Re: Blinky Rides Again: RCMP suspect al-Qaida messages

2004-12-09 Thread R.W. (Bob) Erickson
J.A. Terranson wrote:
On Thu, 9 Dec 2004, Tyler Durden wrote:
 

Those cops you taught...do you think they were stupid enough to assume that,
because this was their first time hearing about Stego, that Al Qaeda was
only starting to use it right then?
   


Thats an interesting question on several different levels:
(1) There is (both within LEAs and the rest of us) a wide range of
opinions as to the feasability of stego being used in the field for
anything useful.  Remember that USA "professional spies" (who spent over a
year learning tradcraft IIRC) had continuous problems with very simple
encryptions/decryptions in the real world.
(2) The folks in the "Al Qaeda is Satan" camp generally believe that not
only is stego in wide use, but that AlQ has somehow managed to turn it
into a high bandwidth channel which is being used every day to Subvert The
American Way Of Life and infect Our Precious Bodily Fluids.  No amount of
education seems to dissuade these people from their misbeliefs.
(3) The other camp believes that stego is a lab-only toy, unsuitable for
much of anything besides scaring the shit out of the people in the Satan
camp.
(4) I have yet to meet a full dozen people who share my belief that while
stego *may* be in use, if it is, that use is for one way messages of
semaphore-class messages only.  I really do not understand why this view
is poopoo'd by all sides, so I must be pretty dense?
 

It only makes sense that transmitted stego payloads be simple codewords 
or signals.
For hand carried chunks of data, simple disguise is sufficient
The bulk transport of dangerous data is a threat model  that doesnt fit 
the situation.
Perhaps LEA confuse themselves thinking al-q is inciting a cultural 
revolution?
.
.




Here is your tracking # Z1 33796

2004-12-09 Thread Ashley Pitts




 
http://dwzrgb.net/azcma
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Lt. Gen. John Sattler, commanding general of the
1st Marine Expeditionary Force, said 51 U.S. troops and eight Iraqi security
forces have died in the Falluja offensive.
 
About 1,200 insurgents have been killed in the
battle, he said.
 
Although Falluja is secured, troops remain busy
conducting mopping up operations and engaging in sporadic fights with holdout
insurgents in the city.
 
Sattler said U.S. and Iraqi troops are "ubiquitous"
throughout the city.
 
"Falluja is secure, but we're in that
search-and-clear phase which will make it safe," he said.
 
"We've commenced the clean-up operation" and
humanitarian assistance is being moved into the town.
 
About 25 to 30 injured civilians in the city have
been treated for injuries, Sattler said, adding that he knows of no civilians
killed in the fighting.
 
He said more than 1,000 suspects have been
captured. Some have been released after questioning.
 
Thair al-Nakib, a spokesman for interim Iraqi Prime
Minister Ayad Allawi, said the battle for Falluja has been won by U.S. and Iraqi
forces and that the city is no longer a terror
stronghold.

<<0001.gif>>

Re: Timing Paranoia

2004-12-09 Thread Steve Thompson
 --- "R.W. (Bob) Erickson" <[EMAIL PROTECTED]> wrote: 
> One of the tools currently being used in the cognitive sciences is the 
> measurement of reaction time to stimulus.

What's this?  The cognitive equivalent to wacking someone on the knee with
a rubber hammer to measure the mentak kick reflex of the subject?

> It turns out that the length of time it takes to given situations is a 
> credible proxy for how difficult the discrimination is to make.

For the individual subject.  I would imagine that such testing would
(among other things) allow some measurement of the thoughtfullness put
into a response.  Careful construction of the tests to control for various
factors might then allow inferences to be made about the relative
sophistication to be found in the cognitive structures involved in the
test-response on a subject-by-subject basis.

> Imagine a paranoia  involving  mysterious e-mail delays and the length 
> of time it takes to catagorize

Imagine hordes of otherwise unemployable psychologists and cognitive
psychologists deployed on mailing lists and Usenet, harassing the fuck out
of `persons of interest'.  Civil rights, for the majority of the civilian
population, are entirely non-existent for all intents and purposes.  I
imagine that a great many self-styled scientists are happily engaged in
the cultivation and acquisition of psycho-social data and knowledge, in
public fora, without too much thought about the morality of their
intrusive meddling in the commons.

All in the name of science, of course.


Regards,

Steve


__ 
Post your free ad now! http://personals.yahoo.ca



Re: tempest back doors

2004-12-09 Thread Steve Thompson
 --- "Major Variola (ret)" <[EMAIL PROTECTED]> wrote: 
> >Perhaps I am stupid.  I don't know how one would go about modifying
> >application software to include a 'back door' that would presumably
> >enhance its suceptibility to TEMPEST attacks.  Isn't tempest all about
> EM
> >spectrum signal detection and capture?
> 
> You have your code drive a bus with signal.  The bus radiates, you
> 'TEMPEST' the signal, game over.  Back in the 60s folks programmed
> PDPs to play music on AM radios.  Same thing.  Dig?

Fine.  That's great as an example of transmitting data over a covert
channel, but so what?  As you suggest, people have been doing that with AM
radios since the 60's, although the folklore mentions the phenomenon in
the context of monitoring the computer's heartbeat, purely as a debugging
technique.

What makes this odd is that the Wired article makes no mention of Tempest,
only of the possibility of there being a back door, which in the usual
vernacular of computer security, usually implies a method for unauthorised
access or use of the software system in question.


Regards,

Steve


__ 
Post your free ad now! http://personals.yahoo.ca



Re: "Word" Of the Subgenius...

2004-12-09 Thread Steve Thompson
 --- John Kelsey <[EMAIL PROTECTED]> wrote: 
>>[May]
> 
> Maybe, maybe not.  The thing I always find interesting and annoying
> about Tim May's posts is that he's sometimes making really clearly
> thought out, intelligent points, and other times spewing out nonsense so
> crazy you can't believe it's coming from the same person.  It's also
> clear he's often yanking peoples' chains, often by saying the most
> offensive thing he can think of.  But once in awhile, even amidst the
> crazy rantings about useless eaters and ovens, he'll toss out something
> that shows some deep, coherent thought about some issue in a new and
> fascinating direction. 

That paragraph could easily be modified to make it a commentary on my
posting habits, or indeed, on my general presentation from day to day. 
So, I will comment.

On a pseudo-random but cyclic schedule, I am harassed, provoked, or
otherwise experience incidents of aggression of one sort or another.  This
affects my mood and general state of mind to varying degrees. 
Furthermore, I do not have consistent dietary intake, nor do I live in an
environment which allows or provides privacy, security, or consistency
save that which I impose with the expenditure of a great deal of effort
and patience.

If you also consider the fact that I have been variously poisoned in
recent years with everything from sedatives to stimulants to hormones to
psychoactive compounds to low-level hallucinogens, and as well have been
subjected to uncounted appeals to my subconscious in the main through the
use of direct and indirect sexually exploitative imagery and encounters,
you might get the idea that consistent literary output is simply not in
the offing.

Before anyone goes to the trouble of suggesting that I discuss matters
with the police, I'll save them the bother.  The police have entirely
failed to allow my allegations the courtesy of a hearing.  Not even once. 
I belive that those who have not merely dirties their own hands in some
way, are too chikenshit to recognise some of the more subtle criminality
that goes on in this country.  Or they may be intimidated by the kind of
agency[1] that has invoved itself in the kind of clandestine activity that
is at issue.

Add in the fact that I've been dealing with _some_ sort of malicious and
interfereing bullshit for quite a few years without any sincere assistance
of any sort beyond the odd informational giveaway of dubious provenance,
and you might well conclude that whatever else is going on, I'm not a
happy camper.  Perhaps my inconsistent presentation mimics the
inconclusive partial criterion for certain classical mental afflictions. 
This is convenient as such afflictions are conveniently viewed by the
layman and professional alike as having an origin that is entirely
internal to the individual in question.

However, I have quite a bit of evidence of varying grades that support my
position rather well.  Time will tell, perhaps, the true nature of the
matter in a fashion that leaves no doubt in the mind of the uninvolved
spectator.

But in the interim, that will have to stand as my overbrief outline of the
reason why I exhibit inconsistency in writing, speech, and action.  I am
simply way too busy dealing with what can in one way be viewed as a
chronic and personalised denial of service attack.

Perhaps Tim May has an entirely different set of factors influencing his
online behaviour.  You will have to ask him to explain his circumstances,
and hope that he consents to it.

As for my case, I do not really wish to make it a topic of discussion on
the Cypherpunks list.  The law enforecement (and perhipheral) personnel
who have involvement in my affairs, for whatever reason, are (and should
be) fully aware of the external influences on my psychology.  They have
the investigative tools and authority to make definitive findings of fact,
and to take corrective action should they find incidents of criminal
liability, but as yet have refused to do so.  And *that* is another matter
entirely.



Regards,

Steve



[1] general sense of the term.  I'm not referring to, say, the CIA
specifically in this instance.  

__ 
Post your free ad now! http://personals.yahoo.ca



Re: Blinky Rides Again: RCMP suspect al-Qaida messages

2004-12-09 Thread Steve Thompson
 --- "R.A. Hettinga" <[EMAIL PROTECTED]> wrote: 
> Lions and Tigers and Steganography, Nell...
> 
> For those of you without a program, here is the new, official, Horsemen
> of
> the Infocalypse Scorecard:
> 
> At 3:14 PM -0400 10/3/04, R. A. Hettinga wrote:
> >   Horseman Color  Character   Nickname
> >
> >1  TerrorismRedShadow  "Blinky"
> >2  NarcoticsPink   Speedy  "Pinky"
> >3  Money Laundering Aqua   Bashful "Inky"
> >4  Paedophilia  Yellow Pokey   "Clyde"
> 
> Cheers,
> RAH
> ---
> 
> 
>  December 8, 2004
> 
>  RCMP suspect al-Qaida messages
> By JIM BRONSKILL



The RCMP couldn't find a hidden terrorist message even if someone shoved
half of it up the ass of Commissioner Giuliano Zaccardelli, and the other
half up the ass of Deputy Commissioner Paul Gauvin, and then sent them a
map with clear directions written on it leading directly to the location
of both assholes.

No, I don't like them at all.


Regards,

Steve


__ 
Post your free ad now! http://personals.yahoo.ca



Sheep Herding

2004-12-09 Thread R.W. (Bob) Erickson
The secular bible: Our project

First let me speak to my Christian brothers and sisters. I mean you no 
disrespect by using the term "bible" in an unholy attack on your faith.

The project of this secular bible honors the sanctity of holy documents.
A secular bible could only be true to itself is it stood for tolerance 
and cooperation.



