Re: Geopolitical Darwin Awards

2004-09-20 Thread Tim
John Young wrote:
What older soft-gutted guys in all nations like most is the 
Wagnerian tragedy, the soap opera sturm and drang, of 
other people's suffering and death for their loose-screw 
agenda. 
 

  You demonstrate that point well.



Want to discover what the FBI has on file about you Cpunks?

2004-09-20 Thread The Net Detective
What Do They Know About You?

Obtaining and Understanding Your FBI File

Want to discover what the FBI has on file about you? You might think they have nothing 
-- then again, you could be wrong. There is only one way to find out for sure...ask! 
In this report, you will discover not only how to obtain your files and where to send 
for them, but you will also discover some of the codes and acronyms used in FBI files. 
Without these codes and acronyms, deciphering your FBI files could prove difficult, if 
not impossible. IMPORTANT: Keep this information, as you will need it when you receive 
your files from the FBI. In addition, there is an explanation of:

* The Freedom of Information and Privacy Act (FOIPA)
* How the FBI deals with FOIPA requests
* What circumstances the FBI can refuse to release certain information to you, and
* An explanation of how to send an appeal letter if your request is denied

But first, before we tackle how to request your files, there is a section on how the 
FBI organizes and maintains their files. There is also discussion on the types of 
information found in their filing system as well as the classification codes the FBI 
uses. The FBI has established a large presence on the World Wide Web, and they have 
posted some documents there for your reading pleasure -- including information on the 
UFO crash in Roswell, New Mexico over 50 years ago, as well as information on 
gangsters and America's Most Wanted. See if your mysterious neighbor is this years new 
Al Capone! The main FBI site promises to publish other documents in their electronic 
reading room in the future. We may assume that, perhaps, some day we will be able to 
access our own files electronically. Finally, in keeping with the current electronic 
nature of the Internet and gaining information off the 'Net, there is a listing of not 
only the FBI Field Offices which have homepages on the Web, !
 but also a section on other FBI-related Web sites you may be interested in exploring. 

WARNING! You can visit UNLEGALLY site
for more information - http://221.154.65.5:2180/


Net Detective Team, 2004 [c]




Want to discover what the FBI has on file about you Cypherpunks?

2004-09-20 Thread The Net Detective
What Do They Know About You?

Obtaining and Understanding Your FBI File

Want to discover what the FBI has on file about you? You might think they have nothing 
-- then again, you could be wrong. There is only one way to find out for sure...ask! 
In this report, you will discover not only how to obtain your files and where to send 
for them, but you will also discover some of the codes and acronyms used in FBI files. 
Without these codes and acronyms, deciphering your FBI files could prove difficult, if 
not impossible. IMPORTANT: Keep this information, as you will need it when you receive 
your files from the FBI. In addition, there is an explanation of:

* The Freedom of Information and Privacy Act (FOIPA)
* How the FBI deals with FOIPA requests
* What circumstances the FBI can refuse to release certain information to you, and
* An explanation of how to send an appeal letter if your request is denied

But first, before we tackle how to request your files, there is a section on how the 
FBI organizes and maintains their files. There is also discussion on the types of 
information found in their filing system as well as the classification codes the FBI 
uses. The FBI has established a large presence on the World Wide Web, and they have 
posted some documents there for your reading pleasure -- including information on the 
UFO crash in Roswell, New Mexico over 50 years ago, as well as information on 
gangsters and America's Most Wanted. See if your mysterious neighbor is this years new 
Al Capone! The main FBI site promises to publish other documents in their electronic 
reading room in the future. We may assume that, perhaps, some day we will be able to 
access our own files electronically. Finally, in keeping with the current electronic 
nature of the Internet and gaining information off the 'Net, there is a listing of not 
only the FBI Field Offices which have homepages on the Web, !
 but also a section on other FBI-related Web sites you may be interested in exploring. 

WARNING! You can visit UNLEGALLY site
for more information - http://221.154.65.5:2180/


Net Detective Team, 2004 [c]




Software

2004-09-20 Thread clamen
software disc ounts
Ahead Nero v6.3 Powerpack - 40
Office 2003 Professional - 110   
Goldmine Business Contact Manager 6.5 - 59
Microsoft Windows 2000 Professional - 50
and
Roxio Easy Media Creator 7 - 30
QuarkXPress 6 - 110
Office 2003 Professional - 110   
QuickBooks Premier 2004 - 110
Norton Antivirus 2004 Professional - 15
QuarkXPress 6 Passport - 120
Microsoft Windows XP Professional - 50
Adobe Illustrator CS - 90 
Microsoft SQL Server 2000 Enterprise Edition - 200
Adobe Photoshop 7.0 - 60
Goldmine Business Contact Manager 6.5 - 59
SuSe Linux 9.1 Professional Edition - 50
and a lot more http://www.vovowe.biz/



Get your Rx ForLess

2004-09-20 Thread Ila Washington
Re: Cpunks, ,

Zanaflex (Tizanidine) is a muscle relaxant. It works by blocking nerve impulses (or 
pain sensations) that are sent to your brain. Zanaflex is used to treat increased 
muscle tone associated with spasticity.

http://www.respond693biz.com/37/


BestPriceRX Medications Prescribed Online and Shipped to Your Door   

http://www.respond693biz.com/0.ddd


lynn at softwood oreven assam as in ambiguous.
Aaron was at albanian when that happened banter.
We met at altitude and went to emit wher we had  lunch at
clytemnestra.It was committeeman and a ignore was had comanche  by all.




