets at entry and exit nodes. But nobody implements effective cover traffic: The reasons given for this deficiency include concerns about bandwidth limitations and processor overhead. 20 years ago these barriers were real, today not so much. I2P users have the option of hosting enough torrents to keep cover traffic unrelated to their other uses of that network going; this is not as effective as padding traffic to maintain a uniform flow, but way better than no cover traffic. TOR actively discourages file sharing, "because" this would cause bandwidth and processor overhead problems. I believe it would be much easier to persuade the TOR Project to implement cover traffic, or to create a next generation TOR network that does, than to persuade router makers to support today's other than best practices TOR network by default. But I'm not sure that this can be done by any project based in a U.S. controlled jurisdiction, as it would be contrary to the National Interest. :o/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJV4TlCAAoJEDZ0Gg87KR0LNSUQAOWwmMPKGFmwH6SbS+P5Ko/i IuzkAa7w72NEnClHi5Nra+loIU4Ursr/+olNbRiqWtwQRoJunLokHqQ5o21XhEBZ bfTt+tYZki+S/vnwC7VwmLzUJj33B36h2Yfvk6ju1YpVXsTLmJmvK8hUVgGhBQQt cfFeW5v0OQrGXnXqchH9MAtrq0IwcNN/R4//6bDii0tm+huf8a8ocIPcjVz5rBFK 4V2wP+SZDprcgyZcW0/dkCzQ4vZucsGpF2lYXhlfLs02xz6DZgoeF5CYwVluHmhu osvgcGh5kRLV6u/18Hr68m/uptDflhsZMKVBwnArDGmwa8enxXmF3/7Me1yByMGb oRYnAcKNsXRNhGdOQFsK80aTeKdnqcjXclHrhCkXFKjw3qCXtTLWoUg90pekJf6l hWS5Bb5M74/8aHvsg5LUoOqTzHQ4MufWVWAHNQc1RejwTglBE4mxLR6YfGGeD9aD B3mI6k7Tuo849ViTMWQOM5CEc9+/qDEnB9TbjhLuXI9matb+oOBXcXXhXv478+g6 SWMnGyRzAg8duIFxAfjULbgc2nQOho07lw9olapSj6VqJMjn73DPik13MlFBVWtQ PNUzT3TaeZFLR8YM3qLTga45ZVXR48txALzfR9Zb+SKB+xxgBnYUf9j6jHNTr3Rc ShSE0/tUBuWCjfDQVSmu =VQPV -----END PGP SIGNATURE----- From wilder at trip.sk Sat Aug 29 13:05:01 2015 From: wilder at trip.sk (Pavol Luptak) Date: Sat, 29 Aug 2015 22:05:01 +0200 Subject: Parallel Polis Congress 2-4.10.2015 in Prague / Central Europe Message-ID: <20150829200501.GA43832@core.nethemba.com> Hello everybody, it would be my pleasure to invite you to cypherpunk conference Parallel Polis Congress 2015 that will take place during 2-4.10.2015 in Prague / Central Europe. Don't hesitate and join this great and unique event (more information below). Last year we had more than 1000 visitors from different countries, see the schedule http://www.paralelnipolis.cz/308/hackers-congress-paralelni-polis-2014-schedule/ Speakers already confirmed for this year - Lyn Ulbricht, Paul Rosenberg, !Mediengruppe Bitnik, Susanne Tarkowski Tempelhof, Julia Tourianski, Smuggler, Frank Braun, Slush, Stef, ..and much more. * Parallel Polis in theory Parallel Polis is a theoretical concept developed by Czech dissident Vaclav Benda (1942–1999) during the height of communist domination in Czechoslovakia in the 1970s. It was translated into English in 1978. Benda argues that in a repressed state, it is impossible to overturn corrupt social, economic and political institutions. Such efforts are futile. Instead, he suggests the creation of new "parallel institutions" that are more responsible to human needs. * Parallel Polis in practice We were impressed by the concept of Vaclav Benda’s Parallel Polis and Timothy C May’s Crypto Anarchistic Manifesto and Cyphernomicon. Embracing the current crypto-technologies we have realized a practical feasibility of these utopian theories and started a unique freedom think tank focused on the promotion of digital freedom, cryptocurrencies, anonymization networks and free markets. For this purpose we decided to rent a big 3-floor house (with almost 1000m2) in the center of Prague (Holešovice) - one floor dedicated to Bitcoin coffee-house, hub and hackerspace called Institute of Cryptoanarchy. :) * Founders of Parallel Polis Parallel polis is 100% state-free project, based on voluntary contributions only of our members and donors. Founding members are people from Czech contemporary-art group Ztohoven (http://ztohoven.com/) and group of cryptoanarchists from Czech and Slovak hackerspaces, see their recent projects Moral Reform (hack of Czech Parliament) http://juraj.bednar.sk/blog/2013/01/06/moral-reform-by-ztohoven-an-ultimate-hack/ and Citizen K ( http://artoftheprank.com/2010/06/19/ztohoven-art-collective-launch-citizen-k-identity-swap/ ) * Parallel Polis Congress and why we need you! Parallel Polis Congress is a 1-birthday party of a new era of our freedom. For such a unique event, we decided to invite all speakers whom we have loved and respected for a long time. * When & Where Parallel Polis Congress takes place in Parallel Polis building (Dělnická 43, Prague) during 2-4.10.2015. If you prefer to take public transport, take the tram number 1, 12, 14, 25, 53 or 54 to the tram station Dělnická. * Stay in touch http://hcpp.cz/ http://www.paralelnipolis.cz https://www.facebook.com/events/111132575904264/ https://twitter.com/Paralelni_polis -- ______________________________________________________________________________ [Parallel Polis - Bitcoin Coffee House, Hub and Cryptoanarchy hackerspace] -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 819 bytes Desc: Digital signature URL: From coderman at gmail.com Sun Aug 30 02:01:33 2015 From: coderman at gmail.com (coderman) Date: Sun, 30 Aug 2015 02:01:33 -0700 Subject: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files") In-Reply-To: <55E13944.4020109@pilobilus.net> References: <55E023E6.2080809@pilobilus.net> <1921523394.2266243.1440780365489.JavaMail.yahoo@mail.yahoo.com> <55E13944.4020109@pilobilus.net> Message-ID: On 8/28/15, Steve Kinney wrote: > ... > "Everybody knows" that effective resistance to traffic analysis of > an encrypted low-latency anonymizing network requires a constant > flow of traffic, padded as necessary with dummy packets to > maintain a constant through-put when an endpoint is idle. This > deprives observers of the ability to match the endpoints of any > given session by analyzing the timing and number of packets at > entry and exit nodes. this is one approach, "zero knowledge" mixes. there are interesting research avenues around low latency traffic analysis resistant techniques. they're more complicated, of course, and in fact it is this complexity to blame rather than any conspiracy. > But nobody implements effective cover traffic: The reasons given > for this deficiency include concerns about bandwidth limitations effective cover traffic for zero knowledge mix is significant. this is because to be effective in a traditional mix produces bandwidth explosion among participants. i challenge you to show an effective mix protocol without this bandwidth explosion that also does not introduce a break in guarantee of anonymity. > and processor overhead. 