No interest in sex? 31641
Title: Idealage We strongly oppose the use of SPAM email and do not want to send our mailings to anyone who does not wish to receive them. As a result, we have provided this remove link for your convenience. This is not SPAM. If you do not wish to receive further mailings, please take a moment and send a remove request to [EMAIL PROTECTED] please type the words "Remove me" in the body of your message or the Subject line to be properly removed from our list. You may then rest-assured that you will never receive another email from us again. Your email address was obtained from an opt-in list, Reference # 10023387. If you have previously un-subscribed and are still receiving this message, you may email our Abuse Control Center at mailto:[EMAIL PROTECTED]?Subject=Abuse Report or Call us at 1-866-728-4204, or write to us at: NoSpam, Remove1635, c/o AARL 111 Pacifica #250, Irvine, CA 92618.
XXX - Free Pass - Acct Info Attached (7131Ooxw6-265V@13)
BRITNEY SPEARS TOTALLY EXPOSED! See her forbidden tits upclose and personal! They're real! See our BRAND NEW hidden camera footage from her latest movie! Britney does not wear panties!! We've gone to great lengths to bring you the hottest content possible! Stolen, black-market, candid, up skirt, nipple slip, xxx home videos, and more of Britney Spears and all your favorite celebrities are our specialty. We pay out over $100,000 a month just to photographers to provide us with the freshest content of the sexiest celebrities on the net. Don't miss out on this special offer! Click Here To See it ALL!! You must be 18 years of age or older to take advantage of this offer. If you do not wish to receive any further e-mail's from us you can be removed from our list by clicking here. [5909vQQE7-485fCIN6929xGeB0-464ZCav9557arV@39]
Merchant accounts make money [34h78]
If you run a business and are reading this e-mail chances are you have probably heard of merchant accounts. While there are lots of other Merchant Account Venders telling you all the same thing, we don't have any limited time offers, no monthly sales or any other slick marketing techniques. Our Prices are the lowest, we never have set up fee or application fee. Our Monthly rates already are super low, our transaction fee is so low it's almost free!! Reply to this e-mail with your Name: Phone Number: Best time to call : One of our helpful staff will call you and help you set up your account. For Whatever size your business is, we have an account perfect for you. If you have any previous credit problems? Don't worry about it because we won't either!! While our competition may have a sale this month, Or won't charge you a set up fee today. We have a sale everyday. All you need to do to take advantage of this every day offer is simply Reply today and you can accept; Visa Mastercard American Express Discover Novus Direct Checks Fax Checks and Also Accept Debit Cards !! Remember, this is not a sale, not a limited time offer. We Offer the best rates, all the time. You are 99.8% GUARANTEED to get a merchant account. So what are you waiting for? For more information please: Reply to this e-mail with your Name: Phone Number: Best time to call : It's that easy. --- To be Removed from this list Please reply with "Remove" in the subject line and you will be removed within 24 hours. bkjhjgvuvemtdfxj
Re: Tim May,J.Orlinn Grabbe Tilt from Libertarians to anarchists.
Johnny come lately wrote: >May has pissed on libertarians from a great height recently and leant >toward classic anarchism. May has pissed on libertarians for quite some time, it isn't some new thing. Your clue is waiting for you, it thinks you are way overdue.
Re: Cypherpunk agenda succeeding
On 3 Feb 2002, Dr. Evil wrote: > Microsoft does support encrypted disks. They do in Windows XP and I > think they may have had it earlier too. Who doesn't support encrypted > disk? The open source guys. There is only _one_ open source OS that > currently supports encrypted disk in a non-kludge way (loopback FS > counts as a kludge). Your ignorance is showing... http://plan9.bell-labs.com http://einstein.ssz.com/hangar18 -- James Choate - [EMAIL PROTECTED] - www.ssz.com
walmart surveillance, collaborators
At 05:21 PM 2/2/02 -0800, Tim May wrote: >On Saturday, February 2, 2002, at 12:52 PM, Neil Johnson wrote: >> Still believe that the government doesn't snoop in your private life ? >> Read on: >> She's checking out when when the words "Limit 3" appears on the cash >> register display. The check-out person informs her that this is because >> Wal-Mart (in co-operation with law enforcement) is limiting the amount >> of >> over the counter cold remedies one can buy to prevent their use in the >> manufacturing of meth. Or maybe since Mafiaboy confessed to being a Robo-head, they're watching dextromethorphine, the cough-suppressing but not terribly euphoric isomer used in cold meds and by bored teenagers. >And this has been going on for a while. I used to be able to buy 50- and >100-count bottles of generic pseudoephedrine (IIRC this was it...don't >quote me on it), the same ingredient in Actifed, a cold/sinus pill. >These generic bottles have vanished, to be replaced by blister packs of >vastly more expensive pills containing the same ingredient. Its the pseudoephedrine which is the major input to most amphetamine and methamphetamine syntheses. The feds (who cause the illicit labs via their prohibition) find cases of PE bottles with their bottoms sliced off. >Pseudoephedrine is related to speed, and I presume can be used to make >purer forms of speed. The synthesis makes a small change to the PE molecule producing a diferent molecule. There is no speed in PE; a long time ago centrally active amphetamines were used in inhalers, but no more (it was readily extracted and purified.) ... Steve Shear: nasal sprays are good for hydrating the membranes that coldbugs target; heated winter air dries them. Zinc may help. But someone buying Nyquil-type drugs is already infected and just wants a break from symptoms. Neil: You'd be better off reading the labels on brand-name Nyquil and buying the ingredients separately and generically. That way you can avoid taking something you don't need --say pseudoephedrine which dries membranes-- when all you want is dextro's cough suppressant effect. The other ingredient tends to be anti-histamines (and ethanol) which help you sleep if nothing else. Enough biology for now. -- "Architects ask: What did I do to cause this?" http://latimes.com/news/nationworld/nation/la-122101arch.story Architects ask, but does congress even bother?