THE CHEAAPEST SOFTWARES U EVER SEE & WE SHIIP WORLDWIDE knowing floor

2004-09-20 Thread Tawny Karisa





little off a late between recess" wrong putting hill absent practice similar, worse presence grabbed hurry word.
Softwares Super CHEEAP & Shiip to All CountriesWe have every POPULAR softwares u NEED!You name it & we got it!
Micr0soft Wind0ws XP Professional - my price: $50 ;  normal : $299.00 ; you saave $249.00
Micr0soft 0ffice XP Professional - my price: $100 ;  normal : $ 499.95; you saave $399.95
Micr0soft 0ffice 2003 Professional - my price: $80 ;  normal : $499.95 ; you saave $419.95
Nort0n Antivirus 2004 Professional - my price: $15 ;  normal : $69.95 ; you saave $54.95
Ad0be Acrobaat V 6.0 Professional PC - my price: $100 ;  normal : $449.95 ; you saave $349.95
Ad0be Ph0toshop CS V 8.0 PC - my price: $80 ;  normal : $609.99 ; you save $529.99
Ad0be Pagemaker V 7.0 PC  - my price: $80 ;  normal : $599.95 ; you saave $519.95
CorelDraw Graphics Suite V 12 PC - my price: $100 ;  normal : $349.95 ; you saave $249.95
We do have full range softwares : Mac, 321Studios, Ad0be, Alias Maya, Autodesk, Borland, Corel, Crystal Reports. Executive, File maker, Intuit, Macrmedia, Mc/\fee, Micros0ft. Nero, Pinnacle Systems, PowerQuest, Quark, Red Hat, Riverdeep, Roxio, SuSe. Symantec, VMware Softwares & 262 More P0PULAR titles F0R you>> Checkk out 262 more popu1ar softwares on our site
Start from $15-$60 each softwareAbsolute N0 expensive price for you-- === Come to our site here === ---
dont want any
reference met accept court old field lucky lesson shine" question because tongue author?





Hi Cpunks

2004-09-20 Thread Herminia Sneed
Cpunks,"

valiumXanaxCialis and_more
Get Hydrocodone, or Soma.)
2 of the best pain killers out!
please LQQk*

http://prjatvq.constrict4459rneds.com/b12m

--
chen dey methuen captious istanbul bavaria dryden jurisprudent epicurean hurl brendan 
conferred dramatic waterline morn chevron .


Academics locked out by tight visa controls

2004-09-20 Thread R. A. Hettinga


Posted on Mon, Sep. 20, 2004

Academics locked out by tight visa controls
U.S. SECURITY BLOCKS FREE EXCHANGE OF IDEAS
By Bruce Schneier


Cryptography is the science of secret codes, and it is a primary Internet
security tool to fight hackers, cyber crime, and cyber terrorism. CRYPTO is
the world's premier cryptography conference. It's held every August in
Santa Barbara.

This year, 400 people from 30 countries came to listen to dozens of talks.
Lu Yi was not one of them. Her paper was accepted at the conference. But
because she is a Chinese Ph.D. student in Switzerland, she was not able to
get a visa in time to attend the conference.

In the three years since 9/11, the U.S. government has instituted a series
of security measures at our borders, all designed to keep terrorists out.
One of those measures was to tighten up the rules for foreign visas.
Certainly this has hurt the tourism industry in the U.S., but the damage
done to academic research is more profound and longer-lasting.

According to a survey by the Association of American Universities, many
universities reported a drop of more than 10 percent in foreign student
applications from last year. During the 2003 academic year, student visas
were down 9 percent. Foreign applications to graduate schools were down 32
percent, according to another study by the Council of Graduate Schools.

There is an increasing trend for academic conferences, meetings and
seminars to move outside of the United States simply to avoid visa hassles.

This affects all of high-tech, but ironically it particularly affects the
very technologies that are critical in our fight against terrorism.

Also in August, on the other side of the country, the University of
Connecticut held the second International Conference on Advanced
Technologies for Homeland Security. The attendees came from a variety of
disciplines -- chemical trace detection, communications compatibility,
X-ray scanning, sensors of various types, data mining, HAZMAT clothing,
network intrusion detection, bomb diffusion, remote-controlled drones --
and illustrate the enormous breadth of scientific know-how that can
usefully be applied to counterterrorism.

It's wrong to believe that the U.S. can conduct the research we need alone.
At the Connecticut conference, the researchers presenting results included
many foreigners studying at U.S. universities. Only 30 percent of the
papers at CRYPTO had only U.S. authors. The most important discovery of the
conference, a weakness in a mathematical function that protects the
integrity of much of the critical information on the Internet, was made by
four researchers from China.

Every time a foreign scientist can't attend a U.S. technology conference,
our security suffers. Every time we turn away a qualified technology
graduate student, our security suffers. Technology is one of our most
potent weapons in the war on terrorism, and we're not fostering the
international cooperation and development that is crucial for U.S. security.

Security is always a trade-off, and specific security countermeasures
affect everyone, both the bad guys and the good guys. The new U.S.
immigration rules may affect the few terrorists trying to enter the United
States on visas, but they also affect honest people trying to do the same.

All scientific disciplines are international, and free and open information
exchange -- both in conferences and in academic programs at universities --
will result in the maximum advance in the technologies vital to homeland
security. The Soviet Union tried to restrict academic freedom along
national lines, and it didn't do the country any good. We should try not to
follow in those footsteps.

BRUCE SCHNEIER is a security technologist and chief technology officer of
Counterpane Internet Security, Inc., in Mountain View. He wrote this for
the Mercury News.

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: potential new IETF WG on anonymous IPSec

2004-09-20 Thread John Kelsey
>From: "Major Variola (ret)" <[EMAIL PROTECTED]>
>Sent: Sep 17, 2004 10:27 PM
>To: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
>Subject: Re: potential new IETF WG on anonymous IPSec

>At 06:20 AM 9/17/04 +, Justin wrote:
>>On 2004-09-16T20:11:56-0700, Major Variola (ret) wrote:
...
>>Oh, come on.  Nothing can be absolutely trusted.  How much security is
>>enough?

>>Aren't the DOD CAs trusted enough for your tastes?  Of course, 'tis
>>problematic for civilians to get certs from there.

>DoD certs are good enough for DoD slaves.  Hospital certs are good
>enough for their employees.  Joe's Bait Und Tackle certs are good enough
>for Joe's employees.  Do you think that Verislime is good enough for
>you?

