Animals Like You Have Never Seen.... 20633

2001-12-29 Thread e7107


.. Wilma had a very perverted idea, that gave her butterflies in her stomach.
She wanted to suck the sex-crazed beast's huge cock.
It was a part of her favorite fantasy, and so tempting that she couldn't resist
To be continued...

CLICK HERE



YOU MUST BE AT LEAST 18 TO ENTER!

=
To be removed from our "in house" mailing list CLICK HERE
and you will automatically be removed from future mailings.

You have received this email by either requesting more information
on one of our sites or someone may have used your email address.
If you received this email in error, please accept our apologies.
=







Because it's a Lie

2001-12-29 Thread Steve Schear

Because it's a Lie
http://annoy.com/covers/doc.html?DocumentID=100027

Sung to the tune of 'Because I Got High' by Afroman

Osama bin Laden's friends dropped by to say hi
By taking a few little airplanes outa the sky
(La da da da da da)
They totaled the twin towers and I don't know why
- Saw people die [repeat 3X]

George W. Bush spent the day in the sky
Nowhere in sight, you coulda searched low and high
(La da da da da da)
Karl Rove covered the coward's tracks by telling a lie
- Fucking nice try [repeat 3X]

Condoleeza called the press, a tear in her eye
Bin Laden is sending secrets on video she said with a sigh
(La da da da da da)
Don't bother with the truth when it's surely better to lie
- Don't ask why [repeat 3X]

The networks never stopped to really ask why
They wanted blood - to make sure Afghanis would fry
(La da da da da da)
Now they find themselves gorging on humble pie
- Selling a lie [repeat 3X]

The President could no longer stand it, wanted to cry
Congressmen were leaking and even though his ratings were high
(La da da da da da)
Ari Fleischer warned the media to watch it or bullets would fly
- Don't even try [repeat 3X]
Rumsfeld was overseas selling pie in the sky
Back in the homeland Tommy Thompson didn't know why
(La da da da da da)
Anthrax was sorted while congress homeward did fly
- Letting them die [repeat 3X]
Attorney General Ashcroft ever cunning and sly
After losing elections to opponents who die
(La da da da da da)
Wants to eavesdrop, snoop and detain and lie
- Fuck off and die [repeat 3X]
Bush signed his name to it and then he got high
Cheney photographed while congress idly stood by
(La da da da da da)
The next election we shall bid all of them bye
- Eye for an eye [repeat 3X]
Confusion everywhere you look as accusations fly
Tom Ridge finally hired but he doesn't know why
(La da da da da da)
It's amusing just sitting watching him try
Reign in the FBI [repeat 3X]
September 11 saw towers rising up high
Attacked from jet planes hijacked out of the sky
(La da da da da da)
October twenty six a date forever we'll cry
- Because it's a Lie [repeat 3X]




Faustines anal urges

2001-12-29 Thread mattd

Subject: Faustines anal urges,your yukon donkeys calling,fau baby.

 >>bringing up the idea of simultaneous detonation of suitcase nukes in 
multiple metropolitan areas. <<

Innerestin you bring that up Justine,zat wots worryn them down at NSA 
central? Why not simple OK Ryders with added homer Simpson fuel rods on 
top? Id love to slide one of those up your cute little sewer rats ass BTW.
Any thoughts on A DC net with envelopes containing pledges all snail,all 
meatspace,all APster,all the time?

I am waiting for my case to come up
& I am waiting
for a rebirth of wonder
& I am waiting for someone
to really discover America
 Lawrence Ferlinghetti,
A Coney Island of the Mind 




Re: CDR: End-to-end encrypting US GSM phones?

2001-12-29 Thread Pier Carlo Montecucchi

GSM cell phones with crypto options.

Some months ago, I have looked at for a model developed by SIEMENS in
collaboration with a small new company. Pushing a key, and  . it is all.

But I do not have additional info at present. I will try to have more
because also of my interest.

Ciao

Pier Carlo Montecucchi


- Original Message -
From: "Peter Kuhm" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Friday, December 28, 2001 11:09 PM
Subject: Re: CDR: End-to-end encrypting US GSM phones?


>
> At 16:01 28.12.01 -0500, Trei, Peter wrote:
>
> >Are there any existing, available US type
> >GSM cell phones which provide good
> >end-to-end  voice encryption (ie, something
> >better than the broken GSM crypto).
>
> don't know, but you may have a look at
>

>
> Rohde & Schwarz  upgrades
> a standard SIEMENS S35i with a cryptochip.
>
> According to a article in German language it costs appr. EUR 2,300.--
> and they should have sold already 500 pcs to governments.
> 
>
> Peter
>
>





Re: VANGUARD: Actions Have Consequences: or, How to Advance Your Beliefs By Helping a Candidate (fwd)

2001-12-29 Thread Bill Stewart

Jim, I'm really surprised that you forwarded this spam to the list.
I received it directly also.

While he does have some useful comments about political organizing,
some of what he says about liberal/conservative differences is a pure crock.
We're in the middle of a radically activist right-wing statist 
administration -
they're doing far more than the Reaganites ever accomplished as far as
building up the political power of the military, reducing civil liberties for
citizens as well as non-citizen residents and travelers, strengthening the 
police agencies,
and moving power away from Congress and into the Executive Branch.

And yet this spammer Martin talks about conservatives not being activists.
To the extent that he's talking about the public rather than the
party activists and the elected and appointed officials,
conservatives today are less activist than during the Reagan/Bush 
administration
and the early Clinton administration, but the new Administration
is the most activist we've seen in ages, whether or not they
were actually elected.  One of the technologies for getting
grassroots and astroturf support that both big parties developed extensively
over the 80s/90s is the use of direct mail for fundraising and
generating letters to politicians - the conservatives
and particularly the Religious Right Wing were probably more effective
than the various sets of liberals.  This looks like an attempt to
do similar things on the net.]


At 10:29 PM 12/28/2001 -0600, Jim Choate wrote:
>-- Forwarded message --
>Date: Fri, 28 Dec 2001 14:41:15 -0800
>From: "TheVanguard.org" <[EMAIL PROTECTED]>
>To: "TheVanguard.org" <[EMAIL PROTECTED]>
>Subject: VANGUARD: Actions Have Consequences:  or, How to Advance Your 
>Beliefs By Helping a Candidate
>
>
>
>[EDITOR'S NOTE:  In honor of the approaching election year, we take this
>opportunity to distribute the following article by Rod D. Martin, founder
>and chairman of Vanguard PAC.]
>
>==
>
>
>Vanguard of the Revolution
>http://www.theVanguard.org
>
>
>ACTIONS HAVE CONSEQUENCES:  or, How to
>Advance Your Beliefs By Helping a Candidate
>
>by Rod D. Martin
>) 27 March 2001
>
>
> Conservatives forever complain about their political leaders.  But they
>don9t do a lot about it.
>
> Liberals (or more precisely, Leftists) are quite different.  Coming as
>they do mostly from distinct interest groups possessing activist political
>cultures and a sense of victimization (be they unionized workers, civil
>rights activists, feminists or whomever), leftists grow up on a steady diet
>not only of ideas, but of the strategies and tactics necessary to win.  From
>cradle to grave, they look to the state as a sort of political savior, and
>they learn early how to get from it what they want.
>
> By contrast, conservatives do not and never have thought in these terms.
>Generally, conservatives just want to be left alone, and see government as a
>necessary evil, nothing more.  Their lives focus elsewhere:  business,
>church, family, civic groups, almost anywhere but politics.  They see
>political activity not as a perpetual opportunity to gain advantages, but as
>an arena where (every so often) they must defend themselves from the latest
>government encroachment.
>
> This difference in culture is staggering, and accounts for much of the
>Left9s success in the 20th Century.  Conservatives do not think politically;
>Liberals do.  And while the Left hones its strategies and tactics year after
>year - spread across millions of individual people and thousands of
>institutions - conservatives wake up periodically, notice there9s an
>election, expend a little half-hearted effort, and go back to sleep.
>
> Because of this relative detachment, conservatives demonstrate a
>remarkably persistent naiveti.  Not only do they rarely understand the
>system (or what the Left has done and continues to do to them); they also
>subscribe year after year to the Sir Galahad theory of politics:  "our ideas
>will win because our hearts are pure."  This foolishness costs their
>movement not only elections but innumerable volunteers (and donors) every
>year, good men and women who cannot understand why their sheer rightness has
>not persuaded and conquered all.  Meanwhile, the Left marches on.
>
> The hard truth is, however wonderful our ideas may be, it is not those
>ideas but the actions they inspire which have consequences in the real
>world.1   And all those whiney conservatives, waiting for Trent Lott (or
>whomever) to effortlessly give them their hearts9 desires, are getting
>exactly what they deserve.  The concept is as old as the Bible:  those who
>do not work, shall not eat.
>
>
>INFLUENCE AND POWER
>
> At times almost despite themselves, conservatives over the past
>generation have come to hold tremendous influence.  They have also held some
>power.  The confusion of these concepts has lead to much needless
>consternation.
>
> In Morto

Re: End-to-end encrypting US GSM phones?

2001-12-29 Thread Lucky Green

On Fri, 28 Dec 2001, Trei, Peter wrote:

> Are there any existing, available US type
> GSM cell phones which provide good
> end-to-end  voice encryption (ie, something
> better than the broken GSM crypto).