We all know of the worldwide spread of dissatisfaction and unhappiness. 
We acknowledge the existence of what we can only call "evil" in the world.

We have less agreement on what we call "good" or "godlike"  We have not 
found enough agreement on what to do about evil.


There are those among us who hold to the principle no agreement is 
required. The proper agents in the war against chaos are the free and 
independent thinkers of the mythical open society. The radical edge of 
this stance is the notion that cooperation always entails disaster in 
the form of unintended consequences.


There are those among us who are afraid of the unknown. Many of us 
prefer to keep to the familiar. We find ourselves in circles of friends 
and relatives and find comfort or at least solace in the company of 
these others. We become "us".


There is a subtle danger in this. The formation of community is also the 
formation of "them"


There are those among us who fear "them" so much that the very thought 
of cooperation is scary. To them the idea that there could be a science 
of cooperation is absurd. They will cite economics and rational self 
interest to avoid gambling on trust. The run-away paranoia that can 
ensue will tax their freedom as surely as the state must.


The project of the science of understanding, this secular bible giving 
people an understanding of their part in the universe, and the tools 
they need to get along with all manner of thinkers.


(tbc)
Of course this is all meant sarcastically.
The Lord knows, nobody wants to just get along.



Re: Blinky Rides Again: RCMP suspect al-Qaida messages

2004-12-09 Thread R.W. (Bob) Erickson
Steve Thompson wrote:
--- "R.A. Hettinga" <[EMAIL PROTECTED]> wrote: 
 

Lions and Tigers and Steganography, Nell...
For those of you without a program, here is the new, official, Horsemen
of
the Infocalypse Scorecard:
At 3:14 PM -0400 10/3/04, R. A. Hettinga wrote:
   

 Horseman Color  Character   Nickname
1  TerrorismRedShadow  "Blinky"
2  NarcoticsPink   Speedy  "Pinky"
3  Money Laundering Aqua   Bashful "Inky"
4  Paedophilia  Yellow Pokey   "Clyde"
 

Cheers,
RAH
---

December 8, 2004
RCMP suspect al-Qaida messages
By JIM BRONSKILL
   


The RCMP couldn't find a hidden terrorist message even if someone shoved
half of it up the ass of Commissioner Giuliano Zaccardelli, and the other
half up the ass of Deputy Commissioner Paul Gauvin, and then sent them a
map with clear directions written on it leading directly to the location
of both assholes.
No, I don't like them at all.
Regards,
Steve
__ 
Post your free ad now! http://personals.yahoo.ca

 

You tell them, Steve
Insanity is a great cover for an insurectionist!


Re: "Word" Of the Subgenius...

2004-12-09 Thread J.A. Terranson


On Thu, 9 Dec 2004, Steve Thompson wrote:



(STANDING OVATION) (SOUNDS OF MANY HANDS CLAPPING)

Thank you Steve, for that short but entertaining look into the dark
recesses of our collective consciousness :-)


-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

 Civilization is in a tailspin - everything is backwards, everything is
upside down- doctors destroy health, psychiatrists destroy minds, lawyers
destroy justice, the major media destroy information, governments destroy
freedom and religions destroy spirituality - yet it is claimed to be
healthy, just, informed, free and spiritual. We live in a social system
whose community, wealth, love and life is derived from alienation,
poverty, self-hate and medical murder - yet we tell ourselves that it is
biologically and ecologically sustainable.

The Bush plan to screen whole US population for mental illness clearly
indicates that mental illness starts at the top.

Rev Dr Michael Ellner



Nul Context

2004-12-09 Thread R.W. (Bob) Erickson
Communication is about context
Sometimes the context is so obvious that the frame is nearly invisible, 
sometimes the context is so subtle that indications of obvious 
significance can only be detected after much study.

Language and meaning involve sharing of contexts.
This is obvious, what is less obvious is the way that communication 
implicates a context one might call, A Theory of Mind

What does this mean? Well a lot of it is hidden in what we call common 
sense, or folk psychology. You know what I mean because I'm behaving 
conventionally in my choice of words, and saying stuff that makes sense.

When we use language conventionally, we talk about things that are 
happening and what people are thinking. When we talk about things that 
matter we wonder what others think. We think about what other people are 
thinking, all the time.

It’s a common enough usage of language, and quite comprehensible. Which 
makes it all the more peculiar that for a long time science had a weird 
rule that said that unempirical terms like intention and purpose, not to 
mention perception and comprehension were "metaphysical nonsense".

Science has come a long way since the logical positivists held sway. Its 
not that they were wrong, the problem was they couldn’t be right. The 
original proof that they were wrong was at hand for most of the 20th 
century, in the interference pattern between the works of Wittgenstein 
and Gödel,

As recently as the middle of the last century, back when Chomsky was 
doing his seminal work in deep structures, psychology was firmly stuck 
with Pavlovian Reflexes and Skinner Boxes and vigorously opposed 
adopting any working theory of mind. Stimulus Response Theory just cant 
handle task of explaining what an artist does. Into this context, Modern 
Linguistics was born.



punkly current events

2004-12-09 Thread Major Variola (ret)

Someone should have commented here, so I will, that some judges (earning

hanging) basically said that anonymity is not a right.  This
in the context of mask-wearing in public.  If the Klan doesn't have
a right to wear pillowcases what makes you think mixmaster will
survive?





Re: SEC Probes Firms That Gather Data on Who Owns What Shares

2004-12-09 Thread Major Variola (ret)
At 10:51 AM 12/9/04 -0500, R.A. Hettinga wrote:
>cash payments of $50 to $100 per tip. The people add that a separate
>internal probe found that four employees of Mellon Financial Corp. had
>received Pittsburgh Pirates tickets, $50 American Express gift
certificates
>and boxes of steaks for such data.

Just for the newbies, these are all bearer instruments, in RAHspeak.
Bearer instruments (incl. gold, tobacco, whiskey, goats, etc.)
let you do things that you don't want monitored.  They also have
'finders keepers' property, which is a corollary, and a bug (not a
feature) should you lose your wallet/stash.  This is a hard property
to imbue digicash with because you need to prevent double-spending,
which generally requires some kind of online access, also a feature.
(Think gas station in the boonies without a credit card terminal;
only cash, gold, silver, Pu, etc if the vendor believes he is competent
to verify
those precious elements, etc.)



Re: "Word" Of the Subgenius...

2004-12-09 Thread Major Variola (ret)
At 11:21 AM 12/9/04 -0500, Tyler Durden wrote:
>
>Well, May seemed to try to make the case that all of those "useles
eaters"
>were in large part responsible for the very existence of the state, and
that
>collapse of the state meant the inevitable downfall of huge numbers of
>minorities (why he focused on them as opposed to white trailer trash I
don't
>know).
>
>But he was definitely advocating that racist viewpoints fall naturally
out
>of a crypto-anarchic approach.

Tyler:

A rational person has to admit that many parasitic folks of all albedos
are able to exist
because they occupy a govt-funded niche.

Without a welfare govt, those people would either 1. subsist on private
(ie voluntary) charity, 2. become useful by necessity 3. die of
starvation
4. die during attempts to coerce others with violence.

Depending on your beliefs about human demographics/nature, you will
assign variable percentages to these outcomes.

It *is* racist to think that genotypes in each bin will differ *IFF* you

*don't* ascribe this outcome to culture associated with genotypes.

But culturism is not racism, its recognition of how behavior and
evolution work.  I subscribe to and will defend culturism.

(I speak for myself, not TM (tm), though I may or may not be a duly
appointed pope of the church of strong cryptography; though recently
I've been trending towards being an Earthquaker,
who believes in tectonics, esp. during seismic events.  Our vatican
is in Parkfield BTW :-)





Re: tempest back doors

2004-12-09 Thread Major Variola (ret)
At 07:46 PM 12/9/04 -0500, Steve Thompson wrote:
> --- "Major Variola (ret)" <[EMAIL PROTECTED]> wrote:
>> >Perhaps I am stupid.  I don't know how one would go about modifying
>> >application software to include a 'back door' that would presumably
>> >enhance its suceptibility to TEMPEST attacks.  Isn't tempest all
about
>> EM
>> >spectrum signal detection and capture?
>>
>> You have your code drive a bus with signal.  The bus radiates, you
>> 'TEMPEST' the signal, game over.  Back in the 60s folks programmed
>> PDPs to play music on AM radios.  Same thing.  Dig?
>
>Fine.  That's great as an example of transmitting data over a covert
>channel, but so what?  As you suggest, people have been doing that with
AM
>radios since the 60's, although the folklore mentions the phenomenon in

>the context of monitoring the computer's heartbeat, purely as a
debugging
>technique.

The poster didn't understand how to backdoor a program using
unintentional RF as the channel.  I told them.  That's "so what"





Re: punkly current events

2004-12-09 Thread R.A. Hettinga
At 6:33 PM -0800 12/9/04, Major Variola (ret) wrote:
>If the Klan doesn't have
>a right to wear pillowcases what makes you think mixmaster will
>survive?

"Which was me point", mutters Killick, under his breath...

Cheers,
RAH

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: SEC Probes Firms That Gather Data on Who Owns What Shares

2004-12-09 Thread R.A. Hettinga
At 6:43 PM -0800 12/9/04, Major Variola (ret) wrote:
>Just for the newbies, these are all bearer instruments, in RAHspeak.

Now, *that* I wasn't paying attention to, having just seen the "omigawd,
more financial proctology" aspects at the beginning of the article.

Thank you.

Cheers,
RAH

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Timing Paranoia

2004-12-09 Thread Roy M. Silvernail
Steve Thompson wrote:
--- "R.W. (Bob) Erickson" <[EMAIL PROTECTED]> wrote: 
 

Imagine a paranoia  involving  mysterious e-mail delays and the length 
of time it takes to catagorize
   

Imagine hordes of otherwise unemployable psychologists and cognitive
psychologists deployed on mailing lists and Usenet, harassing the fuck out
of `persons of interest'.
Imagine using observed timing to conclude that your agent provocateur 
operates from geostationary orbit.

R. W. may be annoying, but at least he's derivative.
--
Roy M. Silvernail is [EMAIL PROTECTED], and you're not
"It's just this little chromium switch, here." - TFT
SpamAssassin->procmail->/dev/null->bliss
http://www.rant-central.com


Re: punkly current events

2004-12-09 Thread J.A. Terranson

On Thu, 9 Dec 2004, Major Variola (ret) wrote:

> Someone should have commented here, so I will, that some judges (earning
>
> hanging) basically said that anonymity is not a right.  This
> in the context of mask-wearing in public.  If the Klan doesn't have
> a right to wear pillowcases what makes you think mixmaster will
> survive?

