RE: Year in Jail for Web Links
Mac Norton wrote: >There was a weapons charge as well, which will always complicate >matters considerably. There was a weapons charge -- Molotov cocktail -- in the first indictment which was dropped. The second indictment was for the single charge of distribution of information, to wit: 18:842(p)(2)(A) Distribution of Information Relating to Explosives, Destructive Devices and Weapons of Mass Destruction http://cryptome.org/usa-v-sma-dkt2.htm Mac's right that this kind of information is idiot cousin of controlled substances. Law is an prejudiced ass. That is why Sherman, a minority youngster, took a hit in cracker Southern California while two old honkies on the Left Coast addicted to 1A who offer the same information get no re-education sentence at all -- well, as the Boston youngster wrote "yet."
2nd Brit Agent Named
This story is breaking in British news, though the name of the agent has not yet been published there -- probably tonight or tomorrow unless OSA kills it like David Kelly. - http://cryptome.org/sean-maguire.htm 2 August 2003. Thanks to Anonymous. Kevin Fulton is reported to have named Stakeknife as Freddie Scappaticci. Subject: Stakeknife Date: Saturday 2nd August 2003 The agent Kevin Fulton has named another agent to solicitors in his fight with the M.O.D. The agent is Sean Maguire from North Belfast. He is also the editor of the North Belfast News, a local newspaper. Fulton intends to call him as a witness in his legal action. -
Re: Someone at the Pentagon read Shockwave Rider over the weekend
Tim May wrote: >Yes, a bunch of "ideas futures" markets have existed for nearly a >decade. An acquaintance of mine, Robin Hanson, was actively promoting >such things in the late 80s and may have been involved in some of the >Extropians-type markets which arose a few years later (I recollect >several efforts with varying degrees of success). Yes, Robin Hanson worked on DARPA's PAM program. Here's his e-mail about it in May 2003: - http://www.mail-archive.com/[EMAIL PROTECTED]/msg03309.html DARPA markets on MidEast From: Robin Hanson Subject: DARPA markets on MidEast Date: Sat, 31 May 2003 07:27:22 -0700 I've been involved for several years in helping DARPA to create some markets to help aggregate info on political, military, and economic changes in the Middle East, and the effect of US policy on such changes. For those interested, we are finally going public with some info on these markets: www.PolicyAnalysisMarket.org Robin Hanson [EMAIL PROTECTED] http://hanson.gmu.edu Assistant Professor of Economics, George Mason University MSN 1D3, Carow Hall, Fairfax VA 22030- 703-993-2326 FAX: 703-993-2323 -
Re: R.I.P. (was: Re: A 'Funky A.T.M.' Lets You Pay for Purchases Made Online)
Oh, like Uday and Qusay, you can't kill this immortal fucker, nobody got the guts to plow a TOW in it. Instead, thousands of gutless have hari-kiried by exiting the battle for well.com nutlick where the dead live in perfect, silent synchrony, so that is a no-brain, no-work option. Sit still, children, repeat this. Hell, start a DOA mail list to bitch about how stupid people are outside of old folks cess-suck. Read yourself sitting on a one-holer. Nothing wrong with cypherpunks that couldn't be cured, as ever, by more fresh young meat totally ignorant and not giving a shit about how it used to be, only hot to throw slop at what's puked by the wizened, the reputable, the stuffed with here's how it's meant to be. Now that revulsion against whoever has truth by tail is a dim memory of what cpunks was meant to be, was now and again, not a place for boozy glory days telling a sanitized tale of what never happened. Pontificators are usually hooted off the list, save for a few protected species taxidermied for darts. The old days, don't believe them, cypherpunks was and is toxic to serious makeovers and shutdowns and lock-outs, and, never forget that PLONKS are cries of shut the fuck up and listen to me. Pluck the PLONKS, if you don't get them you aint earning your stay. PLONKERS little-man your wee-wees. Hiccups a fogey one hand hanging on the bar rail, the other rooting the floor vomit for a chawtabaccy cud ricochet from the spit bucket. ]=;& Uday
Re: Jerk with a t-shirt