20 years ago these barriers were real, > today not so much. I2P users have the option of hosting enough > torrents to keep cover traffic unrelated to their other uses of > that network going; wrong. I2P does not provide traffic analysis resistance, nor defense against active attacker. > this is not as effective as padding traffic to > maintain a uniform flow, but way better than no cover traffic. wrong. "way better" way too generous. this is just wrong. part of the problem is that active attacks and traffic analysis are so hugely effective. the defense of "adding some torrents" is misguided wishful thinking. > TOR actively discourages file sharing, "because" this would cause > bandwidth and processor overhead problems. again, more complicated. not just technical but legal. > I believe it would be much easier to persuade the TOR Project to > implement cover traffic, or to create a next generation TOR > network that does, than to persuade router makers to support > today's other than best practices TOR network by default. But I'm > not sure that this can be done by any project based in a U.S. > controlled jurisdiction, as it would be contrary to the National > Interest. Tor research continues. however, solving low latency traffic analysis resistant anonymity is much harder than just "implement cover traffic"! in fact, you need to solve half a dozen hard problems at once, including how to define an appropriate level of cover traffic over selected links. best regards From l at odewijk.nl Sun Aug 30 02:57:40 2015 From: l at odewijk.nl (=?UTF-8?Q?Lodewijk_andr=C3=A9_de_la_porte?=) Date: Sun, 30 Aug 2015 11:57:40 +0200 Subject: UH OH: Windows 10 will share your Wi-Fi key with your friends' friends In-Reply-To: <20150828151049.GA3831@sivokote.iziade.m$> References: <20150827120641.GB2699@sivokote.iziade.m$> <55DF1FFC.3090008@gmail.com> <55DFCFAF.1080509@riseup.net> <55DFE029.8050807@pilobilus.net> <20150828151049.GA3831@sivokote.iziade.m$> Message-ID: 2015-08-28 17:10 GMT+02:00 Georgi Guninski : > On Fri, Aug 28, 2015 at 12:14:33AM -0400, Steve Kinney wrote: > > > > The continued dominance of Microsoft products even in professional > > and commercial settings, and ongoing efforts to mitigate the > > Microsoft spectrum of security failures and violations, > > They are losing dominance and eventually will kick the bucket. > Wouldn't be surprised if they just "re-adjust" to a new market equilibrium. Windows10 easily has the best usability and compatibility. Reliability seems nominal (on par with other OS'es), meaning horrid. Office is still an absolute bestseller. Microsoft is a big player in the console/games business. The .net ecosystem is the most evolved/advanced of all ecosystems - encompassing pretty much all types of programming, platforms, etc. powered by the amazing Visual Studio. They finally rebranded Internet Explorer into Edge, and decided it's also a good time to push the browser old-school style. Bing is offering better and better search results. (Maybe just because Google seems to be getting worse, and definitely less interesting) Windows Phone and that whole mess still has the potential to do what Microsoft always does: slowly but steadily improve to acceptable. People are surprisingly eager for it to work out; many being burned either on expensive Apple hardware with wacky limitations, or glitchy and inconsistent Android devices. Won't be surprised if there are significantly more smartphones > than computers and m$'s share there is negligible AFAICT. > This can change really fast - one or two manufacturers offering Windows Phone can provide significance pretty fast. If the device is right, and the price is low. When I was much younger thought I would celebrate when > m$ kicks the bucket, but now I have serious doubts that > the next adversary might be more skilled than the scumbags. > This is an interesting statement. Certainly Microsoft is "the evil we know". It's evil is the salesmanship that made it huge - and the software not as geeky as we like. > > demonstrates one of the most fundamental laws of human behavior: > > You can't smarten up a chump. IIRC it was W.C. Fields who > > observed, "Trying to smarten up a chump is like trying to teach a > > pig to sing, it wastes your time and annoys the pig." > > > > I don't care what OS/smartphone many dumb users use, but > your argument applies to politics/voting literally. I think most users do not lack the intelligence/capability to understand, merely the desire to. They do not see any need, and do not have the "means to learn". When is the last time a manual told you anything useful? The best kind of education most people employ isn't even articles - it's poorly produced youtube videos. We've lost the "complete broadcast" that TV and newspapers pretty much guaranteed. The mediums we got in return are exceedingly confusing (unclear in intent and purpose) and "narrow" (little bandwidth). I'm still waiting for #nextgen newsreporting. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4219 bytes Desc: not available URL: From l at odewijk.nl Sun Aug 30 02:59:10 2015 From: l at odewijk.nl (=?UTF-8?Q?Lodewijk_andr=C3=A9_de_la_porte?