Mixmaster's death is in fact coming - you can bank on it.  Every fed I
know is violently aware of every operating remailer.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

 Civilization is in a tailspin - everything is backwards, everything is
upside down- doctors destroy health, psychiatrists destroy minds, lawyers
destroy justice, the major media destroy information, governments destroy
freedom and religions destroy spirituality - yet it is claimed to be
healthy, just, informed, free and spiritual. We live in a social system
whose community, wealth, love and life is derived from alienation,
poverty, self-hate and medical murder - yet we tell ourselves that it is
biologically and ecologically sustainable.

The Bush plan to screen whole US population for mental illness clearly
indicates that mental illness starts at the top.

Rev Dr Michael Ellner



Cryptography firm Certicom posts quarterly loss, year after big U.S. contract

2004-12-09 Thread R.A. Hettinga


CNEWS - Tech News:

 December 9, 2004

 Cryptography firm Certicom posts quarterly loss, year after big U.S. contract
By CRAIG WONG

 TORONTO (CP) - Data encryption company Certicom Corp. is reporting a
second-quarter loss of about $1 million US, down sharply from a profit of
$22.3 million a year earlier when the numbers were boosted by a lucrative
contract from the U.S. National Security Agency.

 Certicom (TSX:CIC) reported Thursday quarterly revenue of $2.6 million US,
compared with $2.7 million US a year ago - excluding revenues from the
$25-million NSA contract. The Mississauga-based firm reports in U.S.
dollars. CEO Ian McKinnon said the NSA contract has given the company a
boost to help sell its technology as the standard for encryption around the
world.

 "It has also hiked Certicom's position as the authority for strong
efficient cryptography," McKinnon said during a conference call with
analysts.

 The technology at the core of Certicom's products - elliptic-curve
cryptography, or ECC - is well suited to such purposes since it can work
faster and requires less computing power and storage than conventional
forms of cryptography.

 "We see the greatest potential in intellectual property licensing as ECC
adoption grows. Our focus is to maximize our share of that market,"
McKinnon said.

 During the quarter, the company used $10 million to retire its convertible
debentures, which matured on Aug. 30, making the company debt free.

 In its outlook the company said it expects operating expenses, including
cost of sales, are expected to range from $3.3 million to $3.6 million in
its third-quarter of its 2005 financial year.

 Research Capital analyst Bruce Krugel said the NSA gave Certicom some
profile, but it has yet to be seen if Certicom can deliver consistently on
its strategy to sign intellectual property deals.

 "There's no denying they have a good stroke of valid, but what I'm
wrestling with at the moment is rate of adoption and what people are
prepared to pay for it," he said

 "We've seen two nice intellectual property licensing deals be announced so
far . . . we just need to see more which would give us at least better
comfort as to what the potential might be."

 At its annual meeting in October, Certicom said it saw a growing demand
for its data encryption technology in both government and the private
sector, including the entertainment industry.

 The company said the explosion of digital music, movies and books that are
easily copied is causing companies such as Disney and Time Warner to demand
that electronic devices and distribution networks be fully secure.

 In its most recent quarter the company reported two important contracts
including one with software integration company Sybase and another with a
customer that could not be disclosed for confidentiality reasons.

 For the six months ended Oct. 31, Certicom reported a loss for $2.2
million or six cents per share on revenue of $5.5 million. That compared
with a profit of $20.7 million or 65 cents per share on revenue of $29.8
million for the same period a year earlier.

 During the 1999-2000 boom in technology stocks, Certicom shares (TSX:CIC)
traded above $100 Cdn. However, as the dot-com mania faded and technology
spending dried up, the shares fell and Certicom downsized repeatedly.

 Certicom shares closed up nine cents at $3.42 on the Toronto Stock
Exchange on Thursday.



-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Timing Paranoia

2004-12-09 Thread R.W. (Bob) Erickson
Roy M. Silvernail wrote:
Steve Thompson wrote:
--- "R.W. (Bob) Erickson" <[EMAIL PROTECTED]> wrote:  

Imagine a paranoia  involving  mysterious e-mail delays and the 
length of time it takes to catagorize
  

Imagine hordes of otherwise unemployable psychologists and cognitive
psychologists deployed on mailing lists and Usenet, harassing the 
fuck out
of `persons of interest'.

Imagine using observed timing to conclude that your agent provocateur 
operates from geostationary orbit.

R. W. may be annoying, but at least he's derivative.
Total novelty is a fiction.
If its not familiar, you wouldnt recognize it
We all work with the same handicaps
but some of us have agenda's
and others have excuses.
I am a collection of projects,
mine is the semantic path,
if anything of significance is missed,
I'll send back reports from the other side
--bob
maker of absurtities
no tangle too complex
to fit through the I of  my needle



Re: Timing Paranoia

2004-12-09 Thread R.A. Hettinga
At 10:16 PM -0500 12/9/04, Roy M. Silvernail wrote:
>Imagine using observed timing to conclude that your agent provocateur
>operates from geostationary orbit.

...And here I thought VALIS was all in his head...

Cheers,
RAH

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Timing Paranoia

2004-12-09 Thread Roy M. Silvernail
R.A. Hettinga wrote:
At 10:16 PM -0500 12/9/04, Roy M. Silvernail wrote:
 

Imagine using observed timing to conclude that your agent provocateur
operates from geostationary orbit.
   

...And here I thought VALIS was all in his head...
 

Right idea, wrong book.
R. W. "Bob" is the frog on Detweiller's shoulder.
--
Roy M. Silvernail is [EMAIL PROTECTED], and you're not
"It's just this little chromium switch, here." - TFT
SpamAssassin->procmail->/dev/null->bliss
http://www.rant-central.com


tangled contexts

2004-12-09 Thread R.W. (Bob) Erickson
Process and perception

This capacity for making high order discriminations about relationships 
between objects in our world, can be taken as the proper function of our 
cognitive competency. The attribute of intentionality, to this way of 
thinking, is best understood as "work product" of a discrete sub-module 
of our brain.

We infer agency from our observations. What is agency? Well first and 
foremost, it is that which is recognizable to the competencies in 
process, that form these judgments.

Does this sound circular? Surely it is circular in a crucial sense. All 
that we "know" comes to our attention as the work product of process in 
various competencies. Ultimately the "authority" of  these high order 
discriminations comes not from a judgment about the correlation between 
our perceptions and the state of the "objective" world, but instead from 
their immediacy. This is to say that we do not perceive and then make 
judgments, our first awareness of every "thing"  is located in the 
moment that the competent module forms some thing out of the possibilities.

These awareness's are not in the semantic domain. Our knowing of 
particular attributes precedes the semantic transform that tags and 
packages up insights, for storage and shipping. We know what we know and 
we apologize for not being able to convey this knowing more effectively.

That we are able to communicate at all, is a testament to the power of 
trial and error and the phenomenal similarity of our minds. This 
similarity is not accidental. Even as each person is an absolutely 
unique instance of humanity, what we are, is the embodiment of a 
phenomenally complex tangle of historical accomplishments that is  
fundamentally common to us all.

Creativity emerges via the capacity/ability to merge contexts

Biological instrumentality:
The complex objects of our knowings come to our awareness as 
circumstances demand, literally selected by their features. Apprehension 
of the world via a sophisticatedly evolved biological instrumentality is 
an entropy hack. Life is the opportunistic bloom of a viral exploitation 
of regularity in the universe.


In the beginning there was sequence, and it begat pattern and context 
space. Within every context space there is a tree of combinatorial 
consequences some leaves of which are potentially lucky. Blind evolution 
isn't trial and error testing of mistakes (mutations), it is the random 
testing of legal combinations


So who set up the game, where did the rules come from, and the design 
language?


The dynamic core of our consciousness consists of transient alignments 
of Feature Value - Action loops that compete for selection in a 
flicker-dance-sort of associations and sensory stimuli.




Perception is a physics hack. Timing is everything. Three dimensionality 
is accessible to us via  a cross mapping within the temporal manifold. 
Propagation of coherent correlations between map-mapped sheets of 
neurons act as a massively parallel delay line with multiple taps. 
Because both spatial and temporal coherence is preserved, the network 
sorts up the objects of perception and tracks them real time. Reality is 
best fit. Misperceptions happen, but its better than being blind.


Our competency at this is not postulated, it is stipulated that the high 
order discriminations we perceive as qualia are exactly as amazing as 
the incredible complexity of the neurological stack that gives us them.

Intentionality is an emergent design goal in secondary consciousness.
(before getting upset about intentional language, remember that it works 
because reality fits.)



Phenomenal transform is a semantic label for a context shift. If you 
insist on thinking of it as a happening, what's happening is that we 
find ourselves switching lexicons when we discuss certain things. Its 
not a description of a change of state in the object, it is a handle for 
referring to a pragmatic feature of discourse about it.


The important thing to realize is that this sorting out of the features 
of the objects of our perception usually is done before we are aware of 
the process, but this does not mean that the process is different for 
hard discriminations, just that they are taking longer than the ~400ms 
self context loop, that feeds a product of the net's immediate state 
back into itself. Think convolving and converging. Discrimination occurs 
opportunistically, our competencies do not require conscious attention. 
In the formation of PV Action loops each project become one of the 
factions in our interior parliament.


We have lots of timing to tap. Response times, flicker fusion times, 
saccades, pulse, peristalsis, menstruation. The royal road to cognitive 
illumination is the path of chronus.

--bob
"me, I'm just a lawn mower"



Re: Timing Paranoia

2004-12-09 Thread R.W. (Bob) Erickson
Roy M. Silvernail wrote:
R.A. Hettinga wrote:
At 10:16 PM -0500 12/9/04, Roy M. Silvernail wrote:
 

Imagine using observed timing to conclude that your agent provocateur
operates from geostationary orbit.
  

...And here I thought VALIS was all in his head...
 

Right idea, wrong book.
R. W. "Bob" is the frog on Detweiller's shoulder.
Tim would bake them
John word salads
While Bobrah sells tickets
to a geodesic  fantasyland
Detweiler mourns with Vulis,
Choate and Sunder trade insults
While Art and CJ make licences
in an authoritarian nightmare
me, I'm just a lawn mower


Re: punkly current events

2004-12-09 Thread Joseph Ashwood
- Original Message - 
From: "Major Variola (ret)" <[EMAIL PROTECTED]>
Subject: punkly current events


If the Klan doesn't have
a right to wear pillowcases what makes you think mixmaster will
survive?
Well besides the misinterprettaion of the ruling, which I will ignore, what 
makes you think MixMaster isn't already dead?

