No interest in sex? 31641

2002-02-03 Thread youth_fountain9977
Title: Idealage



 



We strongly
oppose the use of SPAM email and do not want to send our mailings to anyone who
does not wish to receive them. As a result, we have provided this remove link
for your convenience. This is not SPAM. If you do not wish to receive further
mailings, please take a moment and send a remove request to [EMAIL PROTECTED]
please type the words "Remove me" in the body of your message or the Subject line to be properly removed from our list. You may then rest-assured that you will never receive another email from us again. Your email address was obtained from an opt-in list, Reference # 10023387. If you have previously un-subscribed and are still receiving this message, you may email our Abuse Control Center at mailto:[EMAIL PROTECTED]?Subject=Abuse Report or Call us at 1-866-728-4204, or write to us at: NoSpam, Remove1635, c/o AARL  111 Pacifica #250, Irvine, CA 92618.













XXX - Free Pass - Acct Info Attached (7131Ooxw6-265V@13)

2002-02-03 Thread britney052504



  
  

  

BRITNEY SPEARS
TOTALLY EXPOSED!
  
   See her forbidden tits upclose and personal! They're real!
See our BRAND NEW hidden camera footage from her latest movie!
  Britney does not wear panties!!
  We've gone to great lengths to bring you the hottest content possible!
 Stolen, black-market, candid, up skirt, nipple slip, xxx home videos, and more of Britney Spears and all your favorite celebrities are our specialty. We pay out over $100,000 a month just to photographers to provide us with the freshest content of the sexiest celebrities on the net. Don't miss out on this special offer!
  
  Click
  Here To See it ALL!!
   
  You must be 18 years of age or older to
  take advantage of this offer. If you do not wish to receive any further e-mail's
  from us you can be
  removed from our list by clicking here.

  
  

 


[5909vQQE7-485fCIN6929xGeB0-464ZCav9557arV@39]



Merchant accounts make money [34h78]

2002-02-03 Thread bkjhjgvuvemtdfxj


If you run a business and are reading this e-mail
chances are you have probably heard of merchant
accounts.

While there are lots of other Merchant Account
Venders telling you all the same thing, we don't
have any limited time offers, no monthly sales
or any other slick marketing techniques.

Our Prices are the lowest, we never have set up
fee or application fee.  Our Monthly rates 
already are super low, our transaction fee
is so low it's almost free!!


Reply to this e-mail with your

Name:
Phone Number:
Best time to call :


One of our helpful staff will call you and help
you set up your account.

For Whatever size your business is, we have an
account perfect for you.  If you have any
previous credit problems? Don't worry about it
because we won't either!!

While our competition may have a sale this month,
Or won't charge you a set up fee today. We have 
a sale everyday.  All you need to do to take 
advantage of this every day offer is simply

Reply today and you can accept;

Visa   Mastercard   American Express

Discover   Novus   Direct Checks
 
Fax Checks and  Also Accept Debit Cards !!
 
Remember, this is not a sale, not a limited 
time offer.  We Offer the best rates, all the
time.

You are 99.8% GUARANTEED to get a merchant account.

So what are you waiting for?

For more information please: 

Reply to this e-mail with your

Name:
Phone Number:
Best time to call :



It's that easy.


---
To be Removed from this list Please reply
with "Remove" in the subject line
and you will be removed within 24 hours.

bkjhjgvuvemtdfxj




Re: Tim May,J.Orlinn Grabbe Tilt from Libertarians to anarchists.

2002-02-03 Thread CDR Anonymizer

Johnny come lately wrote:

>May has pissed on libertarians from a great height recently and leant 
>toward classic anarchism.

May has pissed on libertarians for quite some time, it isn't some new
thing.

Your clue is waiting for you, it thinks you are way overdue.




Re: Cypherpunk agenda succeeding

2002-02-03 Thread Jim Choate


On 3 Feb 2002, Dr. Evil wrote:

> Microsoft does support encrypted disks.  They do in Windows XP and I
> think they may have had it earlier too.  Who doesn't support encrypted
> disk?  The open source guys.  There is only _one_ open source OS that
> currently supports encrypted disk in a non-kludge way (loopback FS
> counts as a kludge).

Your ignorance is showing...

http://plan9.bell-labs.com

http://einstein.ssz.com/hangar18


 --


James Choate - [EMAIL PROTECTED] - www.ssz.com







walmart surveillance, collaborators

2002-02-03 Thread Anonymous

At 05:21 PM 2/2/02 -0800, Tim May wrote:
>On Saturday, February 2, 2002, at 12:52  PM, Neil Johnson wrote:
>> Still believe that the government doesn't snoop in your private life ? 
>> Read on:

>> She's checking out  when when the words "Limit 3" appears on the cash
>> register display. The check-out person informs her that this is because
>> Wal-Mart (in co-operation with law enforcement) is limiting the amount 
>> of
>> over the counter cold remedies one can buy to prevent their use in the
>> manufacturing of meth.

Or maybe since Mafiaboy confessed to being a Robo-head, they're
watching dextromethorphine, the cough-suppressing but not terribly
euphoric isomer used in cold meds and by bored teenagers.


>And this has been going on for a while. I used to be able to buy 50- and 
>100-count bottles of generic pseudoephedrine (IIRC this was it...don't 
>quote me on it), the same ingredient in Actifed, a cold/sinus pill. 
>These generic bottles have vanished, to be replaced by blister packs of 
>vastly more expensive pills containing the same ingredient.

Its the pseudoephedrine which is the major input to most amphetamine
and methamphetamine syntheses.  The feds (who cause the illicit
labs via their prohibition) find cases of PE bottles with their
bottoms sliced off.

>Pseudoephedrine is related to speed, and I presume can be used to make 
>purer forms of speed.

The synthesis makes a small change to the PE molecule producing
a diferent molecule.  There is no speed in PE; a long time ago
centrally active amphetamines were used in inhalers, but no more 
(it was readily extracted and purified.)

...

Steve Shear: nasal sprays are good for hydrating the membranes
that coldbugs target; heated winter air dries them.  Zinc may 
help.  But someone buying Nyquil-type drugs is already infected
and just wants a break from symptoms.

Neil: You'd be better off reading the labels on brand-name
Nyquil and buying the ingredients separately and generically.
That way you can avoid taking something you don't need --say
pseudoephedrine which dries membranes-- when all you want
is dextro's cough suppressant effect.  The other ingredient
tends to be anti-histamines (and ethanol) which help you sleep
if nothing else.  

Enough biology for now.

--
"Architects ask: What did I do to cause this?"
http://latimes.com/news/nationworld/nation/la-122101arch.story

Architects ask, but does congress even bother?  




sign up now! **THEORY-EDGE** mailing list

2002-02-03 Thread vznuri

21st century paradigm shifts, DELIVERED DAILY!

The "theory-edge" mailing list is for informal, collegial 
discussion of the latest research advances, and especially 
newsworthy cutting-edge or breakthrough developments, in the 
hardest problems in algorithmics. FREE! Try it out now!

http://groups.yahoo.com/group/theory-edge/

FAQ:

http://www.geocities.com/vznuri/faq.html

3.5 YEARS OLD ** EST.MAY 1998 ** 700+ SUBSCRIBERS ** 4500+ MSGS
openly browsable/searchable archives ** ~7 msgs/day average


We're particularly seeking elite scientists, academics,
researchers, and practitioners such as PhDs and 
graduate students. We have a few "mini-celebrities" currently 
on the list.