=) Date: Sun, 30 Aug 2015 11:59:10 +0200 Subject: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files") In-Reply-To: References: <55E023E6.2080809@pilobilus.net> <1921523394.2266243.1440780365489.JavaMail.yahoo@mail.yahoo.com> <55E13944.4020109@pilobilus.net> Message-ID: Making all routers do Tor by default is not an economical proposal. Besides, you'd want so many Tor nodes to be easily exploited by The Man? -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 197 bytes Desc: not available URL: From tigrutigru at gmail.com Sun Aug 30 05:36:59 2015 From: tigrutigru at gmail.com (tigrutigru at gmail.com) Date: Sun, 30 Aug 2015 15:36:59 +0300 Subject: Augur: blockchain based internet prediction market In-Reply-To: References: Message-ID: <8E88DBA6-33D8-4FC7-8D99-B60A61532103@gmail.com> Eh, how come it's uses Ethereum chain and money is in btc? Can't be right. > On 26 Aug 2015, at 8:20 am, cypherpunks-request at cpunks.org wrote: > > Subject: Augur: Blockchain-based Internet prediction market. > Message-ID: > <732253587.632877.1440556303234.JavaMail.yahoo at mail.yahoo.com> > Content-Type: text/plain; charset="utf-8" > > http://reason.com/blog/2015/08/11/augur-gambling-prediction-ethereum > > > Augur May Become the Greatest Gambling Platform in History. Is There Anything the Government Can Do to Stop It? > A blockchain-based prediction market that won’t be controlled or managed by anyone. > Jim Epstein Aug. 11, 2015 12:36 pm > > An online gambling platform could do to the neighborhood bookie what electric refrigerators did to the ice delivery man. > Coming this fall, Augur will allow participants to wager money on any future event of their choosing. Software will set the odds, collect the bets, and disperse the winnings. The price alone should give Nevada sportsbook operators pause; an estimated one percent of every pot will go to keep the system running. The average vig today is about 10 times that. > Augur isn't a full-fledged casino. You can't play roulette or poker, and running lotto on the platform would be tricky. But it'll be great for sports betting. > Here’s what’s truly novel about Augur: It won’t be controlled by any person or entity, nor will it operate off of any one computer network. > All the money in the system will be in Bitcoin, ??? May be in Ether? > or other types of peer-to-peer cryptocurrency, so no credit card companies or banks need to be involved. If the system runs afoul of regulators—and if it’s successful, it most certainly will—they'll find that there's no company to sue, no computer hardware to pull out of the wall, and no CEO to lockup in a cage.This is new legal territory. If Augur catches on as a tool for betting on everything from basketball games to stock prices, is there anything the government can do to stop it? > Augur is a decentralized peer-to-peer marketplace, a new kind of entity made possible by recent breakthroughs in computer science. The purpose of these platforms is to facilitate the exchange of goods and services among perfect strangers on a platform that nobody administers or controls. Augur’s software will run on what’s known as a “blockchain"—a concept introduced in 2008 with the invention of Bitcoin—that's essentially a shared database for executing trades that's powered and maintained by its users. > Bitcoin’s blockchain was designed as a banking ledger of sorts—kind of like a distributed Microsoft Excel file—but Augur will utilize a groundbreaking new project called Ethereum How is it possible to put btc on Ethereum chain? And, even weirder, take them out? > that expands on this concept. Ethereum allows Augur's entire system to live on the blockchain. That means the software and processing power that makes Augur function will be distributed among hundreds or thousands of computers. Destroying Augur would involve unplugging the computers of everyone in the world participating in the Ethereum blockchain. > If Augur is destined to become the cypherpunks answer to gambling prohibition—the betting man’s version of the online drug market Silk Road if you will—you'd never know it from talking with its developers. They work for a San Francisco-based nonprofit, attend conferences, have legal representation, and talk openly about what they’re up to with reporters. Augur even commissionedone of those cheesy motion graphics promotional videos favored by new tech startups. > About half of the roughly $600,000 raised by Augur's development team comes from Joe Costello, the successful tech entrepreneur who was once Steve Jobs' top pick to become the CEO of Apple. > Joey Krug, a twenty-year-old Pomona college dropout and Augur's lead developer, never uses the world “gambling" to describe his venture. He and his team of five employees call Augur a “prediction market,” a term that emphasizes the information generated when a bunch of people have a financial incentive to feed their expertise into a sophisticated algorithm. > With Augur, as bettors move money in and out of the pot, the odds adjust. This yields publicly available statistics that should carry weight because they're derived from the opinions of a crowd of people with a stake in the results. InTrade, for example, the best-known prediction market until federal regulators forced it to stop serving U.S. customers in 2012, beat the pollsters and pundits by foreseeing the outcome of the 2008 presidential elections in 48 out of 50 states. > Augur’s developers hope that their platform will make it possible to do a Google search to look up the likelihood of some future event. This could usher in a better world, with more informed policy decisions and less malinvestment. > But Augur also serves the less high-minded—though no less noble—purpose of providing cost savings and convenience to gamblers. Restrictions on gambling serve to protect government revenue at the betting man's expense. State-sanctioned casino operators pay high taxes, and state-run lotteries fleece their customers. But there's