Not to my knowledge. As for European-manufactured phones, the
best-known such phone is probably the German Rhode & Schwarz TopSec
handset. Rhode & Schwarz is of course the same company that sells a DEM
300,000 IMSI catcher targetted at the domestic German market and
an outbound-call-only GSM interception station for "export-only"
applications. The customer may wish to take the conflicting interests of
the manufacturer into account when making a purchasing decision.

The other well-known end-to-end encrypting phone is the Swedish Tiger
product initially designed for the Swedish military market. Having
participated in architectural discussions with the designers of the
device, I would recommend against its purchase.

In summary, at present trustworthy end-to-end encrypting GSM handsets are
not available in the market place.


-- Lucky Green <[EMAIL PROTECTED]> PGP encrypted email preferred.




Re: CNN.com on Remailers

2001-12-29 Thread Bill Stewart

At 09:01 PM 12/17/2001 -0600, Jim Choate wrote:
>On Mon, 17 Dec 2001, Trei, Peter wrote:
> > and sends the contents on to the next address (yes, this type of remailer
> > does not include nice features such as cover traffic).
>
>And it can't encrypt that outgoing traffic since it doesn't have the key
>to the destination (I assume the user must nest these themselves).

Yes, the user must nest those himself.  If he doesn't like doing it by hand,
there are client programs that can do this automagically.

The only way to get security is for the originator to do the encryption -
otherwise, if ANY remailer in the chain is compromised,
the Bad Guys can read the message.  If the originator does the crypto,
then EVERY remailer in the chain has to be compromised to break it.

>The sender having to know all the steps is a major threat to the standard
>remailer model. In fact it's one of the major shorcomings with the current
>approaches. The sender should at most be able to set the number of
>remailers, not which ones. That way there's on evidence sitting around on
>their machines (and you can posit throwing the keys away each time - but
>then you have to go out and get them again...and around and around we go).

The remailer-stats pingers publish this information on web pages;
you can retrieve it and read it by hand, or use a client program to fetch it.
If you don't want to keep it, don't.
And some of the clients are web pages themselves (Javascript or whatever),
so you can just retrieve them.

And obviously the sender needs to be able to pick the remailers to use -
depending on the type of message, some messages need to be sent through
remailers in appropriately safe jurisdictions, other messages don't
need much security but need high reliability or high speed
(so you want to pick remailers with good stats.)




Kill the president

2001-12-29 Thread mattd

Waco president arbusto e nuemann today let on he was pissed that the secret 
way he wants his death squads to operate leaked(see below for background) 
He was also said to be put off his banana's and peanuts by the suspicion 
directed toward an arab-american oberstumtrooper of the SS.The SS are my 
ubermench gibbered the loopy ruprecht.(see below,below.)

Subject: hoover fine example of seppo hero
Nazi Tribunal Is Model of Deception
Commentary. Ann Woolner is a columnist for Bloomberg News. The opinions 
expressed are her own.

By Ann Woolner
Atlanta, Nov. 23 (Bloomberg) -- President George W. Bush cites the 1942 
military tribunal convened to prosecute eight Nazis plotting attacks on 
U.S. soil to show how he wants to prosecute present-day terrorists.
It's a model, all right.
It's a model of a powerful government official using the secrecy of a 
military tribunal to deceive the public, falsely embellish his reputation, 
break promises to a whistleblower and sit by while a 30-year prison 
sentence is given to the man who thwarted the Nazi sabotage, a man to whom 
the agency had promised a presidential pardon.
That official was Federal Bureau of Investigation Director J. Edgar Hoover.
His aim was glory for cracking this hugely important case. The problem was 
that it took no detective work whatsoever to crack the case.
All it took was for FBI agents to believe a man, George Dasch, who twice 
called and then walked into FBI headquarters to tell them about the plot.
Dasch told them that Nazi submarines had deposited him and seven other 
Germans at U.S. shores in New York and Florida in recent days. Supplied 
with explosives and timing devices, their mission was to blow up certain 
U.S. military equipment factories, transportation structures and 
Jewish-owned department stores.
Dasch, aided by another would-be saboteur, Ernst Burger, led the FBI to the 
other six Germans, 14 American collaborators, $174,588 and a cache of 
explosives.
Pardon Promised
In return, FBI agents promised Dasch that if he pleaded guilty to his role 
in the plot, he'd get a prison sentence of no more than six months followed 
by a presidential pardon.
It didn't turn out that way.
During the 18-day trial, held in an FBI training room at the Justice 
Department building, agents played down Dasch's and Burger's cooperation, 
although one agent acknowledged Dasch had been promised the pardon.
This was not reported, since no journalists were allowed to cover the 
trial. Secrecy was necessary, Attorney General Francis Biddle explained 
beforehand, to prevent America's enemies from learning ``how our 
intelligence services are equipped to work against them.''
All eight Germans were convicted and six were executed, less than two 
months after Dasch arrived by submarine. Burger got a life sentence; Dasch 
got 30 years.
Hoover Censors Report
Even after the war ended and a new attorney general, Tom Clark, wanted to 
disclose what had happened at the trial, Hoover intervened.
He censored the report the Justice Department produced, cutting out 
information that could ``discredit or embarrass the bureau,'' Hoover wrote 
in a memo. Left out was any mention of the pardon promise and the fact that 
Dasch's own confession sparked the investigation.
Decades passed and Hoover died before the full story came out. Through 
Freedom of Information Act requests, Atlanta Constitution reporter Seth 
Kantor obtained the trial transcript, FBI reports and other documents and 
wrote a series of stories in 1980.
Those stories, on which this account is based, were recounted in an article 
this week by Cox News Service.
Prison Riot
As for Dasch, he'd been sent to the Atlanta Federal Penitentiary where his 
presence prompted a prison riot in 1944. Dasch, whom inmates threatened to 
throw off a five-story building, had been the principal target of the 
rioting prisoners, according to Biddle.
He survived and was transferred to Leavenworth prison in Kansas.
With pressure from new lawyers to release Dasch and Burger, President Harry 
Truman in 1948 ordered them deported to West Germany where they'd 
eventually be free. The White House statement continued the deception in 
explaining Truman's generosity toward these infamous Nazis: ``After their 
arrest, Burger and Dasch gave full and complete identities of all connected 
with the sabotage plot.''
This implied it was only after the FBI had tracked them down that they 
confessed.
Nor did this version help Dasch in post-war Germany. Nazi sympathizers 
threatened to avenge the executions of the other six saboteurs and the 
thwarting of Hitler's sabotage plans, prompting Dasch to move from city to 
city, job to job. By 1980, his trail had vanished, Kantor wrote. He has 
since died, according to news reports.
`Museum Piece'
Bush has ordered the creation of military commissions to conduct tribunals 
for the prosecution of non-U.S. citizens accused of terrorism against the 
United States. The speed of such tribunals, their portabi

RE: CNN.com on Remailers

2001-12-29 Thread Bill Stewart

[Various discussion about spammers using crypto to use remailers.
There's not much, but it's there.  Encrypted-Outgoing-Only
reduces the problem a lot, since there aren't many people who'll
positively respond to encrypted spam :-) ]

At 08:15 PM 12/19/2001 +0100, Anonymous replied to Peter Trei:
> > One solution, which I've long advocated, is for the remailer to drop
> > mail which has an unencrypted body after it's applied it's decryption key.
> >
> > Provided this is an announced policy, substantially increases the
> > protection of the mail and the remop. It does mean that only people
> > capable of using encryption can receive mail via the remailer, but
> > that's probably a *good* thing.
>
>No, that is a terrible idea. It totally destroys the usefulness of
>remailers on Usenet and mailing lists.

Obviously there are some destinations that need to be exceptions.
Usenet's easy - keep track of known mail2news gateways,
and any time you send mail to Usenet, you need to put lots of disclaimers
about it's remailed, it's probably forged, there's no way to reply, etc.

Mailing lists are tougher, because you obviously can't keep a list of them.

Another way to deal with unencrypted outgoing message is to send mail
saying "we've received an anonymous message for you.  You can pick it up
at https://myremailer.com/tempoutgoing/msg124354.txt within 7 days."
or some such.




Rushkoff and buy this free market special.

2001-12-29 Thread mattd

When I was a kid, we lived in a relatively modest neighborhood and shared 
one barbecue pit at the end of the block. Every weekend, anyone could go 
down there and make some hotdogs. Parents would even cook for one another's 
kids. When we got a bit wealthier, we moved out to the suburbs. There, each 
family had its own barbecue in the backyard. Instead of barbecuing with the 
neighbors, we competed with them. "The Jones's have sirloin, so we better 
get filet mignon!"

Sure, in the suburban sprawl schema, the Weber Grill company gets to sell a 
whole lot more barbecues, but our experience of community is surrendered to 
the needs of the marketplace.

I've been making this argument for the past couple of years in articles and 
speeches around the US. Then, just last month, a libertarian magazine made 
a fascinating critique of my work that they believed neutralized such 
anti-corporate sentiments: those of us taking a stand against the 
marketplace as the dominant social paradigm are only doing so in order to 
make money!

That's right  the whole 'lefty' thing is a disingenuous scam to sell 
books, posters, and magazines like this one. We're actually in it for the 
profit.