Past traffic is diverse. 1st priority items of interest are 
recent news reports or media coverage on fresh advances or 
breakthroughs in these areas and subscriber reaction/commentary 
to them. Its a gift economy--please post them when you run into 
them! And more and more, we've already heard and discussed
the cool news *before* it hits the mainstream outlets!


news media   fields   comp sci
--   --   
wiredalgorithmics modelling
slashdot comp sci simulations
new york times   mathematics  experiments
cnn  comp bio cellular automata
MIT tech review  comp neuroscimachine learning
new scientistbioinformatics   artificial intelligence
sci. americanproteomics   artificial neural networks
science week econophysics genetic algorithms
science dailystatistics   evolutionary software
  artificial life
  cryptography
  data compression


Next, we're extremely interested in cutting-edge advances in 
computational methods, both on the applied and theoretical sides. 
A strong scientific component emerges from engaged and active 
subscribers. We've now had three major "open science", *world-class*
research projects and collaborations on the list. Its an exciting
treat to hear daily notes sent by researchers at the cutting edge!


computing forms  computationalscience &
---  complexity   research
QM computing --   
light/optical computing  P vs NP vs Pspaceconferences
nanocomputingNP (complete) problems   workshops
dna computingtransition point new papers
biochips boolean circuits writing papers
logic gates/transistors  satisfiability problem   graduate students
reconfigurable computing davis putnam algorithm   masters thesis
distributed computingresolution   PhDs
parallel computing   hard instances   dissertation
supercomputers   benchmarks   electronic publishing
beowulf clusters validation   peer reviewing
 regular expressions  style/etiquette
 finite state machinesfunding/grants
 turing machines  philosophy
 undecidability   psychology
 diagonalization  kuhn's paradigm shifts
 oracles/relativization   popper's falsifiability
 symmetries   
 recursion


Other interesting theory-edge topics routinely pop up on the list.
Lots of cyber-synchronicity and synergy occurs among people's 
backgrounds when you get a lot of really intelligent and articulate 
researchers in the "same room"!


software mathematics  physics
 ---  ---
packages unprovabilityquantum mechanics
librariesfactoring/primes local hidden variables
computer languages   graphs   analog computing
open source  gamesbell's theorem
 groups   agent complexity
AI advances   chaos
---  open problemsfractals
robotics -levy distributions
face recognition riemann conjecture   1/f noise
speech recognition   collatz conjecture   fractional brownian 
auto theorem proving goldbach conjecture   motion
turing test  odd perfect numbers  nonlinear dynamics
 fermat's last theoremprotein folding
academia &   busy beaver problem  
universities  
-

Anyone against US govt a terrorist? RAISETHEFIST.COM RAIDED BY FBI!!

2002-02-03 Thread Jei


http://www.raisethefist.com/

RAISETHEFIST.COM RAIDED BY FBI!!

NEWSFLASH Jan/30 - We have found a complete backup of raisethefist.com
online. We will need U.S. $300.00 Three Hundred in order to obtain a
copy from that host. Please contact the founder if you wish to donate.
The contact info is on the bottom. -Founder
"The raid consisted of FBI, Secret Service, LAPD and LASD. They
sorounded the house with guns before raiding it. They had machine guns,
shot guns, and hand guns. They also had a door bammer ready to break
down the door, they also blocked off the garage door, and had bullet
proof vests. They obviously came prepared to shoot and kill. They had
more artillary then they use for raiding gang felons and drugoperations."
- RTF Founder
LOS ANGELES, JAN 24 2002 - Heavily armed with high-powered machine guns,
shot guns, and hand guns, the FBI, Secret Service, and Los Angeles
Police Department sorounded the founder of raisethefist.com in his
house. The founder was currently asleep, woken up by a relative who said
fbi, police and undercover's were currently up and down all of the
streets, with they're eyes focused on the premises. Raisethefist.com
founder aproached the door were 2 FBI agents demanded that he step
outside. Within seconds a swarm of FBI raided the house with automatic
weapons and shot guns. Additional police and fbi also stayed on the
front lawn, around the house with a door baracade and additional
weapons. "armed and ready".
FBI and secret service entered the house, seizing all servers and
political liturature. Raisethefist.com was currently being ran within
the founders room of the house, over a computer network. The room was
literarly ransacked, and all equipment, disks, cd's .. etc. were boxed
up, loaded into a truck and seized until further notice.
Since 1999, raisethefist.com has been under extensive government
monitering. At times, Raisethefist.com has recieved over 100 hits from
the U.S Department of Defense in a single day. The FBI, police
department, NSA (and who else) continuesly monitered the site on a daily
basis. Even government's from the UK, Canada, Lavtia, Belgium, Egypt,
Finland, and Australia monitered the site continuesly. The FBI had also
previously intercepted all packets going through the DSL line hosting
the site, and have seized additional accounts being used by the site.
In yet another successfull attempt to silence our vioces,
Raisethefist.com, an anarchist/activist independent media/collective has
been shut down by the secret service. A note from the founder:
"It's not yet known at this point if the site will be back up. As of
now, we have nothing. No more servers, no more network, nothing. My room
remains completly ransacked. My neighbors remain shaken up by what
happend. I most likely won't be getting any of the equipment back. They
also took alot of my political litature. Apparently, they're excuse for
shutting it down was the 'militancy' portrayed on the site. This is not
true. This was an excuse. This same 'militancy' they were concerned
about is portrayed on at least a thousand other web sites across the
internet, and they havn't been touched by the federal government, with
the exception for remote monitering. Raisethefist.com was progresive. It
was going somewhere. Kids started creating clubs in their schools called
'RaisetheFist'. People started utilizing the collective as a powerful
resource for the activist/anarchist community. The federal government
has been investigating me, and the site very closely, long before 9-11,
and long before such militancy was even portrayed on the site. They knew
the site had potential, that it was turning into something more than a
site, but a strong collective utilized by activists throughout the world
committed to social justice. And that's become a crime. Justice has
become a crime. Freedom has become a crime. Anyone activly disagreeing
with policies of the U.S is now automaticly rendered a "terrorist" in
the eyes of national security Where raisethefist.com will go from
here, I don't know. Based on what i've been told, i'll most likely be in
jail, so most of my focus will be towards getting an attorney."
If you want to contact the Founder, please E-mail:
[EMAIL PROTECTED] or for the Sysop please E-mail:
[EMAIL PROTECTED]

 RaiseTheFist.com Leader RaidedBy 25 Heavily-Armed Agents
1-27-2LOS ANGELES - Heavily armed with high-powered machine guns, shot guns,
and hand guns, the FBI, Secret Service, and Los Angeles Police
Department sorounded the founder of raisethefist.com in his house. The
founder was currently asleep, woken up by a relative who said fbi,
police and undercover's were currently up and down all of the streets,
with they're eyes focused on the premises.
Raisethefist.com founder aproached the door were 2 FBI agents demanded
that he step outside. Within seconds a swarm of FBI raided the house
with automatic weapons and shot guns. Additional police and fbi also
stayed on the front lawn, around the house wit

Free Offer - VIAGRA Alternative........ 3759

2002-02-03 Thread rtbnop778
Title: ViaPro

	
	
		
			
		





			
			
		




To be removed from future mailings 
CLICK HERE





patience

2002-02-03 Thread mailer

At 06:52 PM 2/2/02 -0800, Bill Stewart wrote:



>Also, you can get 24-packs of the timed-release 120-mg tabs.

>Apparently speeders don't have the patience to pop all the little



That's quite amusing if you've ever observed certain

obsessive states associated with speeding.



Its easier to drive to mexico to buy bottles or

get large diverted quantities.




Re: Cypherpunk agenda succeeding

2002-02-03 Thread jamesd

--
On 3 Feb 2002, Dr. Evil wrote:
> > Microsoft does support encrypted disks.  They do in
> > Windows XP and I think they may have had it earlier too.
> > Who doesn't support encrypted disk?  The open source
> > guys.  There is only _one_ open source OS that currently
> > supports encrypted disk in a non-kludge way (loopback FS 
> > counts as a kludge).