The rights of property owners, especially commercial property, are not as absolute as sometimes argued. Due to the public services provided by governmental authorities, tax perqs not the least, property owners are required to abide a diverse range of laws and regulations to provide assurance that people on the property are safe. These people include the property owner, family members, employees, customers and others who may not be capable of judging what is safe. Similarly, retail property owners are obliged to provide assurances to customers that they are safe as prescribed by zoning, building and health codes. To be sure there is a lucrative industry of professionals who advise property owners how to skirt these requirements -- public relations mongers, lobbyists, lawyers, zoning consultants, architects, engineers, planners, politicians, so-called public interest groups, bribers, liars, cheaters, the mob, whores, pimps, and so on. Most of these are lightly or unregulated, even those ostensibly licensed to protect the public interest are happy to front for those whose only interest is criminal profit. Keep this in mind: whenever someone argues for the right to do what they want on their property they are blowing shit in your face while picking your pocket and placing you and your beloved mongrels in danger through a smart-ass range of distancing, exculpatory mechanisms, not least several of the constitutional amendments which were set up for just that purpose by the original continental landscape thieves and which are forever being updated to keep the our-screw-you-laws-are-fair-laws racket running smoothly. Thanks to two centuries of warping law and culture to bias stolen property owners, no property owner takes full risk these days, but some will have you killed if you question that, that's what the justice and national security mob is paid handsomely to enforce. Department of Homeland Security looks to be the greatest ever privacy and property expropriation since the national security apparatus was set up after WW2, stolen from the public in the name of protecting it, given over to the homesec contractors, mediated by the homesec slicksters. "Homeland" is the false positive, as was "national defense." >I happen to agree with those who said that since he was on private property >the property owners had every right to boot him off. I just think you >should do a little more fact-checking before you post. > >Jack
Re: Unsubtle Wetwork
Perhaps a suicide but if so it was induced by Kelly's treatment, not only by the goofus members of parliament, but more likely by the Ministry of Defence threatening to punish him for violation of the draconian Official Secrets Act. The Brits for all their admirable humor about vulgarity -- the new GCHQ called a "gaping anus" -- can be vile sonsofbitches when it comes to demanding obedience to authority, with the OSA a prime weapon to assure proper behavior or else. Beyond that there can be truly devastating social outcast penalties, and the worst of all, blackest of humor, withholding royal honors. Too bad the British realm never had to experience the cleansing guillotine -- by the populace not by the authorities. Due to that lack, and the USA's similar lack of final justice, pea-brained officials can get away with official murder, destruction of lives, lying and cheating for personal gain while holding office, or best, after leaving office. Foster's "suicide" for the Clintons, like Kelly's, is a sign that the time is ever ripe to execute the Tim May Final Option in lieu of believing what appears in the media, is told to surviving families, is joked about in the private clubs of capitals around the globe. At least the Reds owned up to their ideological perfidy, unlike those who truly believe in superiority, that is those who best represent inferior humans. No wonder the sonsofbitches fear assassination politics, not just the Jim Bell laughable version, the hard-eyed kind that comes in the night without warning.
Web Privacy War
WSJ today reports on the war between web privacy firms and the feds: http://cryptome.org/web-priv-war.htm Lance Cottrell and other privacy protection firms are featured -- does Anonymizer really bring in up to a $1M a year? Lance says he doesn't keep logs thus cannot respond to subpoenas. Other privacy firms are said to cooperate with the feds. One brags that national security trumps making money. As if they natsec is not the biggest money maker of all time, though homesec is coming on strong. Privsec in the race, though deniability is mandatory. It notes the demise of Zero Knowledge just before the Patriot Act started the boom in people seeking protection from official spies. Darn. But then we don't know what ZK is doing black with the contacts it eagerly gathered in its meetings with the feds.
