´ò¹ú¼Ê³¤Í¾Ã¿·ÖÖÓÖ»Ðè3ëǮ

2001-09-19 Thread ´ò¹ú¼Ê³¤Í¾Ã¿·ÖÖÓÖ»Ðè3ëǮ
Title: ÎÞ±êÌâÎĵµ





   
 
  ¹ú¼Ê³¤»°ËæÉíͨ"KOMODO"

  


   
 
  
   ´ÙÏú»î¶¯¼Û1258Ôª.
´úÀí¼ÛÃæÒé
  ÏêϸÇë·ÃÎÊÎÒÃǵÄÍøÕ¾ 
http://www.kk98.com 
  
  
 
  
 
   

   
   
 
  
 
   
KOMODO¼ò½é
  

  
  
 
  KomodoÊÇÒ»¸öСÇɵÄÅä¼þ£¬ÓÃÀ´×ª»»Ò»°ãÆÕͨµÄµç»°³ÉÎªÍøÂçµç»°¡£ÀûÓÃÃâ·ÑµÄÍøÂç×ÊÔ´£¬Ìṩ¸ßÆ·ÖÊ¡¢ÇåÎú¡¢×ÔÈ»µÄÒôÖÊ¡£ÎÒÃÇÓëÊÀ½çÉÏ×î´óµÄÍøÂç·þÎñ¹©Ó¦ÉÌNet2PhoneºÏ×÷£¬×÷Ó÷ÑÂÊÔ¶µÍÓÚÊÀ½çÉÏÆäËüµÄµçÐÅ·þÎñ¹©Ó¦ÉÌ£¬ÉõÖÁÔÚË«»úģʽÏ£¬ÄܽÚÊ¡½«½ü99.6%µÄͨ»°·Ñ¡£

  
  http://www.kk98.com
  

  
   

  
   
KomodoÖ®²úÆ·¸½¼þ 
  
  Komodoһ̨
  ÖÐÎÄʹÓÃÊÖ²á
  
  µç»°ÏßÒ»Ìõ
  12·üÌØ½»Á÷µçԴת»»Æ÷ 
  
  
  ÂòKomodoת»»Æ÷´ò¹ú¼Ê³¤Í¾Ö»ÐèÊл°·ÑÄ㻹ÓÌÔ¥Â𣿠
  
  
  

  
  
 
   
ÉϺ£ÊÐÇøÃâ·ÑËÍ»õ°²×°¼°Î¬»¤

   
 
  ͬʱ½ÓÊÜÍâµØ¶©¹º
[EMAIL PROTECTED]
³Ï Õ÷ ´ú Àí 


  


  
   
¶¨»õµç»° £º13041655679
  021-54800674 
  021-64809047
  Áª ϵ ÈË £ºÖì ÏÈ Éú
  ÉϺ£ÎÄÃÀÉÌÎñÐÅÏ¢·þÎñÓÐÏÞ¹«Ë¾



  
  ÍâµØ¿ÉÒÔÓʹº£ºÉϺ£ÊÐä·1508Ū91ºÅ501 Óʱࣺ201101    

  


   
   
 
  ¹ú¼Ê³¤»°ËæÉíͨ"KOMODOÌØµã

  
   
 
  

  1¡¢µ¥¼ü¼òÒײÙ×÷£º
Ö»ÐèÒ»¸ö°´Å¤Äú±ã¿ÉÒÔ°ÑÒ»°ãµç»°Á¬ÉÏÍø¼ÊÍøÂ·£¬´òÍø¼ÊÍøÂçµç»°£¬ÍêÈ«²»ÓõçÄÔ£¬ÒÔ³¬µÍ·ÑÂʲ¦´òÊÀ½ç320¸öÒÔÉϵØÇø

  
  

  2¡¢Ò»¿¨¶àÄÜ£¬°²È«¿É¿¿£º
ËæÉíͨ²ÉÓõÄÊǹú¼ÊÉÏÖªÃû¶È×î¸ß£¬Õ¼ÓÐÂÊ×î´óµÄÃÀ¹únet2phone¹«Ë¾µÄÍøÂçµç»°Õʺš£ÀûÓÃKOMODO½Óµ½µç»°»úÉϼ´¿ÉÖ±½Ó²¦´òÊÀ½çÉÏÈκÎһ̨µç»°£¬¶ø·ÑÓÃÊÇ´«Í³·½Ê½µÄÊ®·ÖÖ®Ò»£¡ÁíÍâKOMODOÕʺݹÓÐÒÔÏÂ×÷Ó㺣¨1£©Ö§³ÖÔÚµçÄÔÉÏʹÓã¬ÊµÏÖµçÄÔµ½µç»°µÄ¹ú¼Ê³¤Í¾¹¦ÄÜ£¬·ÑÂÊͬÔÚËæÉíͨÉÏʹÓÃÒ»Ö¡££¨2£©Í¬Ê±Ö§³ÖµçÄÔµ½´«ÕæµÄ¹ú¼Ê´«ÕæÒµÎñ¡£


   3¡¢ÒôÖÊÇåÎú£º
ƾ½è5Ïî¹ú¼Ê¶¥¼â¼¼Êõ£¨½ü¶Ë»ØÉùÄâÖÆ¼¼ÊõNEAR END EC£¬IP¸ßËÙ´ò°ü¼¼Êõ£¬DSP¼¼ÊõµÈ£©ÆäÒôÖʿɴﵽÁªÍ¨£¬¼ªÍ¨µÈIPµç»°µÄͨ»°Ð§¹û£¬²¢Ô¶Ô¶ºÃÓÚͬÀà²úÆ·£¬ÈçInfotalk¡¢Ipstar 
µÈ¡£ÎÒÃÇÈȳϵػ¶Ó­Äúµ½ÎÒ¹«Ë¾Ç×Éí¸ÐÊÜÒ»ÏÂͨ»°ÖÊÁ¿¡£ 


  4¡¢ÉèÖüòµ¥£º
ÖÐÎÄÓïÒôÌáʾ£¬ÇáËÉÍê³ÉISPÉÏÍøÕʺš¢NET2PHONEÍøÂçµç»°ÕʺŵÄÉèÖá£ËæÂôËæÍ¨¡£


  5¡¢ÖÇ»ÛÐÍÓïÒôϵͳ£º
Ìṩ¶à¹úÓïÑÔÓïÒôĿ¼£¬Äú¿ÉÒÔÇáËɵذ´ÕÕÓïÒôָʾ£¬Ò»²½Ò»²½µÄʹÓÃKomodo£¬ ÍêȫûÓÐÓïÑÔÕϰ­¡£ £¨Í¬Ê±ÌṩӢÎÄ¡¢º«ÎÄ¡¢µÂÎÄ¡¢Î÷°àÑÀÎÄÌáʾ£©


  6¡¢²Ù×÷¼ò±ã£º
Ö±½Ó²¦´ò¹ú¼ÊÍøÂ糤»°¡£Ö»Ðè°´Ò»¸öK¼ü£¬¼´¿É½«ÄúµÄÆÕͨ»°»úÁ¬ÉÏÍøÂç¡£


  7¡¢½ÓͨÂʸߣº
ÃÀ¹únet2phone¹«Ë¾Ìá¹©ÍøÂçÔËÐÐϵͳ£¬20Ãë×óÓÒ½Óͨ×îÖյ绰£¬½ÓͨÂʿɴﵽ100%¡£


  8¡¢¹©»°»°·ÑÇåµ¥£º
ÎÒÃǿɰ´ÄúµÄÒªÇó£¬ËæÊ±ÎªÄúÌṩÏêϸ£¬Ã÷È·µÄͨ»°Çåµ¥¡£È·±£ÄúµÄÈ¨Òæ


  9¡¢Ãâ·Ñ¹¦ÄÜÉý¼¶£º
ϵͳÈí¼þԤװÔڿɱà³ÌоƬÖУ¬Í¨¹ýÉÏÍø£¬°´¼¸¸ö¼ü±ã¿ÉÍê³ÉÉý¼¶¹¤×÷¡£Í¬Ê±ÎÒÃÇÌṩΪÆÚÒ»ÄêµÄÃâ·Ñ±£ÐÞ·þÎñ¡£


  10¡¢»°·ÑµÍÁ®£º
ÊÇ"¹ú¼Ê³¤»°ÍøÂçͨ"×îÍ»³öÌØµã£¬Ô¶µÍÓÚIPµç»°4.8ÔªÈËÃñ±Ò/·ÖÖÓ.ͬʱ±ÈÆäËûͬÀà²úÆ·ÈçIPST*£¬INFOTAL*£¬Ò×*µÈµÄ·ÑÂʵͺܶࡣÈçµ¥»úʹÓã¬ÐèÒªÖ§¸¶µÄ½öΪͨ»°·ÑºÍÉÏÍø·Ñ¡£Èç¹ûË«»ú¶Ô´ò£¬Ôò²»¼Æ³¤»°·Ñ£¬½öÐèÖ§¸¶ÉÏÍø·Ñ£¨0.09ÔªÈËÃñ±Ò/·ÖÖÓ£©¼´¿É¡£

  
  http://www.kk98.com


   
   
    

  
   




<[EMAIL PROTECTED]%>  


Re: kuro5hin.org || Combating Terrorism Act of 2001 - Analyzed

2001-09-19 Thread Jim Choate


On Wed, 19 Sep 2001, Declan McCullagh wrote:

> Relying on kuro5hin for political and legislative analysis is like relying
> on the broadcast networks for in-depth reporting.