no logical or moral case for government restrictions on gambling, since no third party is harmed when consenting adults wager money on the future. Augur actually has the potential to make the world safer by taking away market share in the gambling industry from criminals. > And yet sports betting is illegal in most states, and prediction markets are tightly regulated by the Commodity Futures Trading Commission (CTFC). The agency sued Ireland-based InTrade in 2012 to prevent it from accepting bets from U.S. customers. (The company folded shortly after.) In 2013, the CFTC and the Securities and Exchange Commission (SEC) jointly sued the prediction market Banc de Binary for allowing U.S. customers to make bets on commodity prices. > The CFTC has approved other prediction markets, such as the New Zealand-based PredictIt, but only after it agreed to abide by the agency's restrictions. > Krug says the Augur team is planning to meet with CFTC staff go over how their system works before it’s launched, but says he's not overly concerned. “Our friends in Washington, D.C. say the CFTC will probably just dismiss Augur and say it’s not a big deal,” Krug told me in a phone interview. > That doesn’t sound like much of a legal strategy, but how do you have a legal strategy when you're building something unlike anything that's ever existed? Federal anti-gambling laws, such as the 2006 Unlawful Internet Gambling Enforcement Act, target the companies that facilitate online betting— website operators, credit card companies, banks—not individual gamblers. > Augur’s biggest legal vulnerability is the community of human “reporters” who are needed to settle bets on the platform, says Cardozo Law School's Aaron Wright, who is writing a book about the legal implications of blockchain technology. Let’s say a group of people wager money on Augur over the outcome of a boxing match. Once the bout is over, human participants (who receive a portion of the trading fees as compensation) must report the outcome to the system before Augur’s software will disperse the money to the winners. "There’s at least an argument that the people doing that reporting are aiding or abetting unlicensed options and could be prosecuted," says Wright. > But Augur doesn't collect personal information on any of its users, so identifying these people could be difficult. And Augur is a borderless technology, so U.S. gamblers could simply rely on foreigners to report on the outcomes of their bets. > One attorney I spoke with suggested that the team that’s building Augur could be brought up on charges for aiding and abetting a criminal conspiracy. Nate Cardozo, a staff attorney with the Electronic Frontier Foundation, thinks that's far-fetched but says he can't rule it out. Cardozo emphasizes that writing open source software doesn’t necessarily protect the team from prosecution. > “We’ve taken the steps that we need to take in order to bracket the individual's risk and the organization’s risk,” says Augur’s attorney, Marco Santori, who declined to comment further on exactly what those steps might entail. > Even if Krug and his colleagues were to face criminal prosecution, the technology would live on. After Augur is born into the world, the development team could release a software update that would cripple the system. But in that case, Augur's users could band together to block any changes to the underlying code, or another developer could copy the open source code and simply re-launch the platform. > The big question with Augur—and with blockchain platforms more generally—is whether they can outrun our regulatory state long enough to grow so large and popular that they're truly unstoppable. My money’s on Augur in that race. > For more on the promises and pitfalls of decentralized peer-to-peer marketplaces, read my recentReason magazine feature story on the topic. > -------------- next part -------------- > An HTML attachment was scrubbed... > URL: From guninski at guninski.com Sun Aug 30 08:35:07 2015 From: guninski at guninski.com (Georgi Guninski) Date: Sun, 30 Aug 2015 18:35:07 +0300 Subject: UH OH: Windows 10 will share your Wi-Fi key with your friends' friends In-Reply-To: References: <20150827120641.GB2699@sivokote.iziade.m$> <55DF1FFC.3090008@gmail.com> <55DFCFAF.1080509@riseup.net> <55DFE029.8050807@pilobilus.net> <20150828151049.GA3831@sivokote.iziade.m$> Message-ID: <20150830153507.GA3778@sivokote.iziade.m$> too long verbiage to countertroll it all, but let me address smartphone shares. the bat's shits bought Nokia (or at least significant part of it). according to "the register": http://www.theregister.co.uk/2015/07/27/ballmers_billion_dollar_blunders/ Ballmer's billion-dollar blunders: When he gambled Microsoft's money and lost Nokia is the biggest write-off yet, but it wasn't the first It's worth revisiting this one, because it's a doozy. Microsoft paid $7.1bn to gobble Nokia's former Devices and Services business in April 2014. Less than a year and a half later, it would write down $8.44bn in a single quarter, with almost all of the charges related to the Nokia deal. From grarpamp at gmail.com Mon Aug 31 01:48:49 2015 From: grarpamp at gmail.com (grarpamp) Date: Mon, 31 Aug 2015 04:48:49 -0400 Subject: Parallel Polis Congress 2-4.10.2015 in Prague / Central Europe In-Reply-To: <846815489.3155808.1441001677955.JavaMail.yahoo@mail.yahoo.com> References: <20150829200501.GA43832@core.nethemba.com> <846815489.3155808.1441001677955.JavaMail.yahoo@mail.yahoo.com> Message-ID: On Mon, Aug 31, 2015 at 2:14 AM, jim bell wrote: > Congress. Does anyone know any reason that I should not do so? It could be a way to tell if you've earned the highly coveted "no fly" or "designee" status ;) Remember kids, don't travel with any data you're not prepared to share with the world, or your favorite government[s], or to be broken down mentally, physically or otherwise until you reveal it. From jdb10987 at yahoo.com Sun Aug 30 23:14:37 2015 From: jdb10987 at yahoo.com (jim bell) Date: Mon, 31 Aug 2015 06:14:37 +0000 (UTC) Subject: Parallel Polis Congress 2-4.10.2015 in Prague / Central Europe In-Reply-To: <20150829200501.GA43832@core.nethemba.com> References: <20150829200501.GA43832@core.nethemba.com> Message-ID: <846815489.3155808.1441001677955.JavaMail.yahoo@mail.yahoo.com> This organization, Parallel Polis, is inviting me to come and speak at their Congress.  