On 3 Feb 2002, at 8:42, Jim Choate wrote:
> Your ignorance is showing...
>
> http://plan9.bell-labs.com
>
> http://einstein.ssz.com/hangar18

These web sites announce lots of interesting beginnings.

Anyone can start interesting projects, and lots of people
have done so.

The hard part is actually finishing them. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 DKhpwzsEPkg97c5wEJCsELvsBQGtvKv3iqDpIJym
 4GCGYxW0PssctHi3sX8a0OP6zaCB2vZicxHxdjxuG




Re: Cypherpunk agenda succeeding

2002-02-03 Thread jamesd

--
James A. Donald:
> > > it is regrettable that disk encryption is not part of
> > > the operating system -- but if Microsoft put it in
> > > before we had a strong, widely adopted system, they
> > > would doubtless muck it up.

Dr Evil
> Microsoft does support encrypted disks.

So they do:
http://www.microsoft.com/WINDOWSXP/pro/techinfo/administration/recovery/DataProtection.doc

Unfortunately the default encryption is single DES, which can 
be broken by anyone with sufficient money and patience.   Non 
US users cannot change this default, and the ordinary US user 
will not change this default. They now generate a  key pair 
associated with every XP user.

Wow!  Universal public and secret keys, not one per true
name, but one per login identity you create on your PC!

At last, the universal public key cryptography infrastructure
we have all been waiting for! The documentation says that
this key infrastructure is available for everyone, though
Microsoft's email program does not seem aware of this.
Outlook express insists on certified keys, though very few
people, other than web site operators, seem willing to jump
through all the hoops needed create and maintain certified
keys. Right now these universal keys are only used in file
recovery (the symmetric key is encrypted to the
administrator's public key.)  But if one has universal public
key pairs linked to one's computer login, the obvious thing
is to use them in communication.  Of course there is no one
to one relationship between email addresses and login ids, so
one would need to wrap the encrypted body in a header that
says that it can only be read on machine so and so, by user
so and so. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 3wrXNiWT9aRDvMWloLpd/NtFYuHcd+HGPPfA0651
 4zWd4wnG0VtmpEoNV8QUdENb764NqRurUpHZQG8nV




Polygraph Countermeasure Challenge

2002-02-03 Thread Jei


-- Forwarded message --
Date: Tue, 29 Jan 2002 21:23:31 +0100
From: George W. Maschke <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Polygraph Countermeasure Challenge

Dr. Drew C. Richardson, the FBI's recently retired senior scientific expert
on polygraph "testing," has reiterated a challenge to the polygraph
community regarding polygraph countermeasures (methods of defeating
polygraph "tests").

Polygraphers frequently claim that any experienced polygraph examiner can
easily detect attempted polygraph countermeasures. Journalists have
frequently parroted such claims without questioning them. But peer-reviewed
research suggests that polygraphers cannot detect countermeasure attempts
at better than chance levels of accuracy, and Dr. Richardson's challenge
should be of interest to all concerned. You'll find it on the
AntiPolygraph.org message board at:

http://antipolygraph.org/cgi-bin/forums/YaBB.pl?board=Proc&action=display

George W. Maschke

Intelligence Forum (http://www.intelforum.org) is sponsored by Intelligence
and National Security, a Frank Cass journal (http://www.frankcass.com/jnls/ins.htm)




Innocent Muslims killed as Bush allies 'crusade'

2002-02-03 Thread Jei


http://www.guardian.co.uk/Observer/international/story/0,6903,644045,00.html

Innocent Muslims killed as Bush allies 'crusade'

Shootings and torture by security forces are spreading fear in the
Philippines, the new flashpoint in the US war.

Film-makers Jonathan Miller
and Rob Lemkin report

Sunday February 3, 2002
The Observer

Syed Kaing Mabbul was a coconut farmer on the exquisitely beautiful island
of Basilan in the southern Philippines, the hottest new target in
President George W. Bush's global war on terrorism. His misfortune, his
mother told us, is that he has the same name as a commander of the Abu
Sayyaf, a bloodthirsty group of Islamic extremists financed by robbery,
piracy, ransom and - in the past, at least - by Osama bin Laden.

About 150 Americans, the advance party of a force of about 650, are already
in the southern Philippines for a six-month 'military' exercise that began
formally last Thursday. Their task is to train Filipino soldiers how better
to fight Abu Sayyaf, and to rescue kidnapped missionaries Martin and Gracia
Burnham of Wichita, Kansas, who have been in captivity for eight months.

Syed fled the island last May, and has been living in a lean-to shack on the
outskirts of Zamboanga City, on the island of Mindanao, about 15 miles north
of Basilan across a turquoise sea.

Local Muslims took us to meet Syed's mother, Azirah Mabhul. She told us he
had been betrayed to the army by seven fellow Muslims who had split a bounty
of a million pesos (about £14,000).

'They picked up my son at 8am,' she told us. 'They brought him to
Malagutay Brigade Camp, blindfolded him, beat him, stripped him, then hung
him upside down for eight hours. They inserted ground-up chilli paste into
his rectum to force him to confess to belonging to Abu Sayyaf.'

Azirah said that when she finally located her son, he still couldn't sit
down. 'Mum,' he said, 'I just can't take the pain any more.'

In mid-December, Syed Kaing Mabbul was taken, with 79 other terrorist
suspects, to a high security jail in the capital, Manila. He hasn't been
heard from since.

It was impossible to confirm his story, but Muslim community leaders vouched
for his innocence. His case is one of many accounts of harassment,
indiscriminate arrest, disappearances, routine torture and killing now
producing growing concern over 'gross and rampant human rights violations'
against Muslim civilians.

Human rights leaders point the finger at the America's new ally in its
global war, the Philippine armed forces. Since 11 September, they say,
incidents of abuse have grown, and there is a palpable climate of fear.

'We are the ones who are living in terror,' said the imam of a mosque in a
squalid Muslim ghetto on the edge of Zamboanga City. 'This war against
terror is just the latest campaign in a 400-year crusade against Islam,'
he said, echoing the convictions of the wider Islamic world.

Although the Philippines' five million Muslims comprise a minority in
Asia's only Roman Catholic country, they no longer feel on the fringe of
the global Islamic community.

Syed's case was just one 'among hundreds,' said Zenaida Sabaani-Lawi,
director of Murid, a Muslim organisation which provides micro-finance to
local women. 'There have been killings too. It's been getting worse since
11 September. It's as if they now have a licence,' she said. 'This is
state terror.'






The Palestinian Vision of Peace (By Yasir Aarafat, The New YorkTimes)

2002-02-03 Thread Jei

http://www.nytimes.com/2002/02/03/opinion/03ARAF.html

February 3, 2002

The Palestinian Vision of Peace
By YASIR ARAFAT


RAMALLAH — For the past 16 months, Israelis and Palestinians have been
locked in a catastrophic cycle of violence, a cycle which only promises more
bloodshed and fear. The cycle has led many to conclude that peace is
impossible, a myth borne out of ignorance of the Palestinian position. Now
is the time for the Palestinians to state clearly, and for the world to hear
clearly, the Palestinian vision.

But first, let me be very clear. I condemn the attacks carried out by
terrorist groups against Israeli civilians. These groups do not represent
the Palestinian people or their legitimate aspirations for freedom. They are
terrorist organizations, and I am determined to put an end to their
activities.

The Palestinian vision of peace is an independent and viable Palestinian
state on the territories occupied by Israel in 1967, living as an equal
neighbor alongside Israel with peace and security for both the Israeli and
Palestinian peoples. In 1988, the Palestine National Council adopted a
historic resolution calling for the implementation of applicable United
Nations resolutions, particularly, Resolutions 242 and 338. The Palestinians
recognized Israel's right to exist on 78 percent of historical Palestine
with the understanding that we would be allowed to live in freedom on the
remaining 22 percent, which has been under Israeli occupation since 1967.
Our commitment to that two-state solution remains unchanged, but
unfortunately, also remains unreciprocated.