As usual, you miss the point. It's analysis the 'other way'...


 --


  The future, as always, belongs to the dreamers.

 Heinz Pagels

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-






Re: crypto law survey questions

2001-09-19 Thread Jim Choate


On Wed, 19 Sep 2001, Declan McCullagh wrote:

> On Tue, Sep 18, 2001 at 05:40:27PM -0700, [EMAIL PROTECTED] wrote:
> > Is it true that Gregg is giving up? Has someone told him that his ATM,
> > his browser and his garage door opener would be outlawed?
> 
> Depends on whether you believe politicotalk or not. Gregg's comments
> were heartfelt, IMHO. Sad that the only principles politicos seem to have
> nowadays is the principle of limiting crypto, privacy.

As usual, you miss the point, they're trying to save their jobs. Crypto is
a means, not the end.


 --


  The future, as always, belongs to the dreamers.

 Heinz Pagels

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-






Re: crypto law survey questions

2001-09-19 Thread Duncan Frissell

-Original Message-
I wonder what's going to be in the emergency anti-terrorism bill that
Bush will send Congress on Wed or Thurs. Maybe not crypto restrictions,
but the language will likely bear a close read.

-Declan


I wonder about enforcement as well.  Crypto was outlawed in WWII but I don't think too 
many people served time for using it.  It was also not very widespread.  Here you've 
got a popular technology who's suppreswsion nwill be more like Vice Squad work.  
Synbolic crackdowns without a serious expectation of success.

Also crypto bans are meaningless without anonymity bans and anonymity bans haven't 
been too successful in court.  And even with court support, anonymity bans are even 
harder to enforce than crypto bans.

Also crypto bans are really *cypher* bans.  Codes are not covered.  Ubiquitous comms 
make code comms easier than ever.

"East Wind, Rain".

 DCF




Bush's anti-terror bill appears not to include crypto restrictions

2001-09-19 Thread Declan McCullagh

http://www.wired.com/news/politics/0,1283,46953,00.html

Bush Bill Rewrites Spy Laws
By Declan McCullagh ([EMAIL PROTECTED])
2:00 a.m. Sep. 19, 2001 PDT

WASHINGTON -- The Bush administration will ask for more power to
eavesdrop on phone calls, the Internet and voicemail messages,
according to an outline of a bill obtained by Wired News.

In response to last week's catastrophic terrorist attacks, President
Bush plans to ask Congress to approve far-reaching legislation that
rewrites U.S. laws dealing with electronic surveillance, immigration
and support for terrorists.

"We will call upon the Congress of the United States to enact these
important anti-terrorism measures this week," Attorney General John
Ashcroft said Monday. "We need these tools to fight the terrorism
threat which exists in the United States, and we must meet that
growing threat."

According to the two-page outline -- which lacks key details and could
change before it's sent to Capitol Hill -- police would be able to
conduct more wiretaps and use the Carnivore surveillance system in
more situations without court orders. That section of the bill appears
to mirror an amendment the Senate approved last Thursday evening.

No restrictions on encryption products, a prospect feared by some
civil libertarians, appear in the outline.

The bill hands prosecutors a courtroom edge, saying that accused
terrorists should stay in jail by default, that detention of suspected
terrorists is "mandatory," and that the Immigration and Naturalization
Service will have more authority to kick immigrants suspected of being
terrorists out of the United States.

[...] 




SIG: Slashdot | The Physics of Information Technology

2001-09-19 Thread Jim Choate

http://slashdot.org/books/01/09/18/1918234.shtml
-- 

 --


  The future, as always, belongs to the dreamers.

 Heinz Pagels

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





Slashdot | Civil Liberties And The New Reality

2001-09-19 Thread Jim Choate

http://slashdot.org/features/01/09/18/1950255.shtml
-- 

 --


  The future, as always, belongs to the dreamers.

 Heinz Pagels

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





MATT DRUDGE // DRUDGE REPORT 2000® - Pakistan closes newspaper for publishing head money on Americans

2001-09-19 Thread Jim Choate

http://www.drudgereport.com/flash2.htm
-- 

 --


  The future, as always, belongs to the dreamers.

 Heinz Pagels

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





FT.com | News and Analysis | World Article - China seeks US favours for supporting war

2001-09-19 Thread Jim Choate

http://news.ft.com/ft/gx.cgi/ftc?pagename=View&c=Article&cid=FT3FMQD2SRC&live=true&tagid=FTDO9DHMZJC

-- 

 --


  The future, as always, belongs to the dreamers.

 Heinz Pagels

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





Who did it? Foreign Report presents an alternative view

2001-09-19 Thread Jim Choate

http://www.janes.com/security/international_security/news/fr/fr010919_1_n.shtml
-- 

 --


  The future, as always, belongs to the dreamers.

 Heinz Pagels

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





Roving surveillance & misc.

2001-09-19 Thread Aimee Farr

"Citizen Q" posted a news clip, which included:

>   Part of Ashcroft's terrorism package includes a request to allow
> the FBI to seek wiretapping orders for a suspect instead of a
> telephone.
>   That would mean law enforcement agents would be able to tap any
> phone a suspect uses, instead of having to ask for a new
> wiretapping order whenever the suspect changes telephones. With the
> introduction of cellular phones, it has become harder for law
> officers to track conversations of suspects because of the ease of
> getting new telephone numbers or new telephones, officials said.
>   ``That's a key piece of legislation that would be helpful to
> us,'' FBI Director Robert Mueller said Monday.

A requirement under Title I of the ECPA is that the site of the targeted
phone be identified. This is the statutory embodiment of the forth amendment
particularization requirement. In the case of an "oral conversation,"
[within the meaning of the ECPA] Section 2518(11) eliminates the requirement
when there is a finding by a judge reviewing the application that the site
identification requirement is "impracticable." In contrast, for a "wire or
electronic communication," there must be a finding that the purpose of the
person who is the subject of surveillance is "to thwart interception by
changing facilities."


[1] Although somewhat dated, see Michael Goldsmith, Eavesdropping Reform:
The Legality of Roving Surveillance, 1987 U.Ill. L. Rev. 401 (1987).

[2] The MINIMIZATION REQUIREMENT is found in 2518(5) of the ECPA ("Title
III") requires interception be "conducted in such a way as to minimize the
interception of communications not otherwise subject to interception," in
order to prevent a fourth amendment prohibited "general search." For the
search of a conversation to be reasonable, minimization must take place so
that the government does not seize conversations unrelated to criminal
activity.

But see, SCOTT V. UNITED STATES, 436 U.S. 128 (1978) (court rejected the
view that 2518(5) required officers to engage in good faith efforts to
minimize the surveillance of non-pertinent conversations). "Scott factors"
as delineated in later decisions, have been the subject of considerable
criticism. Some states have rejected it entirely, requiring good faith at
the outset under state statutes. (Biometric and technological minimization
might provide a partial answer to Scott's latitude. If plausible, the Scott
doctrine should be tightened in the statute to require sincere "good faith"
minimization in light of any new technological aids to minimization.)

[3] TESTIMONY OF JAMES P. FLEISSNER ON THE COMPREHENSIVE ANTITERRORISM ACT
OF 1995... @ http://www.fas.org/irp/congress/1995_hr/h950612-3f.htm
(discussing roving surveillance and supporting the harmonization of the two
roving surveillance provisions, and discussing the crimes already in the
statute with ties to terrorism).

[4] NOTICE. The notice and inventory provisions of the ECPA need to be
amended to provide notice to non-targets. 2518(8)(d) entitles only those
persons who were named in the court order (suspected of criminal activity)
to receive notice and inventory. The statutory provisions, which were
supposed to provide oversight, have been rendered meaningless by the courts.
There is a discretionary provision allowing a judge to notify a non-target
individual if, in his/her opinion, circumstances call for it.

[5] THE NATURE OF JUDICIAL OVERSIGHT. In regard to the Pen Register and Trap
and Trace Device provisions, the complaint is the lack of judicial
oversight. ["Upon an application made under section 3122(a)(1) of this
title, the court *shall* enter an ex parte order authorizing the
installation and use of a pen register or trap and trace device if the court
finds that the attorney for the Government has certified to the court that
the information likely to be obtained by such installation and use is
relevant to an ongoing criminal investigation."] Communication data, or
communication attributes, have already been the subject of considerable
controversy. Some argue that in contrast to judicial and legislative
interpretation, communication attributes are deserving of GREATER
constitutional protection -- not less, pointing to the fact that
communication data is more precise and revealing.