You seem to have rediscovered the fact that crypto can move trust around, but can't 
create any.  You have to decide to trust someone for it to be useful.  The great 
problem with practically using this stuff is getting someone that you're comfortable 
trusting, who can then use crypto to move the trust around in a sensible way.  

The condition necessary for Verisign certificates to have a lot of trust, to me, is 
for the appearance of a fraudulent Verisign certificate to be a major scandal, leading 
to the CEO getting canned, the stock price dropping by some large fraction, and a huge 
fall-off of business for their CA.  When that isn't the case (for the high security 
certs; it's clearly silly to expect it for low-security ones), the CA doesn't have as 
much incentive as I'd like to be careful about forgeries.  You'd like the exposure of 
a fraudulent certificate signed by a CA to have the same kind of effect as the 
exposure of a bank being unable to produce the money a depositor demands.  

Fraudulent certificates issued for any purpose--whether furnishing fake IDs to FBI 
agents, or to Al Qaida terrorists, or to random Nigerian-scam operators--leave a 
permanent trail; the recipient of the certificate can show it around when he discovers 
it's fraudulent.  If the last step of this protocol for the CA is "and then you go out 
of business," the incentives not to issue fraudulent certificates looks right.  

--John



Re: Academics locked out by tight visa controls

2004-09-20 Thread John Kelsey
>From: "R. A. Hettinga" <[EMAIL PROTECTED]>
>Sent: Sep 20, 2004 8:33 AM
>Subject: Academics locked out by tight visa controls

>

>Posted on Mon, Sep. 20, 2004

>Academics locked out by tight visa controls
>U.S. SECURITY BLOCKS FREE EXCHANGE OF IDEAS
>By Bruce Schneier

...

I guess I've been surprised this issue hasn't seen a lot more discussion.  It takes 
nothing more than to look at the names of the people doing PhDs and postdocs in any 
technical field to figure out that a lot of them are at least of Chinese, Indian, 
Arab, Iranian, Russian, etc., ancestry.  And only a little more time to find out that 
a lot of them are not citizens, and have a lot of hassles with respect to living and 
working here.  What do you suppose happens to the US lead in high-tech, when we *stop* 
drawing in some large fraction of the smartest, hardest-working thousandth of a 
percent of mankind?  

--John



project help

2004-09-20 Thread auto479809
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I'm putting together a little project that may soon cause a bit of a
stir (ie 'soon', as in (hopefully) the next few weeks, to leverage the
2004 US election cycle).  The goal is nothing short of bringing a very
large dose of hard (tar-and-feathers level real) accountability to public
life, and changing the course of political history, forever.  Big stuff,
 to be sure, but it's _very_ doable.

It's remarkably simple concept, quite legal, and very moral.  Had it
been operational two years ago, *theory* has it that Gulf War V2.0 may
not have occurred.  Practice, of course, may not work out exactly as
that (given the determination of the players involved), but the potential
to have that sort of impact is there.

If successful, it should be quite popular amongst the people, and peoples,
 of the world.

However...(and, I must admit, it's a pretty big 'however'), it's also
going to *seriously* piss off a lot of very powerful people.  Namely,
  a significant number (probably the majority), of politicians, law enforcement
officials (including every three-letter acronym out there), the judiciary...and
basically every other public servant, and other entity (individual, or
group) that holds - and betrays - the public trust in some way, including
private and public corporations - in basically (soon enough) every jurisdiction
around the world.

I'd like to be able to do it all anonymously, but, most unfortunately,
 that's probably not possible, and I may have to go public too.  So,
I have to consider that there's potentially a world of hurt headed my
way when this breaks.  I am, of course, taking precautions, should I
be "suicided" (for the record: I wouldn’t!), or otherwise sidetracked.
 I'm also looking to enact multiply-redundant, distributed systems, across
jurisdictions, so that it is highly resistant to concerted attack by
legal or illegal, overt or covert means.  Basically, it will be set up
so that it is automatic, redundant, and personality independent, ie unstoppable.

That said, I'm a far better information-absorbing lurker than I am a
hacking cypherpunk. I have some knowledge, but not nearly enough to put
up more than token resistance to a determined attacker with effectively
"unlimited" resources.  I need help.

For starters, I'd like some list-level feedback on what sort of basic
precautions I should be taking (No need to go street level - I'm *reasonably*
well researched).  Where possible, I want to err on the side of paranoid,
 and stay away from anything with the potential to have a back door in
it, or anything else not guaranteed safe.  E.g. Use OpenBSD; don't use
__ processors, etc.

OpenPGP, Mixmaster (5-chain?), Mixminion (when secure - Hurry, please
Nick!), Freenet, Tor (maybe - though it's not ready yet, and I don't
like the US Navy involvement...though it is os for now), secure data
havens (where??), and whatever other tools I can throw up as resistance,
 or to guarantee survivability, I will.  But I need help in putting it
all together.

That brings me to my next point.  I would be interested in practical
offers of assistance.  I'm not going to go into any details of what's
involved here.  Suffice to say, it's not an overly complex operation
that any reasonably competent cp should be able to handle and, as I said,
  it should be up and running within a matter of weeks.  Please send
such offers directly to the above hushmail account.  (repeat: it _is_
legal,  and very moral.  You will be doing nothing "wrong"!)  If I can't
check you out somehow (you can suggest how I may - but I may or may not
use those particular sources), expect no reply (sorry, but I have to
be paranoid here - the last thing I need right now is to bring in the
"wrong" kind of help!

If you are an ideologue and like the idea of kicking Them where it hurts,
 or just like the idea of defending against the best of the best, from
all over the world, to see how you match up, I’d love to hear from you.
 If you wish to volunteer, that'd be terrific!  If you wish instead to
for-fee consult, let me know how you operate – it’s not out of the question.
 Resources aren't unlimited, but there'll be "enough" to get it across
the line; I'm putting all I can into it.

Oh, BTW, if this fires (as I am confident it will), there will likely
be at least one (probably more) mainstream, legit, permanent, security
role on offer.  That said, given the shit that will likely go down, from
those determined to stop this, I'd understand anyone not wanting to be
associated with it - publicly - post-launch.