sign up now! **THEORY-EDGE** mailing list
21st century paradigm shifts, DELIVERED DAILY! The "theory-edge" mailing list is for informal, collegial discussion of the latest research advances, and especially newsworthy cutting-edge or breakthrough developments, in the hardest problems in algorithmics. FREE! Try it out now! http://groups.yahoo.com/group/theory-edge/ FAQ: http://www.geocities.com/vznuri/faq.html 3.5 YEARS OLD ** EST.MAY 1998 ** 700+ SUBSCRIBERS ** 4500+ MSGS openly browsable/searchable archives ** ~7 msgs/day average We're particularly seeking elite scientists, academics, researchers, and practitioners such as PhDs and graduate students. We have a few "mini-celebrities" currently on the list. Past traffic is diverse. 1st priority items of interest are recent news reports or media coverage on fresh advances or breakthroughs in these areas and subscriber reaction/commentary to them. Its a gift economy--please post them when you run into them! And more and more, we've already heard and discussed the cool news *before* it hits the mainstream outlets! news media fields comp sci -- -- wiredalgorithmics modelling slashdot comp sci simulations new york times mathematics experiments cnn comp bio cellular automata MIT tech review comp neuroscimachine learning new scientistbioinformatics artificial intelligence sci. americanproteomics artificial neural networks science week econophysics genetic algorithms science dailystatistics evolutionary software artificial life cryptography data compression Next, we're extremely interested in cutting-edge advances in computational methods, both on the applied and theoretical sides. A strong scientific component emerges from engaged and active subscribers. We've now had three major "open science", *world-class* research projects and collaborations on the list. Its an exciting treat to hear daily notes sent by researchers at the cutting edge! computing forms computationalscience & --- complexity research QM computing -- light/optical computing P vs NP vs Pspaceconferences nanocomputingNP (complete) problems workshops dna computingtransition point new papers biochips boolean circuits writing papers logic gates/transistors satisfiability problem graduate students reconfigurable computing davis putnam algorithm masters thesis distributed computingresolution PhDs parallel computing hard instances dissertation supercomputers benchmarks electronic publishing beowulf clusters validation peer reviewing regular expressions style/etiquette finite state machinesfunding/grants turing machines philosophy undecidability psychology diagonalization kuhn's paradigm shifts oracles/relativization popper's falsifiability symmetries recursion Other interesting theory-edge topics routinely pop up on the list. Lots of cyber-synchronicity and synergy occurs among people's backgrounds when you get a lot of really intelligent and articulate researchers in the "same room"! software mathematics physics --- --- packages unprovabilityquantum mechanics librariesfactoring/primes local hidden variables computer languages graphs analog computing open source gamesbell's theorem groups agent complexity AI advances chaos --- open problemsfractals robotics -levy distributions face recognition riemann conjecture 1/f noise speech recognition collatz conjecture fractional brownian auto theorem proving goldbach conjecture motion turing test odd perfect numbers nonlinear dynamics fermat's last theoremprotein folding academia & busy beaver problem universities -
Anyone against US govt a terrorist? RAISETHEFIST.COM RAIDED BY FBI!!
http://www.raisethefist.com/ RAISETHEFIST.COM RAIDED BY FBI!! NEWSFLASH Jan/30 - We have found a complete backup of raisethefist.com online. We will need U.S. $300.00 Three Hundred in order to obtain a copy from that host. Please contact the founder if you wish to donate. The contact info is on the bottom. -Founder "The raid consisted of FBI, Secret Service, LAPD and LASD. They sorounded the house with guns before raiding it. They had machine guns, shot guns, and hand guns. They also had a door bammer ready to break down the door, they also blocked off the garage door, and had bullet proof vests. They obviously came prepared to shoot and kill. They had more artillary then they use for raiding gang felons and drugoperations." - RTF Founder LOS ANGELES, JAN 24 2002 - Heavily armed with high-powered machine guns, shot guns, and hand guns, the FBI, Secret Service, and Los Angeles Police Department sorounded the founder of raisethefist.com in his house. The founder was currently asleep, woken up by a relative who said fbi, police and undercover's were currently up and down all of the streets, with they're eyes focused on the premises. Raisethefist.com founder aproached the door were 2 FBI agents demanded that he step outside. Within seconds a swarm of FBI raided the house with automatic weapons and shot guns. Additional police and fbi also stayed on the front lawn, around the house with a door baracade and additional weapons. "armed and ready". FBI and secret service entered the house, seizing all servers and political liturature. Raisethefist.com was currently being ran within the founders room of the house, over a computer network. The room was literarly ransacked, and all equipment, disks, cd's .. etc. were boxed up, loaded into a truck and seized until further notice. Since 1999, raisethefist.com has been under extensive government monitering. At times, Raisethefist.com has recieved over 100 hits from the U.S Department of Defense in a single day. The FBI, police department, NSA (and who else) continuesly monitered the site on a daily basis. Even government's from the UK, Canada, Lavtia, Belgium, Egypt, Finland, and Australia monitered the site continuesly. The FBI had also previously intercepted all packets going through the DSL line hosting the site, and have seized additional accounts being used by the site. In yet another successfull attempt to silence our vioces, Raisethefist.com, an anarchist/activist independent media/collective has been shut down by the secret service. A note from the founder: "It's not yet known at this point if the site will be back up. As of now, we have nothing. No more servers, no more network, nothing. My room remains completly ransacked. My neighbors remain shaken up by what happend. I most likely won't be getting any of the equipment back. They also took alot of my political litature. Apparently, they're excuse for shutting it down was the 'militancy' portrayed on the site. This is not true. This was an excuse. This same 'militancy' they were concerned about is portrayed on at least a thousand other web sites across the internet, and they havn't been touched by the federal government, with the exception for remote monitering. Raisethefist.com was progresive. It was going somewhere. Kids started creating clubs in their schools called 'RaisetheFist'. People started utilizing the collective as a powerful resource for the activist/anarchist community. The federal government has been investigating me, and the site very closely, long before 9-11, and long before such militancy was even portrayed on the site. They knew the site had potential, that it was turning into something more than a site, but a strong collective utilized by activists throughout the world committed to social justice. And that's become a crime. Justice has become a crime. Freedom has become a crime. Anyone activly disagreeing with policies of the U.S is now automaticly rendered a "terrorist" in the eyes of national security Where raisethefist.com will go from here, I don't know. Based on what i've been told, i'll most likely be in jail, so most of my focus will be towards getting an attorney." If you want to contact the Founder, please E-mail: [EMAIL PROTECTED] or for the Sysop please E-mail: [EMAIL PROTECTED] RaiseTheFist.com Leader RaidedBy 25 Heavily-Armed Agents 1-27-2LOS ANGELES - Heavily armed with high-powered machine guns, shot guns, and hand guns, the FBI, Secret Service, and Los Angeles Police Department sorounded the founder of raisethefist.com in his house. The founder was currently asleep, woken up by a relative who said fbi, police and undercover's were currently up and down all of the streets, with they're eyes focused on the premises. Raisethefist.com founder aproached the door were 2 FBI agents demanded that he step outside. Within seconds a swarm of FBI raided the house with automatic weapons and shot guns. Additional police and fbi also stayed on the front lawn, around the house wit
Free Offer - VIAGRA Alternative........ 3759
Title: ViaPro To be removed from future mailings CLICK HERE
patience
At 06:52 PM 2/2/02 -0800, Bill Stewart wrote: >Also, you can get 24-packs of the timed-release 120-mg tabs. >Apparently speeders don't have the patience to pop all the little That's quite amusing if you've ever observed certain obsessive states associated with speeding. Its easier to drive to mexico to buy bottles or get large diverted quantities.