[6] See also, _Terrorism & The Constitution-Sacrificing Civil Liberties in
the Name of National Security_ by James X. Dempsey & David Cole -- available
on Amazon.

~Aimee

"But when, under conditions of modern warfare, our shores are threatened by
hostile forces, the power to protect must be commensurate with the
threatened danger." Korematsu v. United States, 323 U.S. 214, 220 (1944)
(this rationale was used to uphold internment camps for American citizens).
A reminder, I think.




EarthLink rejects FBI\'s request to install Carnivore

2001-09-19 Thread mean-green

EarthLink rejects FBI's request to install Carnivore 

ATLANTA -- Less than 24 hours after last week's terrorist attacks on New York and 
Washington, FBI agents visited executives in EarthLink's Atlanta headquarters. The 
agents, subpoenas in hand, wanted EarthLink personnel to install the FBI's 
controversial tracking software -- called Carnivore -- on the networks the company 
uses to connect customers to the Internet. The agents were looking for electronic 
clues, trying to retrace suspected terrorists' steps in cyberspace. 

http://www0.mercurycenter.com/premium/business/docs/earthlink19.htm




Re: crypto law survey questions

2001-09-19 Thread Nomen Nescio

Tim May writes:
> Q: "Do you believe people should be arrrested, tried, and jailed for 
> writing in some form that narcs and cops cannot read? Do you believe 
> whispering should be made a felony?
>
> Q: If you answered "yes," would you be willing to take a bullet from 
> citizens who don't agree? Will you volunteer to work in an office 
> building that may be terminated by extreme prejudice by patriots?
>
> Q: Do you understand that by repressing civil liberties, you have earned 
> killing?

These are good points, but they don't go far enough.

It is time for everyone to adopt Tim May's policy that those who disagree
on political matters deserve to be killed.  Imagine the simplification
of political life which would result.

What if the Founding Fathers had such policies?  History would be much
more interesting for students to study.  "I declare that the legislature
should have one house!"  "No, I claim that it should have two houses!"
"Fiend!"  "Scoundrel!"  (FFs whip out muskets and shoot each other.)

We could eliminate voting altogether.  Instead everyone would get together
in a large arena.  People favoring the various positions would gather
into groups, then on a signal each person would attempt to shoot and
kill all those in the other groups.  Whichever group was most numerous
would have some survivors left standing who would go out and try to keep
society running.

This is the Promised Land to which Tim May offers to lead us.  Government
by bloodshed.  A democracy of death.

One wonders how long Tim May himself would last in such a society?  It
wouldn't take much of his arrogant blustering before someone decided that
he had "earned killing".  He who lives by the sword, dies by the sword.




Re: Soft Targets (Re: Saudis detained photographing dam)

2001-09-19 Thread Harmon Seaver

  I'm surprised there hasn't been a big effort made to
protect nuke plants. Seems like they'd be a ripe target for
terrs, either by an airliner hit or just by a large armed
group intrusion.

--
Harmon Seaver, MLIS
CyberShamanix
Work 920-203-9633   [EMAIL PROTECTED]
Home 920-233-5820 [EMAIL PROTECTED]
http://www.cybershamanix.com/resume.html




Re: crypto law survey questions

2001-09-19 Thread mmotyka

Jim Choate wrote:
> 
> On Wed, 19 Sep 2001, Declan McCullagh wrote:
> 
> > On Tue, Sep 18, 2001 at 05:40:27PM -0700, [EMAIL PROTECTED] wrote:
> > > Is it true that Gregg is giving up? Has someone told him that his ATM,
> > > his browser and his garage door opener would be outlawed?
> >
> > Depends on whether you believe politicotalk or not. Gregg's comments
> > were heartfelt, IMHO. Sad that the only principles politicos seem to have
> > nowadays is the principle of limiting crypto, privacy.
> 
> As usual, you miss the point, they're trying to save their jobs. Crypto is
> a means, not the end.
> 
Hardly. The symbolic gesture of proposing legislation can serve a
political purpose but do you disagree that there are those who consider
it a desirable end? And who knows the club membership status of each
player?

Mike




Wartime Crypto Laws

2001-09-19 Thread Meyer Wolfsheim

Gentlemen,

It was recently mentioned on this list that there were additional
restrictions placed on the use of ciphers by private citizens during World
War II. I'm curious if anyone knows of a good resource for further
information on this topic.

(Now, inevitably, Choate is going to sent me a Google URL. This is fine,
since I wasn't able to get Google to give me anything but information on
documents discussing recent export restrictions, happening to mention
WWII.)

Thank you.


-MW-




from alt.security.terrorism

2001-09-19 Thread Anonymous

Hidden messages revealed:

 1.   Go into Microsoft Word.
 2.   Type in all caps and highlight:   NYC
 3.   Make the font size 48
 4.   Change the font to Webdings and read what it says
 5.   Then change the font again, this time to Wingdings




Re: CDR: FBI states that terrorists did not use crypto

2001-09-19 Thread Jim Choate


On Wed, 19 Sep 2001, Meyer Wolfsheim wrote:

> Expect a crackdown on Internet anonymity, rather than a reversal of the
> loosened crypto regulations. The death bell may be tolling for anonymous
> Internet access in libraries and cyber-cafes, but so far I have yet to see
> anything to make the case for a second round of the GAK war.

Not likely. To require non-anonymous access will require that wireless
cards include crypto AND that hobbyist groups like Wireless Seattle or
Hangar 18 cease free, public access. Nice catch-22 that...


 --


  The future, as always, belongs to the dreamers.

 Heinz Pagels

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-






Afghanistan Gems

2001-09-19 Thread Subcommander Bob

The gem industry was helping the militant Afghans raise money
back when they were US allies.  In the bios below, helping
the Mujahideen is listed as a cool thing, for both locals
and US folks.

http://www.gems-afghan.com/symposium/speakers.htm



Anwar Pacha was born in Nuristan. He and his father, Fazel Manan Pacha,
joined the
 Jihad in 1979. Together they organized the
tribes, established hospitals and assigned
 doctors to care for the Mujahideen. From
his great grandfather to present, his family
 has maintained leadership and a friendly
relationship with other tribes in Northeastern
 Afghanistan. He has many followers in
Mohamand, Safi, Salarzi, Mahmoond, Gujur,
 Shinwari tribes. Without these peoples,
mining of gemstones is not possible.


Mr. Aref Hanifi was born in Kabul, Afghanistan. He has been involved in
the Import-Export Business
between the US, Europe, China, India, and Hong Kong.
After this he was involved in helping the
Mujahideen, in particular, Khalil Nuristani and
Ubydullah Niazi of Northern Afghanistan (Kapisa).


Mr. Bowersox received his BBA degree from Western Michigan University
where
  he continued his post-graduate studies
in the field of finance and investments.
  After graduation he joined the United
States Army and obtained the rank of Major
  during the Viet Nam war. After his
honorable discharge from the US Army, he
  worked in the gem industry in Brazil,
Burma, Sri Lanka, Madagascar and
  Thailand. In 1973 he began working and surveying the gem mines of
Afghanistan. During 1976 he was awarded the
  exclusive rights for the export of lapis to the United States. After
the Russian invasion, Mr. Bowersox worked with
  the Mujahideen in developing the gem mines in Afghanistan. This
entailed many potentially dangerous trips into
  Afghanistan during the war. In 1997, he was appointed as consultant to
the Minister of Mines and
  Industry-Government of Afghanistan.




Re: Wartime Crypto Laws

2001-09-19 Thread Tim May

On Wednesday, September 19, 2001, at 10:47 AM, Meyer Wolfsheim wrote:

> Gentlemen,
>
> It was recently mentioned on this list that there were additional
> restrictions placed on the use of ciphers by private citizens during 
> World
> War II. I'm curious if anyone knows of a good resource for further
> information on this topic.
>
> (Now, inevitably, Choate is going to sent me a Google URL. This is fine,
> since I wasn't able to get Google to give me anything but information on
> documents discussing recent export restrictions, happening to mention
> WWII.)
>
Kahn's book on Codes has much on WW II, including mail opening laws, 
restrictions on radio use, etc.

Computer crypto obviously didn't exist back then, so we need to look to 
letters, radio, microdots, etc. for what may be coming.


--Tim May




OpinionJournal - Peggy Noonan - There Is No Time, There Will Be Time

2001-09-19 Thread Jim Choate

http://www.opinionjournal.com/columnists/pnoonan/?id=95001157
-- 

 --


  The future, as always, belongs to the dreamers.

 Heinz Pagels

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





Mandatory ID Cards

2001-09-19 Thread Eric Cordian

MSNBC is reporting that Congress is thinking of requiring all citizens and
non-citizens in the United States to carry ID cards.

It looks like the anti-privacy folks are going to do an end-run around the
encryption issue, and first attack anonymity.  An interesting strategy,
and one which we should not let go unchallenged.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"




Re: Mandatory ID Cards

2001-09-19 Thread Roy M. Silvernail

On 19 Sep 2001, at 13:08, Eric Cordian wrote:

> MSNBC is reporting that Congress is thinking of requiring all citizens
> and non-citizens in the United States to carry ID cards.