We seek true independence and full sovereignty: the right to control our own
airspace, water resources and borders; to develop our own economy, to have
normal commercial relations with our neighbors, and to travel freely. In
short, we seek only what the free world now enjoys and only what Israel
insists on for itself: the right to control our own destiny and to take our
place among free nations.

In addition, we seek a fair and just solution to the plight of Palestinian
refugees who for 54 years have not been permitted to return to their homes.
We understand Israel's demographic concerns and understand that the right of
return of Palestinian refugees, a right guaranteed under international law
and United Nations Resolution 194, must be implemented in a way that takes
into account such concerns. However, just as we Palestinians must be
realistic with respect to Israel's demographic desires, Israelis too must be
realistic in understanding that there can be no solution to the
Israeli-Palestinian conflict if the legitimate rights of these innocent
civilians continue to be ignored. Left unresolved, the refugee issue has the
potential to undermine any permanent peace agreement between Palestinians
and Israelis. How is a Palestinian refugee to understand that his or her
right of return will not be honored but those of Kosovar Albanians, Afghans
and East Timorese have been?

There are those who claim that I am not a partner in peace. In response, I
say Israel's peace partner is, and always has been, the Palestinian people.
Peace is not a signed agreement between individuals — it is reconciliation
between peoples. Two peoples cannot reconcile when one demands control over
the other, when one refuses to treat the other as a partner in peace, when
one uses the logic of power rather than the power of logic. Israel has yet
to understand that it cannot have peace while denying justice. As long as
the occupation of Palestinian lands continues, as long as Palestinians are
denied freedom, then the path to the "peace of the brave" that I embarked
upon with my late partner Yitzhak Rabin, will be littered with obstacles.

The Palestinian people have been denied their freedom for far too long and
are the only people in the world still living under foreign occupation. How
is it possible that the entire world can tolerate this oppression,
discrimination and humiliation? The 1993 Oslo Accord, signed on the White
House lawn, promised the Palestinians freedom by May 1999. Instead, since
1993, the Palestinian people have endured a doubling of Israeli settlers,
expansion of illegal Israeli settlements on Palestinian land and increased
restrictions on freedom of movement. How do I convince my people that Israel
is serious about peace while over the past decade Israel intensified the
colonization of Palestinian land from which it was ostensibly negotiating a
withdrawal?

But no degree of oppression and no level of desperation can ever justify the
killing of innocent civilians. I condemn terrorism. I condemn the killing of
innocent civilians, whether they are Israeli, American or Palestinian;
whether they are killed by Palestinian extremists, Israeli settlers, or by
the Israeli government. But condemnations do not stop terrorism. To stop
terrorism, we must understand that terrorism is simply the symptom, not the
disease.

The personal attacks on me currently in vogue 

INFO: Intricate Screening Of Fliers In Works

2002-02-03 Thread Jei


- Forwarded message --
Date: Sat, 2 Feb 2002 03:45:46 -0800 (PST)
Subject: INFO:  Intricate Screening Of Fliers In Works 

"Theoretically, the system could be calibrated to watch for people with
links to restaurants or other places thought to be favored by terrorist
cells. It might also note phone calls and match individuals against
government watch lists. A potential link to a threatening character or
region could boost a passenger's score"

=
Washington Post Friday, February 1, 2002
By Robert O'Harrow Jr.


Intricate Screening Of Fliers In Works
Database Raises Privacy Concerns


Federal aviation authorities and technology companies will soon begin
testing a vast air security screening system designed to instantly pull
together every passenger's travel history and living arrangements, plus a
wealth of other personal and demographic information.

The government's plan is to establish a computer network linking every
reservation system in the United States to private and government
databases. The network would use data-mining and predictive software to
profile passenger activity and intuit obscure clues about potential
threats, even before the scheduled day of flight.

It might find, for instance, that one man used a debit card to buy tickets
for four other men who sit in separate parts of the same plane -- four men
who have shared addresses in the past. Or it might discern an array of
unusual links and travel habits among passengers on different flights.

Those sorts of details -- along with many other far more subtle patterns
identified by computer programs -- would contribute to a threat index or
score for every passenger. Passengers with higher scores would be singled
out for additional screening by authorities.

As described by developers, the system would be an unobtrusive network
enabling authorities to target potential threats far more effectively
while reducing lines at security checkpoints for most passengers. Critics
say it would be one of the largest monitoring systems ever created by the
government and a huge intrusion on privacy.

Although such a system would rely on existing software and technology, it
could be years before it is fully in place, given that enormous amounts of
data would need to be integrated and a structure would need to be
established for monitoring passenger profiles.

At least one carrier, Delta Air Lines, has been working with several
companies on a prototype. Northwest Airlines has acknowledged that it is
talking with other airlines about a similar screening system. Federal
authorities hope to test at least two prototypes in coming months or
possibly sooner, according to government and industry sources familiar
with the effort.

"This is not fantasy stuff," said Joseph Del Balzo, a former acting
administrator of the Federal Aviation Administration and a security
consultant working on one of the profiling projects. "This technology,
based on transaction analysis, behavior analysis, gives us a pretty good
idea of what's going on in a person's mind."

The screening plans reflect a growing faith among aviation and government
leaders that information technology can solve some of the nation's most
vexing security problems by rooting out and snaring people who intend to
commit terrorist acts.

But a range of policy and technical questions still need to be answered
before the system can become a reality. The Transportation Security
Administration, for example, must decide on a set of standards so
technology companies and airlines can begin building a system. They must
also figure out how to pay for the system and its operation. Industry
officials said they hope the system will cost, on average, much less than
$2 per ticket.

Officials at the TSA declined to comment, saying they did not want to
disclose any details that might undermine aviation security.

Government officials and companies also face questions about privacy. In
interviews, more than a dozen people working on two parallel projects said
they were taking pains to protect individual privacy. They intend to limit
the personal information shared with airlines and security officials.

But developers face restrictions on how much information they can use.
Industry officials have already discussed with lawmakers the possible need
to roll back some privacy protections in the Fair Credit Reporting Act and
Driver's Privacy Protection Act to enable them to use more of the credit
and driver's-license data.

Civil liberties activists said they fear the system could be the
beginnings of a surveillance infrastructure that will erode existing
privacy protections. When told about the system, Barry Steinhardt,
associate director of the American Civil Liberties Union, said it would be
"a massive complex system of surveillance."

"It really is a profound step for the government to be conducting
background checks on a large percentage of Americans. We've never done
that before," he said. "I

CYBERWAR: Under Developement: Encryption

2002-02-03 Thread Jei


./mark.hopkins.aka.rizzn//

Rizzn's Wartime Factbook: http://factbook.diaryland.com/
The Best UAV: http://www.unmannedaircraft.com
Rizzn's Musical Stylings: http://rizzn.trance.nu

> http://www.linuxsecurity.com/articles/cryptography_article-4377.html
>
> Under Developement: Encryption
> IDG.net
> Posted By: Jen Olson
> 2/1/2002 10:51
>
> AS MYSTICS SEARCH for the lost island of Atlantis and UFO buffs seek out
> alien spacecraft, cryptologists are continuing their own quest to create
an
> unbreakable code. Michael Rabin, a Harvard University computer science
> professor, believes he has moved cryptology a step closer to its Holy
Grail
> by developing a code that's undecipherable, even by those who have access
to
> both the cypher text and unlimited computing power.
> Rabin's Hyper-Encryption technology, which uses a device that quickly
> generates a deluge of random bits, relies on both time and money to thwart
> even the most dedicated code breaker. A coded message would be hidden
within
> the bits "like raisins in a pudding," quips Rabin. While anyone can read
the
> random bits, the transmission rate is so high that storing all of the
stream
> for analysis would be either technically unfeasible or cost prohibitive.
>
>
> Click here to go to this article:
>
http://www.idg.net/crd_idgsearch_1.html?url=http://www.cio.com/archive/02010
> 2/et_development.html