What makes this argument particularly perplexing is that, if it were true, 
shouldn't the libertarians praise us? We would be adhering, after all, to 
the very principles they espouse! We are simply providing a product that 
meets consumer demand, and  because we don't really believe the rhetoric 
we spew  we are doing so without prejudice or forethought. We are as 
blameless as corporations selflessly catering to the will of the 
all-powerful consumer. Just like global conglomerates, we  the merchants 
of Marx  are simply appealing to a target market. In our case, we sell a 
hip, anti-consumerist aesthetic to people who fall into the Seattle 
Demonstrator psychographic.

This kind of circular, self-perpetuating analysis is symptomatic of a 
society getting itself into some serious ideological trouble. We are so 
inundated by the free market's rhetorical whitewash that we are fast 
approaching what can only be labeled "market fascism": a social contract 
that can no longer tolerate any opinion or event that doesn't serve the 
speculative economy. Its adherents can't understand motivation in any other 
terms than profit-mindedness; they can't imagine alternatives to the logic 
of capitalism. Those who can conceive of counter-currents become the 
latest-variety "enemy of the state." The state itself, of course, is to be 
reduced to the barest regulation required for the free flow of capital and 
protection of property. Market opponents must be eliminated or, better, 
assimilated. The bottom line really does become the bottom line.

Currently, trillions of dollars and man-hours are being spent to lock down 
just such a reality template. Through intimidation, reward, and an odd 
scheme of justifications, the market is yearning towards the status of 
sacred doctrine. While it's still permitted, let's deconstruct some of its 
sacred cows before they become our only source of milk.

The first faulty premise of market fascism is that consumption invariably 
leads to an expression of democratic will  that we vote with our dollars. 
In this sense, corporations conduct focus groups, polling, and other forms 
of cultural anthropology, and justify this information gathering as an 
effort to get to the heart of what people really want.

In reality, the results of such studies are divided into two categories: 
desires that can be monetized, and those that can't. If focus groups 
conducted by the music industry, for example, determine that kids want to 
hear songs made by their own neighbors, record labels do not rush to market 
songs by anon-ymous teens. Instead, they use this information to construct 
publicity campaigns for the groups they have already decided to back.

No, the reduction of the role of citizens to that of consumers does not 
translate into cash-register democracy. It means that the scope of our 
influence has been reduced to very limited conversation with our marketers.

Market fascists dismiss such arguments, claiming that we are paranoid 
leftists, imagining a conspiracy between a group of fictitious marketers 
and corporate chiefs  that such people do not really exist. In a sense, 
they are right. In the corporate reality, no one is in charge.

When you walk into the gap, a young clerk will initiate a well-researched 
sales technique called gapact (Greet Approach Provide Add-on Close Thank). 
Should we be mad at her? Of course not. She's just doing what her manager 
has told her to do. If she doesn't end the day with a certain quota of 
multiple-item sales, she'll get in trouble. So do we blame her manager? No. 
He's got to meet a quota, too, set by corporate headquarters. Do we blame 
the marketing department? Well, they're just taking their orders from the 
ceo. And he's just taking his from the Board of Directors. And 

I love it

2001-12-29 Thread exec22

COMPLETE INTERNET BUSINESS! 

Earn Extra Money!
No selling or buying anything ever!

Have your own Web Site, Internet Mall and more! 
For more information, visit my web site at: 

http://www.dreamwater.org/biz/bizzyb/

This is a World Wide opportunity.
*An equal opportunity employer*

No Obligation


To be removed:
[EMAIL PROTECTED]





Re: End-to-end encrypting US GSM phones?

2001-12-29 Thread Ryan Lackey

I'm unclear why Lucky dislikes the Sectra Tiger (www.sectra.se); the
key management is not what I'd like, but seems designed specifically
for hierarchical military or corporate organizations, which is the only viable
market for a EUR 2500 encrypting cellphone.

I think the most cost-effective voice crypto solution today is a
bluetooth-enabled cellphone, a bluetooth-enabled PocketPC (ipaq) with
fast ARM, and then conventional encrypted-voice software (such as
speak-freely) running over PPP over bluetooth.  It would be fairly
easy to develop a belt or briefcase cellphone, handheld PDA with audio
I/O via headset worn on the belt or held in the hand (or, using an
Ericsson headset, stored in a briefcase as well), .  System cost USD
1000 or less, entirely COTS consumer hardware and open-source
software, and you get a free normal GSM cellphone, high-spec PDA
(==ecash terminal), and equivalent ease of use to the very best
cellphone (as you would be using a headset, carrying the phone and
processor separately).  If you're concerned about rf monitoring on the
local bluetooth side, you could substitute a wired headset/microphone;
if you're concerned about the general unavailability of
bluetooth-enabled fast PDAs, you could with an ease of use penalty use
IrDA.

I don't believe a dragonball could do viable voice crypto (especially
compression), at least without a coprocessor card, but perhaps it
could, and it certainly could support encrypted SMS.

You could possibly use your own non-standard link protocol, vs. PPP,
if you are concerned about latency, but it should be relatively easy
to achieve 100-200ms latency on cell to cell communications.   

The benefit of using software which exists on general purpose machines
and TCP/IP over the link is of course that normal desktops could be
used as secure phone terminals as well, and 

I think there really isn't much demand for voice crypto in the
marketplace, outside the military and defense-mandated commercial
contractor use.  When audio I/O-enabled PDAs, bluetooth cellphones,
etc. are widely deployed, perhaps this will change (plus, bluetooth or
802.11b PDAs could serve as cordless phones with IP-IP or VoIP calling
when in range of a legitimate or borrowed network).

I've used speak-freely on a unix laptop for years, using IP transport
of opportunity, and with a good headset/microphone, it seems to meet
my needs for secure voice.

The other reason for using PPP-Voice is to abuse cell providers; in
the UK, for instance, I have a GBP 75/month unlimited-calling phone
(UK numbers); I could easily use this to dial in to a UK-based phone
with HSCSD and a fast IP connection at 14.4kbps, and then use IP-IP or
a VoIP bridge to get cheaper or free international calling; encrypted
by default to the gateway, and possibly to the other end if supported.

-- 
Ryan Lackey [RL7618 RL5931-RIPE][EMAIL PROTECTED]
CTO and Co-founder, HavenCo Ltd.+44 7970 633 277 
the free world just milliseconds away   http://www.havenco.com/
OpenPGP 4096: B8B8 3D95 F940 9760 C64B  DE90 07AD BE07 D2E0 301F




BURGLAR WATCH-A STATE OF WIDESPREAD STINK, OPPORTUNISTIC & RAMPANT THIEVERY, PLAQUE, CHAOS, BARBARISM AND LAWLESS-A GLOBAL REPORT OF BREAK & ENTER, THEFT, TREPASS, FRAUD, FABRICATION AND COLLUSION CONSPIRED BY VANCOUVER POLICE

2001-12-29 Thread postautumn

To All Cybercitizens,
  
The official launching date for our global broadcast: 1 November, 
2000 is supposed to be a celebration marking the completion of 
Global Media Network. But as you're well aware, the reported 
break and enter, theft and other crimes committed by the City of 
Vancouver police which, if unchecked, have the potential to 
destroy human civilization. We offer our service as an impartial, 
fair, unbiased media. Our media network possess the power to 
illuminate the far corners of the globe, not for higher profits, 
but for higher understanding between the people of this great 
planet. We are proud that our media network, as its name implies, 
has the ability to reach every corner of the earth. We offer our 
declaration of principles to the men and the women, to our every 
brothers and sisters in the planet whom we humbly serve. We 
promise to report the news without fear or favor, to be a force 
for good in this world, fighting injustice, crushing intolerance, 
battling inhumanity, striking a blow for freedom at every turn. 
These are the goals of Global Media Network. Join us and visit 
our official web site at http://www.geocities.com/movehand44

 Global Media Network proudly presents REVIEW OF ONE OF THE TOP 
NEWS OF THIS MILLENNIUM:- BURGLAR WATCH-A STATE OF WIDESPREAD 
STINK, OPPORTUNISTIC & RAMPANT THIEVERY, PLAQUE, CHAOS, BARBARISM 
AND LAWLESS-A GLOBAL REPORT OF BREAK & ENTER,  THEFT, TREPASS, 
FRAUD, FABRICATION AND COLLUSION CONSPIRED BY VANCOUVER POLICE

ENACTMENT OF THE INCIDENTS [DETAILS PROVIDED BY THE VICTIM]:

On 6 June, 94. the victim went out at 2:30 p.m.  from his 
apartment. When he gone back at 2:37 p.m. he discovered that both 
his apartment and his bedroom were broken and entered. He 
discovered that his newly bought hi-fi components  (bought at A & 
B Sound) and forty CDs (costed CAD$2,000) were stolen from his 
bedroom.  When he reported the crimes to the police woman badge # 
9082, who admitted the fact of surveillance two years afterwards 
in 1996, she behaved very arrogant. She purposely hanged up the 
phone several times in order to aggravate him. 

Being alerted of constant harassment, out of suspicion, in 21 
September, 96, at 6:00 p.m.,  the victim confirmed with the same 
police woman badge # 9082 via 911 that the Vancouver police had 
placed the audio and video surveillance devices inside his 
apartment. She refused to remove them and asked him to remove 
them. The Vancouver police were very familiar with the 
environment inside the apartment. In other words, the Vancouver 
police specificially targeted at the victim's properties that 
were located at his bedroom and knew exactly when the residents 
inside left the apartment. When the residents left the apartment 
on 6 June 1994, at 2:30 p.m., the Vancouver police sneaked into 
his apartment, stolen his properties and left within a minutes.  
 