Does anyone know any reason that I should not do so?             Jim Bell From: Pavol Luptak To: cypherpunks at cpunks.org Sent: Saturday, August 29, 2015 1:05 PM Subject: Parallel Polis Congress 2-4.10.2015 in Prague / Central Europe Hello everybody, it would be my pleasure to invite you to cypherpunk conference Parallel Polis Congress 2015 that will take place during 2-4.10.2015 in Prague / Central Europe. Don't hesitate and join this great and unique event (more information below). Last year we had more than 1000 visitors from different countries, see the schedule http://www.paralelnipolis.cz/308/hackers-congress-paralelni-polis-2014-schedule/ Speakers already confirmed for this year - Lyn Ulbricht, Paul Rosenberg, !Mediengruppe Bitnik, Susanne Tarkowski Tempelhof, Julia Tourianski, Smuggler, Frank Braun, Slush, Stef, ..and much more. * Parallel Polis in theory Parallel Polis is a theoretical concept developed by Czech dissident Vaclav Benda (1942–1999) during the height of communist domination in Czechoslovakia in the 1970s. It was translated into English in 1978. Benda argues that in a repressed state, it is impossible to overturn corrupt social, economic and political institutions. Such efforts are futile. Instead, he suggests the creation of new "parallel institutions" that are more responsible to human needs. * Parallel Polis in practice We were impressed by the concept of Vaclav Benda’s Parallel Polis and Timothy C May’s Crypto Anarchistic Manifesto and Cyphernomicon. Embracing the current crypto-technologies we have realized a practical feasibility of these utopian theories and started a unique freedom think tank focused on the promotion of digital freedom, cryptocurrencies, anonymization networks and free markets. For this purpose we decided to rent a big 3-floor house (with almost 1000m2) in the center of Prague (Holešovice) - one floor dedicated to Bitcoin coffee-house, hub and hackerspace called Institute of Cryptoanarchy. :) * Founders of Parallel Polis Parallel polis is 100% state-free project, based on voluntary contributions only of our members and donors. Founding members are people from Czech contemporary-art group Ztohoven (http://ztohoven.com/) and group of cryptoanarchists from Czech and Slovak hackerspaces, see their recent projects Moral Reform (hack of Czech Parliament) http://juraj.bednar.sk/blog/2013/01/06/moral-reform-by-ztohoven-an-ultimate-hack/ and Citizen K ( http://artoftheprank.com/2010/06/19/ztohoven-art-collective-launch-citizen-k-identity-swap/ ) * Parallel Polis Congress and why we need you! Parallel Polis Congress is a 1-birthday party of a new era of our freedom. For such a unique event, we decided to invite all speakers whom we have loved and respected for a long time. * When & Where Parallel Polis Congress takes place in Parallel Polis building (Dělnická 43, Prague) during 2-4.10.2015. If you prefer to take public transport, take the tram number 1, 12, 14, 25, 53 or 54 to the tram station Dělnická. * Stay in touch http://hcpp.cz/ http://www.paralelnipolis.cz https://www.facebook.com/events/111132575904264/ https://twitter.com/Paralelni_polis -- ______________________________________________________________________________ [Parallel Polis - Bitcoin Coffee House, Hub and Cryptoanarchy hackerspace] -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5540 bytes Desc: not available URL: From carimachet at gmail.com Sun Aug 30 20:43:30 2015 From: carimachet at gmail.com (Cari Machet) Date: Mon, 31 Aug 2015 06:43:30 +0300 Subject: PROBLEM: Speech that Enables Speech: China Takes Aim at Its Coders Message-ID: AUGUST 28, 2015 | BY DANNY O'BRIEN Speech that Enables Speech: China Takes Aim at Its Coders The maintainer of GoAgent, one of China's more popular censorship circumvention tools emptied out the project's main source code repositories on Tuesday. Phus Lu, the developer, renamed the repository’s description to “Everything that has a beginning has an end”. Phus Lu’s Twitter account's historywas also deleted, except for a single tweet that linked to a Chinese translation of Alexander Solzhenitsyn’s “Live Not By Lies” . That essay was originally published in 1974 on the day of the Russian dissident’s arrest for treason. We can guess what caused Phus Lu to erase over four years’ work on an extremely popular program from the brief comments of another Chinese anti-censorship programmer, Clowwindy. Clowwindy was the chief developer of ShadowSocks, another tool that circumvented the Great Firewall of China by creating an encrypted tunnel between a simple server and a portable client. Clowwindy also deleted his or her Github repositories last week. In a comment on the now empty Github archive Clowwindy wrote in English : Two days ago the police came to me and wanted me to stop working on this. Today they asked me to delete all the code from Github. I have no choice but to obey. https://www.eff.org/deeplinks/2015/08/speech-enables-speech-china-takes-aim-its-coders The author deleted that comment too shortly afterwards. Github, the host for both repositories, reported a DDoS attack on the days between these two incidents. While Github has not commented on the source of the current attack, the evidence strongly suggests that a previous DDoS against Github in March was conducted by the Chinese government to pressure the company to remove the repositories of two other anti-censorship programs. The Chinese government’s control of the Internet passes through regular waves of enhanced repression, often tied to a significant