 Yahoo! Groups Sponsor -~-->
Get your FREE credit report with a FREE CreditCheck
Monitoring Service trial
http://us.click.yahoo.com/ACHqaB/bQ8CAA/ySSFAA/TySplB/TM
-~->

--
Brooks Isoldi, editor
[EMAIL PROTECTED]

http://www.intellnet.org

  Post message: [EMAIL PROTECTED]
  Subscribe:[EMAIL PROTECTED]
  Unsubscribe:  [EMAIL PROTECTED] 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 





CYBERWAR: A Brief Comparison of Email Encryption Protocols

2002-02-03 Thread Jei


> http://www.linuxsecurity.com/articles/cryptography_article-4356.html
>
> A Brief Comparison of Email Encryption Protocols
> Raph Levien
> Posted By: Jen Olson
> 1/30/2002 14:31
>
> Update: Shaun Gordon pointed out this article is quite old, and while not
> current still contains useful info. This document briefly reviews and
> compares five major email encryption protocols under consideration: MOSS,
> MSP, PGP, PGP/MIME, and S/MIME. Each is capable of adequate security, but
> also suffers from the lack of good implementation, in the context of
> transparent email encryption. I will try to address issues of underlying
> cryptographic soundness, ease of integration with email, implementation
> issues, support for multimedia and Web datatypes, and backwards
> compatibility.
>
> An additional grave concern is key management. Contrary to some beliefs,key
> management is not a solved problem. All of the proposals contain some
> mechanism for key management, but none of them have been demonstrated to be
> scalable to an Internet-wide email system. My belief is that the problems
> with key management do not stem from the classic Web of trust/certification
> hierarchy split, but the nonexistence of a distributed database (with nice
> interfaces) for holding keys. The encryption protocols also stand in the way
> of such a database, with key formats that are either overly complex,
> inadequate, or both.
>
> Shaun Gordon writes, "You might want to consider taking down the article "A
> Brief Comparison of Email Encryption Protocols. This is a pointer to a
> document that is six years old (it appears to be written in March of '96).
> This could be particularly misleading to some people as there is no clear
> date on the article, but it does refer to the upcoming PGP 3.0 which will be
> released in the fall of '96."
>




Kremlin `faked' terrorist attacks on apartments

2002-02-03 Thread Jei


http://www.bangkokpost.com/News/02Feb2002_news26.html

GENERAL NEWS - Saturday 02 February 2002  

Kremlin `faked' terrorist attacks on apartments 

PATRICK E TYLER 

Intensifying his battle with the Kremlin, the Russian oligarch Boris 
Berezovsky said on Thursday that he was just weeks away from laying out 
documentary evidence that Russia's security services were involved in 
apartment house explosions in September 1999 that killed more than 300 
people.

In an interview in London, he said his investigation of the bombings _ 
which were blamed on separatists in Chechnya and triggered a full-scale 
invasion of that rebellious republic _ was the reason Nikolai Patrushev, 
Russia's intelligence chief, accused him last week of providing financial 
support to Chechen ``terrorists''.

Mr Berezovsky said his evidence ``is no less than the evidence the 
United States had that Osama bin Laden was responsible for the World 
Trade Center attack''.

He said the key to his case was the discovery in late September 1999 that 
Russia's security services had placed what appeared to be a large bomb 
in an apartment in Ryazan, 115 miles southeast of Moscow.

When residents discovered the bomb and called the police, the Federal 
Security Service, or FSB, issued a public apology and asserted that the 
``explosives'' were actually bags of sugar tied together with wires and a 
detonator, a dummy used as part of a security exercise.

A number of Russian legislators called for an independent investigation 
of the bombings and the actions of the security service in Ryazan, but in 
March 2000 parliament defeated a motion to open an inquiry. Vladimir 
Putin, a former head of the FSB, won the presidential election the same 
month. Mr Patrushev succeeded him at the security service.

In the jaded politics of today's Russia, Mr Berezovsky's claims have been 
treated with as much scepticism as the counter-claims of Mr Patrushev 
and the security service. The fact that the charges emerged as Mr 
Berezovsky was losing another battle to retain control of the independent 
TV6 television channel added to that scepticism.

Yet the unsolved explosions that brought terror to Russia and incited 
Russians against Chechens and other ethnic groups from the Caucasus 
stand as an enduring and troubling mystery of the Chechen conflict.

Though dozens of arrests were made in the bombings, no one has been 
convicted of direct complicity. Moreover, the bombings laid the 
groundwork for the furious military campaign against Chechnya and for 
the political rise of Mr Putin, then the prime minister, whose relentless 
prosecution of the war garnered a surge of popular support that 
propelled him into the presidency.

Mr Berezovsky said on Thursday that he had no evidence that Mr Putin 
had personal knowledge of any involvement by security services in the 
apartment bombings, but he said Mr Patrushev did.

``I don't have any facts today that Putin is involved personally,'' he
said. ``I have facts that the chief of the FSB is involved in that, and
other people from the FSB are involved.''

While he said the evidence implicated Mr Patrushev, ``I don't have the 
answer as to who gave the order _ whether it was Putin, Patrushev or 
someone else.''

The resurrection of the case highlights the tenacity of Mr Berezovsky, the 
consummate Kremlin insider in the era of former president Boris Yeltsin. 
>From exile in London, where he is fighting legal battles over his holdings 
and an arrest warrant issued last autumn, he continues to strike at Mr 
Putin in the name of liberal and democratic causes, even when many 
liberals shun him.

And in the end, there is the question of whether Mr Berezovsky is simply
trying to orchestrate a political crisis for Mr Putin to win political
asylum in Britain as a means to protect permanently the wealth he carved
out of Russia in the early days, when the pickings were easy.

Mr Berezovsky responded to this question by saying: ``You won't have to
wait long'' to judge the merit of his case. He would not discuss whether
he planned to seek asylum, but said he would be in danger if he returned
to Russia.

``I don't want to tell you that I expect that they would kill me,'' he
said. ``I am not able to say that. But I cannot exclude anything.''

Mr Berezovsky works these days out of a suite of offices on fashionable
Savile Row, where he manages a business empire that is as hard to define
as it is to measure in value. But over the last decade, he is believed to
have controlled major stakes in Russian automobile enterprises, oil and
aluminum companies, Aeroflot and ORT, the state television combine, from
which he was ejected after Mr Putin became president.

Last week, after Mr Berezovsky lost a battle to keep TV6 on the air with a
crew of journalists who had fled the independent NTV network, the security
director, Mr Patrushev, surprised him with a new assault.

Speaking in a televised interview, Mr Patrushev said his bureau had
information 

Online Pharmacy - Viagra, Xenical & More - Lowest Prices DARWIGB

2002-02-03 Thread Online Pharmacy


DO YOU WANT TO LAST LONGER IN BED?

AT LAST VIAGRA (And many other Perscription Drugs) ONLINE!

No waiting rooms, drug stores,

or embarassing conversations.

Just fill out the form and our Doctor will

have your order to you by tomorrow!
CLICK HERE


Many other prescription drugs available, including:
XENICAL, weight loss medication used to help overweight people lose weight and keep this weight off.
VALTREX, Treatement for Herpes.
PROPECIA, the first pill that effectively treats male pattern hair loss.

And Many More..

CLICK HERE
To be removed from future mailings:
Click here









All new! - This Program makes you an Internet Investigator!

2002-02-03 Thread Earnest Villmer



  


  
Internet
  Investigator™ 
  


  
   New for
2002
Internet
Software Program for Online Investigations
  

  
-
  Find Out Anything about Anyone Online
  -
  

  
  Uncover
Information about:
neighbors, enemies, friends, debtors, employees, your
boss,
yourself, relatives, former school or military buddies, even a new love interest!
  