Interesting article...
http://www.msnbc.com/news/630118.asp for those interested.

> It looks like the anti-privacy folks are going to do an end-run around
> the encryption issue, and first attack anonymity.  An interesting
> strategy, and one which we should not let go unchallenged.

>From the link above:

>  The attacks in New York and at the Pentagon have prompted Congress to
>  begin considering requiring all citizens and non-citizens to carry
>  identity cards.
>  Those might be “smart cards” storing data such as fingerprints
>  and travel records. Reviewing the questions that congressional
>  leaders were raising last Thursday, House Democratic Leader
>  Dick Gephardt told Fox News, “What kind of identity cards would
>  we make citizens and others carry? Would they carry more
>  information?”

Hmmm  travel records, eh?  And notice Gephardt acting as 
though it were a fait acompli.  Eric's right: anonymity will be the 
first to go.
--
Roy M. Silvernail
Proprietor, scytale.com
[EMAIL PROTECTED]




Re: Mandatory ID Cards

2001-09-19 Thread Meyer Wolfsheim

> MSNBC is reporting that Congress is thinking of requiring all citizens
> and non-citizens in the United States to carry ID cards.

We're already half-way there. With our photo-id driver's licenses, and
required identification before boarding airplanes, convenient travel and
lack of anonymity go hand in hand.

> It looks like the anti-privacy folks are going to do an end-run around
> the encryption issue, and first attack anonymity.  An interesting
> strategy, and one which we should not let go unchallenged.

This was my thought, to which I eluded in my last post the list. I don't
think crypto opponents could find ways to justify banning its use.
However, an anonymity crack-down is most certainly coming.

And be on the look-out for RIP-USA.


-MW-





Re: CNN poll

2001-09-19 Thread Steve Thompson


Quoting Trei, Peter ([EMAIL PROTECTED]):
> While these online polls are rarely terribly meaningful,
> I will note that CNN has one going now, at
> http://www.cnn.com/2001/US/09/19/gen.america.under.attack/
> 
> It asks 'Would you accept more government involvement in your
> life if it meant more security against terrorism?"
> 
> So far:
> 
> Yes: 70% 118946 votes
> No:  30% 49938 votes
> 
> Peter Trei

I wonder why they bother with such polls.  At this time, there is enough
legislation and political will to mandate `more government' involvement in
people's lives without the need for unscientific study.

Not only is there a need for a war to boost the flagging economy, but
obviously the future security of the human race _depends_ on omnipresent
government intrusion in the affairs of man.  

What, exactly, is gained by these silly pretences at polling the people for
their opinions when the unassailable logic of military necessity is sufficient
unto itself?  I suggest that journalists explain, in simple terms, the facts
of national security to the public.  Properly presented, the majority will
easily accept the inevitable without complaint since the only other option
will be to abandon facts and logick for chaos and uncertainty.


Regards,

Steve

-- 
Several eye-witnesses report seeing a missile strike the WTC before it went down.




Re: Soft Targets (Re: Saudis detained photographing dam)

2001-09-19 Thread David Honig

At 11:16 AM 9/19/01 -0500, Harmon Seaver wrote:
>  I'm surprised there hasn't been a big effort made to
>protect nuke plants. Seems like they'd be a ripe target for
>terrs, either by an airliner hit or just by a large armed
>group intrusion.
>

San Onofre increased their ground security.  

The containment domes are spec'd to handle an airliner crash.  Don't know
which airliner (707 vs. 747) and how 15 tons of kerosine affect it.

Chem plants, refineries & storage facilities [soft targets] all upped their
walking guards.

No more tours of sewage treatment plants for the public for now (really).




Freedom flees in terror from Sept. 11 disaster By Paul McMasters

2001-09-19 Thread Matthew Gaylor



Freedom flees in terror from Sept. 11 disaster

Ombudsman

By Paul McMasters <[EMAIL PROTECTED]>
First Amendment Ombudsman
First Amendment Center

09.19.01

Last Tuesday's terrors were so calamitous that they threaten to shake 
us loose from our constitutional mooring. A civil liberties 
catastrophe looms as citizens surrender to fear, fury and frustration 
and as lawmakers throw money and shards of the Bill of Rights at the 
specter of terrorism.

Some of our elected leaders predict a gloomy future for freedom.

"We're in a new world where we have to rebalance freedom and 
security," said House Democratic Minority Leader Richard A. Gephardt, 
D-Mo. "We're not going to have all the openness and freedom we have 
had."

Senate Minority Leader Trent Lott, R-Miss., repeated the warning: 
"When you're in this type of conflict, when you're at war, civil 
liberties are treated differently."

Even staunch First Amendment advocates, haunted by the suffering and 
devastation in New York City, near Washington, D.C., and the 
Pennsylvania countryside, are tempted to temporize in the face of 
insistent calls to suspend or re-examine our commitment to civil 
liberties.

The First Amendment fallout commenced within hours of the airplanes 
crashing into their targets. Tuesday afternoon, FBI agents fanned out 
to persuade Internet firms and service providers to hook up e-mail 
sniffing software to monitor private citizens' e-mail. While the 
desire to marshal all resources in such circumstances is 
understandable, there are serious consequences for private speech and 
public discourse when ordinary citizens fear that law enforcement 
officials with broad powers to investigate and detain are listening 
in.

Expressive activity was curtailed in a variety of places. A high 
school official reprimanded a student who distributed a flier asking 
her classmates to pray. Officials at the Baltimore Museum of Art took 
down a Christopher Wool painting containing the word "Terrorist" 
(later, they promised to provide "new interpretation" for the 
painting when it is reinstalled). New York police and members of the 
National Guard confiscated film from journalists and tourists.

If only that were the worst of it.

Government officials and policymakers immediately called for measures 
that would chill public discourse, disrupt reporting by the press, 
and interrupt the flow of information to the public. They want an 
expansion of law enforcement powers to spy on telephone and Internet 
traffic, to restrict the use of Internet encryption products that 
thwart online monitoring of private email, to slow down and divert 
funds from the declassification of secrets, and to force public 
libraries to reveal information about patrons' use of their computers.

In Congress, prospects brightened for several troubling measures, including:

*   The Cyber Security Information Act, which among other things 
would blow a gaping hole in the Freedom of Information Act.

*   Anti-leaks legislation, dubbed the "official secrets acts" by 
those who are deeply concerned about its impact on speech and the 
press and the flow of critical information to the public.

*   The Flag Desecration Act, which would for the first time in 
the history of our nation amend the First Amendment to prohibit 
burning the flag as a form of political dissent.


To compound the threat, there are disturbing examples of private or 
self-imposed restrictions on expression. Web pages shut down or 
removed content, a radio network circulated a list of songs that 
would be problematic to play, an employer confiscated American flags 
from the desks of workers, and a wire service withheld news footage 
after Palestinian threats against a photographer.

It would be foolish to dismiss such events - public or private - as 
mere nibbling at the edges of our rights. In fact, each nibble 
diminishes our commitment to freedom and the principles that 
distinguish our way of life from all others.

In such an atmosphere, voices of dissent grow silent, probing 
questions by the press are viewed as unpatriotic and subversive, and 
whistleblowers inside government with vital information are quieted. 
In such an atmosphere, propaganda, rumor and paranoia fester and 
infect. In such an atmosphere, citizens are denied their place as 
full partners in their own governance.

By suspending some of our most precious principles, the risk becomes 
not just terrorists whose hearts have grown rancid with hate but also 
a citizenry whose hearts are filled with fear.

There are things we can and should be doing rather than joining the 
stampede to ditch our rights. As columnist Thomas Friedman put it: 
"We have to fight the terrorists as if there were no rules and 
preserve our open society as if there were no terrorists."

First, we must remember that we've gone down this road too many times 
before. We have suspended freedom o

Mixmaster 2.9beta31 is now available

2001-09-19 Thread Len Sassaman

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I'm pleased to announce that the newest release of Mixmaster is now
available for download.

Notable changes since 2.9beta23 -- server functionality:

o Support for multiple dest.blk files and the Remailer Abuse Blocklist.
o Support for whitelisted addresses for Middleman remailers.
o Support for abuse blocking by IP address
o Support for "Administrator key" requests
o Numerous bug fixes

Notable changes since beta 23 -- client functionality:

o Re-introduced support for the Mutt email client

- --

md5sum: 22e938cad2eddcda1d4004167dc56155  mix-2.9b31.tar.gz

Files can be found here:


ftp://ftp.zedz.net/pub/crypto/remailer/mixmaster/mix-2.9b31.tar.gz
http://www.melontraffickers.com/mixmaster/mix-2.9b31.tar.gz
http://cypherpunks.havenco.com/mixmaster/mix-2.9b31.tar.gz


Please report any problems to [EMAIL PROTECTED]


Thanks,


Len Sassaman


-BEGIN PGP SIGNATURE-
Comment: OpenPGP Encrypted Email Preferred.

iD8DBQE7qQWWPYrxsgmsCmoRAj5eAKCs9Oyxrarp+QiKtBTEp5jztJQcwwCeNw68
6qt3nxzVX7SALwMQmcg3m4M=
=H/8I
-END PGP SIGNATURE-




They all have to rearrange their brains now -- [WTC] is the greatest work of art ever.