Re: Cypherpunk agenda succeeding
-- On 3 Feb 2002, Dr. Evil wrote: > > Microsoft does support encrypted disks. They do in > > Windows XP and I think they may have had it earlier too. > > Who doesn't support encrypted disk? The open source > > guys. There is only _one_ open source OS that currently > > supports encrypted disk in a non-kludge way (loopback FS > > counts as a kludge). On 3 Feb 2002, at 8:42, Jim Choate wrote: > Your ignorance is showing... > > http://plan9.bell-labs.com > > http://einstein.ssz.com/hangar18 These web sites announce lots of interesting beginnings. Anyone can start interesting projects, and lots of people have done so. The hard part is actually finishing them. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG DKhpwzsEPkg97c5wEJCsELvsBQGtvKv3iqDpIJym 4GCGYxW0PssctHi3sX8a0OP6zaCB2vZicxHxdjxuG
Re: Cypherpunk agenda succeeding
-- James A. Donald: > > > it is regrettable that disk encryption is not part of > > > the operating system -- but if Microsoft put it in > > > before we had a strong, widely adopted system, they > > > would doubtless muck it up. Dr Evil > Microsoft does support encrypted disks. So they do: http://www.microsoft.com/WINDOWSXP/pro/techinfo/administration/recovery/DataProtection.doc Unfortunately the default encryption is single DES, which can be broken by anyone with sufficient money and patience. Non US users cannot change this default, and the ordinary US user will not change this default. They now generate a key pair associated with every XP user. Wow! Universal public and secret keys, not one per true name, but one per login identity you create on your PC! At last, the universal public key cryptography infrastructure we have all been waiting for! The documentation says that this key infrastructure is available for everyone, though Microsoft's email program does not seem aware of this. Outlook express insists on certified keys, though very few people, other than web site operators, seem willing to jump through all the hoops needed create and maintain certified keys. Right now these universal keys are only used in file recovery (the symmetric key is encrypted to the administrator's public key.) But if one has universal public key pairs linked to one's computer login, the obvious thing is to use them in communication. Of course there is no one to one relationship between email addresses and login ids, so one would need to wrap the encrypted body in a header that says that it can only be read on machine so and so, by user so and so. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG 3wrXNiWT9aRDvMWloLpd/NtFYuHcd+HGPPfA0651 4zWd4wnG0VtmpEoNV8QUdENb764NqRurUpHZQG8nV
Polygraph Countermeasure Challenge
-- Forwarded message -- Date: Tue, 29 Jan 2002 21:23:31 +0100 From: George W. Maschke <[EMAIL PROTECTED]> Reply-To: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Polygraph Countermeasure Challenge Dr. Drew C. Richardson, the FBI's recently retired senior scientific expert on polygraph "testing," has reiterated a challenge to the polygraph community regarding polygraph countermeasures (methods of defeating polygraph "tests"). Polygraphers frequently claim that any experienced polygraph examiner can easily detect attempted polygraph countermeasures. Journalists have frequently parroted such claims without questioning them. But peer-reviewed research suggests that polygraphers cannot detect countermeasure attempts at better than chance levels of accuracy, and Dr. Richardson's challenge should be of interest to all concerned. You'll find it on the AntiPolygraph.org message board at: http://antipolygraph.org/cgi-bin/forums/YaBB.pl?board=Proc&action=display George W. Maschke Intelligence Forum (http://www.intelforum.org) is sponsored by Intelligence and National Security, a Frank Cass journal (http://www.frankcass.com/jnls/ins.htm)
Innocent Muslims killed as Bush allies 'crusade'
http://www.guardian.co.uk/Observer/international/story/0,6903,644045,00.html Innocent Muslims killed as Bush allies 'crusade' Shootings and torture by security forces are spreading fear in the Philippines, the new flashpoint in the US war. Film-makers Jonathan Miller and Rob Lemkin report Sunday February 3, 2002 The Observer Syed Kaing Mabbul was a coconut farmer on the exquisitely beautiful island of Basilan in the southern Philippines, the hottest new target in President George W. Bush's global war on terrorism. His misfortune, his mother told us, is that he has the same name as a commander of the Abu Sayyaf, a bloodthirsty group of Islamic extremists financed by robbery, piracy, ransom and - in the past, at least - by Osama bin Laden. About 150 Americans, the advance party of a force of about 650, are already in the southern Philippines for a six-month 'military' exercise that began formally last Thursday. Their task is to train Filipino soldiers how better to fight Abu Sayyaf, and to rescue kidnapped missionaries Martin and Gracia Burnham of Wichita, Kansas, who have been in captivity for eight months. Syed fled the island last May, and has been living in a lean-to shack on the outskirts of Zamboanga City, on the island of Mindanao, about 15 miles north of Basilan across a turquoise sea. Local Muslims took us to meet Syed's mother, Azirah Mabhul. She told us he had been betrayed to the army by seven fellow Muslims who had split a bounty of a million pesos (about £14,000). 'They picked up my son at 8am,' she told us. 'They brought him to Malagutay Brigade Camp, blindfolded him, beat him, stripped him, then hung him upside down for eight hours. They inserted ground-up chilli paste into his rectum to force him to confess to belonging to Abu Sayyaf.' Azirah said that when she finally located her son, he still couldn't sit down. 'Mum,' he said, 'I just can't take the pain any more.' In mid-December, Syed Kaing Mabbul was taken, with 79 other terrorist suspects, to a high security jail in the capital, Manila. He hasn't been heard from since. It was impossible to confirm his story, but Muslim community leaders vouched for his innocence. His case is one of many accounts of harassment, indiscriminate arrest, disappearances, routine torture and killing now producing growing concern over 'gross and rampant human rights violations' against Muslim civilians. Human rights leaders point the finger at the America's new ally in its global war, the Philippine armed forces. Since 11 September, they say, incidents of abuse have grown, and there is a palpable climate of fear. 'We are the ones who are living in terror,' said the imam of a mosque in a squalid Muslim ghetto on the edge of Zamboanga City. 'This war against terror is just the latest campaign in a 400-year crusade against Islam,' he said, echoing the convictions of the wider Islamic world. Although the Philippines' five million Muslims comprise a minority in Asia's only Roman Catholic country, they no longer feel on the fringe of the global Islamic community. Syed's case was just one 'among hundreds,' said Zenaida Sabaani-Lawi, director of Murid, a Muslim organisation which provides micro-finance to local women. 'There have been killings too. It's been getting worse since 11 September. It's as if they now have a licence,' she said. 'This is state terror.'