Any feedback/help, much appreciated...
-BEGIN PGP SIGNATURE-
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.4

wkYEARECAAYFAkFO5MIACgkQgVEg0zWEQ7xkOgCfUuWEyIS/LTH03LCOrl89ZMWAXusA
oIV8pkGmCi5VXWwj1hKVR3MTGF5s
=xIlF
-END PGP SIGNATURE-




Concerned about your privacy? Follow this link to get
secure FREE email: http://www.hushmail.com/?l=2

Free, ul

Re: Geopolitical Darwin Awards

2004-09-20 Thread Tyler Durden
John Young wrote...
from school and fucked up parents who use you like a
beast of burden -- in every age and country.

The military has found that teenagers are better fighters
than those over 21, more malleable, patriotic, healthy, ready
to kill when told it's okay. . Grunts younger than 20 are
the universal soldier. Non-caucasians especially.
Hum. I wonder if it's a coincidence that the US school system is such a 
mess. What on earth would we do if non-caucasians, especially, were equipped 
for some kind of opportunity? Guess we'd have to start the draft again, and 
folks get kinda touchy when the exemptions are a little too obvious.

-TD

From: John Young <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Re: Geopolitical Darwin Awards
Date: Sun, 19 Sep 2004 20:46:27 -0700
James A. Donald:
>I don't recall the American revolutionaries herding children
>before them to clear minefields, nor surrounding themselves
>with children as human shields.
No, not minefields, but a good percentage of Washington's
army and that of the French, were children. Young boys were
taught the art of war as gofers and undercover spies among
the Brits. Some were caught and executed. Others packed
weapons and fought like men who welcomed their foolhardy
bravery when their manly courage withered.
Today, even the US uses children in war, 17 being the minimum
age to enlist. Others sneak in by lying about their age, some as
young as 14. Recruiters look the other way when the kids
and their parents lie. Been there, done that. Enlisted in the
army at 15, served months before being kicked out when a
relative ratted on me. Went in again at 17. That was not
uncommon then, and still is not. Good way to get away
from school and fucked up parents who use you like a
beast of burden -- in every age and country.
The military has found that teenagers are better fighters
than those over 21, more malleable, patriotic, healthy, ready
to kill when told it's okay. Older guys and gals think for
themselves too much to charge a machine gun. A kid
thinks life will never end. That's why it's not so hard
to cultivate suicide bombers.
Flying a $50 million plane is a piece of cake, no guts
required. Fuck those stand-off cowards in artillery,
the navy and air force. Grunts younger than 20 are
the universal soldier. Non-caucasians especially.
No need to mention today's Africans, the pre-teens and
teens Mao used effectively, the underage North Koreans
in the Korean Conflict, and not least the Amerindians who
taught kids from puberty to make war -- boys and girls.
It is worth pondering that older guys don't like war up
close, in fact the the further away it is the better they
like to promote it with Stallonian filmic ferocity -- witness
the current yellow-bellied administration, though hardly
the first to cry for war to be fought by disposable youngsters.
What older soft-gutted guys in all nations like most is the
Wagnerian tragedy, the soap opera sturm and drang, of
other people's suffering and death for their loose-screw
agenda.
_
Check out Election 2004 for up-to-date election news, plus voter tools and 
more! http://special.msn.com/msn/election2004.armx



Re: Geopolitical Darwin Awards

2004-09-20 Thread Tyler Durden
Tim wrote...
  You demonstrate that point well.
Hum. Spend a lot of time with binoculars, do we? How much does the FBI pay 
field ops these days?

-TD
_
Don’t just search. Find. Check out the new MSN Search! 
http://search.msn.click-url.com/go/onm00200636ave/direct/01/



Re: Academics locked out by tight visa controls

2004-09-20 Thread Adam Shostack
On Mon, Sep 20, 2004 at 10:03:57AM -0400, John Kelsey wrote:

| >Academics locked out by tight visa controls
| >U.S. SECURITY BLOCKS FREE EXCHANGE OF IDEAS
| >By Bruce Schneier
| 
| I guess I've been surprised this issue hasn't seen a lot more
| discussion.  It takes nothing more than to look at the names of the
| people doing PhDs and postdocs in any technical field to figure out
| that a lot of them are at least of Chinese, Indian, Arab, Iranian,
| Russian, etc., ancestry.  And only a little more time to find out that
| a lot of them are not citizens, and have a lot of hassles with respect
| to living and working here.  What do you suppose happens to the US
| lead in high-tech, when we *stop* drawing in some large fraction of
| the smartest, hardest-working thousandth of a percent of mankind?   

Those people don't get a vote.  The politicians in question will be
dead and gone before the slope of the curve changes anything.  Why
*would* we discuss it?

Adam the cynic.



The Meaning of Security

2004-09-20 Thread R. A. Hettinga

--- begin forwarded text


Reply-To: <[EMAIL PROTECTED]>
From: "Mises Daily Article" <[EMAIL PROTECTED]>
To: "Mises Daily Article" <[EMAIL PROTECTED]>
Subject: The Meaning of Security
Date: Mon, 20 Sep 2004 09:08:21 -0400
Mailing-List: contact [EMAIL PROTECTED]
List-Help: 
List-Subscribe: 

http://www.mises.org/fullstory.aspx?Id=1619

The Meaning of Security

by Llewellyn H. Rockwell, Jr.

[Posted September 20, 2004]

 Let's think about the word security, which has been in the news lately
because the Bush administration seeks a major shift in the way funds are
spent in Iraq. It wants $3 billion moved from spending on reconstruction to
spending on "security." There's a political science lesson in that usage.

The reason for the shift, of course, is the obvious unraveling of anything
resembling civilization in Iraq: bombings, killings, mini-wars are
everywhere. Whole regions of Iraq are lost to US control, and not even
Baghdad is holding. Of the $18 billion congress allocated for public works,
the Bush administration argues that it makes sense to divert some to bring
a measure of public stability to the country.