2001-09-19 Thread Subcommander Bob

Composer creates storm describing attack on US as 'work of art'

 HAMBURG, Germany, Sept 18 (AFP) -

 Composer Karlheinz Stockhausen, 73, has roused indignation in
Germany for describing last week's
 catastrophic airplane assaults on New York as "the greatest work of
art ever."

 The renowned contemporary composer, who was speaking to journalists
in Hamburg late Sunday,
 immediately retracted the remark and asked them not to report it.

 But as a result of what he said, two concerts featuring Stockhausen
which were to be given Tuesday and
 Wednesday were cancelled by the organisers of a music festival at
the request of the local cultural
 authorities and festival sponsors.

 Hamburg's general director of music, Ingo Metzmacher, had invited
the composer to stage performances
 of his own works at the current Hamburg music festival.

 The German news agency DPA said the composer had quit Hamburg,
greatly upset by the affair.

 In a statement issued by the music festival organisers, Stockhausen
said he had been asked whether
 characters in his work, such as Lucifer, were historical, and that
he had replied "they are always
 contemporary, for example Lucifer in New York.

 "I recalled the destruction of art. Any other words outside of this
context have no relation to what I
 meant," he insisted.

 Hamburg culture senator (minister) Christina Weiss said the
composer's reported remark was inexcusable,
 given the grief and mourning in the United States.

 "Out of feeling for the political culture of the city and the
federal republic, the concerts had to be
 cancelled," she said.

 According to DPA, the composer, who had been asked about the
attacks on the United States, said:
 "What happened there is -- they all have to rearrange their brains
now -- is the greatest work of art ever.

 "That characters can bring about in one act what we in music cannot
dream of, that people practise madly
 for ten years, completely fanatically, for a concert and then die.
That is the greatest work of art for the
 whole cosmos.

 "I could not do that. Against that, we, composers, are nothing."

http://asia.dailynews.yahoo.com/headlines/entertainment/afp/article.html?s=asia/headlines/010918/entertainment/afp/Composer_creates_storm_describing_attack_on_US_as__work_of_art_.html




FBI states that terrorists did not use crypto

2001-09-19 Thread Meyer Wolfsheim

Expect a crackdown on Internet anonymity, rather than a reversal of the
loosened crypto regulations. The death bell may be tolling for anonymous
Internet access in libraries and cyber-cafes, but so far I have yet to see
anything to make the case for a second round of the GAK war.

[...]

In Washington, D.C., an FBI official told reporters the hijackers and
their known associates used public computers, such as those in libraries,
as well as their own personal computers to communicate.

``They did use it (the Internet) and they used it well,'' the official
said of the e-mails of the hijackers and their associates. The FBI has
been able to get e-mails that date back as far as 30 to 45 days, the
official said.

The official said the e-mails were in English and Arabic, that there were
hundreds of communications, and the e-mails were not just limited to the
United States. The hijackers did not use encryption techniques, the
official said.

[...]

http://dailynews.yahoo.com/h/nm/20010918/ts/attack_investigation_dc_23.html




Re: Mandatory ID Cards

2001-09-19 Thread Meyer Wolfsheim

> MSNBC is reporting that Congress is thinking of requiring all citizens
> and non-citizens in the United States to carry ID cards.

We're already half-way there. With our photo-id driver's licenses, and
required identification before boarding airplanes, convenient travel and
lack of anonymity go hand in hand.

> It looks like the anti-privacy folks are going to do an end-run around
> the encryption issue, and first attack anonymity.  An interesting
> strategy, and one which we should not let go unchallenged.

This was my thought, to which I eluded in my last post the list. I don't
think crypto opponents could find ways to justify banning its use.
However, an anonymity crack-down is most certainly coming.

And be on the look-out for RIP-USA.


-MW-




"Banning strong encryption would prove as ineffective as shutting down Napster

2001-09-19 Thread Subcommander Bob

"Banning strong encryption would prove as ineffective as
shutting down Napster,"

>From some agitprop "The Terrorists Are Winning the Cyber War"
http://www.latimes.com/news/nationworld/nation/la-091901techspy.story




CNN poll

2001-09-19 Thread Trei, Peter

While these online polls are rarely terribly meaningful,
I will note that CNN has one going now, at
http://www.cnn.com/2001/US/09/19/gen.america.under.attack/

It asks 'Would you accept more government involvement in your
life if it meant more security against terrorism?"

So far:

Yes: 70% 118946 votes
No:  30% 49938 votes

Peter Trei


"They that give up necessary liberty to obtain temporary safety
deserve neither liberty nor safety."  

Benjamin Franklin




Search Results for 'Censorship Service'

2001-09-19 Thread Jim Choate

Kahn (Chpt. 16, 1976 ed.) and NARA...

http://search.nara.gov/query.html?col=0nara&col=2ardor&col=1pres&col=arch&qt=Censorship+Service&qp=&qs=&qc=&pw=100%25&ws=0&la=&qm=0&st=1&nh=10&lk=1&rf=0&oq=&rq=0

-- 

 --


  The future, as always, belongs to the dreamers.

 Heinz Pagels

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





Let US send your ad to Bizop Seekers!

2001-09-19 Thread EmailSendingService
Title: Let us send your message to business opportunity seekers






Let us send your
message to business opportunity seekers!




  
Prices
  
  
Send 10,000
$40
  
  
Send 25,000
$75
  
  
Send 50,000
$125
  
  
Send 100,000
$200
  
  
Send 250,000
$450
  




Text OR HTML messages.




  
E-mail us below and we
will send further details.
  
  
Simply, you need to
provide us with a copy of the e-mail message you would like to send, and how many you are
interested in sending. Be sure to include your "Subject Line".  Make the
message such that someone will reply for "more info" before you send them your
actual url.   We suggesting setting up a separate free e-mail account just for this
purpose. Also send us any questions you might have.  We handle all removes and
undeliverables, you only need to worry about answering e-mail requests.
E-mail Us
  




* Above prices are for messages under 5K, for messages over 5K,
prices will be higher, depending on message.






The Perfect Part Time Home Based Biz 9772

2001-09-19 Thread omazoom

No HYPE!!!  No BULL!!!
Reading this E-Mail Could Change Your Life! 

TEN Million Dollar earner is seeking 16 qualified individuals
and professional marketers to fill TOP POSITIONS
WHO BETTER to be in business with?

Work Our Proven, Successful System and earn...
$1000 weekly while working Our FREE Leads!
FREE Car/House Bonuses Available Now!
Weekly Bonus Checks and Monthly Residuals Too!

Our product line consists of 80% Consumable Goods!
Work as much as YOU want to Earn!
Complete TURN KEY OPPORTUNITY!!!

ARE YOU...
 -Being paid what you are worth?
 -Living the lifestyle you always dreamed about?
 -Spending more quality time with your loved ones?
 -Do you have more bills than income?
 -Have you ever wanted to FIRE YOUR BOSS and own our own
  business and work from home?

Have more time for the better things in life!
Don't Dream to Live...Live The Dream! Take Action NOW!

Our professional team can help YOU EARN BIG CHECKS!
Our professional team can help get you FREE LEADS!
Our Company is STABLE!  Our Company is DEBT FREE!
And, has been in Business for 17 successful years!

See if YOU qualify for our team!

Vist our website now at the following link and submit your
information so we may contact you regarding this incredible opportunity! 
http://www.market-watcher.com/lifestyle.htm


 
(REMOVAL INSTRUCTIONS)
This mailing is done by an independent marketing company.
Please do not use the reply to this e-mail, an e-mail reply
cannot be read! If you would like to be removed from our mailing
list just click below and send us a remove request email.

(To Be Removed)
mailto:[EMAIL PROTECTED]?subject=RemoveMeBizOpPlease




RE: Mandatory ID Cards -biometric association

2001-09-19 Thread Aimee Farr

The conversation elsewhere is out of control...even "negative recognition"
in addition to a National Biometric-ID. The fear is that its an "appearance
measure." My response on another list was fairly long-winded, but it did
include the following:

(1) The pretexter. Mr. Terrorist -- he's a suspect or (hopes to be) a
fugitive, or he wouldn't be pretexting an ID.

(2) The patsy. Ann Murphy -- married and pregnant when her new husband tried
to put her on a plane with 3 pounds of plastic explosive. She was recruited
and set up over a year.

(3) The inward spy. Colonel von Stauffenberg -- admitted to Hitler's Wolf
Lair without question.

(4) The priest. Father Terrorist -- he is who he is. The only thing he has
to hide is his intent.