Re: Reporter writing article on proffr/mattd and threats
It is a fact that proffr/mattd is Declan. Confirming the practice of cpunks confecting imaginary personas to vent their inner evildoing then protesting the vile behavior, disclaiming any contact with their perps. Then campaigning to have the shits banned from an putative open liars forum. That's what non-fiction was invented for, telling lies to uphold the truth -- which is itself a favorite conceit of the non-fictioneers. Facts, just the irrefutable facts, are the makings of reputations made in heaven and hell -- two more tools of the narrative trade pliers. Truth hoots. Prosecutors are hooters. If the facts don't convince grand juries, avid readers all, then cook up an expert to swear on a bible cookbook.
Re: Destroying government computers
Hatch issued a press release yesterday softening his remarks but not recanting. His statement at the hearing does indeed raise the national security threat of P2P in which mil and gov computers using P2P could be attacked by evildoers and grab nation-threatening information, or damage the machines. This threat of commingling mil, gov and public users relates to the recent CIA publication which says the Agency will not use public networks to gather information in fear that classified systems will be compromised. Thus, the Agency remains in the dark about vast amounts of information available to the public, which in turn likely distorts its intelligence reporting to national authorities. It would be wondrous if the Internet gradually turns the spooks inward to protect their out of date secrets, even more so, such that they self-destruct like other historical institutions which became so obsessed with their secrets they lost touch with their supporters, indeed came to see their increasingly skeptical supporters, outsiders, as the principal threats, and so instituted even more spying among their supporters, meanwhile neglecting genuine threats more distantly located. That would fit the DC model of reality, the faith in inside information no matter how foul just so long as only a few had access to it. Perfect setup for manipulating the dimbulbs. Belgium has a good idea to go after war criminals whereever they hide behind national borders, or as in Congress, legislative immunity coutured in national security.
US Encryption Export Clarified
The Bureau of Industry and Security today issued: Export Administration Regulations: Encryption Clarifications and Revisions SUMMARY: This rule amends the Export Administration Regulations (EAR) to clarify when encryption commodities and software may be given de minimis treatment, when short-range wireless devices incorporating encryption may be given mass market or retail treatment, and to provide guidance on when exporters are required to submit encryption review requests. It also expands the authorizations according to which travelers departing the United States may take encryption for their personal use, and clarifies that specially designed medical equipment and software are not controlled as encryption or ``information security'' items under the EAR. Finally this rule implements changes to the Wassenaar Arrangement List of dual-use items (agreed upon in the September 2002 meeting and finalized in December 2002) that eliminate from Export Control Classification Number (ECCN) 5A002 certain types of ``Personalized smart cards'' and equipment specially designed and limited to controlling access to copyright protected data. - http://cryptome.org/bis061703.txt
Re: RF Weapons
Tim May wrote: >"Information Warfare" is again being trotted out in the context of >currently-deteriorating relations between the U.S.G. and the P.R.C. >(China). Wanna bet we start seeing recycled reports about plans to >knock out the stock exchanges, with "Chinese info-terrorists" >replacing the "IRA terrorists" who were said to be planning EMP/HERF >attacks on London several years ago? DoJ's rep at the recent 2600 appeal hearing, Daniel Alter, said that DeCSS is comparable to a terrorist weapon that can knock out air control or other vital infrastructure. Some laughed at that, but Jim Bell got hung for using legal databases because of alleged intent to harm which meant he was not a protected journalist. As 2600 was distinguished from the New York Times though both linked to DeCSS. That intent to harm tips benign use of information into criminality. It is probable that such tipping will soon be applied retroactively to information liberators. Thanks heavens nobody here is likely to be found guilty of that. No matter that actual attacks on information instructure is most likely to be made by its alleged protectors needing clearcut reasons to raid and bust and send up the river those who dare to broadcast information about government perfidy. What will be less entertaining is when a recalcitrant log administrator is shot for resisting a lawful command or a site operator assassinated for refusing to pull an embarassing document. As seems is sure to happen with the alleged perps who have legally posted police officers' personal data up in Seattle. What is it with Seattle, anyhow, all the crybercrime fighters there having a field day. Ah, yes they are they are the lynch folks who describe cybercrime as terrorism, in accord with OMB, DoD and DoJ instructions commaned by Congressional edict. Robb London accused Jim Bell in WWA of what Daniel Alter accused Emmanuel Goldstein in SDNY -- distributing information is mass destruction. Intending to harm they chant.