  
  Become an "Internet Investigator™"
and explore an exciting new world
of valuable information.

With
Internet Investigator™ You
Can Investigate:


   People,
credit records,
social security numbers, employment records, school
records, criminal records, driving records, addresses, phone numbers (even
some unlisted), hidden assets,
family trees and
a whole lot more! 
  

   Click
Here for more Information

  
  
  Click here to be
romoved.

  
  Each
year in the U.S. alone, the "postal" bulk mail industry consumes
over 450 million trees just to make the paper used in sending their advertisements
and promotions. Using email instead can significantly reduce this consumption,
while at the same time decreasing the billions of tons of paper waste filling
our landfills.
Save
the trees, save the planet, use email!
   
  
  




Get Windows To Be More Fault Tolerant and Self Repairing..

2002-02-03 Thread d11822



Dear Windows User,

Now you can boost the reliability of ordinary Windows 95, 98 and ME to nearly
the level of Windows NT or 2000, Microsoft's professional and industrial version
of Windows.

The new WinFix is a very effective way to improve the reliability of Windows,
because it makes Windows fault-tolerant and self-repairing.

And WinFix is very safe, because it operates completely independent of Windows.

CLICK HERE to find out more about WinFix, the safest, most effective way to keep you working, by keeping your PC working non-stop.

Arlen Dixon, CEO
Pinewood Software Marketing

---

This announcement is intended for PC users who asked to be kept
informed about new developments in Windows technology.

We apologize for any email you may have inadvertently
received.
Please CLICK HERE to be removed from future mailings.







Re: INFO: Intricate Screening Of Fliers In Works

2002-02-03 Thread Morlock Elloi

> "Theoretically, the system could be calibrated to watch for people with
> links to restaurants or other places thought to be favored by terrorist
> cells. It might also note phone calls and match individuals against

Terrible.

First they will just have to talk the terrorist out of using cash for
non-ticket purchases or into using cash for ticket purchases.

Otherwise, some really devious terrorist may use traceable payment instruments
only for benign purposes (see "Creating a profile" chapter) and for that final
ticket purchase, while paying with cash everything else.

Could it just be that this current War on something will be used, as all
previous Wars on something, to eradicate cash ? 




=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Great stuff seeking new owners in Yahoo! Auctions! 
http://auctions.yahoo.com




"we want to create a jail without walls"

2002-02-03 Thread Jei


Date: Thu, 31 Jan 2002 08:47:41 -0500
From: "Allen L. Barker" <[EMAIL PROTECTED]>
Subject: "we want to create a jail without walls"

[This article should not surprise anyone on the list.  We all
knew that the first public, non-secret home/body incarcerations 
would be carried out on sex offenders.  And we all know that it will
not end there.  Welcome to the community as a "virtual jail."]

January 31, 2002

Some States Track Parolees by Satellite

By JENNIFER 8. LEE

TAMPA, Fla. -- THEY call it being on the box.

It's not prison. It's not freedom. It's a gray area between.

John Zadrayel, a 40-year-old convicted sex offender, has been on the
box for a year, a condition of his parole after 14 years in prison.

The box, a four-pound electronic device that resembles a transistor
radio, lets parole officers know exactly where he is at all times. It
calculates his location using the Global Positioning System, a network
of 24 satellites 12,000 miles above the earth.

Mr. Zadrayel carries the box around with him all the time, even when
he is bicycling from his rented room to his job as a cook in a local
restaurant. Some nights he wakes up thinking about it.

He wears a wireless bracelet, locked around his ankle, that transmits
a signal to the box to let it know he's there. When he leaves his room
to watch the ducks in a neighboring pond, he has to remember to stay
within 100 feet of the box. If he were to stray too far or abandon the
box completely, he would be in violation of his parole and could be
sent back to prison.

Mr. Zadrayel is one of about 1,200 offenders nationwide who are using
G.P.S. monitoring devices as a condition of their parole or probation
or as a form of house arrest. They are a small but growing fraction of
the 150,000 offenders in the United States who are subject to more
established forms of electronic supervision like home monitoring
systems and mandatory telephone checks.

Traditional systems, many of which also use ankle bracelets but
without G.P.S., can only confirm whether a person is at a designated
place at a designated time. G.P.S. devices allow the authorities to
check up on an offender at any time.

Although the technology is relatively new and not without glitches,
criminologists say that improved monitoring may help governments
address the longstanding problem of how to protect the public without
resorting to the further incarceration of criminals. Systems like the
box, they say, also offer a glimpse of a future in which imprisonment
may be more a function of technology than of bricks and bars.

By tracking parolees' movements in real time - and notifying the
authorities immediately when violations occur - the system offers a
measure of reassurance to local residents when there are criminals in
their midst.

"Very few people get locked up for the rest of their lives," said
Peggy Conway, editor of The Journal of Offender
Monitoring. "Ultimately these people are going to live in the
community."

More precise monitoring and tracking may also prompt the authorities
to release some prisoners earlier, or even eliminate prison sentences
for some first-time offenses. In Florida, it costs $45 a day to keep
someone in the state prison system, compared with about $10 a day for
surveillance with the G.P.S. device.

Currently 27 states are using some type of satellite surveillance, and
some provinces in Canada are also considering using the
technology. Florida has been the most eager adopter, with almost 600
offenders on the box, partly because Pro Tech Monitoring, the leading
G.P.S. surveillance company, is based in the state.

"It's like Big Brother," said Jim Sommerkamp, a senior probation
supervisor here in Hillsborough County, who supervises Mr. Zadrayel
using Pro Tech's system, known as Satellite Monitoring and Remote
Tracking.

And in this case, officials say, Big Brother is a good thing. People
who have committed crimes once are likely to commit them again; about
half of those released from prison are convicted of a new crime within
three years. As a constant reminder that the government is watching,
G.P.S. monitoring may discourage repeat crimes.

[...]

Adoption of the technology has been somewhat slow because the state
and local authorities are reluctant to commit themselves to a system
that still has rough edges. For one thing, the G.P.S. satellite
signals are often blocked when offenders are inside buildings or
outside in areas with many tall buildings. (If a signal is lost for
more than a few minutes, an alert is sent.) The system is also not
suitable for rural areas where the local cellphone infrastructure may
be inadequate. The monitoring is also labor-intensive: at $10 a day,
Pro Tech's system costs twice as much as traditional electronic
monitoring.

"Many states say it's too expensive, it's too bulky, it's too
unreliable," Dr.  Johnson said. "Until they fix some of those
problems, they're not going to consider it."

But as the technology matures, satellite tracking will

Bush Budget Links Dollars to Deeds... except for his special interests

2002-02-03 Thread Steve Schear

Bush Budget Links Dollars to Deeds With New Ratings
By RICHARD W. STEVENSON
WASHINGTON, Feb. 2 — The $2.13 trillion budget plan that President Bush 
will send to Congress on Monday for the first time formally assesses the 
performance of government agencies and programs and to some degree links 
their financing to the grades they receive, administration officials say.

http://www.nytimes.com/2002/02/03/politics/03BUDG.html




"raisethefist" website crackdown

2002-02-03 Thread vznuri

hi all. I heard of another web site shut down
in texas or somewhere around the time of the 9-11...
what would be good is a public documentation/exposure of all
these cases, does anyone know of one???
sort of a cyberspatial ACLU or EFF

also I wonder what exactly was on the site below

--- Forwarded Message

To: [EMAIL PROTECTED]
Date: Mon, 28 Jan 2002 16:57:51 -
Subject: [ParanoidTimes] RaiseTheFist.com Leader Raided By 25 Heavily-Armed Agents
From: "dknuckles2001" <[EMAIL PROTECTED]>

RaiseTheFist.com Leader Raided By 25 Heavily-Armed Agents
1-27-2002

LOS ANGELES - Heavily armed with high-powered machine guns, shot 
guns, and hand guns, the FBI, Secret Service, and Los Angeles Police 
Department sorounded the founder of raisethefist.com in his house. 
The founder was currently asleep, woken up by a relative who said 
fbi, police and undercover's were currently up and down all of the 
streets, with they're eyes focused on the premises. Raisethefist.com 
founder aproached the door were 2 FBI agents demanded that he step 
outside. Within seconds a swarm of FBI raided the house with 
automatic weapons and shot guns. Additional police and fbi also 
stayed on the front lawn, around the house with a door baracade and 
additional weapons. "armed and ready". 
 