MixMaster is only being used by a small percentage of individuals. Those 
individuals like to claim that everyone should send everything anonymously, 
when in truth communication cannot happen with anonymity, and trust cannot 
be built anonymously. This leaves MixMaster as only being useful for a small 
percentage of normal people, and those using it to prevent being identified 
as they communicate with other known individuals.

The result of this is rather the opposite of what MixMaster is supposed to 
create. A small group to investigate for any actions which are illegal, or 
deemed worth investigating. In fact it is arguable that for a new face in 
action it is probably easier to get away with the actions in question to 
send the information in the clear to their compatriots than it is to use 
MixMaster, simply because being a part of the group using MixMaster 
immediately flags them, as potential problems.

In short, except for those few people who have some use for MixMaster, 
MixMaster was stillborn. I'm not arguing whether such a situation should be 
the correct way things happened, but that is the way things happened.
   Joe 



[p2p-hackers] Automatic reputation systems for P2P security? (fwd from [EMAIL PROTECTED])

2004-12-09 Thread Eugen Leitl
- Forwarded message from [EMAIL PROTECTED] -

From: [EMAIL PROTECTED]
Date: Wed, 08 Dec 2004 19:42:50 -0500
To: [EMAIL PROTECTED]
Subject: [p2p-hackers] Automatic reputation systems for P2P security?
X-mailer: Pegasus Mail for Windows (v4.12a)
Reply-To: "Peer-to-peer development." <[EMAIL PROTECTED]>

I've seen several papers referencing advogato, among other things, and it seems 
like reputation/trust systems solve a lot of problems related to P2P 
misbehavior. For 
instance, clients can track other clients that send out bogus files, that 
report a file 
and then refuse to share it, that create bogus queueing data (big problem with 
Emule/Edonkey networks), that might outright lie or otherwise cheat/steal and 
attempt to disrupt a Chord network, etc.

It seems that scalar trust systems aren't going to do it because it is fairly 
easy to 
cheat by creating fake nodes, etc. So the real trick is the "group" or vector 
trust 
metrics.

However, that may solve the theoretical issue but I haven't seen any real 
examples 
of implementation. For instance, most of the papers referring to Advogato and 
Advogato-like systems are based on the client-server model. And to implement 
trust 
networks as it appears that they are done now, the shear amount of data 
necessary 
makes them pretty darned unwieldy.

In addition, it is relatively well known (but time/bandwidth consuming) for a 
node to 
detect misbehaving nodes. But translating that to a trust metric, or even how 
to 
handle that on an implementation level has not been published anywhere.

SO...is there anything out there on this sort of idea, especially on the 
implementation side? I mean...if this can be done in reality, then it has a 
whole host 
of uses even just in the small world of file sharing networks. As it stands, 
any trust 
metric that's been tried so far is easily tampered with by the clients.

___
p2p-hackers mailing list
[EMAIL PROTECTED]
http://zgp.org/mailman/listinfo/p2p-hackers
___
Here is a web page listing P2P Conferences:
http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpdmB5xv3Axr.pgp
Description: PGP signature


failure delivery

2004-12-09 Thread MAILER-DAEMON
Message from  yahoo.com.
Unable to deliver message to the following address(es).

<[EMAIL PROTECTED]>:
217.12.1.71 does not like recipient.
Remote host said: 550 5.1.1 <[EMAIL PROTECTED]>... User unknown
Giving up on 217.12.1.71.

--- Original message follows.

Return-Path: <[EMAIL PROTECTED]>

The original message is over 5k.  Message truncated to 1K.

X-Rocket-Spam: 81.53.243.120
X-YahooFilteredBulk: 81.53.243.120
X-Rocket-Track: 40: 20 ; SFLAG=OPENRELAY ; IPCR=g-w0,n0,g100 ; IP=81.53.243.120 
; SERVER=216.155.197.136
Authentication-Results: mta218.mail.dcn.yahoo.com
  from=minder.net; domainkeys=neutral (no sig)
X-Originating-IP: [81.53.243.120]
Return-Path: <[EMAIL PROTECTED]>
Received: from 81.53.243.120  (HELO dbmxknl.net) (81.53.243.120)
  by mta218.mail.dcn.yahoo.com with SMTP; Thu, 09 Dec 2004 02:34:42 -0800
From: [EMAIL PROTECTED]
Date: Thu, 09 Dec 2004 09:11:52 GMT
Subject: Oh God it's
Importance: Normal
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
Message-ID: <[EMAIL PROTECTED]>
MIME-Version: 1.0
Content-Type: multipart/mixed; 
 boundary="=5e814d1a6b7a8.d"
Content-Transfer-Encoding: 7bit
This is a multi-part message in MIME format.

--=5e814d1a6b7a8.d

I was surprised, too!
Who_could_suspect_something_like_that? shityi
--=5e814d1a6b7a8.d
Content-Type: application/octet-stream; name=im_shocked_1415.xls.com
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="im_shocked_1415.xls.com"

TVqQAAME//8
*** MESSAGE TRUNCATED ***



Blinky Rides Again: RCMP suspect al-Qaida messages

2004-12-09 Thread R.A. Hettinga
Lions and Tigers and Steganography, Nell...

For those of you without a program, here is the new, official, Horsemen of
the Infocalypse Scorecard:

At 3:14 PM -0400 10/3/04, R. A. Hettinga wrote:
>   Horseman Color  Character   Nickname
>
>1  TerrorismRedShadow  "Blinky"
>2  NarcoticsPink   Speedy  "Pinky"
>3  Money Laundering Aqua   Bashful "Inky"
>4  Paedophilia  Yellow Pokey   "Clyde"

Cheers,
RAH
---


 December 8, 2004

 RCMP suspect al-Qaida messages
By JIM BRONSKILL

 OTTAWA (CP) - The RCMP has warned its investigators to be on the lookout
for cleverly disguised messages embedded by al-Qaida in digital files
police seize from terror suspects.

 An internal report obtained by The Canadian Press gives credence to the
long-rumoured possibility Osama bin Laden's terrorist network and other
extremist groups are using a technique known as steganography to hide the
existence of sensitive communications.

 Steganography, from the Greek word stegos, meaning covered, and graphie,
or writing, involves concealing a secret message or image within an
apparently innocuous one.

 For instance, a seemingly innocent digital photo of a dog could be
doctored to contain a picture of an explosive device or hidden wording.

 "Investigators in the course of their work on terrorist organizations and
their members, including al-Qaida and affiliated groups, need to consider
the possible use of steganography and seek to identify when steganography
is known or suspected of being used," the report says.

 It recommends investigators consult the RCMP's technological crime program
for assistance, including "comprehensive forensic examinations" of seized
digital media.

 A heavily edited copy of the January 2004 report, Computer-assisted and
Digital Steganography: Use by Al-Qaida and Affiliated Terrorist
Organizations, was recently obtained from the Mounties under the Access to
Information Act.

 Among the material stripped from the document is information on how best
to detect, extract and view surreptitious messages.

 Steganography dates to before 400 B.C. The ancient Greeks hid messages in
wax tablets, while invisible inks have long been used to convey secrets.

 Simple computer-assisted steganography helps apply such traditional
methods in an electronic environment, the report notes. The messages may
also be scrambled using cryptography to prevent them falling into the wrong
hands.

 The RCMP seems especially concerned, however, about digital steganography
- the use of special computer programs to embed messages.

 "There now exist nearly 200 software packages which perform digital
steganography," the report says.

 A limited number of publicly available software tools are designed to
detect the use of steganography, but the "success rate of these tools is
questionable," the RCMP adds.

 Some only detect the use of specific software, while others are useful for
scouring only certain types of files in which the secret message may be
hidden.

 There have been numerous media reports in recent years that terrorist
groups, including al-Qaida, were using steganographic techniques.

 The phenomenon is "deeply troubling," said David Harris, a former Canadian
Security Intelligence Service officer now with Ottawa-based Insignis
Strategic Research.

 He suggested any delay in detecting disguised messages could be disastrous.

 "We're talking very often about time-sensitive issues: where is the bomb?
Who's operating in connection with whom?" he said.

 "On that kind of basis, this is really, really disturbing as a development."

 Harris also questioned whether western security agencies have sufficient
personnel and resources to uncover the messages.



-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Tried e dating?

2004-12-09 Thread Isaiah Kraft
Hello,

Someone in your area wants to meet you!

Fill out a quick profile form and get access to
1,000's of potential dates in your area.


http://www.timedaction.com/creative1/index.html



Isaiah





http://www.timedaction.com/creative1/remove.php


upbeat playmate bedraggle cornstarch altruism
fontainebleau fundamental nab chock bespectacled
dewitt platonic psychotherapeutic stride hewn



Choose from these Six Great Free offers

2004-12-09 Thread FGD







 
 

 


 


 
 

 
Business Cards

 


 
Great Value!

 



 
 
Calendar Magnets

 


 
10 Reg. $12.99
  Now FREE

 



 
 
Return Address Labels

 


 
140 Reg. 
$7.99
  Now FREE

 




 
 
 
Invitations

 


 
10 Reg. $7.99
  Now FREE

 



 
 
Thank You Cards

 


 
10 Reg. $7.99
  Now FREE

 



 
 
Design Services

 


 
Great Value!

 




 


 


 
This incredible promotion 
allows you to sample some of our products and services for free. 
It's simple. Order in December and you get them free. If you 
need more later, reordering is fast, easy and inexpensive! You'll 
already know the kind of quality that you can expect.






 


 
Offer expires December 
31, 2004. Shipping and handling, product upgrades and 
photo/logo uploads not included. Not valid on previous 
purchases. Free offers may not be combined with any other 
discounts or promotions, and free design services may 
not be combined with any other free offer. Free Design 
Services and Free Business Card offers currently have 
no expiration date. Each free offer item subject to full 
shipping and handling charges for single item purchases. 









 
If you do 
not want to receive e-mails concerning VistaPrint products, please 
submit your e-mail address by clicking here to UNSUBSCRIBE from our database. 



VistaPrint 
provides the highest quality, full-color graphic design and printing 
at the lowest prices!
VistaPrint has served more than 4,000,000 customers worldwide.