political event or protest. Many commentators have connected a current wave of media and Internet crackdowns to a forthcoming military parade commemorating World War II in Beijing on September 3. But even as a peak moment in a temporary spate of repression, the intimidation of GoAgent and ShadowSock’s creators represents a continuing escalation by the authorities against technologists. Chinese law has long forbidden the selling of telecommunication services that bypass the Great Firewall of China, as well as the creation or distribution of “harmful information”. Until recently, however, the authorities have not targeted the authors of non-commercial circumvention software, nor its users. Human Rights in China , a Chinese rights advocacy and research organization, told EFF that, based on its preliminary review, VPNs and circumvention software is not specifically prohibited under Chinese law. While the state interferes with people's ability to use such software, it has not outlawed the software itself. In November, Phus Lu wrote a public declaration to clarify this p oint. In the statement, he stated that he has received no money to develop GoAgent, provided no circumvention service, nor asserted any political view. Phus Lu’s caution at that time was prompted by the police questioning of another technologist, Xu Dong, a supporter of the Hong Kong opposition Umbrella Movement who was detained in the same month for “picking quarrels and creating disturbances” . According to the Washington-based blog China Change, Xu Dong, who goes by the nym Onionhacker online, had also been working on censorship circumvention code. During his detention he was told by the police that he had committed “crimes of developing software to help Chinese Internet users scale the Great Fire Wall of China.” Even if it's unclear what law Xu Dong had broken, if any, in November, the legal and political climate has grown even more aggressively anti-Internet since then. A new National Security Law came into effect on July 1 , which provides the authorities with a wide remit to oversee “internet information technology produces and services” that impact national security (Art. 59), as well as maintain “network sovereignty” (Art. 25). It seems that is already being interpreted to include the creators of circumvention software. A sweeping bill on cyber-security is also in the works. The targeting of software developers by China is a new and worrying trend, but one that we’re seeing occur around the world. Authorities everywhere are realising that one way to sabotage free expression is to intimidate those who build the tools that enable that speech. Technologists like Phus Lu, Clowwindy and Xu Dong are now facing the same political scrutiny and intimidation in authoritarian regimes as independent writers, publishers, poets or journalists did in Solzhenitsyn’s time. Code is speech : and using police intimidation to compel these creators to delete their code repositories is as serious a violation of human rights law as compelling a writer to burn his or her own books. It’s also as ultimately futile: while the Chinese authorities have chosen to target and disrupt two centralised stores of code, thousand of forked copies of the same software exist—both on other accounts on Github and in private copies around the Net. ShadowSocks and GoAgent represent hours of creative work for their authors, but the principle behind them is reproducible by many other coders. The Great Firewall may be growing more sophisticated in detecting and blocking new circumvention systems, but even as it does so, so new code blossoms. Meanwhile the intimidation of programmers remains a violation of the human rights of the coder—and a blow to the rights of everyone who relies on their creativity to exercise their own rights. .O. ..O OOO -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 20792 bytes Desc: not available URL: From oshwm at openmailbox.org Mon Aug 31 02:49:31 2015 From: oshwm at openmailbox.org (oshwm) Date: Mon, 31 Aug 2015 10:49:31 +0100 Subject: Parallel Polis Congress 2-4.10.2015 in Prague / Central Europe In-Reply-To: References: <20150829200501.GA43832@core.nethemba.com> <846815489.3155808.1441001677955.JavaMail.yahoo@mail.yahoo.com> Message-ID: <7C812F56-64C3-4CBC-8C09-C67657D8BFE4@openmailbox.org> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 always send your data to foreign countries via internet airways :D On 31 August 2015 09:48:49 BST, grarpamp wrote: >On Mon, Aug 31, 2015 at 2:14 AM, jim bell wrote: >> Congress. Does anyone know any reason that I should not do so? > >It could be a way to tell if you've earned the highly coveted >"no fly" or "designee" status ;) > >Remember kids, don't travel with any data you're not prepared >to share with the world, or your favorite government[s], or to be >broken down mentally, physically or otherwise until you reveal it. -----BEGIN PGP SIGNATURE----- Version: APG v1.1.1 iQI7BAEBCgAlBQJV5CMqHhxvc2h3bSA8b3Nod21Ab3Blbm1haWxib3gub3JnPgAK CRAqeAcYSpG1iNeVD/sGp+0CwIrZ431QPJdrRk2wxTOQRQchbcVHG73VUMZ1dWxT M5Fgb4t0/4Ah40B0I7dh1muKpzuDM4SgrwFefB7Z9wmkV5J4sblGe1ZlGl+X19r0 JOtGn4qkg0Ksb57BNpQokWnAGw4DWceT1XwE4Gn8r8txcgc20pTRhNDalu5ttdpq aHloTeuch46w2MONgJ3SRBSAYWLz8hiQHHlVPX/hGEdpAN8oqiRlTTpQEMx2TRtC gZji0Drj5q1XBgeMAEb7F17Z5YsrwcNIJFr/wJlwMzKvH3g5crWgX0Gn108yTs4Y qPQe8iWaqt0cJ6j9wQSF5jY6AN8Ltvx6TKJp2Y09q0I3dJ9yNTEUrJS4Xp7/m82K b5rSsLrFRPCFNHcWohxlDc9sOxNEFZhf3lt4+4FeRXUjIUr4VJY20rghbXGrDNms 1WYMBI2a84FDWgp6h1c0AZ+GohObXmJnvQU1WftvzrfrlbAqLFrL0hDjtquN5+Xj u6zy7hsHc9sBoZ7s9VOA52WLGW6fX/6vZQnkT4G0+EFU/zSt2Up7sUN16n2OvaIW MXl9iKh/AWDpmlsOx1iegm5mAYA54W0zURT5SnVXIlvNhNYuoWtjFd4WrcOMCDiV 1wZ3/doI0AaNgQIjqlWfH/OotCX74y+h9tASHmIiAYc7NUQqkAJPnXwKF2qyYQ== =Rs07 -----END PGP SIGNATURE----- From wilder at trip.sk Mon Aug 31 03:09:59 2015 From: wilder at trip.sk (Pavol Luptak) Date: Mon, 31 Aug 2015 12:09:59 +0200 Subject: Parallel Polis Congress 2-4.10.2015 in Prague / Central Europe