In 2, 3, and 4 authentication is an exploit. If it leads to a false sense of
security, it is an exploit. ''They'' will go for timing + circumstance +
opportunity. (The focus has shifted away from airplanes.) Myself and several
others have pointed out how this would agitate domestic dissident groups,
further civil tension, and possibly provoke violence -- the terrorist
objective straight out of "TERRORISM 101."

I just haven't seen any compelling counter-terrorism studies FOCUSING on
this (I'm looking, and I'm sure that I will...). Although document forgery
is an immigration problem, it sounds like one that can be addressed at the
border. While authentication is a first line defense, I question this
measure in terms of "combating terrorism," and worry that it is over-rated.
It's also something that goes with chokepoint-checkpoints.

[*pause*...seen the latest ANSIR?]

~Aimee




FBI states that terrorists did not use crypto

2001-09-19 Thread Meyer Wolfsheim

Expect a crackdown on Internet anonymity, rather than a reversal of the
loosened crypto regulations. The death bell may be tolling for anonymous
Internet access in libraries and cyber-cafes, but so far I have yet to see
anything to make the case for a second round of the GAK war.

[...]

In Washington, D.C., an FBI official told reporters the hijackers and
their known associates used public computers, such as those in libraries,
as well as their own personal computers to communicate.

``They did use it (the Internet) and they used it well,'' the official
said of the e-mails of the hijackers and their associates. The FBI has
been able to get e-mails that date back as far as 30 to 45 days, the
official said.

The official said the e-mails were in English and Arabic, that there were
hundreds of communications, and the e-mails were not just limited to the
United States. The hijackers did not use encryption techniques, the
official said.

[...]

http://dailynews.yahoo.com/h/nm/20010918/ts/attack_investigation_dc_23.html




SIG: A 'Tarpit' That Traps Worms

2001-09-19 Thread Jim Choate

http://www.wired.com/news/technology/0,1282,46964,00.html
-- 

 --


  The future, as always, belongs to the dreamers.

 Heinz Pagels

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





Afghanistan asks CNN to leave

2001-09-19 Thread Jim Choate

http://sg.news.yahoo.com/010919/3/1hfgh.html
-- 

 --


  The future, as always, belongs to the dreamers.

 Heinz Pagels

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





WP:FBI investigating if/how terrorists used stego, crypto

2001-09-19 Thread Xeni Jardin

Terrorists' Online Methods Elusive
http://www.washtech.com/news/netarch/12557-1.html

By Ariana Eunjung Cha and Jonathan Krim,
Washington Post Staff Writers
Wednesday, September 19, 2001

Government agencies are contacting computer experts for help in
understanding how Osama bin Laden and his associates may have used the
Internet to send encrypted electronic messages to one another to
coordinate last week's attacks on the World Trade Center and the Pentagon,
sources said yesterday.

For at least three years, federal agents had found evidence that bin
Laden's group embedded secret missives in mundane e-mails and on Web
sites. But efforts to track down and decipher the messages have
floundered.

Numerous, easy-to-download software applications are available online that
enable users to protect transmissions from curious eyes and frustrate
government attempts to create a systematic way to locate and screen those
messages.

Basic encryption tools allow people to scramble messages so that only
those with a "key" can read them. An increasing number, however, go beyond
this by allowing messages to be hidden inside graphics, music files or in
the headers of e-mails. The technology, known as steganography, allows
users to get around electronic wiretaps by piggybacking messages on
seemingly innocent digital files for things such as 'N Sync songs, a
posting on eBay or a pornographic picture.

The proliferation of this technology, people in the security community
say, is changing the rules of the intelligence game by allowing anyone to
coordinate dispersed global armies quickly and cheaply.

Several experts in the field said yesterday they've received calls from
the government asking for their assistance. One academic researcher said
he was asked to remain on standby to help try to peel the layers off of
any encrypted messages the government might find.

But that might be the easy part. Sources close to the investigation said
the few messages investigators have intercepted in the past did not take
advantage of encryption techniques. The challenge, at least in this case,
has been finding the messages in the first place.

Neil Johnson, associate director of the Center for Secure Information
Systems at George Mason University, which receives funding from the
government, said steganography is powerful because messages can
effectively be hidden almost anywhere.

Johnson's recent research has focused, with some success, on how to crack
it by examining a site, image or data stream for signs that steganography
was used, he said.

Mark Loveless, a computer security consultant with BindView Development
Corp., said the technology is also popular because if it's used properly
it would be almost impossible to trace the author of the message and the
recipient because of the random way in which files are distributed from
user to user using swapping services such as Napster and Gnutella.

In the wake of the attacks, Sen. Judd Gregg (R-N.H.) has proposed making
it mandatory that software developers give government security agents the
"keys" to encryption programs when they are created, a position strongly
opposed by many in the technology community who worry it could be used to
invade the privacy of law-abiding computer users.

Phil Zimmermann, the creator of a popular encryption technology, said he
believes the answer to catching the terrorists lies in human footwork
rather than more surveillance technologies: "It's not practical to frisk
everyone on the planet to find the one person with a box cutter."

The government has been waging war on data-scrambling technology on
several fronts for more than 30 years. It has asked Congress for stricter
rules on exporting the technology and has taken the developers of such
technology to courts. Most recently, the NSA created a whole department to
try to "leverage emerging technologies and sustain both our offensive and
defensive information warfare capabilities," according to a recent
document outlining its cryptography strategy.

At a closed congressional hearing last year, one federal official said
that U.S. intelligence is "detecting with increasing frequency the
appearance and adoption of computer and Internet familiarity" in the hands
of terrorist organizations. "The skills and resources of this threat group
range from the merely troublesome to dangerous," the official said in a
submitted statement. "As we know, Middle East terrorist groups  such as
Hezbollah, Hamas and Osama bin Laden's organization  are using
computerized files, e-mail and encryption to support their organizations."

That view was echoed by Ben Venzke, an intelligence and cyber-security
consultant in Virginia who assists several government agencies.

"Groups like them are very intelligent," he said. "They are very wise in
the ways of tradecraft and operational security and will make use of any
tools that are available," he said.







Back to Washtech.com Home

) 2001 The Washington Post Company




Re: Mandatory ID Cards (fwd)

2001-09-19 Thread Jim Choate


Date: Wed, 19 Sep 2001 18:19:51 -0500
Subject: Re: Mandatory ID Cards (fwd)

Damn, haven't they figured out that tatoos are cheaper and less prone to
loss?

Jim Choate wrote:

> -- Forwarded message --
> Date: Wed, 19 Sep 2001 13:08:47 -0700 (PDT)
> From: Eric Cordian <[EMAIL PROTECTED]>
> Reply-To: [EMAIL PROTECTED]
> To: [EMAIL PROTECTED]
> Subject: CDR: Mandatory ID Cards
>
> MSNBC is reporting that Congress is thinking of requiring all citizens and
> non-citizens in the United States to carry ID cards.
>
> It looks like the anti-privacy folks are going to do an end-run around the
> encryption issue, and first attack anonymity.  An interesting strategy,
> and one which we should not let go unchallenged.





EarthLink rejects FBI\'s request to install Carnivore

2001-09-19 Thread amp

I must say that I'm a bit suprised by this. It's hard to believe that any 
company in the U.S. would actually stand on principles. Kudos to Earthlink in 
this case.



On Wednesday 19 September 2001 04:45 am, [EMAIL PROTECTED] wrote:
> EarthLink rejects FBI's request to install Carnivore
>
> ATLANTA -- Less than 24 hours after last week's terrorist attacks on New
> York and Washington, FBI agents visited executives in EarthLink's Atlanta
> headquarters. The agents, subpoenas in hand, wanted EarthLink personnel to
> install the FBI's controversial tracking software -- called Carnivore -- on
> the networks the company uses to connect customers to the Internet. The
> agents were looking for electronic clues, trying to retrace suspected
> terrorists' steps in cyberspace.
>
> http://www0.mercurycenter.com/premium/business/docs/earthlink19.htm

-- 
TANSTAAFL,

[EMAIL PROTECTED]
http://www.zeugma.nu/

Never be afraid to try something new. 
Remember, amateurs built the ark. 
Professionals built the Titanic.




Re: Mandatory ID Cards -biometric association

2001-09-19 Thread Harmon Seaver

 I recall there being fairly high, if not supreme, court
decisions in the past confirming that you never have to
identify yourself to the police. Other than when driving a
car, of course, as that's a "privilege" not a right. So how
are they going to force these mandatory ID cards on people?

--
Harmon Seaver, MLIS
CyberShamanix
Work 920-203-9633   [EMAIL PROTECTED]
Home 920-233-5820 [EMAIL PROTECTED]
http://www.cybershamanix.com/resume.html




Ashcroft's Plans to Shred the Constitution

2001-09-19 Thread Eric Cordian

While Bill Maher loses his advertisers for suggesting that lobbing cruise
missiles from 2,000 miles away is more cowardly than personally flying an
aircraft into a building, we now have a first look at the "features"
present in the anti-Terrorism bill, to be submitted to Congress on Friday.