 
The products 
and services described in this e-mail are provided by VistaPrint Limited, 
the international leader for webtop graphic design and printing. United 
States customers may contact us in care of our U.S. subsidiary: 
VistaPrint USA Incorporated, 100 Hayden Avenue, Lexington, MA 02421ppp=51513








TM: <12;1Zom6ChJ9h4ozr-6h46Fb;18593029>





bro - you are the man

2004-12-09 Thread Tania Quintero
fed up of suffering for nothing

V.1-C^O*D.1-N  75O  m.gg

3o  P|L|S  169.oO
6O  PIllS  245.95
9O  P|||S  319.oo

0.r.d.e.r quickly :  http://ohmybackhurts.com/indexv.shtml?aa5163

Same Day Sh1pp1ng







To Stop : http://ohmybackhurts.com/please

check out

Kirsten English
Engraver
Protein'eXpert, Grenoble, 38027, France
Phone: 391-626-1781
Mobile: 618-712-7913
Email: [EMAIL PROTECTED]

THIS IS AN AUTO-GENERATED MESSAGE - PLEASE DO NOT REPLY TO THIS MESSAGE

This software is a 80 day usage download

NOTES:
The contents of this paper is for usage and should not be certitude lisle

argonaut manumitted berman

Time: Thu, 09 Dec 2004 17:47:37 +0200




SEC Probes Firms That Gather Data on Who Owns What Shares

2004-12-09 Thread R.A. Hettinga


The Wall Street Journal


 December 8, 2004

 PAGE ONE


Tracking Stocks
 SEC Probes Firms That Gather
 Data on Who Owns What Shares
Its Question: Have They Paid
 Custodian Banks' Staffers
 To Give Up Information?
Free Steaks and Game Tickets

By SUSAN PULLIAM
Staff Reporter of THE WALL STREET JOURNAL
December 8, 2004; Page A1


A back-office clerk at CIBC Mellon Trust Co. was filling in for a colleague
this summer when she got an unusual e-mail. The sender wanted data about
which of the big investors the company dealt with owned a particular stock
-- information the clerk knew was supposed to be top secret.

The employee refused to provide the data. An internal probe concluded that
the clerk she was filling in for had for years been giving out data on
stockholdings, according to people close to the situation. They say the
probe found that in return, this clerk got baseball and hockey tickets and
cash payments of $50 to $100 per tip. The people add that a separate
internal probe found that four employees of Mellon Financial Corp. had
received Pittsburgh Pirates tickets, $50 American Express gift certificates
and boxes of steaks for such data.

The incident offers a window into a secret Wall Street world of gathering
and selling real-time data about big investors' stock trading. This
information, which is generally confidential, is so valuable that a whole
industry has sprung up around finding it out. Businesses known as
stock-surveillance firms gather trading data as best they can and market it
to corporations that are curious about who is buying and selling their
shares.

Because small bits of trading data can be gleaned through legitimate
sources, the business model is perfectly legal. But there's the potential
for stock-surveillance firms to veer off the legal track if they use
improper means to find out who is buying or selling what. There's also the
potential for illegal insider trading if the information falls into the
hands of investors who use it in their trading.

Now the Securities and Exchange Commission is investigating the
stock-surveillance business, sending out subpoenas to several data firms,
according to people close to the situation. Among issues the SEC is looking
into: Whether, at banks that act as custodians of stock during the trading
process, some back-office workers systematically received gratuities for
leaking data. The SEC also wants to know whether any trading data may have
been turned over to investors and led to insider trading.

SEC enforcement chief Stephen Cutler said, "As a general matter, we are
interested in whether confidential portfolio information has been leaked at
any point along the chain." A person close to the situation said the SEC
probe focuses on possible data leaks as far back as 2000.

The CIBC Mellon Trust case helped spur the SEC's enforcement division to
action, people familiar with the matter say. The trust, based in Toronto,
is a joint venture of Canadian Imperial Bank of Commerce and Pittsburgh's
Mellon Financial. A spokeswoman for CIBC Mellon said it has taken steps to
correct the problem uncovered by the joint venture's internal
investigation. A spokesman for Mellon Financial said that regulators were
notified quickly after the problem emerged, adding that Mellon "regrets the
unauthorized disclosure of custodial information" and was "very proactive"
in informing clients. A spokesman for CIBC said it doesn't carry out
custodial activities in the U.S. but declined to comment further.

The joint-venture employee who the probe concluded had been giving out data
for years was Yvonne Williams, say people close to the situation. She was
fired in July after the venture's internal investigation. Ms. Williams
couldn't be reached for comment. Three of the four Mellon Financial
employees cited in a Mellon probe also have been dismissed. No employees
have been charged with anything.

Among firms subpoenaed in the SEC's investigation, say people familiar with
the matter, is Thomson Financial, a unit of Thomson Corp. of Toronto.
Thomson Financial's Capital Markets Intelligence unit is one of the largest
stock-surveillance firms. The unit told its employees this week that one
CMI executive had left after an internal probe found business practices
conflicting with its code of conduct, say people close to the situation.
They add that at least two other employees are expected to depart.

Thomson wouldn't comment on the probe but said it has taken steps to
correct problems. "We take any allegation of impropriety or wrongdoing
seriously and will not tolerate any such behavior," said a spokesman. He
added that Thomson provides the trading data it gathers only to its
corporate clients and their agents.

Also receiving subpoenas, according to people familiar with the SEC probe,
are Ilios Partners; the Georgeson Shareholder Communications Inc. unit of
Computershare Ltd.; and Miller Tabak & Co., an institu

Horseman #3, "Inky": Money Laundering in America

2004-12-09 Thread R.A. Hettinga



MND COMMENTARY
- Jim Kouri - MensNewsDaily.com

Money Laundering in America


 December 7, 2004
 by Jim Kouri


 Federal law enforcement officials estimate that between $100 billion and
$300 billion is laundered in this country each year. While illegal drug
trafficking accounts for much of the funds being laundered, other criminal
activities, including terrorism and tax evasion, also account for an
extensive amount. In the past two decades, federal law enforcement efforts
to combat money laundering have focused on requiring financial institutions
to report currency transactions that exceed $10,000.

 Beginning in 1988, these reports have been supplemented by reports of
suspicious transactions. Many of the transactions reported as suspicious
involve individuals who appear to be attempting to avoid the $10,000
reporting requirement. However, any activity that deviates from the norm
for a particular account can be considered suspicious. The Right to
Financial Privacy Act, enacted in 1978, raised questions as to whether
financial institutions were authorized to report suspicious transactions.
To address these concerns, legislation has been enacted to provide
protection against civil liability for institutions reporting suspicious
transactions. Banks and other financial institutions report tens of
thousands of suspicious transactions each year. The reports have led to the
initiation of major investigations into various types of criminal activity.

 However, because there is no overall control or coordination of the
reports, there is no way of ensuring that the information is being used to
its full potential. Financial institutions report suspicious transactions
on a variety of different forms that provide different types of information
and that are filed with different law enforcement and regulatory agencies.
The form that is filed most frequently is filed with the Internal Revenue
Service (IRS) and kept on a centralized database. However, the form does
not contain any information describing the suspicious activity that would
allow law enforcement agencies to evaluate the usefulness of the
information on the basis of the form alone.

 Moreover, some institutions have been filing these forms erroneously. IRS
and other federal and state law enforcement agencies use the database on a
reactive basis; that is, to provide additional information on an
investigation that has already been initiated. Other forms used to report
suspicious transactions do describe the activity so that the information
can be evaluated. However, these forms are filed with six different federal
financial regulatory agencies. Because the forms are not maintained on a
centralized database, they are not used on a reactive basis. Financial
institutions filing this form are required to send a copy of it to the
nearest district office of IRS' Criminal Investigation Division.

 However, IRS has not developed any guidance or directives as to how the
information is to be managed as an intelligence resource. Use of the
reports to initiate investigations varies among the 35 district offices.
The Government Accounting Office identified 15 states that receive copies
of suspicious transaction reports filed on one or both of these two-forms.
Nine of these states told GAO that they use the information to initiate
criminal investigations. The Department of the Treasury, the financial
regulatory agencies, and IRS have recently agreed to substantial changes
regarding how suspicious transactions are to be reported and how the
information is to be used. These proposals, which were made with input from
the financial community, have the potential for significantly improving the
contribution that suspicious transaction reports make to law enforcement at
both the federal and state levels.

 The IRS does not have agencywide policies or procedures for managing
suspicious transaction reports. Consequently, the extent to which special
agents in the 35 CID district offices solicit, process, and evaluate the
reports is up to the discretion of the district CID chief and varies
significantly among districts. The percentage of investigations initiated
on the basis of suspicious transaction reports also varies significantly
among districts.

 >From October 1990 to June 1994 CID initiated 21,507 investigations
nationwide. About 4 percent of the cases were initiated as a result of a
suspicious transaction report. Among the district offices, however, the
percentage varied from 0 to over 18 percent. GAO believes that the varying
rates are an indication that use of the reports may not be emphasized to
the same extent among the districts.

 Sources: US Department of Justice, US Department of the Treasury and
National Security Institute

 Jim Kouri


 DISCUSS THIS ARTICLE IN THE FORUM!

Jim Kouri, CPP is currently fifth vice-president of the National
Association of Chiefs of Police. He's former chief at a New York

Re: primes as far as the eye can see, discrete continua

2004-12-09 Thread Tyler Durden
So the obvious question is, does this speed up the cracking capabilities of 
computers? On the surface, I'd say no, but then again I'm no computational 
science expert. (I say no because any of the primes used in X-bitlength 
encryption are already known, and these strings of primes aren't going to be 
used any more frequently than any random batch of primes.)

-TD
From: "Major Variola (ret)" <[EMAIL PROTECTED]>
To: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
Subject: Re: primes as far as the eye can see, discrete continua
Date: Wed, 08 Dec 2004 21:37:52 -0800
copied under fair use only because Roy put in the research...