In July, 96, he called the Vancouver police in 320 Main Street, 
Vancouver, a male police who had sneaky remarks (about twenty 
something years old, caucasian) lied that the former chief 
constable Ray Canuel was in Atlanta, Georgia so that he could not 
handle the complaint. Afterwards, he sent a letter to Ray Canuel 
(deceased of cancer) in the same month without hearing any 
response. He then presented the complaint in person directly to 
the assistant to Ray Canuel. The assistant deceived him that the 
Vancouver police wouldl respond to his complaint three weeks 
later. The complaint aroused the police's revenge. Two polices 
without search and arrest warrant trespassed his apartment in 
Feb., 97. One caucasian police opened his complaint letter which 
was originally sealed without his consent and he was falsely 
arrested by the two polices. One of the police were a Chinese who 
were about 5"6, 160 lb., black and short hair. Another police 
were a caucasian who were about 6"2, gray and long hair whir 
covered his trim, gray-blue eyes, about 220 lb.. Both polices 
were thirty something years old. The latter one misrepresented 
and called himself as former Chief Constable Ray Canuel 
(deceased). The two polices committed trespass and false arrest. 

The fact that Vancouver police are morally corruptive makes no 
difference to his efforts. When the victim filed the complaint 
through other formal channels three years afterward, i.e. 1999, 
he received a fabricated letter from Sergeant Mike Bernard, 
Office of the Chief Constable, Internal Investigation Section, 
Vancouver Police Department dated 20 May, 99, falsifyinging that 
police badge #581 Dave Turpin, Tony Zanatta had conducted the 
investigations. Indeed, they never contacted him nor take any 
report. Given the Vancouver police are coercive that they collude 
with every party the victim seeks help from or affiliates with. 
When the victim booked an appointment with a security company, 
APC Security in Burnaby, B.C., to do a further sweep on his 
apartment, the Vancouver police colluded with the compa

BlackNet customers/suppliers needed.

2001-12-29 Thread mattd

Subject: dene suline Kanada
The Dene Suline of Cold Lake: Reasserting aboriginal title and opposing the 
NATO war machine
On December 12, 2001, the Dene Suline people of Cold Lake, "Alberta, 
kanada", are supposed to vote on an offer from the government to give money 
and land in exchange for Dene territory on which the Primrose Lake Air 
Weapons Range is located. Primrose Lake is a favored NATO playground, where 
they have tested out numerous missiles, bombs, weapons and aircraft that 
are currently being used in the War against Terrorism. The Dene Suline 
have established a camp at the main entrance of the weapons range and are 
opposing the theft of their land to feed the war machine and the oil 
industry. Since their earliest memories, the Dene Suline have lived 
peacefully on the land that is now the Primrose Lake Air Weapons Range. 
Through hunting, fishing, trapping, and food gathering, the Dene Suline 
have sustained themselves as a people in the face of genocide from the 
kanadian government and NATO. The Dene people live from northern kanada, in 
"Alberta, Saskatchwan, Manitoba, and Northwest Territories," down to Black 
Mesa in "Arizona." The U$ and kanadian governments and corporations have 
stolen their land, killed their people and forced the Dene onto 
reservations. Like the Dineh (Navajo) people at Big Mountain, the Dene 
Suline of Cold Lake have faced forced relocation. The first Europeans on 
Dene Suline territory were Hudson Bay Company fur traders and by 1867 a 
treaty, known at Treaty #6, was forced onto the Dene Suline. In 1952, the 
kanadian government, under the pretense of protecting the freedom and 
safety of kanada, stole the land encompassing Primrose Lake Air Weapons, 
land that was garunteed to them in their treaty. When this happened, the 
Dene Suline had a 7 day sit-in at Suckerville, on the shores of Primrose 
Lake, refusing to move until their land was returned. After heavy coercion 
from the government, a deal was made; a 20 year lease of 4,490 sq. miles 
for military use only and after 20 years, it was to be returned or a new 
lease renegotiated with the Dene Suline. Before 1952, a large deposit of 
oil was discovered on their territory and by the early 970s the technology 
had been developed to extract that oil. Since that time, the oil companies, 
primarily Alberta Energy Corporation, have been raping the earth in Dene 
Suline territory, taking billions of dollars worth of oil yearly and 
destroying the environment in the process. The voices of opposition from 
the Dene Suline have been ignored by the government and, not surprisingly, 
after 20 years was up, the government still maintained control over 
Primrose Lake and did not renegotiate the lease. The territory of the Dene 
Suline is being bombed and decimated everyday. Burial grounds, traplines, 
hunting and fishing grounds are destroyed by the greed of the oil industry 
and the bombs of the NATO war machine. Through alcohol, residential 
schools, poverty, and forced assimilation, the government has tried to 
break the culture and strength of the people.
NATO, the War Machine and Native Territory Many other indigenous Nations on 
Turtle Island have seen the effects of the war machine testing on their 
territories. The Western Shoshone people in Newe Segobia, (Nevada), have 
suffered from massive nuclear testing on their territory. Many people have 
contracted cancer and other illnesses and died from nuclear radiation and 
the subsequent destruction of the land and the sustenance it provides for 
their people. Low level flight trainings have shattered the lives of many 
Innu people in North Eastern kanada. Thousands of low level planes fly over 
their territory every year, negatively affecting the environment, the food 
sources and culture of the Innu. For 6 weeks every year at the Primrose 
Lake Air Weapons Range, more than 18 NATO countries use the range for 
"Operation Maple Flag" in which they test new laser and ballistic missiles, 
and depleted uranium bombs. In the 50 years since the Department of 
National Defense stole this land, Primrose Lake has become the second 
largest airforce base in kanada. The Tomahawk Cruise Missile was first 
tested at Primrose Lake, and then used in Iraq, Yugoslavia and now 
Afghanistan. The formation of the U$ and kanada was based upon the 
terrorizing and genocide of Native people. Christian fanatics conquered new 
lands through war, biological warfare (including the the intentional spread 
of small pox), land theft, forced assimilation, deceit, torture, rape, and 
destruction of villages, long houses, gravesites, carvings, totem poles 
etc. The West perfected colonization here on Turtle Island and now 
"Globalization" is its latest offspring with "Operation Enduring Freedom" 
(the War Against Terrorism) as its military arm. The War against Terrorism 
is colonization in the 21st century, as more areas and countries are turned 
into U$/Western military occupied zones and the

Death to Capitalism.

2001-12-29 Thread mattd

the most stupefying characteristic of todays society is its ability to
make daily comfort exist a hands breadth away from catastrophe.
In the middle of October, 2000 in eastern Kentucky, a coal mine pond gave
way, releasing 200 million gallons of sludge into streams, killing fish,
washing away roads and bridges and fouling the water supply. The tar-like
sludge spread into the Ohio River. But such disasters are not so uncommon.
One need only consider the cyanide spill that happened in Romania at the
end of January spreading as far as Yugoslavia and leaving a few hundred
tons of dead fish (not to mention birds, otters and other creatures) in its
wake, or the spillage of radio-active material at Tokaimura, Japan that
caused major environmental damage for a radius of several miles around it
in October of 1999. And of course, we cannot forget Bhopal or Chernobyl.
But these are the most spectacular disasters, the ones that could not be
made invisible (though even disasters of this sort may, in time, become so
common that they cease to be newsconsider that there 45 coal mine ponds
that were said to be at higher risk of failure than the one that collapsed
in October). Disaster is, in fact an ongoing aspect of our present
existence. The estuary at the mouth of the Colorado River is quickly dying,
most likely due to the effects of hydro-electric dams. Chemical pollution
has spread death from the mouth of the Mississippi River well into the Gulf
of Mexico. The ozone layer disappears along with the forests and the
plankton that feed it. And the melting of the polar ice caps has forced
scientists to admit to the reality of global warming. When one adds to this
the more blatantly intentional disasters caused by the attempts of the
great powers to teach the lesser powers the meaning of democracy by bombing
the shit out of the powerless, it is clear that life in the present is
always lived on the edge of disaster.
When the litany of disasters that surrounds us is sung, it is easy to feel
that we are dealing with the inevitable, with an unavoidable fate. But this
is not the case. Every one of the disasters described above can be traced
to the functioning of specific social institutions and the decisions of the
people who hold power in them. As has been said many times, there are
people who make these decisions and they have names and addresses.
They also share a particular social position. As the rulers of this social
order, they benefit from it in terms of power and economic wealth. (That
they do so at the expense of their individuality and any real enjoyment of
life does not decrease their responsibility for the present existence.)
While some of the disastrous effects of their decisions may have taken them
by surprise, it cannot be honestly said that they acted blindly. After all,
these are the same people who had no problem with showering a small
predominately agricultural country with herbicide in an attempt to destroy
its economy. The environment is not their concern; power and economic
expansion are.
When capitalism developed the technological system ideal for its expansion,
the industrial system that began in the shipping industries which then
provided the resources for developing the manufacturing industries, the
door was opened to a world of daily misery and ongoing disaster. Whether it
be the genocide against indigenous people who did not adapt quickly enough
to their enslavement to the needs of capital, the illnesses and injuries
that the regime of work imposes on workers, the increasing precariousness
that faces everyone who is not of the ruling class, misery is the order of
the day in this society.
To fully understand why this is, it is necessary to realize that capitalism
thrives on crisis. Its order is an order of crisis management. For the
rulers of the social order this is not a problem. They are well protected
from the consequences of the crises that they sometimes quite intentionally
induce. Those at the bottom, those who have been excluded from any real
control over the circumstances in which they live, suffer the consequences
of this system.
The industrial system, which is so necessary to the expansion of capital,
has been an environmental disaster from the beginning, offering William
Blake some of his most frightening poetic images. The famous London fog of
the 19th century was, in fact, industrial smog which accompanied high rates
of tuberculosis among the poorer classes. Today, the toxification of the
environment combines with the stress of daily survival to create cancer,
heart disease, immune system breakdown and increasing levels of mental
distress and disorder from which those in power seek to protect themselves
with medical care that most of us could never affordand which plays its
own role in the toxification of this world.
Capitalism will not provide a solution for the disasters it causes. It is a
system of stop-gap measures, and, increasingly, as the new technologies
come to the fo

PATRIOT games.