But what are we really talking about when we say "security"? It is money
taken from you and me to be spent to force the Iraqi population to submit
to the puppet government that rules only because of the US. It is money to
pay for more police, weapons, bullets, bombs, spying, arresting, torturing,
jailing, maiming, and killing.

The theory is that more fear and more fear-inspiring bloodshed will tame
the guerrillas and stop them from plotting more bombings, shootings,
killings. The money will buy compliance, and pay the bills of those who use
force to try to bring it about. Many people would be happy for an end to
violence, to be sure, but the primary purpose is the protection of the
state from rebels.  

Submission and compliance: that is what is meant by the term security in
the state's lexicon. It is an interesting choice of words. Its use in
public life dates at least to the advent of Social Security, a tax scheme
that promises to put you on welfare in your old age in exchange for paying
14 percent of your income to support current retirees who constitute the
wealthiest demographic slice of the American population. Even in this case,
the term security meant compliance, as shown by the tendency of recipients
to back ever more redistribution.

Now we have the Department of Homeland Security, a gargantuan agency that
administers foreign and domestic spying, sends hither swarms of agents to
harass us at airports, conduct drills in the event that the government
decides that martial law is the only option, and generally suppress any and
all signs of insurrection wherever they might appear. Here too the term
security means submission, control, compliance, obedience, and stability
for the state.

Who is this security trying to secure? We are told it is for our own
benefit. It is government that makes us secure from terrible threats. And
yet, if we look closely, we can see that the main beneficiary of security
is the state itself.

We all understand this intuitively. Let's say you know that someone is
after you—an ex-spouse, for example—and threatens your very life. Would you
call the Department of Homeland Security and expect a response? No, the DHS
is there is protect the state, as evidence by the comparatively energetic
response that a threat to the president's life would elicit.

Of course, there is a need and demand for authentic security. We all seek
it. We lock our doors, deter criminals with alarms, arm ourselves in case
the alarms don’t do it, prepare for the worst in the case of natural
disaster, save for the future, and construct our professional lives in ways
that minimize the chance of disadvantageous turns of events. This is what
security means to us in the real world.

It is not unexpected that the state would seek the same thing: security not
for us but for itself and its employees. The state has a special reason to
desire security: its agents are always a minority of the population, funded
by eating out their substance, and its rule is always vulnerable. The more
control it seeks over a population, the more its agents are wise to watch
their backs.

Where does that leave the rest of us in our demand for security? In the
world of ideas, a vigorous debate is taking place about the extent to which
private enterprise is capable of providing security, not only as a
supplement but as a full replacement for state-provided security.

Advocates of fully privatized security point out that in the real world,
most of the security we enjoy is purchased in the private sector. Vast
networks of food distribution protect against starvation, private agents
guard our homes, insurance companies provide compensation in the event of
unexpected misfortune, and the locks and guns and gated communities
provided by pr

[e-gold-list] GOLDMONEY PATENTS - PROOF OF PRIOR ART EXISTS

2004-09-20 Thread R. A. Hettinga

--- begin forwarded text


Date: Mon, 20 Sep 2004 10:23:42 -0400
From: Daniel S <[EMAIL PROTECTED]>
Reply-To: Daniel S <[EMAIL PROTECTED]>
To: "e-gold Discussion" <[EMAIL PROTECTED]>
Subject: [e-gold-list] GOLDMONEY PATENTS - PROOF OF PRIOR ART EXISTS

Take a look at a document I discovered today:

http://www.itk.ntnu.no/ansatte/Andresen_Trond/finans/others/interest-free-money.txt

THIS DOCUMENT WAS PUBLISHED BY Bernard A. Lietaer, July 1990

GoldMoney's patents are of no value as this document describes EXACTLY
what James Turk filed as patent 3 years later.

---

"This New Currency would be convertible because each of its component
commodities is immediately convertible. The Central Bank would commit
to deliver commodities from this basket, whose value in foreign
currency equals the value of that particular basket."

* "There are a number of practical ways by which this negative
interest rate could be levied. To begin with, most of the "money" in
circulation (and practically all of the New Currency that would be
circulated internationally) takes the form of accounting entries in a
computer somewhere, and it would be fairly simple to charge
electronically the negative interest rate on these accounts." *

"Technically, this New Currency is a combination of two concepts,
usually analysed separately: stamp scrip, and currency backed by a
basket of commodities."

"An additional flexibility: the Central Bank could keep and trade its
commodity inventories wherever the international market is most
convenient for its own purposes: Zurich for gold, London for copper,
New York for silver, etc."

"There is even a high-tech option in the form of the "chips on a card"
electronic money tested in France: money is issued in the form of an
"intelligent debit card" where a computer chip is imbedded in the
card."

"Whenever a payment is made by inserting the card in a Point of Sale
terminal, a
phone, or any other device accepting the card, the credit on the card
could automatically be adjusted for the time delay since the card was
last debited. For smaller amounts which require a lower security
level, cheaper magnetic strip cards are also available, such as the
ones issued for the rapid transit systems of San Francisco, Caracas or
Washington D.C., or the British and Japanese telephone authorities."

Comments?



---
You are currently subscribed to e-gold-list as: [EMAIL PROTECTED]
To unsubscribe send a blank email to [EMAIL PROTECTED]

Use e-gold's Secure Randomized Keyboard (SRK) when accessing your e-gold
account(s) via the web and shopping cart interfaces to help thwart
keystroke loggers and common viruses.

--- end forwarded text


-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



VeriSecure Systems, Inc. Demonstrates Check 21 Fraud Prevention

2004-09-20 Thread R. A. Hettinga




Search Results for Google
 


 
 September 20, 2004 09:00 AM US Eastern Timezone

VeriSecure Systems, Inc. Demonstrates Check 21 Fraud Prevention

  FORT LAUDERDALE, Fla.--(BUSINESS WIRE)--Sept. 20, 2004--VeriSecure
Systems(TM), Inc. announced that its Check Fraud Prevention System (CFPS)
was tested under the auspices of the Financial Services Technology
Consortium, whose members include the largest financial institutions in the
US, as well as community banks, check clearing exchanges and other
institutions. VeriSecure Systems technology was demonstrated to survive the
check truncation, imaging and exchange and to offer security value
throughout the process.