NUMBER THEORY:
 Proof Promises Progress in Prime Progressions
 Barry Cipra
 The theorem that Ben Green and Terence Tao set out to prove would have
been impressive enough. Instead, the two
 mathematicians wound up with a stunning breakthrough in the theory of
prime numbers. At least that's the preliminary assessment
 of experts who are looking at their complicated 50-page proof.
 Green, who is currently at the Pacific Institute for the Mathematical
Sciences in Vancouver, British Columbia, and Tao of the
 University of California (UC), Los Angeles, began working 2 years ago
on the problem of arithmetic progressions of primes:
 sequences of primes (numbers divisible only by themselves and 1) that
differ by a constant amount. One such sequence is 13,
 43, 73, and 103, which differ by 30.
 In 1939, Dutch mathematician Johannes van der Corput proved that there
are an infinite number of arithmetic progressions of
 primes with three terms, such as 3, 5, 7 or 31, 37, 43. Green and Tao
hoped to prove the same result for four-term
 progressions. The theorem they got, though, proved the result for prime
progressions of all lengths.
 "It's a very, very spectacular achievement," says Green's former
adviser, Timothy Gowers of the University of Cambridge, who
 received the 1998 Fields Medal, the mathematics equivalent of the Nobel
Prize, for work on related problems. Ronald Graham, a combinatorialist
at UC San Diego,
 agrees. "It's just amazing," he says. "It's such a big jump from what
came before."
 Green and Tao started with a 1975 theorem by Endre Szemeridi of the
Hungarian Academy of Sciences. Szemeridi proved that arithmetic
progressions of all
 lengths crop up in any positive fraction of the integers--basically,
any subset of integers whose ratio to the whole set doesn't dwindle away
to zero as the numbers get
 larger and larger. The primes don't qualify, because they thin out too
rapidly with increasing size. So Green and Tao set out to show that
Szemeridi's theorem still
 holds when the integers are replaced with a smaller set of numbers with
special properties, and then to prove that the primes constitute a
positive fraction of that set.
   Prime suspect. Arithmetic
progressions such as this 10-prime sequence are infinitely abundant, if
a new proof
   holds up.
 To build their set, they applied a branch of mathematics known as
ergodic theory (loosely speaking, a theory of mixing or averaging) to
mathematical objects called
 pseudorandom numbers. Pseudorandom numbers are not truly random,
because they are generated by rules, but they behave as random numbers
do for certain
 mathematical purposes. Using these tools, Green and Tao constructed a
pseudorandom set of primes and "almost primes," numbers with relatively
few prime
 factors compared to their size.
 The last step, establishing the primes as a positive fraction of their
pseudorandom set, proved elusive. Then Andrew Granville, a number
theorist at the University of
 Montreal, pointed Green to some results by Dan Goldston of San Jose
State University in California and Cem Yildirim of Bo_gazigi University
in Istanbul, Turkey.
 Goldston and Yildirim had developed techniques for studying the size of
gaps between primes, work that culminated last year in a dramatic
breakthrough in the
 subject--or so they thought. Closer inspection, by Granville among
others, undercut their main result (Science, 4 April 2003, p. 32; 16 May
2003, p. 1066),
 although Goldston and Yildirim have since salvaged a less far-ranging
finding. But some of the mathematical machinery that these two had set
up proved to be
 tailor-made for Green and Tao's research. "They had actually proven
exactly what we needed," Tao says.
 The paper, which has been submitted to the Annals of Mathematics, is
many months from acceptance. "The problem with a quick assessment of it
is that it
 straddles two areas," Granville says. "All of the number theorists
who've looked at it feel that the number-theory half is pretty simple
and the ergodic theory is
 daunting, and the ergodic theorists who've looked at it have thought
that the ergodic theory is pretty simple and the number theory is
daunting."
 Even if a mistake does show up, Granville says, "they've certainly
succeeded in bringing in new ideas of real import into the sub

Re: "Word" Of the Subgenius...

2004-12-09 Thread Tyler Durden
If you think those are anarchist ideas, you've missed the
main ideas about anarchy and anarcho-capitalism and such.
Anarchism isn't about getting rid of the _current_ people in charge,
it's about getting rid of _having_ people be in charge.
Well, May seemed to try to make the case that all of those "useles eaters" 
were in large part responsible for the very existence of the state, and that 
collapse of the state meant the inevitable downfall of huge numbers of 
minorities (why he focused on them as opposed to white trailer trash I don't 
know).

But he was definitely advocating that racist viewpoints fall naturally out 
of a crypto-anarchic approach.

-TD



War Classics 50 Movie DVD Collection

2004-12-09 Thread HotQualityDeals

War Classics 50 Movie DVD Collection

Copy and Paste the following URL into your Browser to Learn More:
http://mx16.hotqualitydeals.com/cgi-bin/clickthru?c=220&m=1289&e=563647

Featuring:

RONALD REAGAN
Sidney Poitier
Chuck Connors 
Goddard
Sir John Gielgud

Limited Production Run
Building your DVD Collection 
Excellent Value - 60 Cents per movie 
Digitally Remastered for DVD 
ALL Full-Length Feature Films 
First Time Available in DVD Format 
Over 70 Hours of Movies 
See Complete Movie List 

Copy and Paste the following URL into your Browser to Learn More:
http://mx16.hotqualitydeals.com/cgi-bin/clickthru?c=220&m=1289&e=563647

http://mx16.hotqualitydeals.com/cgi-bin/clickthru?c=220&m=1289&e=563647

Remove yourself from any future advertisers emails here   
http://www.dnelist.com/u/eef2a6e9192441e0eafd5ccd68046000339

Please use this link to Remove yourself from future HotQualityDeals 
mailing lists. http://mx16.hotqualitydeals.com/cgi-bin/unsub.cgi?m=1289&e=563647

You can also unsubscribe from our database by writing 
us a letter using the following adress. Please be sure 
to let us know what your email address is, and we 
will promptly remove you from any future mailings.

Customer Service Representative
Ladysmith, B.C. Canada, V9G1B3
Box #1687



RE: Blinky Rides Again: RCMP suspect al-Qaida messages

2004-12-09 Thread Tyler Durden
What a fuckin' joke. You mean they're only now realizing that Al-Qaeda could 
use stego? Do they think they're stupid?

Nah...certainly the NSA are fully prepared to handle this. I doubt it's much 
of a development at all to those in the know.

-TD
From: "R.A. Hettinga" <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED], [EMAIL PROTECTED], 
[EMAIL PROTECTED]
Subject: Blinky Rides Again: RCMP suspect al-Qaida messages
Date: Thu, 9 Dec 2004 09:14:41 -0500

Lions and Tigers and Steganography, Nell...
For those of you without a program, here is the new, official, Horsemen of
the Infocalypse Scorecard:
At 3:14 PM -0400 10/3/04, R. A. Hettinga wrote:
>   Horseman Color  Character   Nickname
>
>1  TerrorismRedShadow  "Blinky"
>2  NarcoticsPink   Speedy  "Pinky"
>3  Money Laundering Aqua   Bashful "Inky"
>4  Paedophilia  Yellow Pokey   "Clyde"
Cheers,
RAH
---

 December 8, 2004
 RCMP suspect al-Qaida messages
By JIM BRONSKILL
 OTTAWA (CP) - The RCMP has warned its investigators to be on the lookout
for cleverly disguised messages embedded by al-Qaida in digital files
police seize from terror suspects.
 An internal report obtained by The Canadian Press gives credence to the
long-rumoured possibility Osama bin Laden's terrorist network and other
extremist groups are using a technique known as steganography to hide the
existence of sensitive communications.
 Steganography, from the Greek word stegos, meaning covered, and graphie,
or writing, involves concealing a secret message or image within an
apparently innocuous one.
 For instance, a seemingly innocent digital photo of a dog could be
doctored to contain a picture of an explosive device or hidden wording.
 "Investigators in the course of their work on terrorist organizations and
their members, including al-Qaida and affiliated groups, need to consider
the possible use of steganography and seek to identify when steganography
is known or suspected of being used," the report says.
 It recommends investigators consult the RCMP's technological crime 
program
for assistance, including "comprehensive forensic examinations" of seized
digital media.

 A heavily edited copy of the January 2004 report, Computer-assisted and
Digital Steganography: Use by Al-Qaida and Affiliated Terrorist
Organizations, was recently obtained from the Mounties under the Access to
Information Act.
 Among the material stripped from the document is information on how best
to detect, extract and view surreptitious messages.
 Steganography dates to before 400 B.C. The ancient Greeks hid messages in
wax tablets, while invisible inks have long been used to convey secrets.
 Simple computer-assisted steganography helps apply such traditional
methods in an electronic environment, the report notes. The messages may
also be scrambled using cryptography to prevent them falling into the wrong
hands.
 The RCMP seems especially concerned, however, about digital steganography
- the use of special computer programs to embed messages.
 "There now exist nearly 200 software packages which perform digital
steganography," the report says.
 A limited number of publicly available software tools are designed to
detect the use of steganography, but the "success rate of these tools is
questionable," the RCMP adds.
 Some only detect the use of specific software, while others are useful 
for
scouring only certain types of files in which the secret message may be
hidden.

 There have been numerous media reports in recent years that terrorist
groups, including al-Qaida, were using steganographic techniques.
 The phenomenon is "deeply troubling," said David Harris, a former 
Canadian
Security Intelligence Service officer now with Ottawa-based Insignis
Strategic Research.

 He suggested any delay in detecting disguised messages could be 
disastrous.

 "We're talking very often about time-sensitive issues: where is the bomb?
Who's operating in connection with whom?" he said.
 "On that kind of basis, this is really, really disturbing as a 
development."

 Harris also questioned whether western security agencies have sufficient
personnel and resources to uncover the messages.

--
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Australian snooping laws pass lower house

2004-12-09 Thread R.A. Hettinga


Australian IT

Snooping laws pass lower house

DECEMBER 09, 2004

POLICE will be able to access stored voice mail, email and mobile phone
text messages under new laws passed by federal parliament today.

The laws recognise voice mail, email and SMS messages should fall outside
telecommunication interception laws originally designed to stop law
enforcement agencies from intercepting phone calls.

 Police and other law enforcement officers will still need a search warrant
or a right of access to communications or storage equipment to access voice
mail, email and SMS under the changes.

 "These amendments make it easier for our law enforcement and regulatory
agencies to access stored communications that could provide evidence of
criminal activity," Attorney-General Philip Ruddock said.

 "They will also assist in securing information systems by allowing network
administrators to review stored communications for viruses and other
inappropriate content."

 Labor referred the proposed law to a Senate committee three times before
agreeing to it today.

 Opposition homeland security spokesman Robert McClelland said there needed
to be a distinction between stored messages and live telephone
conversations.

 "There have been concerns expressed about privacy and there always has
been a distinction between an eavesdropper and the reader of other people's
correspondence," he said.

 "But written documents have always been susceptible to legal process, to
warrants.

 "Everyone that creates a document does so knowing that that document can
be read by others and can be subject to legal process.

 "I don't think anything turns on the fact the document is written on a
computer and sent by email as opposed to being written in long hand and
popped in the letter box."

 The laws are a temporary measure and will cease to have effect after 12
months when a review of the measures will be undertaken.

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



export regulations updated

2004-12-09 Thread R.A. Hettinga

--- begin forwarded text


Delivered-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: export regulations updated
From: "Perry E. Metzger" <[EMAIL PROTECTED]>
Date: Thu, 09 Dec 2004 11:32:59 -0500
Sender: [EMAIL PROTECTED]


Cryptome just published some updates to the crypto export regulations:

http://cryptome.org/bis120904.txt

Perry

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

--- end forwarded text


-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Horseman number 4: 'Paedophiles Pose Greatest Threat Facing Internet'

2004-12-09 Thread R.A. Hettinga
Okay, so it's a trifecta, today...