The Palestinian Vision of Peace (By Yasir Aarafat, The New YorkTimes)
http://www.nytimes.com/2002/02/03/opinion/03ARAF.html February 3, 2002 The Palestinian Vision of Peace By YASIR ARAFAT RAMALLAH For the past 16 months, Israelis and Palestinians have been locked in a catastrophic cycle of violence, a cycle which only promises more bloodshed and fear. The cycle has led many to conclude that peace is impossible, a myth borne out of ignorance of the Palestinian position. Now is the time for the Palestinians to state clearly, and for the world to hear clearly, the Palestinian vision. But first, let me be very clear. I condemn the attacks carried out by terrorist groups against Israeli civilians. These groups do not represent the Palestinian people or their legitimate aspirations for freedom. They are terrorist organizations, and I am determined to put an end to their activities. The Palestinian vision of peace is an independent and viable Palestinian state on the territories occupied by Israel in 1967, living as an equal neighbor alongside Israel with peace and security for both the Israeli and Palestinian peoples. In 1988, the Palestine National Council adopted a historic resolution calling for the implementation of applicable United Nations resolutions, particularly, Resolutions 242 and 338. The Palestinians recognized Israel's right to exist on 78 percent of historical Palestine with the understanding that we would be allowed to live in freedom on the remaining 22 percent, which has been under Israeli occupation since 1967. Our commitment to that two-state solution remains unchanged, but unfortunately, also remains unreciprocated. We seek true independence and full sovereignty: the right to control our own airspace, water resources and borders; to develop our own economy, to have normal commercial relations with our neighbors, and to travel freely. In short, we seek only what the free world now enjoys and only what Israel insists on for itself: the right to control our own destiny and to take our place among free nations. In addition, we seek a fair and just solution to the plight of Palestinian refugees who for 54 years have not been permitted to return to their homes. We understand Israel's demographic concerns and understand that the right of return of Palestinian refugees, a right guaranteed under international law and United Nations Resolution 194, must be implemented in a way that takes into account such concerns. However, just as we Palestinians must be realistic with respect to Israel's demographic desires, Israelis too must be realistic in understanding that there can be no solution to the Israeli-Palestinian conflict if the legitimate rights of these innocent civilians continue to be ignored. Left unresolved, the refugee issue has the potential to undermine any permanent peace agreement between Palestinians and Israelis. How is a Palestinian refugee to understand that his or her right of return will not be honored but those of Kosovar Albanians, Afghans and East Timorese have been? There are those who claim that I am not a partner in peace. In response, I say Israel's peace partner is, and always has been, the Palestinian people. Peace is not a signed agreement between individuals it is reconciliation between peoples. Two peoples cannot reconcile when one demands control over the other, when one refuses to treat the other as a partner in peace, when one uses the logic of power rather than the power of logic. Israel has yet to understand that it cannot have peace while denying justice. As long as the occupation of Palestinian lands continues, as long as Palestinians are denied freedom, then the path to the "peace of the brave" that I embarked upon with my late partner Yitzhak Rabin, will be littered with obstacles. The Palestinian people have been denied their freedom for far too long and are the only people in the world still living under foreign occupation. How is it possible that the entire world can tolerate this oppression, discrimination and humiliation? The 1993 Oslo Accord, signed on the White House lawn, promised the Palestinians freedom by May 1999. Instead, since 1993, the Palestinian people have endured a doubling of Israeli settlers, expansion of illegal Israeli settlements on Palestinian land and increased restrictions on freedom of movement. How do I convince my people that Israel is serious about peace while over the past decade Israel intensified the colonization of Palestinian land from which it was ostensibly negotiating a withdrawal? But no degree of oppression and no level of desperation can ever justify the killing of innocent civilians. I condemn terrorism. I condemn the killing of innocent civilians, whether they are Israeli, American or Palestinian; whether they are killed by Palestinian extremists, Israeli settlers, or by the Israeli government. But condemnations do not stop terrorism. To stop terrorism, we must understand that terrorism is simply the symptom, not the disease. The personal attacks on me currently in vogue
INFO: Intricate Screening Of Fliers In Works
- Forwarded message -- Date: Sat, 2 Feb 2002 03:45:46 -0800 (PST) Subject: INFO: Intricate Screening Of Fliers In Works "Theoretically, the system could be calibrated to watch for people with links to restaurants or other places thought to be favored by terrorist cells. It might also note phone calls and match individuals against government watch lists. A potential link to a threatening character or region could boost a passenger's score" = Washington Post Friday, February 1, 2002 By Robert O'Harrow Jr. Intricate Screening Of Fliers In Works Database Raises Privacy Concerns Federal aviation authorities and technology companies will soon begin testing a vast air security screening system designed to instantly pull together every passenger's travel history and living arrangements, plus a wealth of other personal and demographic information. The government's plan is to establish a computer network linking every reservation system in the United States to private and government databases. The network would use data-mining and predictive software to profile passenger activity and intuit obscure clues about potential threats, even before the scheduled day of flight. It might find, for instance, that one man used a debit card to buy tickets for four other men who sit in separate parts of the same plane -- four men who have shared addresses in the past. Or it might discern an array of unusual links and travel habits among passengers on different flights. Those sorts of details -- along with many other far more subtle patterns identified by computer programs -- would contribute to a threat index or score for every passenger. Passengers with higher scores would be singled out for additional screening by authorities. As described by developers, the system would be an unobtrusive network enabling authorities to target potential threats far more effectively while reducing lines at security checkpoints for most passengers. Critics say it would be one of the largest monitoring systems ever created by the government and a huge intrusion on privacy. Although such a system would rely on existing software and technology, it could be years before it is fully in place, given that enormous amounts of data would need to be integrated and a structure would need to be established for monitoring passenger profiles. At least one carrier, Delta Air Lines, has been working with several companies on a prototype. Northwest Airlines has acknowledged that it is talking with other airlines about a similar screening system. Federal authorities hope to test at least two prototypes in coming months or possibly sooner, according to government and industry sources familiar with the effort. "This is not fantasy stuff," said Joseph Del Balzo, a former acting administrator of the Federal Aviation Administration and a security consultant working on one of the profiling projects. "This technology, based on transaction analysis, behavior analysis, gives us a pretty good idea of what's going on in a person's mind." The screening plans reflect a growing faith among aviation and government leaders that information technology can solve some of the nation's most vexing security problems by rooting out and snaring people who intend to commit terrorist acts. But a range of policy and technical questions still need to be answered before the system can become a reality. The Transportation Security Administration, for example, must decide on a set of standards so technology companies and airlines can begin building a system. They must also figure out how to pay for the system and its operation. Industry officials said they hope the system will cost, on average, much less than $2 per ticket. Officials at the TSA declined to comment, saying they did not want to disclose any details that might undermine aviation security. Government officials and companies also face questions about privacy. In interviews, more than a dozen people working on two parallel projects said they were taking pains to protect individual privacy. They intend to limit the personal information shared with airlines and security officials. But developers face restrictions on how much information they can use. Industry officials have already discussed with lawmakers the possible need to roll back some privacy protections in the Fair Credit Reporting Act and Driver's Privacy Protection Act to enable them to use more of the credit and driver's-license data. Civil liberties activists said they fear the system could be the beginnings of a surveillance infrastructure that will erode existing privacy protections. When told about the system, Barry Steinhardt, associate director of the American Civil Liberties Union, said it would be "a massive complex system of surveillance." "It really is a profound step for the government to be conducting background checks on a large percentage of Americans. We've never done that before," he said. "I