2001-12-29 Thread mattd

The PATRIOT shredding and flushing of the constitution was drawn up and 
ready to go.Some background I want to store online,justin Case.
The Juvenile Justice Bill
After the Columbine High School shootings, the US Senate passed the May 
1999 Juvenile Justice Bill. Though unrelated in any way to "juvenile 
justice," several provisions were included that directly target animal 
rights and environmental activists. Reflecting industry pressure and 
influence, the Juvenile Justice Bill condemns people who commit politically 
motivated nonviolent offenses with exceedingly disproportionate prison 
terms. Unfortunately, this law is only one example of a systematic attempt 
by industry and government to discourage direct action by punishing 
activists with jail time that far exceeds time given to truly violent and 
dangerous people. Such sentencing preferences illustrate the priority the 
state (and our crypto-fascist , creep of creeps,Tim May btw.)gives to 
property over human life. The Juvenile Justice Bill also:
1. Makes it a federal crime to distribute information on how to make bombs 
(over the Internet or otherwise) or other weapons of mass destruction if 
the "teacher intends" for the information to be used to commit a federal 
violent crime, or knows that the recipient will use the information to 
commit such a crime.
2. Enhances penalties under the Animal Enterprise Terrorism Act by changing 
a minimum sentence to a mandatory five years instead of one.
3. Creates a "National Animal Terrorism and Ecoterrorism Incident 
Clearinghouse" to "accept, collect and maintain" information on crimes 
against animal enterprises or commercial activities because of their 
perceived impact on the environment. Records of such incidents are 
available for all law enforcement agencies.
4. Enhances sentences for "gangs," defined as the assembly of three or more 
people. These sentencing guidelines promote selective and politically 
biased prosecution by applying more serious penalties against those who 
commit crimes in defense of animals or the environment. The courts are 
being asked to evaluate the actions of an individual and the thoughts 
behind an action instead of simply evaluating the actual crime. The bill 
also undermines the First Amendment protection of websites and publications.
The RICO Act
In May 1999, Senators Orin G. Hatch (R-UT) and Diane Feinstein (D-CA) 
introduced an amendment to the Racketeer Influenced and Corrupt 
Organization (RICO) Act, aimed at "Animal Enterprise Terrorism and 
Ecoterrorism." RICO was originally designed to combat traditional organized 
crime and its infiltration of legitimate enterprises; however, its most 
innovative, and controversial, aspects are provisions which allow the state 
to seize property owned by anyone charged with being part of a "criminal 
enterprise." RICO targets illegal activity organized across state lines. 
Thus, if you "organize" using email and telephone, you can potentially be 
prosecuted under federal laws. In the past, RICO has been employed 
primarily against white-collar criminals, anti-abortion protesters and 
mobsters. Now, target groups can include just about anyone.
Oregon Declares War on Activists
On March 12, two bills intended to stiffen penalties for "eco-terrorists" 
were unanimously approved by the Oregon House of Representatives. Under HR 
2344 and 2385, Oregons organized crime laws would be expanded to include 
activities such as tree spiking and sabotage of animal research, livestock 
or agricultural operations. Convictions under the laws would be punishable 
by up to 20 years in prison and a $300,000 fine. Reflecting the hysterical 
attitude and culture of propaganda currently prevailing in the Oregon 
legislature, Representative Bob Jenson claimed he received threatening 
letters and phone calls a year ago when lawmakers were first considering HR 
2344 and 2385. He stated, "I will do everything to ensure that if you break 
the law as part of those protests, that you will get free room and board 
for 20 years." The process of attacking social movements in Oregon fits 
into a larger pattern of criminalizing dissent with respect to the 
anti-globalization movement, which is made up of anarchists, 
environmentalists, animal rights activists, students, Unions, teachers and 
others concerned about the fate of the planet and each other. David 
Helvarg, author of The War Against the Greens, stresses how difficult it is 
for ecologically destructive industries to look good and publicly justify 
their actions; therefore, their strategy has been "to make us look bad, 
demonize us and make themselves look respectable as a result." If one were 
to compare a cancer-causing industrial polluter to a teenage 
monkeywrencher, it would become glaringly apparent to the public as to who 
is the real "eco-terrorist."
Groups to Watch Out For
"A growing network of pro-technology activists is making sure that the 
message of my book, EcoTerror: The Violent Ag

Outbreak on Clavius.Complete news Blackout.H.Floyd to investigate and report.

2001-12-29 Thread mattd

Subject: quarantine on Clavius and corralitos.
During a health emergency, health officials would be able immediately to 
take over any materials or facilities "as may be reasonable and necessary" 
for emergency response -- including the management of a health care 
facility and the rationing of medicine and other supplies if a shortage 
develops.
They could compel a person to submit to a physical exam or test without a 
court order or be charged with a misdemeanor offense and face the 
possibility of forced isolation. Physicians and other health workers could 
be forced to do the testing or face criminal liability.
Court orders would be required for quarantining someone, but faced with an 
immediate threat, officials could quarantine first and go to court afterward.
The law sets forth a procedure for contesting court orders and for hearings 
on the need for continued isolation. Officials could compel people to be 
vaccinated or treated for infectious diseases, though not those likely to 
suffer serious harm from a vaccination. The law would shield officials and 
their agents from civil liability, except in cases of gross negligence or 
willful misconduct.
[George] Annas, the Boston University critic, says that the law's major 
problem is that it gives "tremendous powers to unnamed and unaccountable 
public health officials to order people examined, treated, vaccinated or 
quarantined and do it with immunity unless acting with willful malice.
Mousepox that was converted to a selective strain that infects white men 
only with 100% fatality rates is suspected.It is believed a professor R ,a 
molecular biologist accidently released the virus on a recent trip to 
sacramento.




Strut like Tut,Tiny blur spotted in Egypt.

2001-12-29 Thread mattd

Subject: egypt dissident jailed,Toady Blecch could not care less.
Egypt's First Web Prisoner Of Conscience
by jonathan 5:56am Fri Nov 30 '01
Egypt's First Web Prisoner Of Conscience
''He is Egypt's first web prisoner of conscience," quipped one recipient of 
the news that a web designer was arrested last week, charged with posting 
an indecent poem on the Internet. Although the incident was not entirely 
unique -- people have been hounded in the past for posting Internet content 
deemed to be offensive to public morals -- the case of Shohdy Naguib, 
Al-Ahram Weekly's 39-year-old web master, is different because it relates 
to freedom of literary expression.
Shohdy Naguib was taken from his home by police in the early hours of 22 
November. He was accused of posting a poem by his late father, Naguib Surur 
-- a renowned poet, playwright, theatrical critic and actor who died in 
1978 -- on a Web site. Naguib denied connection to the site. Although the 
prosecutor ordered his release on bail on the very same day of his arrest, 
Naguib remained in custody until 25 November, three days later.
Naguib agrees. "The Internet is a virtual place where copies of everything 
proliferate. There are no Internet authorities as such, with the exception 
of those whose task is to make the net function. It doesn't have an owner, 
and won't unless a super-power emerges to control it," he told the Weekly. 
Cyberspace, he argued, belongs to all those who participate in it. "We 
cannot let it be a playground where only cats are allowed in and mice are 
banished."
- Al-Ahram Weekly
 

More stuff like this at KillYourTV.com




Open secret

2001-12-29 Thread mattd

That timmy thinks he's hung like donkey kong yet is actually well below 
average.? Probably,the jerk's nutless anyway so thats academic.No,I refer 
to a teaser in this weeks nude scientist.>>OPEN SECRET: An unbreakable code 
could soon become free for all.Sounds like a nightmare for professional 
spies...<<
Weel sheet! Thats got to be good fucken news! Stale but still NS is a 
conservative mag,digesters reader for scientists.(They still broke the 
anthrax-US govt link.)This issue also has a story on the lost biowarfare 
battle and for Quantum crypto-punks the hope that with superconducting 
cables operating now in Denmark and Detroit and the news of single photon 
emissions in supercooled conditions,the quantum road to crypto-anarchy 
edges ever closer.On this day-1863 -- Russia: Nihilists annihilate Chief of 
Police.1971 -- US: Vietnam veteran antiwar protesters peacefully
end their occupation of the Statue of Liberty.
"The statue of Liberty welcomes innumerable
pilgrims...while it is announced that the center of the
world, which took millennia to shift from the
Euphrates to the Thames, is now on the Hudson River.
In full imperial euphoria the United States
celebrates...but novelist Mark Twain, the old spoilsport,
proposes changing the national flag: the white stripes
should be black, he says, & the stars should be skulls
& crossbones."
1973 -- Alexander Solzhenitsyn publishes Gulag
Archipelago.
"One word of truth shall outweigh the whole world."
1984 -- Straw That Broke...?: Sam Peckinpah, film
director, rides the high country, of cardiac arrest at 59.