:-)

Cheers,
RAH
---


print
  

Wed 8 Dec 2004

4:51pm (UK)
'Paedophiles Pose Greatest Threat Facing Internet'

By David Barrett, PA Home Affairs Correspondent


 Online paedophiles are the greatest threat facing the internet, government
research said today.

 A variety of internet child porn issues dominated a "top 10" of criminal
threats posed by new technology, a Home Office report revealed.

 The survey of 53 internet and technology experts saw seven different child
porn concerns ranked in the 10 most serious "netcrime" threats, with
grooming and possible stalking of children ranked as the top fear.

 In second place was the growing use of the internet for espionage by
corporate spies.

 Out of a total of 101 crime issues in the league table compiled by the
survey, 12 related to child porn.

 The top 10 rankings were:-

 1. Increased online grooming and possible stalking using the internet.

 2. Espionage by corporate spies.

 3. Increased access to paedophile content sold by organised criminals
through various online platforms.

 4. Use of online storage for paedophile images to bypass seizure of home
computers.

 5. Use of secure "peer to peer" technology for all types of paedophile
activity.

 6. Use of encryption for secure access to paedophile networks.

 7. Theft of personal digital assistants or mobile phones containing
personal information to commit fraud on the internet.

 8. Growing access to "real-time" child abuse on the web.

 9. Use of "peer to peer" technology for pirate activity.

 10. Grooming of children for abuse using advanced mobile phone technology.

 The study, entitled "The Future of Netcrime Now", said police were already
working to combat internet child porn and the issue's high media profile
may have contributed to its prominent place in the poll.

 "The Government, law enforcement and industry needs to 'gear up' their
capability to continuously look forward, attempting to identify new forms
of criminal technology misuse as soon as they emerge, or even before they
are seized upon by the criminal community," it concluded.

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



fresh-faces-singlez

2004-12-09 Thread National A. Culturally
Allow me :) Please :)
See exhibitionists strut their stuff
If you want to make an easy job seem mighty hard, just keep putting off doing 
it.

http://using.translaywoodantfeme-soletrader.com/dhw/
An artist is a creature driven by demons. He doesn't know why they choose 
him and he's usually too busy to wonder why.
merry xmas: 

http://one.translaywoodantfeme-soletrader.com/yap/
Sampai jumpa lagi
Adamson
993 5560124 ext 0325
__
"Be a sinner and sin strongly, but more strongly have faith and rejoice in 
Christ."


unique-art

2004-12-09 Thread Streamline K. Knitter
Ave! :)


I figured this would be right up your alley

Many a time from a bad beginning great friendships have sprung up.


 http://simply.braghalf-germanlaterigrade.com/csm/


Beauty is only skin deep, but it's a valuable asset if you're poor or haven't 
any sense.


happy new year: 

http://decided.elbowlengthsolid-silver.com/yap/


Zbogom
Workman, Sarah Caroline
185 2325566
__
 "No one can read with profit that which he cannot learn to read with pleasure."




d/\ting-camz

2004-12-09 Thread Thumb A. Endowment
Boo :)))


A great way to see if you're compatible before you meet'em

All great men are gifted with intuition. They know without reasoning or 
analysis, what they need to know.

 
 
 http://am.elbowlengthsolid-silver.com/dhw/


Remember: there are no small parts, only small actors.


call later: 

http://corps.nonadjectivaldiketo.com/yap/


Mee-na-gay
maddhukar
1 416 2365897
__
 "Idleness is many gathered miseries in one name."



all types of t00nz

2004-12-09 Thread Accommodations S. Looser
There's no earthly reason why you should remember me... :))
be prepared to see something quite unique here
If you cannot work with love but only with distaste, it is better that you 
should leave your work.
http://police.zoilismgestic.com/csm/
A woman's always younger than a man at equal years.
see u later: 

http://front.translaywoodantfeme-soletrader.com/xyp/
A deo
Liz Ashton
+1 58 212 6317285
__
"We have really everything in common with America nowadays, except, of course, 
language."



New Global Directory of OpenPGP Keys

2004-12-09 Thread Eugen Leitl

Link: http://slashdot.org/article.pl?sid=04/12/09/1446203
Posted by: michael, on 2004-12-09 15:50:00

   from the how-may-i-direct-your-call dept.
   Gemini writes "The [1]PGP company just announced a new type of
   [2]keyserver for all your OpenPGP keys. This server verifies (via
   mailback verification, like mailing lists) that the email address on
   the key actually reaches someone. Dead keys age off the server, and
   you can even remove keys if you forget the passphrase. In a classy
   move, they've included support for those parts of the OpenPGP standard
   that PGP doesn't use, but [3]GnuPG does."

   [4]Click Here 

References

   1. http://www.pgp.com/downloads/beta/globaldirectory/index.html
   2. http://keyserver-beta.pgp.com/
   3. http://www.gnupg.org/
   4. 
http://ads.osdn.com/?ad_id=5671&alloc_id=12342&site_id=1&request_id=2385427&op=click&page=%2farticle%2epl

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpyKa0R0l9l2.pgp
Description: PGP signature


RE: Blinky Rides Again: RCMP suspect al-Qaida messages

2004-12-09 Thread J.A. Terranson

On Thu, 9 Dec 2004, Tyler Durden wrote:

> What a fuckin' joke. You mean they're only now realizing that Al-Qaeda could
> use stego? Do they think they're stupid?
>
> Nah...certainly the NSA are fully prepared to handle this. I doubt it's much
> of a development at all to those in the know.
>
> -TD


As recently as two years ago, I had a classroom full of cops (mostly fedz
from various well-known alphabets) who knew *nothing* about stego.  And I
mean *NOTHING*.  They got a pretty shallow intro: here's a picture, and
here's the secret message inside it, followed by an hour of theory and
how-to's using the simplest of tools - every single one of them was just
blown away. Actually, that's not true - the Postal Inspectors were bored,
but everyone _else_ was floored.

While the various alphabets have had a few years to get up to speed, the
idea that they are still 99% ignorant does not surprise me in the least.

//Alif

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

 Civilization is in a tailspin - everything is backwards, everything is
upside down- doctors destroy health, psychiatrists destroy minds, lawyers
destroy justice, the major media destroy information, governments destroy
freedom and religions destroy spirituality - yet it is claimed to be
healthy, just, informed, free and spiritual. We live in a social system
whose community, wealth, love and life is derived from alienation,
poverty, self-hate and medical murder - yet we tell ourselves that it is
biologically and ecologically sustainable.

The Bush plan to screen whole US population for mental illness clearly
indicates that mental illness starts at the top.

Rev Dr Michael Ellner



[osint] Ex-Stasi Spy Chief Markus Wolf Hired By Homeland Security?

2004-12-09 Thread R.A. Hettinga

--- begin forwarded text


To: "Bruce Tefft" <[EMAIL PROTECTED]>
Thread-Index: AcTeFypjnXqh3PHmQpq2wCUI7SfIsQAANSaQ
From: "Bruce Tefft" <[EMAIL PROTECTED]>
Mailing-List: list [EMAIL PROTECTED]; contact [EMAIL PROTECTED]
Delivered-To: mailing list [EMAIL PROTECTED]
Date: Thu, 9 Dec 2004 12:53:57 -0500
Subject: [osint] Ex-Stasi Spy Chief Markus Wolf Hired By Homeland Security?
Reply-To: [EMAIL PROTECTED]


http://www.stevequayle.com/News.alert/04_Global/041209.Stasi.html

Ex-Stasi Spy Chief Markus Wolf Hired By Homeland Security?



Dec. 6, 2004
Alex Jones
Prison Planet

Political analyst Al Martin, who has in the past proven accurate in getting
ahead of the news curve, is reporting that Homeland Security have hired
former Stasi head, the 'Silver Fox' Markus Wolf.

Martin states, "Wolf is the man that effectively built the East German state
intelligence operation's internal directorate," Martin continues. "He turned
half the population into informants. That is his specialty, is taking a
population, constructing the various state divisions, mechanisms of control,
in order to organize informants within the population. That is his real
specialty. And that is precisely, as Primakov has intimated, why Wolf is
being brought in. The regime knows that once all of Patriot II is in law and
they begin working on Patriot III, they will then begin to establish the
internal mechanism to coordinate, as an official function of state, a system
of informants. Wolf's speciality was to turn East Germany into the greatest
and most efficient informant state ever created."

On a radio appearance earlier today Martin stated that the admission that
Wolf would be hired was made in a BBC radio interview given by the former
head of the KGB, General Yevgeni Primakov.

Martin had previously reported that Primakov had been hired as a consultant
by the US Department of Homeland Security to implement CAPPS II and the
national iD card system which he dubbed an 'internal passport'.

Sources close to Martin have told Alex Jones confidentially that the
appointment of Wolf was also confirmed by a US Congressman.

During his radio interview, Martin outlined the immediate agenda. The
remaining portions of the 9/11 Commission intelligence reccomendations which
include the introduction of a national ID card would be passed and
subsequently 'Patriot Act 3,' which would include the formal establishment
of a Stasi-like domestic spying organisation which would be similar in scope
to the TIPS program.

TIPS, which was supposedly nixed by Congress, would have recruited one in
twenty-four Americans as domestic informants, a higher percentage than was
used by the Stasi in East Germany.

Government funding was cut but private funding continues and the same
program was intriduced under a number of sub-divisions including AmeriCorps,
SecureCorps and the Highway Watch program.