CYBERWAR: Under Developement: Encryption
./mark.hopkins.aka.rizzn// Rizzn's Wartime Factbook: http://factbook.diaryland.com/ The Best UAV: http://www.unmannedaircraft.com Rizzn's Musical Stylings: http://rizzn.trance.nu > http://www.linuxsecurity.com/articles/cryptography_article-4377.html > > Under Developement: Encryption > IDG.net > Posted By: Jen Olson > 2/1/2002 10:51 > > AS MYSTICS SEARCH for the lost island of Atlantis and UFO buffs seek out > alien spacecraft, cryptologists are continuing their own quest to create an > unbreakable code. Michael Rabin, a Harvard University computer science > professor, believes he has moved cryptology a step closer to its Holy Grail > by developing a code that's undecipherable, even by those who have access to > both the cypher text and unlimited computing power. > Rabin's Hyper-Encryption technology, which uses a device that quickly > generates a deluge of random bits, relies on both time and money to thwart > even the most dedicated code breaker. A coded message would be hidden within > the bits "like raisins in a pudding," quips Rabin. While anyone can read the > random bits, the transmission rate is so high that storing all of the stream > for analysis would be either technically unfeasible or cost prohibitive. > > > Click here to go to this article: > http://www.idg.net/crd_idgsearch_1.html?url=http://www.cio.com/archive/02010 > 2/et_development.html Yahoo! Groups Sponsor -~--> Get your FREE credit report with a FREE CreditCheck Monitoring Service trial http://us.click.yahoo.com/ACHqaB/bQ8CAA/ySSFAA/TySplB/TM -~-> -- Brooks Isoldi, editor [EMAIL PROTECTED] http://www.intellnet.org Post message: [EMAIL PROTECTED] Subscribe:[EMAIL PROTECTED] Unsubscribe: [EMAIL PROTECTED] Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
CYBERWAR: A Brief Comparison of Email Encryption Protocols
> http://www.linuxsecurity.com/articles/cryptography_article-4356.html > > A Brief Comparison of Email Encryption Protocols > Raph Levien > Posted By: Jen Olson > 1/30/2002 14:31 > > Update: Shaun Gordon pointed out this article is quite old, and while not > current still contains useful info. This document briefly reviews and > compares five major email encryption protocols under consideration: MOSS, > MSP, PGP, PGP/MIME, and S/MIME. Each is capable of adequate security, but > also suffers from the lack of good implementation, in the context of > transparent email encryption. I will try to address issues of underlying > cryptographic soundness, ease of integration with email, implementation > issues, support for multimedia and Web datatypes, and backwards > compatibility. > > An additional grave concern is key management. Contrary to some beliefs,key > management is not a solved problem. All of the proposals contain some > mechanism for key management, but none of them have been demonstrated to be > scalable to an Internet-wide email system. My belief is that the problems > with key management do not stem from the classic Web of trust/certification > hierarchy split, but the nonexistence of a distributed database (with nice > interfaces) for holding keys. The encryption protocols also stand in the way > of such a database, with key formats that are either overly complex, > inadequate, or both. > > Shaun Gordon writes, "You might want to consider taking down the article "A > Brief Comparison of Email Encryption Protocols. This is a pointer to a > document that is six years old (it appears to be written in March of '96). > This could be particularly misleading to some people as there is no clear > date on the article, but it does refer to the upcoming PGP 3.0 which will be > released in the fall of '96." >
Kremlin `faked' terrorist attacks on apartments
http://www.bangkokpost.com/News/02Feb2002_news26.html GENERAL NEWS - Saturday 02 February 2002 Kremlin `faked' terrorist attacks on apartments PATRICK E TYLER Intensifying his battle with the Kremlin, the Russian oligarch Boris Berezovsky said on Thursday that he was just weeks away from laying out documentary evidence that Russia's security services were involved in apartment house explosions in September 1999 that killed more than 300 people. In an interview in London, he said his investigation of the bombings _ which were blamed on separatists in Chechnya and triggered a full-scale invasion of that rebellious republic _ was the reason Nikolai Patrushev, Russia's intelligence chief, accused him last week of providing financial support to Chechen ``terrorists''. Mr Berezovsky said his evidence ``is no less than the evidence the United States had that Osama bin Laden was responsible for the World Trade Center attack''. He said the key to his case was the discovery in late September 1999 that Russia's security services had placed what appeared to be a large bomb in an apartment in Ryazan, 115 miles southeast of Moscow. When residents discovered the bomb and called the police, the Federal Security Service, or FSB, issued a public apology and asserted that the ``explosives'' were actually bags of sugar tied together with wires and a detonator, a dummy used as part of a security exercise. A number of Russian legislators called for an independent investigation of the bombings and the actions of the security service in Ryazan, but in March 2000 parliament defeated a motion to open an inquiry. Vladimir Putin, a former head of the FSB, won the presidential election the same month. Mr Patrushev succeeded him at the security service. In the jaded politics of today's Russia, Mr Berezovsky's claims have been treated with as much scepticism as the counter-claims of Mr Patrushev and the security service. The fact that the charges emerged as Mr Berezovsky was losing another battle to retain control of the independent TV6 television channel added to that scepticism. Yet the unsolved explosions that brought terror to Russia and incited Russians against Chechens and other ethnic groups from the Caucasus stand as an enduring and troubling mystery of the Chechen conflict. Though dozens of arrests were made in the bombings, no one has been convicted of direct complicity. Moreover, the bombings laid the groundwork for the furious military campaign against Chechnya and for the political rise of Mr Putin, then the prime minister, whose relentless prosecution of the war garnered a surge of popular support that propelled him into the presidency. Mr Berezovsky said on Thursday that he had no evidence that Mr Putin had personal knowledge of any involvement by security services in the apartment bombings, but he said Mr Patrushev did. ``I don't have any facts today that Putin is involved personally,'' he said. ``I have facts that the chief of the FSB is involved in that, and other people from the FSB are involved.'' While he said the evidence implicated Mr Patrushev, ``I don't have the answer as to who gave the order _ whether it was Putin, Patrushev or someone else.'' The resurrection of the case highlights the tenacity of Mr Berezovsky, the consummate Kremlin insider in the era of former president Boris Yeltsin. >From exile in London, where he is fighting legal battles over his holdings and an arrest warrant issued last autumn, he continues to strike at Mr Putin in the name of liberal and democratic causes, even when many liberals shun him. And in the end, there is the question of whether Mr Berezovsky is simply trying to orchestrate a political crisis for Mr Putin to win political asylum in Britain as a means to protect permanently the wealth he carved out of Russia in the early days, when the pickings were easy. Mr Berezovsky responded to this question by saying: ``You won't have to wait long'' to judge the merit of his case. He would not discuss whether he planned to seek asylum, but said he would be in danger if he returned to Russia. ``I don't want to tell you that I expect that they would kill me,'' he said. ``I am not able to say that. But I cannot exclude anything.'' Mr Berezovsky works these days out of a suite of offices on fashionable Savile Row, where he manages a business empire that is as hard to define as it is to measure in value. But over the last decade, he is believed to have controlled major stakes in Russian automobile enterprises, oil and aluminum companies, Aeroflot and ORT, the state television combine, from which he was ejected after Mr Putin became president. Last week, after Mr Berezovsky lost a battle to keep TV6 on the air with a crew of journalists who had fled the independent NTV network, the security director, Mr Patrushev, surprised him with a new assault. Speaking in a televised interview, Mr Patrushev said his bureau had information
Online Pharmacy - Viagra, Xenical & More - Lowest Prices DARWIGB
DO YOU WANT TO LAST LONGER IN BED? AT LAST VIAGRA (And many other Perscription Drugs) ONLINE! No waiting rooms, drug stores, or embarassing conversations. Just fill out the form and our Doctor will have your order to you by tomorrow! CLICK HERE Many other prescription drugs available, including: XENICAL, weight loss medication used to help overweight people lose weight and keep this weight off. VALTREX, Treatement for Herpes. PROPECIA, the first pill that effectively treats male pattern hair loss. And Many More.. CLICK HERE To be removed from future mailings: Click here
All new! - This Program makes you an Internet Investigator!