In-Reply-To: <20150829200501.GA43832@core.nethemba.com> References: <20150829200501.GA43832@core.nethemba.com> Message-ID: <20150831100959.GA62262@core.nethemba.com> See http://hcpp.cz/eng/ On Sat, Aug 29, 2015 at 10:05:01PM +0200, Pavol Luptak wrote: > Hello everybody, > it would be my pleasure to invite you to cypherpunk conference Parallel Polis > Congress 2015 that will take place during 2-4.10.2015 in Prague / Central > Europe. > > Don't hesitate and join this great and unique event (more information below). > > Last year we had more than 1000 visitors from different countries, see the > schedule > http://www.paralelnipolis.cz/308/hackers-congress-paralelni-polis-2014-schedule/ > > Speakers already confirmed for this year - Lyn Ulbricht, Paul Rosenberg, > !Mediengruppe Bitnik, Susanne Tarkowski Tempelhof, Julia Tourianski, > Smuggler, Frank Braun, Slush, Stef, ..and much more. > > * Parallel Polis in theory > > Parallel Polis is a theoretical concept developed by Czech dissident Vaclav > Benda (1942–1999) during the height of communist domination in Czechoslovakia > in the 1970s. It was translated into English in 1978. > Benda argues that in a repressed state, it is impossible to overturn corrupt > social, economic and political institutions. Such efforts are futile. > Instead, he suggests the creation of new "parallel institutions" that are more > responsible to human needs. > > * Parallel Polis in practice > > We were impressed by the concept of Vaclav Benda’s Parallel Polis and > Timothy C May’s Crypto Anarchistic Manifesto and Cyphernomicon. > > Embracing the current crypto-technologies we have realized a practical > feasibility of these utopian theories and started a unique freedom think tank > focused on the promotion of digital freedom, cryptocurrencies, anonymization > networks and free markets. > > For this purpose we decided to rent a big 3-floor house (with almost 1000m2) > in the center of Prague (Holešovice) - one floor dedicated to Bitcoin > coffee-house, hub and hackerspace called Institute of Cryptoanarchy. :) > > * Founders of Parallel Polis > > Parallel polis is 100% state-free project, based on voluntary contributions > only of our members and donors. > Founding members are people from Czech contemporary-art group Ztohoven > (http://ztohoven.com/) and group of cryptoanarchists from Czech and Slovak > hackerspaces, see their recent projects Moral Reform (hack of Czech > Parliament) http://juraj.bednar.sk/blog/2013/01/06/moral-reform-by-ztohoven-an-ultimate-hack/ and Citizen K ( http://artoftheprank.com/2010/06/19/ztohoven-art-collective-launch-citizen-k-identity-swap/ ) > > * Parallel Polis Congress and why we need you! > > Parallel Polis Congress is a 1-birthday party of a new era of our freedom. > For such a unique event, we decided to invite all speakers whom we have loved > and respected for a long time. > > * When & Where > > Parallel Polis Congress takes place in Parallel Polis building (Dělnická 43, > Prague) during 2-4.10.2015. > If you prefer to take public transport, take the tram number 1, 12, 14, 25, 53 > or 54 to the tram station Dělnická. > > * Stay in touch > > http://hcpp.cz/ > http://www.paralelnipolis.cz > https://www.facebook.com/events/111132575904264/ > https://twitter.com/Paralelni_polis > -- > ______________________________________________________________________________ > [Parallel Polis - Bitcoin Coffee House, Hub and Cryptoanarchy hackerspace] -- _______________________________________________________________ [wilder at trip.sk] [https://keybase.io/pavolluptak] [talker: ttt.sk 5678] -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 819 bytes Desc: Digital signature URL: From blibbet at gmail.com Mon Aug 31 13:22:58 2015 From: blibbet at gmail.com (Blibbet) Date: Mon, 31 Aug 2015 13:22:58 -0700 Subject: Linux Foundation' Linux workstation security checklist In-Reply-To: <20150831111344.GA2558@sivokote.iziade.m$> References: <20150831111344.GA2558@sivokote.iziade.m$> Message-ID: <55E4B7A2.1090907@gmail.com> On 08/31/2015 04:13 AM, Georgi Guninski wrote: > The document appears to be: > https://github.com/lfit/itpol/blob/master/linux-workstation-security.md > Linux workstation security checklist Since the Linux Foundation advise is recommending UEFI and Secure Boot and TPMs, I think they should also recommend running Intel CHIPSEC -- directly or via LUV-live -- for firmware vulnerability analysis, at least on the Intel systems (AMD has no CHIPSEC port). If system was designed vulnerable by vendor, there's little point in bothering with Secure Boot or any OS-level hardening.... https://01.org/linux-uefi-validation/downloads/luv-live-image https://github.com/chipsec/chipsec Guidance should probably enable Verified Boot when running Chrome, perhaps the Verified U-Boot and other secure coreboot/U-Boot implementations. The advise should also mention something about each distro's Secure Boot varies in strength, some allow unsigned kernel drivers to be loaded even if Secure Boot is enabled. http://firmwaresecurity.com/2015/07/17/secure-boot-strength-varies-by-linux-implementation/ It should mention virtual firmware security (inside VirtualBox, QEMU, etc), especially after last BlackHat talk: http://firmwaresecurity.com/2015/08/08/689/ There's more to do, taking snapshots of rom, scanning for changes, tracking vendor firmware updates, ensuring system has fresh firmware bits, etc. But it's a nice start. > Troll-friendly appears this claim: > UEFI boot mode is used (not legacy BIOS) (CRITICAL) > UEFI and SecureBoot > > (ask RMS ;-) ) AFAIK, RMS uses an IBM Thinkpad retrofitted with LibreBoot (presumably using SeaBIOS BIOS clone). https://stallman.org/stallman-computing.html I don't think RMS is responsible for LF's IT security policies. :-) If someone has one of these old Thinkpads boxes (sold by "Ministry of Freedom" (formerly trading as Gluglug), please try to run CHIPSEC on it; if it runs, run chipsec_main.py to see if it passes the