Re: Technological Solution
Tim May wrote: >None of the non-cryptographic methods are very resistant to legal, >technical, sniffing, and black bag attacks. And only multiply-chained >encrypted-at-each-stage messages, a la remailers, are adequate for >high-value messages. Those who've read it know that Jim Bamford's "Body of Secrets" ends with a paragraph on NSA's being unable to cope with the spread of communications protection technology and has come to rely more and more on the Special Collection Service, a joint NSA-CIA black bag operation and other methods of gaining access to targeted material. This comes after decades of NSA disparaging the CIA's reliance on HUMINT in favor of COMINT, ELINT, and a host of technological intelligence gathering methods. Bamford says that NSA's prowess in these methods accounts for its humongous growth into the premier intel agency -- in budget and in personnel. Until the technology it invented, fostered and funded made its way into the private world and then to other countries intel (and allegedly criminal) organizations. >From computers to crypto to means to crack or get around those. What will come of Special Collection Service application inside the United States as the fervor for homeland defense burgeons and the redefinition of "foreign enemies" to include anyone in the US considered to be a threat, is worth pondering, in particular as SCS techniques are shared with domestic agencies to fight the drug war and for counterterrorism -- all domestic agencies now becoming rapidly militarized in policy, training, equipment and close working with DoD. Recall DEA planting the bug on Jim Bell for IRS -- the agency is the most militarized due to the DoD and intel agencies being ordered to fight the drug war in the US and overseas. Recall, too, the amazing 30 agents which raided Jim's home, according to trial testimony by Jeff Gordon, the were all shocked and frightened at the chem-warfare stuff allegedly found there, until the EPA calmed the tough guys. That's the reason Jim's home is listed in the EPA's most hazardous sites compendium for the year of the raid. Last week, as Declan noted there were a series of congressional hearings on homeland security legislation and increased funding for combating high-tech crime. We offer the lengthy testimony on several bills providing for homeland defense and combating terrorism: http://cryptome.org/homeland-terr.htm (286K) As I noted a few days ago, information is now listed with nuclear, biological and chemical threats to the nation, and requires similar intelligence about its danger to the homeland. This could lead to the the technologies Tim lists being defined as homeland information-terrorist threats as our very own Stasi secret police grows rapidly -- informers squealing on family members, vast lists of suspects, and so on. No wonder the CIA has held on to the East German lists of enemies of the state -- its own citizenry -- so fervently. US intel is looking for reasons to live and where best than pursuing you know who, ably assisted by the industry set up by ex-intel members. Those down-sized by the end of the Cold War got bills to pay. Finally, reading the NYT account of Kerry's team killing the Vietnamese is sobering. The article is much more disturbing than accounts of it have portrayed. Kerry's and other killers' spin over the years have induced an intolerance for reading the grim shit that the military does when it is out of control. And be sure to reflect on Bamford's account of the Joint Chiefs planning to fake a terrorist attack on the US to warrant a Cuban offensive. That shit could be in the works even now -- homeland defense is aiming to be a humongous growth industry. One easy way to get that underway is to fake a nationally disruptive infowar attack -- or is that already underway.