FBI and secret service entered the house, seizing all servers and 
political liturature. Raisethefist.com was currently being ran within 
the founders room of the house, over a computer network. The room was 
literarly ransacked, and all equipment, disks, cd's .. etc. were 
boxed up, loaded into a truck and seized until further notice. 
 
Since 1999, raisethefist.com has been under extensive government 
monitering. At times, Raisethefist.com has recieved over 100 hits 
from the U.S Department of Defense in a single day. The FBI, police 
department, NSA (and who else) continuesly monitered the site on a 
daily basis. Even government's from the UK, Canada, Lavtia, Belgium, 
Egypt, Finland, and Australia monitered the site continuesly. The FBI 
had also previously intercepted all packets going through the DSL 
line hosting the site, and have seized additional accounts being used 
by the site. 
 
In yet another successfull attempt to silence our vioces, 
Raisethefist.com, an anarchist/activist independent media/collective 
has been shut down by the secret service. 
 
"It's not yet known at this point if the site will be back up. As of 
now, we have nothing. No more servers, no more network, nothing. My 
room remains completly ransacked. My neighbors remain shaken up by 
what happend. I most likely won't be getting any of the equipment 
back. They also took alot of my political litature. 
 
Apparently, they're excuse for shutting it down was the 'militancy' 
portrayed on the site. This is not true. This was an excuse. This 
same 'militancy' they were concerned about is portrayed on at least a 
thousand other web sites across the internet, and they havn't been 
touched by the federal government, with the exception for remote 
monitering. Raisethefist.com was progresive. It was going somewhere. 
Kids started creating clubs in their schools called 'RaisetheFist'. 
People started utilizing the collective as a powerful resource for 
the activist/anarchist community. 
 
The federal government has been investigating me, and the site very 
closely, long before 9-11, and long before such militancy was even 
portrayed on the site. They knew the site had potential, that it was 
turning into something more than a site, but a strong collective 
utilized by activists throughout the world committed to social 
justice. And that's become a crime. Justice has become a crime. 
Freedom has become a crime. 
 
Anyone activly disagreeing with policies of the U.S is now 
automaticly rendered a "terrorist" in the eyes of national 
security Where raisethefist.com will go from here, I don't know. 
Based on what i've been told, i'll most likely be in jail, so most of 
my focus will be towards getting an attorney."

http://www.rense.com/general19/raisefist.htm


-  Yahoo! Groups Sponsor -~-->
Get your FREE credit report with a FREE CreditCheck
Monitoring Service trial
http://us.click.yahoo.com/ACHqaB/bQ8CAA/ySSFAA/zgSolB/TM
- -~->

==
 IF YOU'RE NOT PARANOID, THEN
 YOU'RE NOT PAYING ATTENTION!
==
To Post: [EMAIL PROTECTED]
Home Page: http://groups.yahoo.com/group/ParanoidTimes
Subscribe: [EMAIL PROTECTED]
==
NOTE: In accordance with Title 17 U.S.C. section 107,
this material is distributed without profit or payment to
those who have expressed a prior interest in receiving
this information for non-profit research and educational
purposes only.  For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml

fbi raid anarchists house & web site/raisethefist

2002-02-03 Thread vznuri

--- Forwarded Message

From: "Bond" <[EMAIL PROTECTED]>
Date: Fri, 1 Feb 2002 01:44:45 +1100
Subject: [ParanoidTimes] FBI Raid Silences Teen Anarchist's Site
To: <[EMAIL PROTECTED]>

- --=_NextPart_000_0497_01C1AAC2.06A5EFC0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

FBI Raid Silences Teen Anarchist's Site
By Brian McWilliams, Newsbytes
SHERMAN OAKS, CALIFORNIA, U.S.A.,
31 Jan 2002

In a case that may test limits on Internet free speech in the wake of Sept.=
 11, armed federal agents last week raided the home of a Los Angeles teenag=
er suspected of hacking into several Web sites to post anarchist messages a=
nd using his own site, Raisethefist.com, to publish bomb-making information=
.

Sherman Martin Austin, 18, is believed to have violated federal computer fr=
aud and abuse laws, as well as statutes prohibiting the distribution of bom=
b-making information, according to an FBI affidavit.

FBI agents conducted the raid on the afternoon of Jan. 24 at the Sherman Oa=
ks residence owned by Austin's mother after receiving a federal warrant. Th=
e agents seized several computers and documents, according to an FBI spokes=
person.=20

In an interview Wednesday, Austin told Newsbytes he was interrogated for mo=
re than six hours but has not yet been charged with any crimes.=20

According to Austin, all of the site's files, which were dedicated to "the =
anti-corporate globalization movement," were lost as a result of the raid. =
The site had received approximately 700 unique visitors each day, he said.=
=20

"I think they are a bunch of cheap shots, surrounding and raiding my house =
with machine guns, shotguns, bullet-proof vests. They had more artillery th=
an they use with wanted gang felons or raids on drug operations," said Aust=
in.=20

Matthew McLaughlin, a representative of the FBI's Los Angeles field office,=
 confirmed that agents who conducted the search were heavily armed.=20

"This is Los Angeles after all. We always go in to protect ourselves. We do=
n't go in with slingshots," said McLaughlin.=20

A message at the Raisethefist.com site today described the raid and said th=
e incident was proof that "anyone actively disagreeing with policies of the=
 U.S is now automatically rendered a 'terrorist' in the eyes of national se=
curity."=20

Following the Sept.11 attacks on America, Congress passed the USA Patriot A=
ct, which expand the ability of law enforcement to hunt for terrorists.=20

"People can rant and rave on the Internet all they want, but when they cros=
s the line of calling people to action to violently overthrow the Constitut=
ion of the United States, they have a problem," said McLaughlin.=20

According to the FBI, Austin allegedly defaced at least five commercial Web=
 sites since 1999 using the nickname "Ucaun." On three of the sites, Austin=
 left behind a hacking program named troop.cgi that was designed to attempt=
 to log in to a computer operated by the U.S. Army, the FBI affidavit state=
d.=20

In the interview, Austin acknowledged that he vandalized the Web sites and =
that he knew it was illegal to do so. But he defended the act by saying it =
was necessary to get his message out.=20

Copies of several of the defaced pages are accessible using the cache store=
d by the Google search engine. The defacements contain white and red text o=
n a black background, with the title "Hacked by the UCA - Underground Confi=
dential Association" and a verbose screed about overthrowing the government=
 and building a "New World Order."=20

According to the FBI, Austin operated Raisethefist.com as well as a site fo=
r his fledgling Web development business, 2CP.com, from computers in his ho=
me connected to the Internet by DSL.=20

Copies of the site's pages cached by Google include instructions on how to =
make explosives from pipes, fertilizer, and match heads.=20

In the interview, Austin said he did not write the bomb instructions but in=
stead copied the pages from another site.=20

Another page, entitled "Hacking," notes that the Department of Defense and =
other government agencies are dependent upon information technology and are=
 therefore vulnerable to computer attacks.=20

"But how many of us are really willing to engage in such an intense form of=
 warfare through bauds and wires? Who's got the balls? Who's willing to sac=
rifice everything?" said the page.=20

The domain registration record for Raisethefist.com lists Austin as the adm=
inistrative, technical, and billing contact for the site. Austin said he "m=
ade up" the name listed as the site's registrant, Joseph Parker, "for secur=
ity reasons" and noted that he has received threats because of the site's a=
nti-government message.=20

According to Austin, he has been targeted by the government simply because =
he advocates social justice.=20

"If I go to jail, then I will go to jail not based on my actions, but based=
 on what I think," he said.

http://www.