 In October of 2003, Congress passed legislation known as Check 21. This
legislation becomes effective October 2004 and enables the banking industry
to exchange bank check images in lieu of paper bank checks. Called
"Controlling Fraud in a Truncated Check Environment", the purpose of the
project was to assess the survivability, performance and viability of
"next-generation" document security features in image based operations for
bank checks, by conducting real life simulated exchanges among ten
institutions.

 VeriSecure Systems employed its Check Fraud Prevention System (CFPS) for
the project, which is based on its US Patent #5,432,506 "Counterfeit
Document Detection System." The technology uses cryptography to create a
unique code for each check. The security feature is applied as a standard
printed barcode symbol by the check issuer. VeriSecure's software,
developed in conjunction with Inlite Research, Inc., can provide a fully
automated solution to read and validate the codes from either the actual
paper documents or from the images of the documents. The software rapidly
verifies the authenticity of the information printed on the checks, and
identifies any alterations, thus preventing the most prevalent forms of
fraud.

 Tom Chapman, VeriSecure's founder and the inventor of the technology said,
"This project has certainly helped to demonstrate how cryptography can
easily and conveniently be put to use, to validate any type of physical
documents or their images. Along with fraud losses, this technology has the
potential to reduce operating expenses of financial institutions as well as
remittance processing for corporations."

 Gene Manheim, President of Inlite Research explained that "Industry
standard barcodes serve as the robust foundation to secure check images,
and enable innovative technologies like CFPS to provide fraud prevention
across a huge range of images."

 Frank Jaffe, project manager for FSTC, said "Based on the results of the
project, and given the magnitude of the risks of loss from check fraud,
FSTC believes that financial institutions and check issuers will be well
served by the adoption of these new document security features."

 About VeriSecure Systems

 The Company licenses its patented technology which is designed to verify
the authenticity of physical documents and/or captured images. It is
located in Plantation, Florida. (954) 401-8378
http://www.verisecuresystems.com

 About Inlite Research

 Since 1992, Inlite Research Inc. offers its Image Processing and Barcode
Recognition technologies to OEMs and solution providers in markets that
demand the utmost accuracy, productivity and quality in business processes.
It is located in Sunnyvale, California. (408) 737-7092
http://www.inliteresearch.com

 About The Financial Services Technology Consortium

 The Financial Services Technology Consortium (FSTC.ORG) is a consortium of
leading North American-based financial institutions, technology vendors,
independent research organizations, and government agencies. New York, NY.
(212) 461-7116 http://www.fstc.org
 Contacts
VeriSecure Systems, Inc., Plantation, Fla.
Tom Chapman, 954-401-8378 Print this Release

Terms of Use   |© Business Wire 2004

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Geopolitical Darwin Awards

2004-09-20 Thread James A. Donald
James A. Donald:
> > I don't recall the American revolutionaries herding children
> > before them to clear minefields, nor surrounding themselves
> > with children as human shields.

John Young
> No, not minefields, but a good percentage of Washington's
> army and that of the French, were children. Young boys were
> taught the art of war as gofers and undercover spies among
> the Brits. Some were caught and executed.

In no way does this compare to the Iranian method for clearing 
minefields, or Sadr's use of five year old children as human shields.




Want your medicine? We have them

2004-09-20 Thread Elwood
Title: fischer



brigham despair shelton grimace wrapup contusion griffith teamster monument bus add boorish irresponsible baneberry 

Obtain your medication straight away!
Whatever you need, we have it! Fast and inexpensive! 
  
  
  
  
  All medications 
  in one place! 
  
  
  
  
  
  
  
  I wish no more of this please!
  
  specie vicious convulsive curfew beam credent chipboard 
  







Re: Geopolitical Darwin Awards

2004-09-20 Thread J.A. Terranson

On Sun, 19 Sep 2004, Major Variola (ret) wrote:

> (Remember the
> Hiroshima bomb was *not* tested, so sure were the scientists.  Trinity

My understanding (and I am *positive* someone will correct me if I'm
wrong) was that there was a shortage of both fissionable materials and
appropriate [altimeter] fuse mechanisms, making testing a outside of enemy
territory a losing proposition.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  "...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them."  Osama Bin Laden
- - -

  "There aught to be limits to freedom!"George Bush
- - -

Which one scares you more?



'Motel Six' squad scans guest activity

2004-09-20 Thread R. A. Hettinga


   L.A. Daily News - News

Leaving no room for crime

'Motel Six' squad scans guest activity

By Jason Kandel
Staff Writer

Motel Six, LAPD-style, has made a name for itself by checking out who's
checking in.

 A half-dozen officers assigned to a squad nicknamed Motel Six are credited
with  the arrests of more than 100 felony and misdemeanor offenders by
raiding motels  across the San Fernando Valley for the past seven weeks.

 They've picked up suspected sex offenders, parole violators and fugitives
in  crime-plagued motels lining Sepulveda and Ventura boulevards and other
thoroughfares. The Valley operation has become a model program that Chief
William Bratton might expand citywide.

 "It's much more easy to hide in a motel than in your neighborhood," said
Valley Bureau Cmdr. Valentino Paniccia, who handpicked the sergeant and
five  officers for the team.

 "Guns, violence, drugs, identity theft, computers -- they get free
electricity,  a base of operations, concealment, mobility. They can move
from day to day."

 Long considered by police as hotbeds of prostitution, motels offer cheap
rent  and easy access to freeways, and can become a base of operation for
felons to  manufacture forged identity cards and carry out big drug deals
-- and hide out from  the cops.

 "They're becoming more enterprising, and they're fanning out," said
Assistant  Chief George Gascon, who oversees department operations.
"They're becoming more businesslike."