Undermining government power and authority
At a conference yesterday at Columbia on whether encryption will protect privacy -- among panelists Whit Diffie and Steve Levy -- panelist John Podesta, former Clinton chief of staff, argued that law will be needed to combat privacy-trasngressive technology, that encryption will not be up to the task. Two lawyers from the floor repeated the point. Podesta munged the issue of the needs of intelligence and law enforcement to invade privacy, munged it as if still obeying secret instructions from those cabals. Steve Levy reminded that Podesta before working for Clinton was on the other side of the crypto/privacy wars, aiding I believe Steve said, EFF. Podesta smiled at Steve's pinprick. A youngster from the floor observed that in recent years since the relaxation of crypto export controls not a damn thing had been done to actually increase the protection of the privacy of individuals, that on the contrary programs for governmental invasion of privacy had increased in the US and around the world. Podesta smiled at the wisdom of babes, techies just don't get reality politics, he appeared to gloat, with the non-techies smiling at his pretense survivalism. Podesta noted that the 125th anniversary of the gummed-envelope was approaching. That that technology is trusted for privacy because of custom and law backing the custom. He stated that any privacy technology is going to be workable only if backed by law enforcemcent, and, not least custom. He added that the fact that gummed envelopes can be easily opened by intelligence agencies and law enforcement did not bother people. Sub rosa, implied: people with nothing to hide. There were some murmurings of dissent to Podesta's real politic remarks but except for the young techies, not much. Indeed, as a newcomer to privacy and encryption conferences, and there are dozens of them now being sponsored, not much new is being said. One suspects that a numbing down is going on, to establish a custom of acceptance that privacy-invasion by government is as inevitable as death and taxes. Encryption in this view is just food for the gullible non-techies. The same is going on with technological means of digital content protection of all kinds, the techies are being dismissed as too idealistic in their promises of strong protection, that instead only global law and treaties will protect intellectual property cartels. As promised by the cartelish DMCA. So why would anybody support undermining government power and authority in the face of such confidence that no way Jose? Plot to undermine government go to jail, do research to undermine, get clubbed with DMCA. Just think about undermining, your brainwaves will be logged. Bamford reports that in the 1960s the USG was picking up Tempest emanations from Russian encryption machines in Cuba from a surveillance ship four miles away. And lots more techie stuff that would terrify a law solves all believer. But then that may be why Podesta was scared shitless by lawless technology -- having been briefed on what contemporary shit is going on to surveil him and everybody else, behind the calls for NSA going deaf and the FBI pretending to be shocked at its diminished abilities.
Re: Right to anon. speech online upheld in US district court
Declan hoplessed: >I'm just encouraging you to refrain from baiting the resident sharks. That'd plonk the whole discoursing shebang, I mean lockbox all golden tongues everywhere. Then journalisming kaput, and professorialing, and congressionaling, and getting inside the barflied nobodies's indifference to yarping of yarpingists, the tube-hating and baiting of sports, windfall, millionaires. Christ, Declan, you trying to unplug Gore's invention of the shark baiting gizmo. What you gonna do with the rest of your worthlessing wasting a mindless on bad grass distributed by NORML to cheapskate short-attention-spanning purveyists. Bamford tree-cuts 400 pages to explain NSA's billion-megawatt baiting of the dimbulb galaxy of shark attackers.
RE: Right to anon. speech online upheld in US district court
Aimee Farr spun: >Finally, the law has an impressive track record, in stark contrast to >'crypto-anarchy.' So law proponents ever adversarial, no matter the facts. Homework on the exegesis of cryptoanarchy would demonstrate otherwise: it is law (and its siamese twin, order) which appears whereever cryptoanarchy rises to prominence in a people -- L&O a perfect means to strenghening strangleholds. Opposition to organized control of law and order is timeless, spaceless. Time and space a conceit of L&O in the scientific realm. Opposition to government is timeless and spaceless, or was until the notion of imperial full employment was concocted, imperialism coming to America during WW2. And now more people work for government in the US than in any other nation today, and most others of the citizenry get a piece of the dole in one way or the other. That does not mean there is not considerable anti-government sentiment among the govs beneficiaries, perhaps the most vociferous of gov critics are those who know it from the inside. This interior dissent, too, is bred by imperialism, with it incessant interior struggle among it beneficiaries. It is no accident that cypherpunks was founded by and is fed by dissident beneficiaries of government largesse and protection from bad, bad people who give shit not for L&O in any disguise. National defense education, with it emphasis on training an elite citizenry, has produced thousands of Jim and Jane Bells still searching for what was promised the smart guys if they just abided the rules. Their promisers chuckling at the bright-eyed idiots who never knew what it was like to survive under oldtime cryptoanarchy -- when keeping secrets from the day's tax criminals was the highest accomplishment -- especially the rats in their midst whispering rules of right and wrong, what history proved and didn't, who was first and who is clueless. Me, I'm an immortal, got medical and preaching licenses to prove it, in the name of Anonymous, awarded by Anonymous. Teller lied, the NYT says, it was a young physicist who designed the H-bomb, the very one who later became a fierce opponent of nuclear weapons. A rat.