According to AP, the bill permits prosecutors to use evidence collected by
foreign governments, even if that evidence was collected in ways
unconstitutional in the United States.

It will also permit law enforcement to seize billing records of ISPs
without a court order, so that they may be grepped through to identify
anyone who uses the service with an assumed name.

The definition of "terrorist" will be augmented to include any person who
supports in any way any organization they know or should know is a
terrorist organization.

Criminalize the possession of chemicals that could be used in chemical or
biological weapons in quantities the Feebs consider suspicious.

Criminalize giving "expert advise" to "terrorists."

Permit the seizing of the property of any person, organization, or
country, that attacks the United States.

Permit access to education records by law enforcement, without the
permission of the student or their parents.

Permit terrorist DNA fingerprinting, and remove the $2 million cap on
rewards for fighting terrorism.

The gauntlet has been thrown down.  How long before the estates of
"terrorists" Bill Maher and Tim May are seized at gunpoint for the Greater
Good of the Reich?

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"




Operation Infinite Justice

2001-09-19 Thread Tim May

Not to sound like a warmonger, but an idea came to me today, upon 
hearing that the new military operation is now named "Infinite Justice."

Take the multicolored ribbon many are using to symbolize the events of
9/11...

Then turn it on its side...

Complete the loop and it becomes

The infinity symbol

Infinite Justice


--Tim May




How ID Cards might be made de facto mandatory, but not de jure mandatory

2001-09-19 Thread Tim May

On Wednesday, September 19, 2001, at 07:00 PM, Harmon Seaver wrote:

>  I recall there being fairly high, if not supreme, court
> decisions in the past confirming that you never have to
> identify yourself to the police. Other than when driving a
> car, of course, as that's a "privilege" not a right. So how
> are they going to force these mandatory ID cards on people?
>

(When I say "will require" I mean that other legislation will require 
that the libraries, companies, rental agencies, etc. inspect them. Those 
who don't have them simply won't be able to rent cars, use libraries, 
get driver's licenses, cash checks, etc.)

1. Libraries will require the card before giving access to public 
terminals (or perhaps even to books...)

2. Hotels, airlines, car rental and storage locker companies will 
require them.

3. States will require driver's licenses to be cross-linked with these 
ID cards.

4. Gun purchases, ammunition purchases, hunting licenses, fishing 
licenses, etc. cross-linked.

5. Use the banking system  or money order/check-cashing systems in any 
way. Including filing taxes.

...and so on.

It's unlikely that these ID cards will be demanded on the street 
("Papers, please!").  But the cards can be mandated for nearly every 
other aspect of economic life.

The Supreme Court will not have to even rule on these cross-linkings.

It should be fine for someone to _not_ have such an ID card, provided he 
does not want to rent or buy a car, get a driver's license, buy 
ammunition, check into a hotel, rent a mailbox, open a bank account, 
cash a check, or file tax forms.

None of them are cases where the state, ostensibly, is requiring names 
to be attached to writings or pamphlets. Nor are they cases where 
internal movement requires a passport. (These are some of the reasons 
past courts have thrown out mandatory identification laws.) Properly 
done, a cop will never have to demand the ID card, so the issue of it 
being mandatory becomes untested in courts (I'm speculating a bit 
here...).

I'm not endorsing these moves, of course, just speculating on how the 
courts may acquiesce to such an ID card.

And, of course, another 911-like event could make the Supreme Court 
reverse itself.


--Tim May




Re: chip-level randomness? (fwd)

2001-09-19 Thread Jim Choate


-- Forwarded message --
Date: Wed, 19 Sep 2001 13:50:53 -0700
From: John Gilmore <[EMAIL PROTECTED]>
To: Pawel Krawczyk <[EMAIL PROTECTED]>
Cc: Bram Cohen <[EMAIL PROTECTED]>, [EMAIL PROTECTED],
[EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: chip-level randomness? 

The real-RNG in the Intel chip generates something like 75 kbits/sec
of processed random bits.  These are merely wasted if nobody reads them
before it generates 75kbits more in the next second.

I suggest that if application programs don't read all of these bits
out of /dev/intel-rng (or whatever it's called), and the kernel
/dev/random pool isn't fully charged with entropy, then the real-RNG
driver should feed some of the excess random bits into the /dev/random
pool periodically.  When and how it siphons off bits from the RNG is a
separate issue; but can we agree that feeding otherwise-wasted bits
into a depleted /dev/random would be a good idea?

A better way to structure this might be for /dev/intel-rng to register
with /dev/random as a source of entropy that /dev/random can call upon
if it depletes its pool.  /dev/random would then be making decisions
about when to stir more entropy into the pool (either in response to a
read on /dev/random, or to "read ahead" to increase the available pool
in between such reads).  Thus, when demand on /dev/random is high, it
would become one of the "application programs" that would compete to
read from /dev/intel-rng.  Since /dev/random is the defined interface
for arbitrary applications to get unpredictable bits out of the
kernel, I would expect that in general, /dev/random is likely to be
the MAJOR consumer of /dev/intel-rng bits.

(Linux IPSEC uses /dev/random or /dev/urandom for keying material.  It
can easily consume many thousands of random bits per second in doing
IKE's Diffie-Hellman to set up dozens of tunnels.  Today this "surge
demand" occurs at boot time when setting up preconfigured tunnels -- a
particularly bad time since the system hasn't been collecting entropy
for very long.  /dev/intel-rng's high-spead stream can significantly
improve the quality of this keying material, by replenishing the entropy
pool almost as fast IPSEC consumes it.  Over time, IPSEC's
long-term demand for random bits will increase, since opportunistic
encryption allows many more tunnels to be created, with much less
effort per tunnel by the system administrator.)

Also, the PRNG in /dev/random and /dev/urandom may someday be broken
by analytical techniques.  The more diverse sources of true or
apparent randomness that we can feed into it, the less likely it is
that a successful theoretical attack on the PRNG will be practically
successful.  If even a single entropy source of sufficiently high
speed is feeding it, even a compromised PRNG may well be unbreakable.

John




-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]




Re: Mandatory ID Cards

2001-09-19 Thread David Honig

At 01:08 PM 9/19/01 -0700, Eric Cordian wrote:
>MSNBC is reporting that Congress is thinking of requiring all citizens and
>non-citizens in the United States to carry ID cards.

What, if any, power granted to congress lets them think they could justify
this?





 






  







The Register - USA is playing into bin Laden's hands

2001-09-19 Thread Jim Choate

http://www.theregister.co.uk/content/57/21757.html
-- 

 --


 Kill them all, take their land, and go there for vacation.

 Rage Against The Machine

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





Text of "Mobilization Against Terrorism Act" now online

2001-09-19 Thread Declan McCullagh

Text of the "Mobilization Against Terrorism Act":
http://vorlon.mit.edu/~declan/mata/
http://www.well.com/~declan/mata/

Background:
http://www.politechbot.com/p-02531.html

-Declan

**

http://www.wartimeliberty.com/article.pl?sid=01/09/20/0333204

Text of President Bush's Anti-Terrorism Bill Now Online

posted by declan on Wednesday September 19, @10:20PM
from the be-sure-to-read-the-fine-print dept.

For the last week, Washington has been buzzing about what may
-- or may not -- be in the "Mobilization Against Terrorism Act." We
now have a draft copy of MATA online that you can find at
http://vorlon.mit.edu/~declan/mata/ or
http://www.well.com/~declan/mata/. (Alas, it's in a series of JPG
files, but if someone wants to take the large version and OCR it,
please post a link in the comment thread below.) The Bush
administration sent a draft of MATA to Congress late Wednesday, with
the House Judiciary committee pledging "a legislative hearing followed
by a full committee markup as soon as possible" once they receive the
final version. We'll let you look through the bill yourself, but note
how this would expand the utility of the Net's two favorite
surveillance systems: Carnivore and Echelon. If you want to crib from
a summary, see the outline we posted on Tuesday. EFF's press release
on MATA is attached below.

---

Electronic Frontier Foundation Media Release

For Immediate Release: September 19, 2001


Contacts:

Shari Steele, EFF Executive Director, [EMAIL PROTECTED],
   +1 415 436-9333 x103

Lee Tien, EFF Senior Staff Attorney, [EMAIL PROTECTED],
   +1 415 436-9333 x102 (office),
   +1 510 290-7131 (cell)


DOJ's Anti-Terrorism Law Would Dismantle Civil Liberties

Legislate to Improve Security Not Eliminate Freedoms

San Francisco, California - The Electronic Frontier
Foundation (EFF) today criticized the "Mobilization Against
Terrorism Act" proposed by the US Department of Justice
because many provisions of the law would dramatically alter
the civil liberties landscape through unnecessarily broad
restrictions on free speech and privacy rights in the
United States and abroad.

EFF again urged Congress to act with deliberation in
approving only measures that are effective in preventing
terrorism while protecting the freedoms of Americans.