Any of you punks want to go back and get Angel?




Re: NTBugtraq author says virus authors "terrorists"

2001-12-29 Thread Eugene Leitl

On Sat, 29 Dec 2001, Anonymous wrote:

> Forget that it may be problematic to extradite the individual, or that
> they may be young, or claim to be doing 'research.' We need to catch
> them, and place them in a position whereby they are seen for what they
> are -- a terrorist," Cooper said. "The cost to our businesses, not to
> mention our way of life, is simply too high to not pursue these
> individuals."

Of course the chiefest terrorists are purveyors of low-quality software
such as Microsoft. MS Outlook and Windows are the greatest threats to your
data, far beyond what the most heinous virus/worm could ever hope to
accomplish.

In a world of diverse, secure, noncommercial systems (free *nices) there
would be basically no worms nor viruses, and the damage they'd be doing
would be highly limited.

Ceterum censeo Microsoftem delendam esse.




Cell phone urban legends

2001-12-29 Thread mattd

Phone set to speed dial an answering machine recorded police abusing and 
beating black man in Chicago.Cops fired.
Phone with vibrating silent alarm fished out of young womens rectum in 
Taiwan."We were experimenting"faustine chong said.Then there was the one 
that give's you a splitting Israeli headache.Thats in the archives 
already.(thanks jya.)
SMS,DoCoMo style texting is an official "killer app".All yakuza hitmen now 
check contracts and prices by cellphone now.
Soprano waste management is importing the technology.See New Jersey 
IMC.mattd in OZ used to get regular empty cellphone calls on his 
messagebank.0417 531 548.everytime he said "Kill the President"He wants the 
service reinstated.
Phonecalls on the web were tried by Taylor last year.He called NZ and it 
was like ham radio,with a satellite 1 or 2 second delay.Another net 
revolution but I digress.Faustine please call mattd for aural sex on 03 
5422 7207.check 17 hr timeslip.

  Direct action_ is what it's all about. Undermining the state through the
spread of espionage networks, through undermining faith in the tax system,
through even more direct applications of the right tools at the right times.
When Cypherpunks are called "terrorists," we will have done our jobs.
Font: Daschle-Anthrax-Bold




Re: Afghans Demand End to Bombing

2001-12-29 Thread Jon Beets

I read several articles and had not seen those... All I asked for was a
reference... Thanks for POINTING out that you can find it... Just WANTED THE
PERSON saying it to also GIVE HIS REFERENCES when he makes he satements...

Jon Beets

- Original Message -
From: "Tim May" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Friday, December 28, 2001 11:42 PM
Subject: Re: Afghans Demand End to Bombing


> On Friday, December 28, 2001, at 09:16 PM, Jon Beets wrote:
>
> > - Original Message -
> > From: "Anonymous" <[EMAIL PROTECTED]>
> > To: <[EMAIL PROTECTED]>
> > Sent: Friday, December 28, 2001 8:00 PM
> > Subject: Afghans Demand End to Bombing
> >
> >
> >>Heard on the news tonight that the "interim Afghan government" was
> >> demanding an end to the bombing in 3 days, and that all troops
> >> leave in 6 months.
> >
> > Can you show a reference to this?  Everything I read today said tribal
> > leaders from the Paktia province were wanting the bombing to stop... I
> > read
> > nothing about the interim government stating it...
>
> It took me less than a minute to retrieve several articles with quotes
> from members of the interim government. Here's just one of them:
>
> http://dailynews.yahoo.com/h/nm/20011228/ts/attack_dc_1192.html
>
> If you challenge someone to "show a reference to this" you should have
> at least spent a minute looking.
>
> >
> > Again I still hav'nt seen a reference where Bush stated our troops will
> > be
> > there for a long time.. He did say the war on terrorism will last a long
> > time but where did he explicitly say they would be in Afghanistan for
> > along
> > time?
>
> You haven't seen a reference? Then you haven't looked, have you?
>
> It took me another 30 seconds to find this (though I remembered it from
> seeing Bush's comments today in Crawford):
>
> "With operational commander Gen. Tommy Franks at his side at his
> Crawford, Texas, ranch, Bush said he expected U.S. forces to remain in
> Afghanistan ``for quite a long period of time.''"
>
> http://dailynews.yahoo.com/h/nm/20011228/ts/attack_dc_1196.html
>
> --Tim May, Citizen-unit of of the once free United States
> " The tree of liberty must be refreshed from time to time with the blood
> of patriots & tyrants. "--Thomas Jefferson, 1787




Re: VANGUARD: Actions Have Consequences: or, How to Advance Your Beliefs By Helping a Candidate (fwd)

2001-12-29 Thread Jim Choate


On Sat, 29 Dec 2001, Bill Stewart wrote:

> Jim, I'm really surprised that you forwarded this spam to the list.
> I received it directly also.

La di da...

> While he does have some useful comments about political organizing,

So it wasn't a total spam after all, you're just upset by his commentary.

> some of what he says about liberal/conservative differences is a pure crock.

The same can be said about you or I, silly.

> We're in the middle of a radically activist right-wing statist 
> administration -

Bullshit. This is standard spin doctor bullshit. The differences between
'right' and 'left' are in your imagination. Both sides want to be THE
side, that's the ONLY factor worth focusing on. 'How' isn't that
important.

> they're doing far more than the Reaganites ever accomplished as far as

The 'Reaganites' accomplished nothing, other than taking credit (and
getting it) for things that would have generaly happened along the same
lines anyway. You, and most others, give 'them' way too much power over
what happens. Quit acting like a victim.

> building up the political power of the military, reducing civil liberties for
> citizens as well as non-citizen residents and travelers, strengthening the 
> police agencies, and moving power away from Congress and into the
> Executive Branch.

Condemnations equally applicable to Republican, Democratic, Green, or
Libertarian (and any others you generaly want to add to that list).
 
At least it got you off your ass.

Happy New Year.


 --


 Day by day the Penguins are making me lose my mind.

 Bumper Sticker

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-






Re: CNN.com on Remailers

2001-12-29 Thread Jim Choate


On Sat, 29 Dec 2001, Bill Stewart wrote:

> > At 09:01 PM 12/17/2001 -0600, Jim Choate wrote:

> The only way to get security is for the originator to do the encryption -
> otherwise, if ANY remailer in the chain is compromised,

Actually this isn't the 'only' way. ALL (!!!) that is required to keep the
security of the email traffic is that it is source encrypted for the
destination; it's gibberish to all middle-men. What the remailer chain
does is break the causal connectivity, it provides plausible deniability.

Now, with respect to middle man routing, if each middle man routes to
another layer randomly then it addresses the exact issues of a 'turned'
remailer. In addition, with the current 'ad hoc' key management mechanism
getting intermediate keys isn't that hard (just pose as a remailer
operator and they'll gush into your keyring). A solution to this problem,
that you won't accept but 'oh well', is to create the network using 'small
world' approaches so that the remailers have a 'back channel' to
continously validate the 'reputation' of the next stage remailers (ie ala 
'igor') while at the same time not even knowing what other remailers out
there might exist in the 'remailer cloud' (and more importantly not
caring).

This approach has a couple of additional advantage; it doesn't require the
user to understand some hard to comprehend syntax for the remailers, and
it doesn't require the user to keep all this evidence around a priori to
their actual use of the remailer chain (ie they don't have to d/l a key
from anywhere mecessarily) - traffic analysis.

> the Bad Guys can read the message.

At no point can anyone other than the recipient 'read the message', unless
it was sent in the 'clear' in the first place (silly thing to do).

> If the originator does the crypto,
> then EVERY remailer in the chain has to be compromised to break it.

ROTFLMAO. ONLY(!!!) if the source didn't destination encrypt to begin
with. A critical step you seem to not quite 'get'.

[other 'stuff' deleted]


 --


 Day by day the Penguins are making me lose my mind.

 Bumper Sticker

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





Re: cell phone guns

2001-12-29 Thread David Honig

At 06:54 PM 12/28/01 -0500, Faustine wrote:
>
>Not surprising, since cell phone holster decoys have been around for ages.
>Why settle for a .22 when you could be packing a Glock 30?
>Like this...

Better stealth.

I like the NAA .22 belt buckle.  Can also fit inside a beeper case.

Mossad prefers suppressed Berretta .22 which doesn't need racking.




Re: cell phone guns

2001-12-29 Thread David Honig

At 03:16 PM 12/28/01 -0800, Eric Murray wrote:
>22 caliber four-shot pistol hidden inside a cell phone, uncovered
>during police raids in Europe.
>
>http://abcnews.go.com/sections/world/DailyNews/phone001205.html
>
>"Cell phone users will have to be made aware that reaching for their
>phones in some circumstances could be misinterpreted as a threat by
>authorities"

FWIW Old news.  The yugos were said to have this, a picture was
published, over 6 months ago.




The Register - Stealth copy protection - where we are now

2001-12-29 Thread Jim Choate

http://www.theregister.co.uk/content/54/23516.html
-- 

 --


 Day by day the Penguins are making me lose my mind.

 Bumper Sticker

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





yes I would like to make my own DVDs

2001-12-29 Thread DRenck1042

what do I do?