RE: The Culture of Secrecy, Disinformation, and , Propaganda...
No, as far I know, no Gzr'd MAD scientist subs here, though there may be some of their spies taking nyms of pinpoint targets. Most, if not all, MAD scientists work for governments which love to underwrite their demonic abilities and absence of scruples. Aiming these natsec producers of WMD at external and internal enemies of the state is what political economy of state artfully conceals. Nobody mega-slaughters like states of political assassinations. Putting limits on the flow of information is an ancient WMD, resurrected by the USA in fear of allowing citizens to know too much, following the precedent of earlier overreachers convinced of their superiority claim to keep secrets, and their claim of the right to kill to guard those secrets -- most of which conceal perks and privilieges of government officals and their contractors. As often noted here, private murder will never come close to matching organized state killing sanctified by church, family and the commonweal. Surveillance of the commonwealth is booming business. Pure evil is a state without opposition, though many aim at that omnipotent beatitude, law and order the drug of officials. The tails of such states and officials and contractors beg tickling, incessantly. Prime contractors, remember, are lawyers and other state-blessed professionals. And do they ever caution: don't mess with Texas -- we got to report threats or lose our ticket. Nothing new about this chatter, it's been around as long as organized crime, oops, government. Snitches are dual users.
Re: The Culture of Secrecy, Disinformation, and , Propaganda...
Jim Choate aptly accused everybody: >You're a fucking paranoid, schizo, liar. That's me, all right, an admirer of country porn, this list. I offered the WWA DA's Witness Arranger to call me anytime they needed a witness on short notice, for any purpose, to hang around, to testify any way desired, to recant, to re-testify more obligingly, to spill my guts to the media, to hound (never stalk, never legally investigate, never seek news about) competing witnesses and fame-seeking officials, concoct lurid allegations based on inside information and private correspondence, and recant them under the influence of sonbitch intervenors, to overreach due to elite education and tit-abuse, to damn all parties on earth, to home-jail myself, chained to a computer,l wear a wire and tote a sensor as fashion statements, buttonhole jurors and would-bes wearing "Burn Him" buttons, demanding screaming constitutional protection to issue exaggerated homeland threats, aping highest authorities. This for free, as a bonafide fucking paranoid, schizo, liar, FPSL, sometimes called TLAs.
RIAA Warns SDMI Hackers
RIAA and The SDMI Foundation on April 9 warned Ed Felten and his researchers not to publish their paper about the weaknesses of the SDMI content protection system at the 4th International Information Hiding Workshop to be held April 25-29, 2001. Their paper is public: http://cryptome.org/sdmi-attack.htm (41K text with 11 images) Zipped text and images: http://cryptome.org/sdmi-attack.zip (328K)
CIA CPIC/West
I am seeking information on a CIA operation known as CPIC/West located in Bend, Oregon. This is a sister station of CPIC/Miami, or OC/Miami, or CPIC/East, which was described on this list in 1998 by Kenneth C. Stahl, a former communications specialist for the Agency. http://www.anaserve.com/~wethepeople/messages/5.html http://cypherpunks.venona.com/date/1998/10/msg00247.html The Oregon operation may be known also as CIA-ISTAC, also possibly located in Bend, Oregon, which was a subject of a recent federal trial in Tacoma, Washington.