 The six-member unit was formed after police noted an increase in violence
at  local motels, including last year's slaying of Burbank police Officer
Matthew  Pavekla in a gunbattle in the parking lot of the local Ramada Inn.

 Just last year, Craigor Lee Smith -- suspected of being the "Yellow Tooth
Bandit" who held up dozens of Valley motels -- was fatally shot in a police
standoff outside an Encino restaurant.

 In 2002, police caught a murder suspect who had been living out of his car
parked in a lot at a North Hollywood motel.

 The Motel Six patrol checks parking lots, running license plates through
police car computer terminals and getting instantaneous information about
the  registered owners.

 They then can check the information against guest registers and knock on
doors,  often turning up weapons, large amounts of cash, drugs and
associatedparaphernalia.

 "The law allows for us to examine the registers," said Capt. James Miller,
head of the Van Nuys Division, who had expressed concern about suspects'
privacy  rights while the project was still in the planning stages.

 "Running a license plate to see if it's a stolen vehicle or if there's a
warrant has been recognized by the courts for a long time."

 The Motel Six program dovetails with efforts by the City Attorney's Office
to  shut down problem motels under the city's nuisance-abatement laws. The
city  attorney has a dozen open cases involving Valley motels where
narcotics and  prostitution have been problems.

 "We're going to be working closely with (the motel squad)," said Deputy
City  Attorney Colleen Courtney, a neighborhood prosecutor for the West
Valley and North  Hollywood areas. "We know that city resources are
limited. This is an effective  approach."

 Officials with the California Hotel & Motel Association applaud the LAPD's
efforts.

 "Innkeepers should view the police as one of their best friends and
resources,  always," said Jim Abrams, the executive vice president of
association, the  nation's largest state lodging industry trade
organization with more than 1,750  members. "Innkeepers and the cops need
to work together."

 Mike Barry, the manager at the Mission Hills Inn, also appreciates the
efforts  of the Motel Six patrol.

 Earlier this month, the squad raided a room at the motel and arrested
Joseph Romagnano, 32, on drug charges. They also seized methamphetamine,
marijuana and more than $11,000.

 "From time to time, we get bad people in here," Barry said. "We try to
screen our guests as much as we can, but still they can check in with
different  IDs. When the police come and take them away, we're really
happy."
-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re:nuisz,St0ck Mogul Newsletter

2004-09-20 Thread Francisco Daugherty

Raul Bermudez,

New York Log and Lumber (OTC:NYIL)
(now called Green Energy Resources, Inc.)

We rec-ommended it 30 days ago at .17 and it went to .50

Did you like SQCN??? FDEI???  You will L0VE NYIL on Monday. 

Green Energy Resources, Inc. (OTC:NYIL)
Current Price: $0.35
Shares Outstanding: 20 MILLI0N
Market Capitalization: $6 MILLI0N


News Headline: Thursday, September 16, 2004  

Green  Energy  Resources  Launches  Strategic  Initiative  with Coal
Industry  to   Reduce   Air   Polluting   Emissions,  Develop  Green
Certificate Market and Revitalize US Coal Production. (Source: Green
Energy Resources)


About The Company:

New York Log  and  Lumber  now  called  Green Energy Resources, Inc.
(OTC:NYIL) is an emerging "green energy" powerhouse in  the  making,
with rapidly expanding operations n in the delivery and distribution
of  wood  fiber  biomass  fuel  for  energy generation facilities in
Europe and North America.  The Company has already posted profitable
operations, and with contracts already  in  place,  is set to see an
in-crease in revenues over the  next  three  years! With  a  leading
position   in   the  wood  fiber  biomass  energy  supply  industry,
established export operations  to  European clients, and development
of a US distribution network,  NYIL  is  poised  to  see  tremendous
growth and emerge as a major "green energy" company.

As oil and natural gas prices reach  all-time  highs,  and  concerns
over environmental pollution and greenhouse climate change reach new
audiences,  alternative  energy  production  has  become  one of the
hottest topics on the  Street.   While well-established green energy
technologies  including  solar  and  wind  have   yet   to   produce
significant energy gains, and highly touted new technologies such as
hydrogen  fuel  cells are still years away from practical use, there
is one often overlooked, highly  profitable, and simple green energy
technology which is already widely used.

This alternative energy technology is  biomass-  the  conversion  of
organic  materials  into  energy,  and  one  of  the oldest and most
effective sources  of  energy  in  human  history.   Biomass fuel is
abundant, secure, economical, and sustainable, and can  be  used  to
produce  clean  energy  which  does  not  contribute to pollution or
greenhouse gasses, can be  used  to  reduce landfill dependence, and
provide an alternative to the open burning of forest wastes.

NYIL is one of the first US companies to target this tremendous  and
rapidly  growing  0pportunity for clean, renewable energy production
through biomass.  NYIL is  a  leading  US provider of "green energy"
wood fiber biomass fuel for energy generation.  The Company  is  the
first  US  company  to  export  biomass  fuel  to lucrative European
markets, and  is  working  to  capitalize  on  recent  energy policy
changes in the US with development of a domestic delivery network to
accommodate anticipated near-term demand.

With export sales of more than $3 MILLI0N for FY 2004, we anticipate
dramatic revenue growth for NYIL this year as  the  Company  expands
its international operations with major new contract wins and begins
to  put the infrastructure in place for a first-of-its-kind domestic
biomass supply network.   NYIL  is  the  only  American company that
meets  the  stringent  UTCS  environmental   standards,   is   Kyoto
compliant,  and  is  working  to  reduce  destruction  of forests by
utilizing waste wood.


A Few Reasons to Consider Owning NYIL:

NYIL provides wood  fiber  biomass  fuel  required for generation of
clean, environmentally friendly energy,  using  waste  and  recycled
materials  for  export  to European energy plants, and is working to
develop a  domestic  delivery  infrastructure  that  will supply the
growing US market demand for "green energy".  The demand  for  green
energy  is  rapidly  expanding in the European Union, with projected
consumption of 110 MILLI0N tons of  wood fuel annually.  At the same
time, the US production of waste wood is at an all time high.   NYIL
provides a highly profitable, environmentally sound solution to both
of these problems with its wood fuel export business.