Attorney General John Ashcroft distributed the proposed
Mobilization Against Terrorism Act to members of
Congress after Monday's press conference at which he
indicated that, among other measures, he would ask
Congress to expand the ability of law enforcement officers
to perform wiretaps in response to the terrorist attacks
on the United States on September 11, 2001. Ashcroft
asked Congress to pass anti-terrorism legislation
including "expanded electronic surveillance" by the end of
this week.

EFF believes this broad legislation would radically tip the
United States system of checks and balances, giving the
government unprecedented authority to surveil American
citizens with little judicial or other oversight.

One particularly egregious section of the DOJ's analysis of
its proposed legislation says that "United States
prosecutors may use against American citizens information
collected by a foreign government even if the collection
would have violated the Fourth Amendment."

"Operating from abroad, foreign governments will do the
dirty work of spying on the communications of Americans
worldwide. US protections against unreasonable search and
seizure won't matter," commented EFF Senior Staff Attorney
Lee Tien.

Additional provisions of the proposed Mobilization Against
Terrorism Act include measures which:

* Make it possible to obtain e-mail message header
information and Internet user web browsing patterns without
a wiretap order

* Eviscerate controls on roving wiretaps

* Permit law enforcement to disclose information obtained
through wiretaps to any employee of the Executive branch

* Reduce restrictions on domestic investigations under the
Foreign Intelligence Surveillance Act (FISA)

* Permit grand juries to provide information to the US
intelligence community

* Permit the President to designate any "foreign-directed
individual, group, or entity," including any United States
citizen or organization, as a target for FISA
surveillance

* Prevent people from even talking about terrorist acts

* Establish a DNA database for every person convicted of
any felony or certain sex offenses, almost all of which
are entirely unrelated to terrorism

EFF Executive Director Shari Steele emphasized, "While it
is obviously of vital national importance to respond
effectively to terrorism, this bill recalls the McCarthy
era in the power it would give the government to
scrutinize the private lives of American citizens."

Ashcroft's proposed legislation comes in the wake of the
Senate's hasty passage of the "Combating Terrorism Act"
on the evening of September 13 with less than 30 minutes
of consideratio

Re: Ashcroft's Plans to Shred the Constitution

2001-09-19 Thread Steve Thompson


Quoting Eric Cordian ([EMAIL PROTECTED]):
> The gauntlet has been thrown down.  How long before the estates of
> "terrorists" Bill Maher and Tim May are seized at gunpoint for the Greater
> Good of the Reich?

Doesn't that depend on how quickly they co-operate with the feds?  Surely
highly intelligent citizen-units will be given the opportunity to save their
property from confiscation in exchange for their services towards furthering
the war effort.
 

Regards,

Steve
-- 
Several eye-witnesses report seeing a missile strike the WTC before it went down.




Fast, Free, Instant Life Insurance Quotes

2001-09-19 Thread bbngfcc9e3
Title: Save up to 75% on term life insurance!







 
  


  

Save up to 75% on Term Life Insurance

Get FREE quotes instantly from top insurance companies

  
  

  
   
Best Life Insurance, Lowest Cost!
  

  



  

Compare your rates in 4 easy steps:


1. get your FREE instant quotes
2. compare the lowest prices
3. select the company of your choice
4. apply online

  



  
 
  

  
  

COMPARE YOUR CURRENT COVERAGE
to these sample 10-year level term monthly premiums (20 year, 30 year and smoker rates
also available)


 
    
   $250,000
   $500,000
   $1,000,000
 
 
   Age
   Male
   Female
   Male
   Female
   Male
   Female
 
   30
   $12
   $11
   $19
   $15
   $31
   $27
 
 
   40
   $15
   $13
   $26
   $21
   $38
   $37
 
 
   50
   $32
   $24
   $59
   $43
   $107
   $78
 
 
   60
   $75
   $46
   $134
   $87
   $259
   $161
 


  


  

 
  
   You'll have 15 quotes from the nation's top insurance companies in less than 1 minute!
   Get a FREE quote now
   
 

  
  




















The Star (Canada): "It's the U.S. foreign policy, stupid" ..

2001-09-19 Thread measl


-- Forwarded message --
Date: Wed, 19 Sep 2001 15:15:00 -0500 (CDT)
From: MSANEWS <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: The Star (Canada): "It's the U.S. foreign policy, stupid" ..
Suicide Bombers were NOT "pious avengers"


 __  __   _  ___  __
/  |/  / __/ _ | / |/ / __/ | /| / / __/
   / /|_/ /\ \/ __ |// _/ | |/ |/ /\ \  
  /_/  /_/___/_/ |_/_/|_/___/ |__/|__/___/  

 Support MSANEWS, a project of learning and enlightenment
"A Mind is a Terrible Thing to Waste" -- Martin Luther King



Source: Direct Submission
Email: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Date: Wed, 19 Sep 2001 16:23:32 -0400 (EDT)
Title: [The Star Article]: It's the U.S. foreign policy, stupid

TEXT:

Wed Sep 19 16:23:31 2001

It's the U.S. foreign policy, stupid

Haroon Siddiqui

STAR COLUMNIST

AMERICA IS not the target of terrorism because Islamic
fundamentalists hate American democratic ideals of freedom, 
liberty and "all that we stand for,"  as George Bush has 
claimed. 

Only if it were so. The problem may be much bigger. 

This is what needs to be grasped, quickly, even in this period of
bereavement.  There is a danger in this television-driven drama's
misplaced focus on the ``how'' of last week's horror, that Americans
will not pay sufficient attention to the ``why'' of it. 

The worst possible interpretation of the evil deed is to assume that
it was carried out by spiritually inspired suicide bombers seeking
"martyrdom" as a reward for trying to topple American hedonism. 

The mad bombers did not fit the mould of pious avengers. On the eve
of their evil act, two were consuming vodka and ogling strippers at
a bar. Another who had come via Germany liked to drink and dance
with his live-in girlfriend whom he had ditched before crossing the
Atlantic. 

They were trying to "meld in," to avoid suspicion, say the experts
who know not that no true believer would ever behave so, even as a
ruse. 

Nor did the bombers come from impoverished hellholes, the breeding
grounds of zealots and ready recruits for extremist causes.

They were educated products of privilege, sons of affluent families
from Arab nations that are among America's strongest allies. This is
scarier than we think. 

What we think is based on what we are told. What we are being told
in the wake of the biggest terrorist act is what we have already
been told, ad nauseam, in the years before. None of it inspires much
confidence. 

Osama bin Laden is the prime suspect, yet we can't seem to get even
the most basic facts on him right.

He is said to have inherited $20 million. Or $200 million. Or $500
million. All stashed in a Sudanese bank. Or invested broadly. 

His accounts have remained frozen since 1998. Or maybe not. 

He has only a few dozen followers. Or a few hundred. Or "3,000 Arab
radicals from 12 countries." Or an army of "35,000 warriors"
assigned to secret cells around the globe. 

He lives in a cave with three rooms and four wives, satellite TV,
faxes and phones. Or he does not spend more than one night in any
place.

Either out of ignorance or calculation, the theories on the motives
for last week's attacks avoid the most obvious: America has many
enemies. 

Not just because of globalization and a McWorld in which Coke brings
harmony to all. Or because of American cultural domination. Or
because America is arrogant and isolationist. 

Rather, it is due to American complicity in injustice, lethal and
measurable, on several fronts: 

The Israeli-Palestinian conflict, in which America stands by
decades-long Israeli defiance of United Nations resolutions,
international law and the most basic standards of human rights,
keeping millions penned in military-patrolled enclaves. 

The decade-long American-led economic sanctions on Iraq that have
killed 500,000 children under 5, strangled a whole nation and
destroyed the birthplace of civilization. 

The mess in Afghanistan where the CIA recruited and trained the
likes of bin Laden to overturn the Soviet occupation but dumped them
once that mission impossible was accomplished. Since then, the
American-led economic sanctions - imposed to help ferret out bin
Laden - have inflicted a new wave of misery, leaving thousands of
children dead and about 1 million people starving. 

American strategic alliances with the military and monarchical
dictatorships of Algeria, Turkey and Egypt, as well as the oil-rich
Arab states, all of whom crush even the smallest steps towards
democratization. 

Add the American sanctions on Iran, Sudan and Libya, "the rogue
states," plus the miseries of Bosnia, Chechnya and Kashmir, and you
begin to grasp the utter dismay, and sense of helplessness, gripping
the peoples of all these lands. 

N

freedomforum.org: Freedom flees in terror from Sept. 11 disaster

2001-09-19 Thread Jim Choate

http://www.freedomforum.org/templates/document.asp?documentID=14924
-- 

 --


 Kill them all, take their land, and go there for vacation.

 Rage Against The Machine

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





The Times - Secret plans for 10-year war

2001-09-19 Thread Jim Choate

http://www.thetimes.co.uk/article/0,,2001320010-2001325231,00.html
-- 

 --


 Kill them all, take their land, and go there for vacation.

 Rage Against The Machine

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





RE: Text of "Mobilization Against Terrorism Act" now online

2001-09-19 Thread Xeni Jardin

FWIW, "MATA" in Spanish means "kill."