Re: very effective communication
BF quoted: >"Terrorists are the only true avant-garde artists because they're the >only ones who are still capable of really surprising people." >---Laurie Anderson When Robb London hurled the careerist word "terrorism" the left bank of Jim-gawkers hissedly overwrit their cryptoed HDs, the right bank of techno-Quanticoeds caressed their de-degaussers. Jeff Gordon said he cypherpunkishly PGPs, and employs avant-garde tools to breach its sanctuary for daft believers. You mean B&E or ratfinkerfucker, a fool tsked. Jeff thumbed a hole in n out.
Re: GPS bugs (was: Jim Bell Trial: Third Day (fwd))
Jim's home in Vancouver, WA, is on a hill overlooking the Oregon border; from his house you can see more of Oregon than Washington. So going across the border for him must have been so common as to be barely unnoticeable as with most twin-citizens. Not for Jeff's evil-intended eye, and his pea-brain which must have gone searching for a statute that perfectly fit a borderless prey, waiting for dark night to pounce via fairly dumb GPS gadget (or maybe a TS "illuminator" that needed no electronic emission, just a shaped object). If Mueller in Bend, OR, hadn't been invented by the CIA, Jeff would have had concoct Jim a cross-border target himself -- and maybe the Agency did him a favor. CIA ISTAC is still listed in the .GOV database, the only "CIA" listing. And a search on "Central Intelligence Agency" only brings up a busy signal. In contrast, ARIN offers dozens of listings for "Central Intelligence Agency."
Breeding Rats Galore
Anonymous writes: [Quote] Over the past few days, I found the story about James Bell in Tacoma who is being hung out to dry it seems. I thought that the group I am associated with would enjoy reading all the info you have on James Bell, so I pieced together some of the posts about him and the link to Wired's articles. That post was not incredibly controversial, nor were any threats made against any person or group by myself or the respondents, yet I have evidence that starting today, I am being watched, and trailed as I drive. Is there something magic about the James Bell case that causes alphabet agencies to investigate those that openly discuss it? This is a real question to which I hope you will reply: Considering the type of data you post on your sites, do you find that you're being watched, or has that period come and gone? Have you ever requested your FBI file through the FOIA? I don't know that I have one, but I may send off a request just to see. I would love to hear your suggestions on how to react to "being watched" if you've been frustrated by similar experiences. Also, on the FOIA. [Unquote] Would the DoD, CIA and FBI use Jeff Gordon's pissant operation to conceal a burgeoning homeland defense Stasi octupussy? Yes, and here's why: Federal Register: April 13, 2001 DEPARTMENT OF DEFENSE Defense Science Board SUMMARY: The Defense Science Board Task Force on Intelligence Needs for Homeland Defense--Follow-On Initiative will meet in closed session on April 11, 2001, at Los Alamos National Laboratory, Albuquerque, NM, April 12-13, 2001, at Sandia National Laboratory, Albuquerque, NM. This Task Force will explore the intelligence ramifications posed by a changing spectrum of threat regimes, including biological, chemical, information, nuclear, and radiological weapons. The mission of the Defense Science Board is to advise the Secretary of Defense and the Under Secretary of Defense for Acquisition, Technology & Logistics on scientific and technical matters as they affect the perceived needs of the Department of Defense. At this meeting, the Defense Science Board Task Force will: consider the board spectrum of intelligence issues from early threat detection to deterrence, through response--including attribution; evaluate the collection and analysis of target-related information and weapon unique information; examine the role of HUMINT against these missions as well as the technology that the HUMINT collectors needs to be equipped with; consider strategic indications and warning and tactical warning dissemination and how the two need to be merged; analyze methodology to correlate large data flows spatially temporally and functionally (Low SNR); and assess the robustness of today's intelligence apparatus for coping with these challenges. In accordance with Section 10(d) of the Federal Advisory Committee Act, P.L. No. 92-463, as amended (5 U.S.C. App. II), it has been determined that this Defense Science Board meeting, concerns matters listed in 5 U.S.C. 552b(c)(1), and that accordingly these meetings will be closed to the public. Due to critical mission requirements and scheduling