security tess. I don't expect CHIPSEC will recognize the ancient Intel chipset used by the old IBM Thinkpad. It'd probably take someone to update CHIPSEC to add system data for this old chipsec, in order to make it work. Perhaps Ministry of Freedom has a vested interest? :-) Potential insecurely-built IBM system firmware security aside, I don't think Libreboot nor SeaBIOS offers much in terms of security to stop attackers, as well. U-Boot and coreboot both have PKI-enabled boot flavors that're vaguely like UEFI's Secure Boot, which Ministry of Freedom could be using, to help secure their modern customers. From guninski at guninski.com Mon Aug 31 04:13:44 2015 From: guninski at guninski.com (Georgi Guninski) Date: Mon, 31 Aug 2015 14:13:44 +0300 Subject: Linux Foundation' Linux workstation security checklist Message-ID: <20150831111344.GA2558@sivokote.iziade.m$> >From the reg: http://www.theregister.co.uk/2015/08/31/harden_like_linux_foundation/ with journo title: Linux Foundation releases PARANOID internal infosec guide The document appears to be: https://github.com/lfit/itpol/blob/master/linux-workstation-security.md Linux workstation security checklist Troll-friendly appears this claim: UEFI boot mode is used (not legacy BIOS) (CRITICAL) UEFI and SecureBoot (ask RMS ;-) ) From odinn.cyberguerrilla at riseup.net Mon Aug 31 10:43:07 2015 From: odinn.cyberguerrilla at riseup.net (odinn) Date: Mon, 31 Aug 2015 17:43:07 +0000 Subject: Linux Foundation' Linux workstation security checklist In-Reply-To: <20150831111344.GA2558@sivokote.iziade.m$> References: <20150831111344.GA2558@sivokote.iziade.m$> Message-ID: <55E4922B.8030603@riseup.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Hello, Upon reading this post "Linux Foundation' Linux workstation security checklist" a little thing went "bing!" in my brain and I remembered something. I went and looked it up and it was still there. Here it is, hopefully relevant / helpful to the discussion (what I found helpful as the basics on Ubuntu / Linux security): https://ubuntuforums.org/showthread.php?t=510812 Georgi Guninski: >> From the reg: > http://www.theregister.co.uk/2015/08/31/harden_like_linux_foundation/ > > with journo title: Linux Foundation releases PARANOID internal infosec > guide > > The document appears to be: > https://github.com/lfit/itpol/blob/master/linux-workstation-security.m d > > Linux workstation security checklist > > Troll-friendly appears this claim: UEFI boot mode is used (not > legacy BIOS) (CRITICAL) UEFI and SecureBoot > > (ask RMS ;-) ) > > - -- http://abis.io ~ "a protocol concept to enable decentralization and expansion of a giving economy, and a new social good" https://keybase.io/odinn -----BEGIN PGP SIGNATURE----- iQEcBAEBCgAGBQJV5JIqAAoJEGxwq/inSG8CLXIH/0IL7WRrsl3ionQDlbj6iE8K +4xPZQuWWjkPdgLWk/wyW0hsO8PQasiyhP9xxqxlSVwbeswC0CfJT2tqbAO2GYga 4UtGVi69kSuQYZ9h7WD6ai29XdLid1vBzY9lIrT5RSFhB3F647TQeEej4RoYJzcn ZRQ+ItX3ooh9s+rhKKGIQv2laU0PBfK+o6pwbuNiIQSqVEAjTgMdwhEBDxlBizQn bsX0XZmGLtSr7iLYtRIHjaCIzzDAgGVtWci2VQypy6ejoieDE/D3vDDVKAadgQ2N CBJ1aor+FuMzJubvAyh4JrW5YeZSMcma5EgFd55vi5TQFSweId6kLSf1dP7Uu58= =RZ73 -----END PGP SIGNATURE----- From jdb10987 at yahoo.com Mon Aug 31 11:11:10 2015 From: jdb10987 at yahoo.com (jim bell) Date: Mon, 31 Aug 2015 18:11:10 +0000 (UTC) Subject: Parallel Polis Congress 2-4.10.2015 in Prague / Central Europe In-Reply-To: References: Message-ID: <1089487246.3485553.1441044670924.JavaMail.yahoo@mail.yahoo.com> From: grarpamp On Mon, Aug 31, 2015 at 2:14 AM, jim bell wrote: >> Congress.  Does anyone know any reason that I should not do so? >It could be a way to tell if you've earned the highly coveted >"no fly" or "designee" status ;) Apparently not.  Since March 2012, when I was released from FCI Sheridan, Oregon, I have taken four plane flights, each without any incident or apparent delay.  I have also taken a couple of Amtrak trips, and similarly there was no incidents involved.          Jim Bell -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2044 bytes Desc: not available URL: From coderman at gmail.com Mon Aug 31 19:33:24 2015 From: coderman at gmail.com (coderman) Date: Mon, 31 Aug 2015 19:33:24 -0700 Subject: Linux Foundation' Linux workstation security checklist In-Reply-To: <55E4B7A2.1090907@gmail.com> References: <20150831111344.GA2558@sivokote.iziade.m$> <55E4B7A2.1090907@gmail.com> Message-ID: On 8/31/15, Blibbet wrote: >... > If someone has one of these old Thinkpads boxes (sold by "Ministry of > Freedom" (formerly trading as Gluglug), please try to run CHIPSEC on it; does not run; not needed. > Potential insecurely-built IBM system firmware security aside, I don't > think Libreboot nor SeaBIOS offers much in terms of security to stop > attackers, as well. building your own BIOS images, signing your own bootstraps, is "not offer much"? you're wrong and these are incredibly useful security measures. of course by no means sufficient by themselves, and you must always keep your laptops/devices safe with you, lest they be implanted by trivial means with physical access. best regards, From grarpamp at gmail.com Mon Aug 31 22:41:09 2015 From: grarpamp at gmail.com (grarpamp) Date: Tue, 1 Sep 2015 01:41:09 -0400 Subject: [tor-talk] hardware recommendations In-Reply-To: References: <55E17366.1050205@openmailbox.org> Message-ID: On Sun, Aug 30, 2015 at 5:49 PM, Jacob Appelbaum wrote: > Intel has AMT and opaque microcode updates, other CPU vendors have > similar fun hardware features. > > Further reading regarding AMT from the FSF: > > https://www.fsf.org/blogs/community/active-management-technology Some Intel docs indicate that remote AMT requires their "LM" series lan controllers. The Intel programming guides and block diagrams indicate an ability to update (and perhaps by that to zero) the AMT and related firmware. Their general CPU microcode is signed. Didn't read far enough yet to tell the full scope of what is in their programming guides in these areas.