Internet Investigator™ New for 2002 Internet Software Program for Online Investigations - Find Out Anything about Anyone Online - Uncover Information about: neighbors, enemies, friends, debtors, employees, your boss, yourself, relatives, former school or military buddies, even a new love interest! Become an "Internet Investigator™" and explore an exciting new world of valuable information. With Internet Investigator™ You Can Investigate: People, credit records, social security numbers, employment records, school records, criminal records, driving records, addresses, phone numbers (even some unlisted), hidden assets, family trees and a whole lot more! Click Here for more Information Click here to be romoved. Each year in the U.S. alone, the "postal" bulk mail industry consumes over 450 million trees just to make the paper used in sending their advertisements and promotions. Using email instead can significantly reduce this consumption, while at the same time decreasing the billions of tons of paper waste filling our landfills. Save the trees, save the planet, use email!
Get Windows To Be More Fault Tolerant and Self Repairing..
Dear Windows User, Now you can boost the reliability of ordinary Windows 95, 98 and ME to nearly the level of Windows NT or 2000, Microsoft's professional and industrial version of Windows. The new WinFix is a very effective way to improve the reliability of Windows, because it makes Windows fault-tolerant and self-repairing. And WinFix is very safe, because it operates completely independent of Windows. CLICK HERE to find out more about WinFix, the safest, most effective way to keep you working, by keeping your PC working non-stop. Arlen Dixon, CEO Pinewood Software Marketing --- This announcement is intended for PC users who asked to be kept informed about new developments in Windows technology. We apologize for any email you may have inadvertently received. Please CLICK HERE to be removed from future mailings.
Re: INFO: Intricate Screening Of Fliers In Works
> "Theoretically, the system could be calibrated to watch for people with > links to restaurants or other places thought to be favored by terrorist > cells. It might also note phone calls and match individuals against Terrible. First they will just have to talk the terrorist out of using cash for non-ticket purchases or into using cash for ticket purchases. Otherwise, some really devious terrorist may use traceable payment instruments only for benign purposes (see "Creating a profile" chapter) and for that final ticket purchase, while paying with cash everything else. Could it just be that this current War on something will be used, as all previous Wars on something, to eradicate cash ? = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Great stuff seeking new owners in Yahoo! Auctions! http://auctions.yahoo.com
"we want to create a jail without walls"
Date: Thu, 31 Jan 2002 08:47:41 -0500 From: "Allen L. Barker" <[EMAIL PROTECTED]> Subject: "we want to create a jail without walls" [This article should not surprise anyone on the list. We all knew that the first public, non-secret home/body incarcerations would be carried out on sex offenders. And we all know that it will not end there. Welcome to the community as a "virtual jail."] January 31, 2002 Some States Track Parolees by Satellite By JENNIFER 8. LEE TAMPA, Fla. -- THEY call it being on the box. It's not prison. It's not freedom. It's a gray area between. John Zadrayel, a 40-year-old convicted sex offender, has been on the box for a year, a condition of his parole after 14 years in prison. The box, a four-pound electronic device that resembles a transistor radio, lets parole officers know exactly where he is at all times. It calculates his location using the Global Positioning System, a network of 24 satellites 12,000 miles above the earth. Mr. Zadrayel carries the box around with him all the time, even when he is bicycling from his rented room to his job as a cook in a local restaurant. Some nights he wakes up thinking about it. He wears a wireless bracelet, locked around his ankle, that transmits a signal to the box to let it know he's there. When he leaves his room to watch the ducks in a neighboring pond, he has to remember to stay within 100 feet of the box. If he were to stray too far or abandon the box completely, he would be in violation of his parole and could be sent back to prison. Mr. Zadrayel is one of about 1,200 offenders nationwide who are using G.P.S. monitoring devices as a condition of their parole or probation or as a form of house arrest. They are a small but growing fraction of the 150,000 offenders in the United States who are subject to more established forms of electronic supervision like home monitoring systems and mandatory telephone checks. Traditional systems, many of which also use ankle bracelets but without G.P.S., can only confirm whether a person is at a designated place at a designated time. G.P.S. devices allow the authorities to check up on an offender at any time. Although the technology is relatively new and not without glitches, criminologists say that improved monitoring may help governments address the longstanding problem of how to protect the public without resorting to the further incarceration of criminals. Systems like the box, they say, also offer a glimpse of a future in which imprisonment may be more a function of technology than of bricks and bars. By tracking parolees' movements in real time - and notifying the authorities immediately when violations occur - the system offers a measure of reassurance to local residents when there are criminals in their midst. "Very few people get locked up for the rest of their lives," said Peggy Conway, editor of The Journal of Offender Monitoring. "Ultimately these people are going to live in the community." More precise monitoring and tracking may also prompt the authorities to release some prisoners earlier, or even eliminate prison sentences for some first-time offenses. In Florida, it costs $45 a day to keep someone in the state prison system, compared with about $10 a day for surveillance with the G.P.S. device. Currently 27 states are using some type of satellite surveillance, and some provinces in Canada are also considering using the technology. Florida has been the most eager adopter, with almost 600 offenders on the box, partly because Pro Tech Monitoring, the leading G.P.S. surveillance company, is based in the state. "It's like Big Brother," said Jim Sommerkamp, a senior probation supervisor here in Hillsborough County, who supervises Mr. Zadrayel using Pro Tech's system, known as Satellite Monitoring and Remote Tracking. And in this case, officials say, Big Brother is a good thing. People who have committed crimes once are likely to commit them again; about half of those released from prison are convicted of a new crime within three years. As a constant reminder that the government is watching, G.P.S. monitoring may discourage repeat crimes. [...] Adoption of the technology has been somewhat slow because the state and local authorities are reluctant to commit themselves to a system that still has rough edges. For one thing, the G.P.S. satellite signals are often blocked when offenders are inside buildings or outside in areas with many tall buildings. (If a signal is lost for more than a few minutes, an alert is sent.) The system is also not suitable for rural areas where the local cellphone infrastructure may be inadequate. The monitoring is also labor-intensive: at $10 a day, Pro Tech's system costs twice as much as traditional electronic monitoring. "Many states say it's too expensive, it's too bulky, it's too unreliable," Dr. Johnson said. "Until they fix some of those problems, they're not going to consider it." But as the technology matures, satellite tracking will
Bush Budget Links Dollars to Deeds... except for his special interests
Bush Budget Links Dollars to Deeds With New Ratings By RICHARD W. STEVENSON WASHINGTON, Feb. 2 The $2.13 trillion budget plan that President Bush will send to Congress on Monday for the first time formally assesses the performance of government agencies and programs and to some degree links their financing to the grades they receive, administration officials say. http://www.nytimes.com/2002/02/03/politics/03BUDG.html
"raisethefist" website crackdown