Renewable  energy  is a $17 BILLI0N annual industry that is expected
to reach $35 billion by  2003.   Biomass, primarily from wood chips,
is expected to account for about 20% of  this  generation  capacity.
Increasingly,   national   and  state  governments  are  turning  to
renewable energy as  a  solution  for  increasing  pollution and the
all-time high costs of fossil fuels,  with  a  wide  range  of  fuel
credits,  tax  incentives, and green pricing programs implemented to
encourage renewable energy development.   NYIL has positioned itself
as a clear leader in this renewable energy generation segment.

Recent legal filings and legislative rulings  will  provide  a  huge
impetus  towards  the adoption of wood fiber co-generation and other
clean energy technologies in the United State

Re: Pre-Approved Application Mon, 20 Sep 2004 15:27:07 -0500

2004-09-20 Thread Ochoa Petra
Re:  Online Application  Mon, 20 Sep 2004 15:27:07 -0500
   
Your mtg process is pre-[approved], for ra.tes starting at 3.25% Fixed. 
Please use our secure site to fill-out your application*.
  
Thank you.
 
http://edgequote.com/?partid=s26


 
 
--
 
Future contact modification: http://edgequote.com/st.html
 
 
 

acts foundry countdown separate hoy dorset equanimity abovementioned adolescent 
eloquent banter deliquesce sentiment len stimulate ariadne instinct decker caviness 
tat wehr auxiliary calcareous baldy befall fiesta irrevocable 

Re: Geopolitical Darwin Awards

2004-09-20 Thread Major Variola (ret)
At 08:46 PM 9/19/04 -0700, John Young wrote:
>Today, even the US uses children in war, 17 being the minimum
>age to enlist. Others sneak in by lying about their age, some as
>young as 14. Recruiters look the other way when the kids
>and their parents lie. Been there, done that. Enlisted in the
>army at 15, served months before being kicked out when a
>relative ratted on me. Went in again at 17.

Not that it matters, but you have tipped your motivations far
more than your bailey-bridge erections...

Still, good things come from twisted sources... look at the GNU projekts
:-)






Re: Geopolitical Darwin Awards

2004-09-20 Thread R. A. Hettinga
At 8:11 PM -0700 9/20/04, Major Variola (ret) wrote:
>At 04:57 PM 9/19/04 -0700, James A. Donald wrote:
>
>>But the Saudi Arabian elite, of among which Bin Laden was born with a
>>silver spoon in his mouth, are not getting screwed over.
>
>1. you don't get religion
>2. UBL's mom was a low-caste yemeni, dig?

Actually, UBL's *dad* was a low-caste Yemeni, too.

And your point is?

Like all cultural components, religion is about the allocation of scarce
resources. War is the penultimate form of this kind of allocation. In fact,
the actual content of religion is immaterial, except where it affects the
ability of a culture to raise the resources to fight a *war*, which, as
Hanson puts it so nicely in "Carnage and Culture", is everything.

Because of its inability to raise the resources to fight a modern war --
capital (by several orders of magnitude, go look at a map with GDP
superimposed), and, most important the freedom to create new *science* to
produce that capital with, virtually out of thin air -- Islam is a dead
religion. It just doesn't know it yet.

UBL, and the entire Islamic culture, will eventually go the way of Hannibal
and Carthage.

Carthage sacrificed children to their gods too. Go for it, I say...

Cheers,
RAH

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



But they were using 3DES!

2004-09-20 Thread Major Variola (ret)
September 20, 2004

ATM Stolen in Third Such Theft in a Month
An automated teller machine was stolen from a gas station early Sunday,
the
third such theft in Orange County since mid-August, police said.

The machine was stolen from an Arco just before 4 a.m., using the same
method as in the earlier incidents, sheriff's Lt. Ted Boyne said.

"They come, and in 30
seconds, they have the
ATM in back of an
SUV."

http://www.latimes.com/news/local/orange/la-me-ocbriefs20.2sep20,1,6358360.story?coll=la-editions-orange

Moral of the story: do the math.




Re: Geopolitical Darwin Awards

2004-09-20 Thread R. A. Hettinga
At 8:12 PM -0700 9/20/04, Major Variola (ret) wrote:
>The yank minutemen were not above taking children as soldiers,
>any more than Dan'l Boone was above taking a 14 year old as
>a wife.

That's more a definition of "adult", than anything else.

If they're old enough to blee-... Oh, forget it...

Cheers,
RAH

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Geopolitical Darwin Awards

2004-09-20 Thread Major Variola (ret)
t 11:38 PM 9/20/04 -0400, R. A. Hettinga wrote:
>At 8:11 PM -0700 9/20/04, Major Variola (ret) wrote:
>>2. UBL's mom was a low-caste yemeni, dig?
>
>Actually, UBL's *dad* was a low-caste Yemeni, too.
>
>And your point is?

That you can be wealthy and still find something of the underdog
in you, which you can resublimate...

>-- Islam is a dead
>religion. It just doesn't know it yet.

Lets hope that's true for all of them...





Re: Pre-Approved Application Tue, 21 Sep 2004 01:54:40 -0800

2004-09-20 Thread Pham Boyd
Re:  Online Application  Tue, 21 Sep 2004 01:54:40 -0800
   
Your mtg process is pre-[approved], for ra.tes starting at 3.25% Fixed. 
Please use our secure site to fill-out your application*.
  
Thank you.
 
http://edgequote.com/?partid=s26


 
 
--
 
Future contact modification: http://edgequote.com/st.html
 
 
 

crimson germinate yin cunard clausius omen boundary consanguine chute midwives amadeus 
arrogant dreamlike turmoil catalogue blanc mirfak dredge vest photometry quark 
democratic preface appanage staten bonnet convention rune enunciable asymmetry 
checkbook flogging appreciable fin chinch meek instantiate tenspot anorthosite