Re: Cypherpunk agenda succeeding

2002-02-03 Thread Bill Stewart

>On Thursday, January 31, 2002, at 08:44 AM, [EMAIL PROTECTED] wrote:
>>Encrypted disks are still rare, but that is because raids
>>that seize people's computers are rare.  Of course it is
>>regrettable that disk encryption is not part of the operating
>>system -- but if Microsoft put it in before we had a strong,
>>widely adopted system, they would doubtless muck it up.

There are two things that can make it common -
- paranoids like us reacting to raids on computers
- stolen laptops leading to corporate information theft.
Microsoft isn't going to encrypt disk drives to protect against the former;
they might do it because of business demand from the latter.

One of the big impacts of encrypted disks is that
cops can steal your computer with just a warrant,
while encrypted disks force them to take you to court
to get the password, which gives you an opportunity to
get a lawyer and argue about the reasonableness of the search.

That's one of the few good excuses I can see for using biometrics -
if the computer won't mount the main diskdrive without you
putting your thumb on the pad, it's harder to blackbag
and they can't get your data without you knowing it,
assuming the biometrics are implemented properly.
Some blackbag jobs can work fine without rebooting the machine,
like keyloggers in the keyboard cord (if your operating system
doesn't choke on disconnecting the cord), and obviously
cracking into your box from your DSL line won't be affected,
but it does block some attacks.

Some uses for biometrics have a much more incriminating tradeoff -
if your private key can only be opened using your thumbprint,
that's strong evidence that that key really belongs to you
and not just some random user with an account on your machine.
But tying your thumbprint to the hardware sitting in your house
isn't very incriminating, unless you were going to claim that
you're just running the box for your brother and don't know what
he's running on it :-)




Re: Cypherpunk agenda succeeding

2002-02-03 Thread Jim Choate


On Sun, 3 Feb 2002 [EMAIL PROTECTED] wrote:

> > http://einstein.ssz.com/hangar18
> 
> These web sites announce lots of interesting beginnings.
> 
> Anyone can start interesting projects, and lots of people
> have done so.
> 
> The hard part is actually finishing them. 

You mean like having a BBS/system publicly available for over 20 years?

Or starting the first Linux user group in Texas?

Or providing a node for the CDR for a period approaching 5 years?

If one of my projects fails it isn't because I let it die from negligence.

Our current status:

-   We currently have the T1 installed, we're currently doing load
checking and burn-in while waiting for various DNS issues to
resolve themselves. The site should go public within a week to
10 days.

-   Two working 802.11b AP's approximately 10 miles apart,
w/ another coming online in the next couple of months.
This will be our 3rd 'backbone' node and will be about
10 miles from the other two. I believe this gives us
the largest Guerrilla Network in Ctl. Texas, if not Texas
over all.

-   We have one location for weekly meeting spec'd out and
we should have a second by the end of the week.

-   We are working on our first Plan 9 file server now, to be
followed by at least two (2) Plan 9 process boxes by summer.

-   We have a Lego Mindstorms reference platform completed and
we should be providing that material shortly after the
go-live date.

We are completely volunteer supported...and you do NOT have to be in
Austin to participate...


 --


James Choate - [EMAIL PROTECTED] - www.ssz.com







Re: CDR: fbi raid anarchists house & web site/raisethefist

2002-02-03 Thread measl


On Sun, 3 Feb 2002 [EMAIL PROTECTED] wrote:




You know, this kid is acting all "shocked" and surprised that "The
Man" reacted to his propaganda.  I find this *truly* amusing!  Did he think
that the Fedz would just stand back and *watch*?  

Take on the ruling powers at your own risk: don't be surprised when they
decide you've become a nuisance worth slapping around.  This is not to say
that you *shouldn't* take on the what you believe in, but at least go in with
your eyes open!
  
Yours,

J.A. Terranson
Yet Another Loud Mouth Who Has Been Visited By The Man (but who isn't the
least bit surprised by it)...




Re: fbi raid anarchists house & web site/raisethefist

2002-02-03 Thread Tim May

On Sunday, February 3, 2002, at 04:50  PM, [EMAIL PROTECTED] wrote:

> On Sun, 3 Feb 2002 [EMAIL PROTECTED] wrote:
>
> 
>
>
> You know, this kid is acting all "shocked" and surprised that "The
> Man" reacted to his propaganda.  I find this *truly* amusing!  Did he 
> think
> that the Fedz would just stand back and *watch*?

Apparently the kid believed the crap they taught him in school about the 
First Amendment.



>
> Take on the ruling powers at your own risk: don't be surprised when they
> decide you've become a nuisance worth slapping around.  This is not to 
> say
> that you *shouldn't* take on the what you believe in, but at least go 
> in with
> your eyes open!

I hope the kid goes on to execute those who ordered his arrest.


--Tim May
"Dogs can't conceive of a group of cats without an alpha cat." --David 
Honig, on the Cypherpunks list, 2001-11




Re: INFO: Intricate Screening Of Fliers In Works

2002-02-03 Thread Tim May

On Sunday, February 3, 2002, at 01:22  PM, Morlock Elloi wrote:

>> "Theoretically, the system could be calibrated to watch for people with
>> links to restaurants or other places thought to be favored by terrorist
>> cells. It might also note phone calls and match individuals against
>
> Terrible.
>
> First they will just have to talk the terrorist out of using cash for
> non-ticket purchases or into using cash for ticket purchases.
>
> Otherwise, some really devious terrorist may use traceable payment 
> instruments
> only for benign purposes (see "Creating a profile" chapter) and for 
> that final
> ticket purchase, while paying with cash everything else.
>
> Could it just be that this current War on something will be used, as all
> previous Wars on something, to eradicate cash ?

And how will they get the records from restaurants? (Ditto for the other 
"data mining" inputs, most of which are from private persons, companies, 
or organizations.) Subpoena of specific person records will not generate 
the data mining raw data they want.

Even in our headlong rush to a surveillance state, I don't see 
restaurants and bookstores turning over information on this kind of 
scale.

(Which leaves us with the credit card companies. Maybe FINCEN and DOJ 
can get specific records, but, again, the kind of terabytes per day of 
raw data to feed the data harvesters will not be easy to get. Unless the 
several credit reporting agencies elect to help Big Brother on a massive 
scale. We should be on the watch for this.)

--Tim May

"To those who scare peace-loving people with phantoms of lost liberty, 
my message is this: Your tactics only aid terrorists."  --John Ashcroft, 
U.S. Attorney General




Re: CYBERWAR: A Brief Comparison of Email Encryption Protocols

2002-02-03 Thread jamesd

--
Jei, quoting an old but still too true document
> > An additional grave concern is key management. Contrary
> > to some beliefs,key management is not a solved problem.
> > All of the proposals contain some mechanism for key
> > management, but none of them have been demonstrated to be 
> > scalable to an Internet-wide email system.

The current program for key management -- based on keys
certified, and regrettably, sometimes issued by a central
certifying authority -- just is not working.  This is partly
because most of the recipients do not understand about
private and public keys, and partly because of an amazingly
user hostile interface designed to obstruct people who do not
know what they are doing from screwing up even more than they
do already, but which in practice just plain obstructs them. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 wVOK0p9C2cZKI5rpTOgf6FKkqKBAZ/LlLJuXE5JY
 4KQCaT1zXQN0qMzc+a1vQnMr6Wn6eNNFJsBs/DO2u