hi all. I heard of another web site shut down in texas or somewhere around the time of the 9-11... what would be good is a public documentation/exposure of all these cases, does anyone know of one??? sort of a cyberspatial ACLU or EFF also I wonder what exactly was on the site below --- Forwarded Message To: [EMAIL PROTECTED] Date: Mon, 28 Jan 2002 16:57:51 - Subject: [ParanoidTimes] RaiseTheFist.com Leader Raided By 25 Heavily-Armed Agents From: "dknuckles2001" <[EMAIL PROTECTED]> RaiseTheFist.com Leader Raided By 25 Heavily-Armed Agents 1-27-2002 LOS ANGELES - Heavily armed with high-powered machine guns, shot guns, and hand guns, the FBI, Secret Service, and Los Angeles Police Department sorounded the founder of raisethefist.com in his house. The founder was currently asleep, woken up by a relative who said fbi, police and undercover's were currently up and down all of the streets, with they're eyes focused on the premises. Raisethefist.com founder aproached the door were 2 FBI agents demanded that he step outside. Within seconds a swarm of FBI raided the house with automatic weapons and shot guns. Additional police and fbi also stayed on the front lawn, around the house with a door baracade and additional weapons. "armed and ready". FBI and secret service entered the house, seizing all servers and political liturature. Raisethefist.com was currently being ran within the founders room of the house, over a computer network. The room was literarly ransacked, and all equipment, disks, cd's .. etc. were boxed up, loaded into a truck and seized until further notice. Since 1999, raisethefist.com has been under extensive government monitering. At times, Raisethefist.com has recieved over 100 hits from the U.S Department of Defense in a single day. The FBI, police department, NSA (and who else) continuesly monitered the site on a daily basis. Even government's from the UK, Canada, Lavtia, Belgium, Egypt, Finland, and Australia monitered the site continuesly. The FBI had also previously intercepted all packets going through the DSL line hosting the site, and have seized additional accounts being used by the site. In yet another successfull attempt to silence our vioces, Raisethefist.com, an anarchist/activist independent media/collective has been shut down by the secret service. "It's not yet known at this point if the site will be back up. As of now, we have nothing. No more servers, no more network, nothing. My room remains completly ransacked. My neighbors remain shaken up by what happend. I most likely won't be getting any of the equipment back. They also took alot of my political litature. Apparently, they're excuse for shutting it down was the 'militancy' portrayed on the site. This is not true. This was an excuse. This same 'militancy' they were concerned about is portrayed on at least a thousand other web sites across the internet, and they havn't been touched by the federal government, with the exception for remote monitering. Raisethefist.com was progresive. It was going somewhere. Kids started creating clubs in their schools called 'RaisetheFist'. People started utilizing the collective as a powerful resource for the activist/anarchist community. The federal government has been investigating me, and the site very closely, long before 9-11, and long before such militancy was even portrayed on the site. They knew the site had potential, that it was turning into something more than a site, but a strong collective utilized by activists throughout the world committed to social justice. And that's become a crime. Justice has become a crime. Freedom has become a crime. Anyone activly disagreeing with policies of the U.S is now automaticly rendered a "terrorist" in the eyes of national security Where raisethefist.com will go from here, I don't know. Based on what i've been told, i'll most likely be in jail, so most of my focus will be towards getting an attorney." http://www.rense.com/general19/raisefist.htm - Yahoo! Groups Sponsor -~--> Get your FREE credit report with a FREE CreditCheck Monitoring Service trial http://us.click.yahoo.com/ACHqaB/bQ8CAA/ySSFAA/zgSolB/TM - -~-> == IF YOU'RE NOT PARANOID, THEN YOU'RE NOT PAYING ATTENTION! == To Post: [EMAIL PROTECTED] Home Page: http://groups.yahoo.com/group/ParanoidTimes Subscribe: [EMAIL PROTECTED] == NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml
fbi raid anarchists house & web site/raisethefist
--- Forwarded Message From: "Bond" <[EMAIL PROTECTED]> Date: Fri, 1 Feb 2002 01:44:45 +1100 Subject: [ParanoidTimes] FBI Raid Silences Teen Anarchist's Site To: <[EMAIL PROTECTED]> - --=_NextPart_000_0497_01C1AAC2.06A5EFC0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable FBI Raid Silences Teen Anarchist's Site By Brian McWilliams, Newsbytes SHERMAN OAKS, CALIFORNIA, U.S.A., 31 Jan 2002 In a case that may test limits on Internet free speech in the wake of Sept.= 11, armed federal agents last week raided the home of a Los Angeles teenag= er suspected of hacking into several Web sites to post anarchist messages a= nd using his own site, Raisethefist.com, to publish bomb-making information= . Sherman Martin Austin, 18, is believed to have violated federal computer fr= aud and abuse laws, as well as statutes prohibiting the distribution of bom= b-making information, according to an FBI affidavit. FBI agents conducted the raid on the afternoon of Jan. 24 at the Sherman Oa= ks residence owned by Austin's mother after receiving a federal warrant. Th= e agents seized several computers and documents, according to an FBI spokes= person.=20 In an interview Wednesday, Austin told Newsbytes he was interrogated for mo= re than six hours but has not yet been charged with any crimes.=20 According to Austin, all of the site's files, which were dedicated to "the = anti-corporate globalization movement," were lost as a result of the raid. = The site had received approximately 700 unique visitors each day, he said.= =20 "I think they are a bunch of cheap shots, surrounding and raiding my house = with machine guns, shotguns, bullet-proof vests. They had more artillery th= an they use with wanted gang felons or raids on drug operations," said Aust= in.=20 Matthew McLaughlin, a representative of the FBI's Los Angeles field office,= confirmed that agents who conducted the search were heavily armed.=20 "This is Los Angeles after all. We always go in to protect ourselves. We do= n't go in with slingshots," said McLaughlin.=20 A message at the Raisethefist.com site today described the raid and said th= e incident was proof that "anyone actively disagreeing with policies of the= U.S is now automatically rendered a 'terrorist' in the eyes of national se= curity."=20 Following the Sept.11 attacks on America, Congress passed the USA Patriot A= ct, which expand the ability of law enforcement to hunt for terrorists.=20 "People can rant and rave on the Internet all they want, but when they cros= s the line of calling people to action to violently overthrow the Constitut= ion of the United States, they have a problem," said McLaughlin.=20 According to the FBI, Austin allegedly defaced at least five commercial Web= sites since 1999 using the nickname "Ucaun." On three of the sites, Austin= left behind a hacking program named troop.cgi that was designed to attempt= to log in to a computer operated by the U.S. Army, the FBI affidavit state= d.=20 In the interview, Austin acknowledged that he vandalized the Web sites and = that he knew it was illegal to do so. But he defended the act by saying it = was necessary to get his message out.=20 Copies of several of the defaced pages are accessible using the cache store= d by the Google search engine. The defacements contain white and red text o= n a black background, with the title "Hacked by the UCA - Underground Confi= dential Association" and a verbose screed about overthrowing the government= and building a "New World Order."=20 According to the FBI, Austin operated Raisethefist.com as well as a site fo= r his fledgling Web development business, 2CP.com, from computers in his ho= me connected to the Internet by DSL.=20 Copies of the site's pages cached by Google include instructions on how to = make explosives from pipes, fertilizer, and match heads.=20 In the interview, Austin said he did not write the bomb instructions but in= stead copied the pages from another site.=20 Another page, entitled "Hacking," notes that the Department of Defense and = other government agencies are dependent upon information technology and are= therefore vulnerable to computer attacks.=20 "But how many of us are really willing to engage in such an intense form of= warfare through bauds and wires? Who's got the balls? Who's willing to sac= rifice everything?" said the page.=20 The domain registration record for Raisethefist.com lists Austin as the adm= inistrative, technical, and billing contact for the site. Austin said he "m= ade up" the name listed as the site's registrant, Joseph Parker, "for secur= ity reasons" and noted that he has received threats because of the site's a= nti-government message.=20 According to Austin, he has been targeted by the government simply because = he advocates social justice.=20 "If I go to jail, then I will go to jail not based on my actions, but based= on what I think," he said. http://www.