After the passage of Patriot Act 3 Wolf and Primakov would be tapped for
their expertise in further collapsing America into a surveillance grid
police state. Primakov has openly stated that they are working on behalf of
Bush and Cheney to complete the 'Sovietization of America.

http://disc.server.com/discussion.cgi?disc=149495;article=72168;title=APFN



 Yahoo! Groups Sponsor ~-->
$4.98 domain names from Yahoo!. Register anything.
http://us.click.yahoo.com/Q7_YsB/neXJAA/yQLSAA/TySplB/TM
~->

--
Want to discuss this topic?  Head on over to our discussion list,
[EMAIL PROTECTED]
--
Brooks Isoldi, editor
[EMAIL PROTECTED]

http://www.intellnet.org

  Post message: [EMAIL PROTECTED]
  Subscribe:[EMAIL PROTECTED]
  Unsubscribe:  [EMAIL PROTECTED]


*** FAIR USE NOTICE. This message contains copyrighted material whose use
has not been specifically authorized by the copyright owner. OSINT, as a
part of The Intelligence Network, is making it available without profit to
OSINT YahooGroups members who have expressed a prior interest in receiving
the included information in their efforts to advance the understanding of
intelligence and law enforcement organizations, their activities, methods,
techniques, human rights, civil liberties, social justice and other
intelligence related issues, for non-profit research and educational
purposes only. We believe that this constitutes a 'fair use' of the
copyrighted material as provided for in section 107 of the U.S. Copyright
Law. If you wish to use this copyrighted material for purposes of your own
that go beyond 'fair use,' you must obtain permission from the copyright
owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
Yahoo! Groups Links

<*> To visit your group on the web, go to:
http://groups.yahoo.com/group/osint/

<*> To unsubscribe from this group, send an email to:
[EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
http://docs.yaho

RE: Blinky Rides Again: RCMP suspect al-Qaida messages

2004-12-09 Thread Tyler Durden
Oh, general cluelessness doesn't suprise me. What suprises me is that the 
writer of the original article seemed to believe that Stego was a new 
development.

Those cops you taught...do you think they were stupid enough to assume that, 
because this was their first time hearing about Stego, that Al Qaeda was 
only starting to use it right then? (I assume the answer is 'no'...they'll 
be smart enough at least to recognize that this was something around for a 
while that they were unaware of).

NSA folks, on the other hand, I would assume have a soft version of a 
Variola Stego suitcase...able to quickly detect the presence of pretty much 
any kind of stego and then perform some tests to determine what kind was 
used. I bet they've been aware of Al Qaeda stego for a long time...that's 
probably the kind of thing they are very very good at.

In the end it probably comes down to Arabic, however, and that language has 
many built-in ways of deflecting the uninitiated. I'd bet even NSA has a 
hard time understanding an Arabic language message, even after they de-stego 
and translate it.

-TD
From: "J.A. Terranson" <[EMAIL PROTECTED]>
To: Tyler Durden <[EMAIL PROTECTED]>
CC: [EMAIL PROTECTED], [EMAIL PROTECTED], 
[EMAIL PROTECTED],[EMAIL PROTECTED]
Subject: RE: Blinky Rides Again: RCMP suspect al-Qaida messages
Date: Thu, 9 Dec 2004 12:19:55 -0600 (CST)

On Thu, 9 Dec 2004, Tyler Durden wrote:
> What a fuckin' joke. You mean they're only now realizing that Al-Qaeda 
could
> use stego? Do they think they're stupid?
>
> Nah...certainly the NSA are fully prepared to handle this. I doubt it's 
much
> of a development at all to those in the know.
>
> -TD

As recently as two years ago, I had a classroom full of cops (mostly fedz
from various well-known alphabets) who knew *nothing* about stego.  And I
mean *NOTHING*.  They got a pretty shallow intro: here's a picture, and
here's the secret message inside it, followed by an hour of theory and
how-to's using the simplest of tools - every single one of them was just
blown away. Actually, that's not true - the Postal Inspectors were bored,
but everyone _else_ was floored.
While the various alphabets have had a few years to get up to speed, the
idea that they are still 99% ignorant does not surprise me in the least.
//Alif
--
Yours,
J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF
 Civilization is in a tailspin - everything is backwards, everything is
upside down- doctors destroy health, psychiatrists destroy minds, lawyers
destroy justice, the major media destroy information, governments destroy
freedom and religions destroy spirituality - yet it is claimed to be
healthy, just, informed, free and spiritual. We live in a social system
whose community, wealth, love and life is derived from alienation,
poverty, self-hate and medical murder - yet we tell ourselves that it is
biologically and ecologically sustainable.
The Bush plan to screen whole US population for mental illness clearly
indicates that mental illness starts at the top.
Rev Dr Michael Ellner



[p2p-hackers] Don't Let the RIAA Put the Net at Risk! (fwd from [EMAIL PROTECTED])

2004-12-09 Thread Eugen Leitl
- Forwarded message from Seth Johnson <[EMAIL PROTECTED]> -

From: Seth Johnson <[EMAIL PROTECTED]>
Date: Thu, 09 Dec 2004 14:28:34 -0500
To: [EMAIL PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: [p2p-hackers] Don't Let the RIAA Put the Net at Risk!
Organization: Real Measures
X-Mailer: Mozilla 4.79 [en] (Win98; U)
Reply-To: "Peer-to-peer development." <[EMAIL PROTECTED]>


> http://www.nyfairuse.org/action/ftc/


Don't Let the RIAA Put the Net at Risk!

Tell the FTC that the Internet is Peer to Peer, It is Ours, and
We Intend to Keep It!


Please forward this notice to any other concerned parties you may
know.


Please tell the FTC not to allow a few rich cartels and
monopolies such as the RIAA, MPAA and Microsoft to put the
Internet at risk:
http://www.ftc.gov/bcp/workshops/filesharing/comments.htm


What's Going On:

The FTC has issued a call for participation announcing a workshop
on "P2P Filesharing" technology to take place in Washington, DC
this December 15th and 16th.

An RIAA-sponsored CapAnalysis paper submitted to the FTC, calls
for an investigation of "P2P Filesharing" applications for
deceptive practices that affect the privacy and security of
users, subjecting them to such risks as adware, viruses, exposure
to undesirable material, impairments of computer function, and
last but not least, liability to charges of copyright
infringement. Congress is also calling the FTC to investigate
these products.

We call all those who know the Internet is a common good, who
make productive use of it and who develop applications for it as
a regular part of their daily lives, to join us in telling the
FTC what the real sources of these risks are.

Please tell the FTC not to allow a few rich cartels and
monopolies such as the RIAA, MPAA and Microsoft to put the
Internet at risk:
http://www.ftc.gov/bcp/workshops/filesharing/comments.htm


Get On the Bus!

We are organizing a caravan of concerned citizens to travel to
the nation's capital and defend our rights and powers against the
RIAA, the MPAA and Microsoft.

When we arrive:

* We will call the FTC to protect Internet users by acting
against a few rich cartels and monopolies that impede innovation
and access to robust solutions, choice, transparency and control.

* We will call the FTC to focus their attention on the real
sources of the risks in question, and to respond to them
appropriately.

* We will pose the question to the FTC of how they can
distinguish the applications they have selected for consideration
at this workshop from the multitude of applications of the
Internet and the ordinary functions of operating systems now in
use on millions of interconnected desktops across the planet.

* We will press the FTC to explain what risks are actually
unique to the applications they have singled out.

* We will call the FTC to separate copyright matters from
consideration of the private interests of computer owners.

* We will call the FTC to refer copyright policy to the
appropriate body, the United States Congress. 


Please submit comments to the FTC here:
http://www.ftc.gov/bcp/workshops/filesharing/comments.htm

Please contact us to let us know you will join us in this action
and to offer your assistance with travel, lodging and sustenance:
http://www.nyfairuse.org/cgi-bin/nyfu/contactus

Links:

The FTC "P2P Filesharing" Workshop:
http://www.ftc.gov/bcp/workshops/filesharing/index.htm

The CapAnalysis/RIAA Paper:
http://ipcentral.info/blog/P2P%20White%20Paper.doc

House and Senate Members Urge FTC Action Against P2P:
http://www.gnutellanews.com/article/13743

>From Clean System to Zombie Bot in Four Minutes:
http://slashdot.org/article.pl?sid=04/11/30/1932245

In Praise of P2P:
http://www.economist.com/displayStory.cfm?Story_id=3422905
New Yorkers for Fair Use - www.nyfairuse.org

-- 

DRM is Theft!  We are the Stakeholders!

New Yorkers for Fair Use
http://www.nyfairuse.org

[CC] Counter-copyright: http://realmeasures.dyndns.org/cc

I reserve no rights restricting copying, modification or
distribution of this incidentally recorded communication. 
Original authorship should be attributed reasonably, but only so
far as such an expectation might hold for usual practice in
ordinary social discourse to which one holds no claim of
exclusive rights.

___
p2p-hackers mailing list
[EMAIL PROTECTED]
http://zgp.org/mailman/listinfo/p2p-hackers
___
Here is a web page listing P2P Conferences:
http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpBnfIkFU7oB.pgp
Description: PGP 

Tried e dating?

2004-12-09 Thread Jesse Shannon
Hello,

Someone in your area wants to meet you!

Fill out a quick profile form and get access to
1,000's of potential dates in your area.


http://www.timedaction.com/creative1/index.html



Jesse





http://www.timedaction.com/creative1/remove.php


bela monastery cerebrate sean pour
summarily ackerman essen lung arabesque
concourse abeyant behavioral backplate du



RE: Blinky Rides Again: RCMP suspect al-Qaida messages

2004-12-09 Thread J.A. Terranson


On Thu, 9 Dec 2004, Tyler Durden wrote:

> Those cops you taught...do you think they were stupid enough to assume that,
> because this was their first time hearing about Stego, that Al Qaeda was
> only starting to use it right then?


Thats an interesting question on several different levels:

(1) There is (both within LEAs and the rest of us) a wide range of
opinions as to the feasability of stego being used in the field for
anything useful.  Remember that USA "professional spies" (who spent over a
year learning tradcraft IIRC) had continuous problems with very simple
encryptions/decryptions in the real world.

(2) The folks in the "Al Qaeda is Satan" camp generally believe that not
only is stego in wide use, but that AlQ has somehow managed to turn it
into a high bandwidth channel which is being used every day to Subvert The
American Way Of Life and infect Our Precious Bodily Fluids.  No amount of
education seems to dissuade these people from their misbeliefs.

(3) The other camp believes that stego is a lab-only toy, unsuitable for
much of anything besides scaring the shit out of the people in the Satan
camp.

(4) I have yet to meet a full dozen people who share my belief that while
stego *may* be in use, if it is, that use is for one way messages of
semaphore-class messages only.  I really do not understand why this view
is poopoo'd by all sides, so I must be pretty dense?

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

 Civilization is in a tailspin - everything is backwards, everything is
upside down- doctors destroy health, psychiatrists destroy minds, lawyers
destroy justice, the major media destroy information, governments destroy
freedom and religions destroy spirituality - yet it is claimed to be
healthy, just, informed, free and spiritual. We live in a social system
whose community, wealth, love and life is derived from alienation,
poverty, self-hate and medical murder - yet we tell ourselves that it is
biologically and ecologically sustainable.

The Bush plan to screen whole US population for mental illness clearly
indicates that mental illness starts at the top.

Rev Dr Michael Ellner