re: Debunking a myth: Internet recipe lets you make ricin

2004-02-23 Thread Poindexter
get.php?file=FE:3260610bc13ef573d9103c16e90bac53bead0eea John Poindexter Director Grand Duchy of Fenwick Institute for Strategic Studies

re: Debunking a myth: Internet recipe lets you make ricin [updated]

2004-02-23 Thread Poindexter
:7afa5f883d186d893080443498aa1625639f1cb5 ] The IIR #chemistry channel: >From our WoMD series: Practical ricin preparation complements a now redacted US >patent 3,060,165 >https://www.meshmx.com/fe/download_get.php?file=FE:3260610bc13ef573d9103c16e90bac53bead0eea John Poindexter Director Grand Duchy of Fenwick Inst

Ricin Patent

2004-03-16 Thread Poindexter
John, I would appreciate an attribution in Cryptome's patent posting, http://cryptome.org/ricin-patent.htm, as I copied you on two Feb 23 emails when I made that patent available for DL. This was weeks before Bruce and Dan's correspondance. JP

RAND: Assessing the Homeland Security Implications of Publicly Available Geospat

2004-03-31 Thread Poindexter
John, Funny the paper doesn't mention Cryptome's eyeballing project. :)) Abstract: U.S. decisionmakers require an analytical process for assessing whether publicly accessible geospatial information (e.g., maps, overhead images, Web site information) can help potential attackers, including terr

Choicepoint - collecting the data of our lives

2004-04-05 Thread Poindexter
And you thought my Information Awareness program was a threat? "The Constitution guarantees some privacy, but not anonymity, Smith has said repeatedly. The courts concur. People have no right to lie about who they are, or to request credentials that convey rights and privileges - such as driver'

Passive E-Mail Monitoring Leads To Arrest

2004-04-07 Thread Poindexter
www.2advanced.net writes "The world's first arrest resulting from passive monitoring of electronic communications is being reported by Globe Technology. In the article, sources reveal that 'an e-mail message intercepted by NSA spies precipitated a massive investigation by intelligence officials

Re: current status of cypherpunks, tim may, etc. ??

2004-04-12 Thread Poindexter
At 04:10 PM 4/11/2004, Tyler Durden wrote: >So...how many years before it's possible for an online group to anonymously fun, >order up and drop-ship weapons on a besieged people trying to maintain their national >sovereignty? Why not join http://www.ideosphere.com and wager some play money (a re

Sniper rifle implants tracking chip

2004-04-17 Thread Poindexter
I wonder if this site was put up for April 1st. http://www.backfire.dk/EMPIRENORTH/newsite/products_en001.htm also see their homeland security alert product http://www.backfire.dk/EMPIRENORTH/newsite/products_en002.htm

Re: anonymous IRC project needs new home...

2004-05-09 Thread Poindexter
At 07:07 AM 5/9/2004 -0400, Adam Back wrote: >The anonymous IRC project (IIP -- http://www.invisiblenet.net/iip/) provides encrypted anonymous IRC chat. > >Haven't looked in the protocol in detail to see how they get their anonymity, but the guy seemed aware of Chaum etc and they have crypto proto

Cruise Missile Clearance! Everything that Blows Shit Up Must Go!

2004-07-30 Thread Poindexter
My name is Bruce Simpson and I'm the guy who designed and built a low-cost cruise missile last year (as extensively reported by the world's media). As a result of this, the New Zealand government has seen fit to ensure that I can no longer engage in the activities, research or other work that re

Data-Driven Attacks Using HTTP Tunneling

2004-08-04 Thread Poindexter
http://www.securityfocus.com/infocus/1793 As more traffic across the Internet is coming under scrutiny and network administrators are making efforts to limit the traffic in and out of their networks, the one port that no one is willing to block en-masse is port 80. Users (and administrators) br

Identifying the Traitor Among Us: The Rhetoric of Espionage and Secrecy

2004-09-17 Thread Poindexter
http://etd.library.pitt.edu/ETD/available/etd-07282003-132723/unrestricted/karentdiss.pdf This study approaches espionage as a knowledge-producing and knowledge-disseminating practice similar to knowledge practices such as science. The study uses investigative tools drawn from rhetoric of cienc