Re: Cypherpunk agenda succeeding
>On Thursday, January 31, 2002, at 08:44 AM, [EMAIL PROTECTED] wrote: >>Encrypted disks are still rare, but that is because raids >>that seize people's computers are rare. Of course it is >>regrettable that disk encryption is not part of the operating >>system -- but if Microsoft put it in before we had a strong, >>widely adopted system, they would doubtless muck it up. There are two things that can make it common - - paranoids like us reacting to raids on computers - stolen laptops leading to corporate information theft. Microsoft isn't going to encrypt disk drives to protect against the former; they might do it because of business demand from the latter. One of the big impacts of encrypted disks is that cops can steal your computer with just a warrant, while encrypted disks force them to take you to court to get the password, which gives you an opportunity to get a lawyer and argue about the reasonableness of the search. That's one of the few good excuses I can see for using biometrics - if the computer won't mount the main diskdrive without you putting your thumb on the pad, it's harder to blackbag and they can't get your data without you knowing it, assuming the biometrics are implemented properly. Some blackbag jobs can work fine without rebooting the machine, like keyloggers in the keyboard cord (if your operating system doesn't choke on disconnecting the cord), and obviously cracking into your box from your DSL line won't be affected, but it does block some attacks. Some uses for biometrics have a much more incriminating tradeoff - if your private key can only be opened using your thumbprint, that's strong evidence that that key really belongs to you and not just some random user with an account on your machine. But tying your thumbprint to the hardware sitting in your house isn't very incriminating, unless you were going to claim that you're just running the box for your brother and don't know what he's running on it :-)
Re: Cypherpunk agenda succeeding
On Sun, 3 Feb 2002 [EMAIL PROTECTED] wrote: > > http://einstein.ssz.com/hangar18 > > These web sites announce lots of interesting beginnings. > > Anyone can start interesting projects, and lots of people > have done so. > > The hard part is actually finishing them. You mean like having a BBS/system publicly available for over 20 years? Or starting the first Linux user group in Texas? Or providing a node for the CDR for a period approaching 5 years? If one of my projects fails it isn't because I let it die from negligence. Our current status: - We currently have the T1 installed, we're currently doing load checking and burn-in while waiting for various DNS issues to resolve themselves. The site should go public within a week to 10 days. - Two working 802.11b AP's approximately 10 miles apart, w/ another coming online in the next couple of months. This will be our 3rd 'backbone' node and will be about 10 miles from the other two. I believe this gives us the largest Guerrilla Network in Ctl. Texas, if not Texas over all. - We have one location for weekly meeting spec'd out and we should have a second by the end of the week. - We are working on our first Plan 9 file server now, to be followed by at least two (2) Plan 9 process boxes by summer. - We have a Lego Mindstorms reference platform completed and we should be providing that material shortly after the go-live date. We are completely volunteer supported...and you do NOT have to be in Austin to participate... -- James Choate - [EMAIL PROTECTED] - www.ssz.com
Re: CDR: fbi raid anarchists house & web site/raisethefist
On Sun, 3 Feb 2002 [EMAIL PROTECTED] wrote: You know, this kid is acting all "shocked" and surprised that "The Man" reacted to his propaganda. I find this *truly* amusing! Did he think that the Fedz would just stand back and *watch*? Take on the ruling powers at your own risk: don't be surprised when they decide you've become a nuisance worth slapping around. This is not to say that you *shouldn't* take on the what you believe in, but at least go in with your eyes open! Yours, J.A. Terranson Yet Another Loud Mouth Who Has Been Visited By The Man (but who isn't the least bit surprised by it)...
Re: fbi raid anarchists house & web site/raisethefist
On Sunday, February 3, 2002, at 04:50 PM, [EMAIL PROTECTED] wrote: > On Sun, 3 Feb 2002 [EMAIL PROTECTED] wrote: > > > > > You know, this kid is acting all "shocked" and surprised that "The > Man" reacted to his propaganda. I find this *truly* amusing! Did he > think > that the Fedz would just stand back and *watch*? Apparently the kid believed the crap they taught him in school about the First Amendment. > > Take on the ruling powers at your own risk: don't be surprised when they > decide you've become a nuisance worth slapping around. This is not to > say > that you *shouldn't* take on the what you believe in, but at least go > in with > your eyes open! I hope the kid goes on to execute those who ordered his arrest. --Tim May "Dogs can't conceive of a group of cats without an alpha cat." --David Honig, on the Cypherpunks list, 2001-11
Re: INFO: Intricate Screening Of Fliers In Works
On Sunday, February 3, 2002, at 01:22 PM, Morlock Elloi wrote: >> "Theoretically, the system could be calibrated to watch for people with >> links to restaurants or other places thought to be favored by terrorist >> cells. It might also note phone calls and match individuals against > > Terrible. > > First they will just have to talk the terrorist out of using cash for > non-ticket purchases or into using cash for ticket purchases. > > Otherwise, some really devious terrorist may use traceable payment > instruments > only for benign purposes (see "Creating a profile" chapter) and for > that final > ticket purchase, while paying with cash everything else. > > Could it just be that this current War on something will be used, as all > previous Wars on something, to eradicate cash ? And how will they get the records from restaurants? (Ditto for the other "data mining" inputs, most of which are from private persons, companies, or organizations.) Subpoena of specific person records will not generate the data mining raw data they want. Even in our headlong rush to a surveillance state, I don't see restaurants and bookstores turning over information on this kind of scale. (Which leaves us with the credit card companies. Maybe FINCEN and DOJ can get specific records, but, again, the kind of terabytes per day of raw data to feed the data harvesters will not be easy to get. Unless the several credit reporting agencies elect to help Big Brother on a massive scale. We should be on the watch for this.) --Tim May "To those who scare peace-loving people with phantoms of lost liberty, my message is this: Your tactics only aid terrorists." --John Ashcroft, U.S. Attorney General
Re: CYBERWAR: A Brief Comparison of Email Encryption Protocols
-- Jei, quoting an old but still too true document > > An additional grave concern is key management. Contrary > > to some beliefs,key management is not a solved problem. > > All of the proposals contain some mechanism for key > > management, but none of them have been demonstrated to be > > scalable to an Internet-wide email system. The current program for key management -- based on keys certified, and regrettably, sometimes issued by a central certifying authority -- just is not working. This is partly because most of the recipients do not understand about private and public keys, and partly because of an amazingly user hostile interface designed to obstruct people who do not know what they are doing from screwing up even more than they do already, but which in practice just plain obstructs them. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG wVOK0p9C2cZKI5rpTOgf6FKkqKBAZ/LlLJuXE5JY 4KQCaT1zXQN0qMzc+a1vQnMr6Wn6eNNFJsBs/DO2u