[EMAIL PROTECTED]

Who do I pay?




brinworld, sexchart

2001-12-29 Thread David Honig

Wired interview with creator of sexchart
http://wired.com/news/culture/0,1284,48997,00.html

The graph: 
http://www.attrition.org/hosted/sexchart/sexchart.9.25

Relevence to Brin's _Transparent Society_ etc should be obvious.




Re: VANGUARD: Actions Have Consequences: or, How to Advance Your Beliefs By Helping a Candidate (fwd)

2001-12-29 Thread Tim May

On Saturday, December 29, 2001, at 02:20 AM, Bill Stewart wrote:

> Jim, I'm really surprised that you forwarded this spam to the list.
>>

I'm not surprised that Choate did this.

However, Bill, I _am_ surprised that you top-posted and included the 
entire long spam article in your reply here.

(I have snipped it.)




--Tim May
"Dogs can't conceive of a group of cats without an alpha cat." --David 
Honig, on the Cypherpunks list, 2001-11




The idiocy of Choate

2001-12-29 Thread Tim May

On Saturday, December 29, 2001, at 03:27 AM, Bill Stewart wrote:

> At 09:01 PM 12/17/2001 -0600, Jim Choate wrote:
>> The sender having to know all the steps is a major threat to the 
>> standard
>> remailer model. In fact it's one of the major shorcomings with the 
>> current
>> approaches. The sender should at most be able to set the number of
>> remailers, not which ones. That way there's on evidence sitting around 
>> on
>> their machines (and you can posit throwing the keys away each time - 
>> but
>> then you have to go out and get them again...and around and around we 
>> go).
>
> The remailer-stats pingers publish this information on web pages;
> you can retrieve it and read it by hand, or use a client program to 
> fetch it.
> If you don't want to keep it, don't.
> And some of the clients are web pages themselves (Javascript or 
> whatever),
> so you can just retrieve them.


As others have remarked, Choate simply has no clue how even the 
Cypherpunks remailers of 1992 work(ed).

That he thinks "having to know all the steps" is a bad idea tells me he 
is just too clueless to have ever been taken seriously, even for a few 
months, here on this list.

An old girlfriend of mine grasped the idea of envelopes-within-envelopes 
and how the security of the remailer chain depended on the sender 
deciding on a list of intermediate steps and then encrypting each nested 
envelope appropriately.

"The sender should at most be able to set the number of remailers, not 
which ones. " is one of the stupidest comments I have ever seen on this 
list.

This has been Cypherpunks kindergarten material for a decade (and many 
of us knew it years earlier).

--Tim May



>
> And obviously the sender needs to be able to pick the remailers to use -
> depending on the type of message, some messages need to be sent through
> remailers in appropriately safe jurisdictions, other messages don't
> need much security but need high reliability or high speed
> (so you want to pick remailers with good stats.)
>
>
--Tim May, Corralitos, California
Quote of the Month: "It is said that there are no atheists in foxholes; 
perhaps there are no true libertarians in times of terrorist attacks." 
--Cathy Young, "Reason Magazine," both enemies of liberty.




Re: [fsml] Euro Banknotes embed RFID chips (fwd)

2001-12-29 Thread Steve Schear

At 01:52 AM 12/29/2001 +0100, Eugene Leitl wrote:
>-- Forwarded message --
>Date: Sat, 29 Dec 2001 00:36:31 -
>From: Andrew Hennessey <[EMAIL PROTECTED]>
>To: [EMAIL PROTECTED]
>Subject: [fsml] Euro Banknotes embed RFID chips
>
>http://www.eetimes.com/story/OEG20011219S0016
>
>
>
>Euro bank notes to embed RFID chips by 2005
>
>By Junko Yoshida
>EE Times
>(12/19/01, 3:03 p.m. EST)
>
>SAN MATEO, Calif. - The European Central Bank is working with technology
>partners on a hush-hush project to embed radio frequency identification tags
>into the very fibers of euro bank notes by 2005, EE Times has learned.
>Intended to foil counterfeiters, the project is developing as Europe
>prepares for a massive changeover to the euro, and would create an instant
>mass market for RFID chips, which have long sought profitable application.
>
>The banking community and chip suppliers say the integration of an RFID
>antenna and chip on a bank note is technically possible, but no bank notes
>in the world today employ such a technology. Critics say it's unclear if the
>technology can be implemented at a cost that can justify the effort, and
>question whether it is robust enough to survive the rough-and-tumble life
>span of paper money.

Not to mention intentional Electro-Magnetic Pulse exposure of bills to 
thwart the system.

A cheaper and more robust solution would embed random length and oriented 
glass/plastic fibers in the paper.  When exposed to a line illuminator as 
it is passed through a verifier, each bill would have a unique "illuminate 
here" - "light comes out there" signature that can be read out and matched 
to a DB generated at the mint.  Because of the fiber's resilience it will 
be more difficult to damage or thwart than RFIDs.

steve




RE: CNN.com on Remailers

2001-12-29 Thread Meyer Wolfsheim

On Sat, 29 Dec 2001, Bill Stewart wrote:

> Obviously there are some destinations that need to be exceptions.
> Usenet's easy - keep track of known mail2news gateways,
> and any time you send mail to Usenet, you need to put lots of disclaimers
> about it's remailed, it's probably forged, there's no way to reply, etc.

Certainly wise, though not popular with the remailer users (see the
thread on alt.privacy.anon-server discussing the recent switch by one of
the most popular mail2news gateways to this type of system, where a
disclaimer is placed at the top of the message.) The simple truth is that
the average user can't be expected to look at mail or news headers,
though, so you need to place such things in the body.

> Mailing lists are tougher, because you obviously can't keep a list of them.

What about an "opt-in" service for mailing list admins?

> Another way to deal with unencrypted outgoing message is to send mail
> saying "we've received an anonymous message for you.  You can pick it up
> at https://myremailer.com/tempoutgoing/msg124354.txt within 7 days."
> or some such.

I've thought about this before. I was concerned about the potential risks
of keeping the messages in an identifiable manner on the remailer
server... but if everything is encrypted, it wouldn't matter.

Unfortunately, requiring everything be encrypted also limits the
whistle-blower, anonymous tipster applications of these systems.
Additionally, it would be nice if the major PGP implementations supported
the "stealth encryption" features, too. (Yes, there's ways to make do
without it...)

-MW-




Equity Loans with your home 22

2001-12-29 Thread ads5685
 you can get a.
FREE NO OBLIGATION LOAN QUOTE
We can help you find resources to get approved for.
...Debt Consolidation
...A Second Mortgage
...Home Improvements
...Refinancing your Current Mortgage

		
		
		
Our clients shop the market for you to offer the most competitive companies, offering the best loan products in your state! Why waste YOUR TIME and MONEY with a one-company broker? What's more, all quotes are provided FREE OF CHARGE, and with absolutely no obligation!

Are you paying too much for your mortgage?
You would be surprised how many people are!

Find out if you could be saving money right now!
A simple, 5 minute online form could help save you thousands!

Click here to visit our website

What do you have to lose?  (Besides those high rates?!)




Please Note:
To be removed from our list simply click here. You will be removed from our list immediately. Our goal is to help consumers find the best pricing for Mortgage products. If you aren't in the market for our services at this time, please disregard this message, and we sincerely apologize for any inconvenience.



Save Up to 70% on Insurance Here!



Article: Embedding Identities

2001-12-29 Thread BlancInk

>From http://www.israel21c.com/channels/technology/articles/tech_0014.htm:

Researchers at Ben-Gurion University of the Negev and the University of
Connecticut have designed a novel method for improving the security of
identification cards or passports.

In the sophisticated approach, a block of encrypted information - such as
the bearer's fingerprint pattern or other unique personal facts - can be
concealed within a picture on a document. Because this information is
relevant to the bearer alone, use of the ID by a person resembling the
cardholder is easily unmasked. Moreover, since only the issuer knows the
complex keys used to encrypt the hidden information, it would be nearly
impossible to forge an ID that would pass through the system.

According to Prof. Joseph Rosen at BGU's Department of Electrical and
Computer Engineering, the new development combines two well-known methods of
representing data. One is the half-tone image, a two-dimensional pattern of
larger and smaller dots used in reproducing pictures. The other is a 2D
barcode, in which a checkerboard of tiny dots and spaces represents digital
information.

Barcodes are familiar to all of us: They are the long string of lines
printed on packaging labels for product identification. But a 2D barcode
comprised of small dots can record much more information than the string of
lines and is an inexpensive way to provide extensive data about a person or
a manufactured product.

In this new development, Rosen and his colleague Prof. Bahram Javidi of the
University of Connecticut have combined the 2D halftone image and barcode by
slightly shifting the positions of the arrangement of halftone dots. The
concealed barcode information can be retrieved using what is known as a 2-D
spatial correlator, which contains a confidential filter function that
deciphers the concealed image.

The new technology, Rosen said, is very robust as even a damaged ID picture
or a half-covered picture contains sufficient hidden data to retrieve the
encrypted information. This is because the entirety of secret data is
distributed throughout the picture. However, if the original picture is not
whole, the hidden picture will be reproduced with lower quality. Another
advantage of this development is that both optical and computational
approaches can be used to reveal the hidden data. A patent has been
submitted for the approach to conceal an image within an image.



  ..
Blanc




Fun with bleach and nail polish remover

2001-12-29 Thread Anonymous via the Cypherpunks Tonga Remailer

However, it may be impossible to prevent the publication of all information concerning 
the
 making and use of explosives. The problem of easy availability of information on 
how to make improvised explosive
 devices is compounded by the ease with which anyone can also obtain the necessary 
materials to make a bomb.
 Improvised explosive devices can be manufactured from such common chemicals as 
acetone (fingernail polish remover),
 peroxide (hair bleach), and one additional readily available ingredient. For 
example, Triacetone Triperoxide (TATP), a
 combination of these ingredients, is currently the most common explosive used by 
terrorists in Israel.


I have seen too many "dangerous" mistakes in this NG when AP is being discussed. I 
will rather give you the correct details that
you make it and do not blow off your hands. 

You will need 30% Hydrogen Peroxide (6% will give you a rather poor yield). Now to get 
the 30% Hydrogen Peroxide, go to
your local hospital chemist. 30% will never be sold to someone for their hair so don't 
try that story, so spin a story that the
Peroxide is to clean a wound as it is a great disinfectant (diluted of course). 

The acetone can be bought at either a hardware store or at a hospital or normal 
chemist. If you get asked why you need the
acetone, spin a story that it is used to thin paint, or to strip paint. Remember that 
acetone is highly flammable. 

The Hydrochloric Acid can be purchased from any swimming pool shop, or from your local 
hardware store. The type that goes
into your pool is normally 31.5% and is perfect for what you need. The Hydrochloric 
acid will give you a trimmer, sulphuric
acid will give you the dimmer version of the AP. 

Now that you have acquired all the ingredients, take a beaker or clean 500 ml bottle 
and place it into some nice cold water.
Into this beaker, add 200 ml hydrogen peroxide (try not to get any of this onto your 
skin). Now add 150 ml of the acetone.
Remember to do this outside as the fumes are rather unpleasant to breath in. You will 
feel the beaker will start to get a bit
warm. Now add 50 ml hydrochloric acid to the mixture and stir with a glass rod. There 
that is all you have to do. 

Do this experiment in the evening and let the AP stand over night. In the morning you 
will see that you will have +- 2.5 cm of
crystals at the bottom of the flask and +- 0.5 cm floating on the top of the flask. 
Take a glass funnel and insert coffee filter
paper or oil filtering paper and filter the AP crystals out. Place these crystals out 
onto a sheet of clean paper and leave them to
dry +- 1/2 a day to a day. Try to keep the crystals out of direct sunlight, preferably 
in a shady area. 

Place these dry crystals into a camera film container. Please do not hit these 
crystals with a hammer as a bright person claimed
to have done, you could land up with that hammer in your forehead. AP is sensitive to 
heat and to friction. When the crystals do
not respond to either friction or impact it simply means that the crystals are still 
too wet. 



WARNING: Acetone Peroxide is dangerous and very sensitive to FRICTION,
SHOCK, HEAT OR FLAME. Handle with great care!! This 
composition is dangerous
and would need to be handled by someone with a lot of 
common sense. If you do
not have experience with explosives DO NOT MAKE THIS. I 
can not stress
enough how unstable and dangerous acetone peroxide is. 
This explosive is the
most unstable of all other explosives. Making large 
quantities is suicide as the
weight of the crystals will detonate themselves.



   Information on Acetone Peroxide:

   Acetone peroxide is formed when hydrogen peroxide 30% acts on 
acetone. The
   introduction of dilute sulfuric acid causes the reaction to go 
into completion.

   There are actually two isomers of acetone peroxide, the first 
is tricycloacetone
   peroxide and the second is dicycloacetone peroxide. Both of 
these compounds are
   very similar, but the reaction seems to favor the tricyclo over 
the dicyclo. Both will
   be made in the reaction to differing degrees. The trimmer has 
about 80% the power
   of TNT.

   A quantity the size of a pea in contact with a flame will burn 
instantaneously with a
   small 'pop' and producing a fireball, much like HMTD does. Any 
sign of confinement
   will ensure that ignition will rapidly give rise to detonation.

   Acetone peroxide is a powerful primary explosive. It, as with 
other explosive
   peroxides, seems to be very volatile. In standing 10 days at 
room temperature,
 

Re: cell phone guns

2001-12-29 Thread Faustine

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

At 06:54 PM 12/28/01 -0500, Faustine wrote:
>
>Not surprising, since cell phone holster decoys have been around for ages.
>Why settle for a .22 when you could be packing a Glock 30?
>Better stealth.
>I like the NAA .22 belt buckle.  Can also fit inside a beeper case.
>Mossad prefers suppressed Berretta .22 which doesn't need racking.


Hm, whatever works, I guess. Sheer stealth isn't as much a factor for me as is
accuracy, reliability and being able to avoid the "woman with a peashooter"
image. All rhetoric aside (but with all that in mind) I've actually been
thinking of getting a 9mm, something along the lines of a Glock 26, a Kahr P9
or maybe a Sig-Sauer P239. Any thoughts? 

I know there's no substitute for getting out there and firing them at a range
to see what I'm comfortable with, but if anyone has any recommendations,
better suggestions, which 9mm to avoid, etc. I'd appreciate it.


~Faustine.




***

Resistance to sudden violence, for the preservation not only of my person, my
limbs, and life, but of my property, is an indisputable right of nature which I
have never surrendered to the public by the compact of society, and which
perhaps, I could not surrender if I would.

- --John Adams 

-BEGIN PGP SIGNATURE-
Version: PGPsdk version 1.7.1 (C) 1997-1999 Network Associates, Inc. and its 
affiliated companies. (Diffie-Helman/DSS-only version)

iQA/AwUBPC5LIfg5Tuca7bfvEQKIyACbBmjXCMeeeYVRJyKZXX1RVM3kUskAoM2S
QBFXBjlKLqElf9F9VhRYuReW
=82tr
-END PGP SIGNATURE-




Re: Fun with bleach and nail polish remover

2001-12-29 Thread keyser-soze

At 11:29 PM 12/29/2001 +0100, Anonynmous wrote:
>You will need 30% Hydrogen Peroxide (6% will give you a rather poor yield). Now to 
>get the 30% Hydrogen Peroxide, go to
your local hospital chemist. 30% will never be sold to someone for their hair so don't 
try that story, so spin a story that the
Peroxide is to clean a wound as it is a great disinfectant (diluted of course).

If you have trouble finding concentrated H2O2 you can distill your own from dilute 
sources.  http://webhome.idirect.com/~earlcp/Reports/Stills_199x.html 




Re: Fun with bleach and nail polish remover

2001-12-29 Thread KPJ

It appears as if Anonymous via the Cypherpunks Tonga Remailer
<[EMAIL PROTECTED]> wrote:
|
|I have seen too many "dangerous" mistakes in this NG when AP is being
|discussed. I will rather give you the correct details that you make it and do
|not blow off your hands.
[...]
|Hydrogen peroxide H2H2 - Available at a beauty supply store and possibly a
|pharmacy. 

Minor correction: /H2H2/ should be /H2O2/, naturally.




Re: Fun with bleach and nail polish remover

2001-12-29 Thread Eugene Leitl

On Sun, 30 Dec 2001, KPJ wrote:

> Minor correction: /H2H2/ should be /H2O2/, naturally.

Organic peroxides are useful as improvised blasting caps, but otherwise
much too unstable.




Violating the Constitution with Impunity

2001-12-29 Thread keyser-soze

A recent speech by former FCC Commissioner Harold Furchtgott-Roth is rather 
refreshing. A key quote.

"Today, when the federal government violates the constitution including the First 
Amendment, we mostly find silence from the media."

http://www.aei.org/sp/sp111601b.htm

There is little doubt that much that we have taken for granted in the United States 
has changed in the past two months.  Our feeling of security, our confidence in the 
safety of public facilities, and our general sense of well-being have all been shaken. 

The poignant question is raised about whether the First Amendment—particularly 
the speech provision--has changed, or perhaps whether the government’s 
interpretation of it has changed.  I have some good news.  The words of the First 
Amendment are the same today as they were two months ago, or two years ago, or two 
decades ago, or two centuries ago. 

But I also have some bad news.  The First Amendment has been violated many times in 
the past two centuries.  As Floyd Abrams noted earlier this morning, many of our 
greatest national leaders have taken great liberties in curtailing the First 
Amendment, particularly in times of crisis.  And it is not just our great leaders, and 
it is not only in times of crisis, that the First Amendment has been violated.  The 
constitution itself, and the First Amendment in particular, are violated frequently. 

Moreover, those who violate the constitution are rarely held accountable.  Public 
servants largely have immunity for liability in their performance of their public 
functions.  But, when it comes to the constitution, that immunity often turns into 
impunity, a veritable license to violate at will.  Aside from occasional public 
disapprobation, there is no penalty for violating the Constitution generally or the 
First Amendment in particular.  




Re: Fun with bleach and nail polish remover

2001-12-29 Thread Sampo Syreeni

On Sun, 30 Dec 2001, Eugene Leitl wrote:

>> Minor correction: /H2H2/ should be /H2O2/, naturally.
>
>Organic peroxides are useful as improvised blasting caps, but otherwise
>much too unstable.

Yes, it's unstable, but what, exactly, is it that makes $H_{2}O_{2}$
organic?

Sampo Syreeni, aka decoy - mailto:[EMAIL PROTECTED], tel:+358-50-5756111
student/math+cs/helsinki university, http://www.iki.fi/~decoy/front
openpgp: 050985C2/025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2