conflicts, there is insufficient time to provide timely notice required by section 10(a)(2) of the [[Page 19145]] Federal Advisory Committee Act and Subsection 101-6.1015(b) of the GSA Final Rule on Federal Advisory Committee Management, 41 CFR part 101-6, which further requires publication at least 15 calendar days prior to the meeting of the Task Force. Dated: April 19, 2001. [Yes, 19.] --- DEPARTMENT OF DEFENSE Defense Science Board SUMMARY: The Defense Science Board Task Force on Managed Information Dissemination Follow-On Initiative will meet in closed session on April 11-12, 2001, at SAIC, 4001 N. Fairfax Drive, Arlington, VA. The mission of the Defense Science Board is to advise the Secretary of Defense and the Under Secretary of Defense for Acquisition, Technology & Logistics on scientific and technical matters as they affect the perceived needs of the Department of Defense. At this meeting, the Defense Science Board Task Force will review the need and feasibility of a coordinated information dissemination capability within the U.S. Government encompassing tactical, operational, and strategic information. Specifically, they will investigate detailed and actionable recommendations with respect to enabling ``channels'' and establishing appropriate ``brand identity''; DoD's role in a U.S. strategic information dissemination capability; policy, legal, and economic issues hindering U.S. capabilities; and identify new and emerging technologies capable of enhancing U.S. capabilities. In accordance with section 10(d) of the Federal Advisory Committee Act, Pub. L. No. 92-463, as amended (5 U.S.C. App. II), it has been determined that this Defense Science Board meeting c
Re: TannerWatch: Jack don't need no body language
Irv Benzion wrote: >You are probably unaware as was I that it >is illegal to criticize a federal judge or >his/her actions or to cause "disrespect" to >the federal court system. There it is. This citizen unit is going down. So ordered. Period. Following Sasquatch's footsteps.
Re: contempt of court and online legal info
Ms Miller, Judge Tanner fobade me to publish names of jurors on the Internet, and, apparently, filings which had not already been published on our site Cryptome.org: http://cryptome.org/jdb032801.htm I have since found that the case docket has been withdrawn from the court's website, and I have chosen to publish the docket with a note: http://cryptome.org/jdb040401.htm I'm traveling in the Northwest at present but checking e-mail. I may testify for Jim Bell on Monday but that is not certain. Jim is scheduled to continue his testimony on Monday and promises "bombshell" disclosures. The trial has been disturbingly prejudicial toward Jim, from judge to prosecutor to federal agents' investigative methodologies and testimony, to treatment of Jim in the courtroom. A nasty display of official vengeance, of which Judge Tanner's closing of the public record is only a part. Regards, John
AR Politics
(Cyberpass is down.) Jim testified for himself Friday afternoon, presenting as good a narrative as Jeff's. He's due to continue on Monday. Both Jim and Jeff made little use of exhibits, and an observer might think their testimony was scripted by a single writer: both had been well-rehearsed in acting style and voice direction to perform a single story with two Rashomons of the same events, both equally compelling or unbelievable depending on what a viewer wanted to see. The main difference is that Jeff has the backing of a bloated, self-serving justice system: the courthouse, the judge, the agents of several TLAs, guards, marshals, SEATAC, and much more maw needing cases -- Tacoma court is a wasteland of little used overspending. Jim has a roll of the dice with the jurors, all of whom are dressed and look more like Jim than the mani-uniformed and dark-suited officials and rats. Jim has no witnesses: Judge Jack denied all requests, compared to a couple of dozen for the government. Most of Jim's request for discovery have been denied, while the gov gets all it asks for. At the end of Friday Judge Jack denied Jim's request for access to his own discovery notes for use during his testimony. Jim has so far demonstrated that he is several grades of intelligence above that of his official tormentors. And far less prejudicial. So what if the show is scripted that way, that the hero is doomed to be condemned by the king's police, for crowd-pleasing anti-revolutionary politics. And it's blood-quickening incendiary. A local says the news media are staying away from the trial in fear of subpoena -- for the trial, for the grand jury cooking up iA victims.
USA v. James Bell, Tacoma
James Bell asks through Lou Bell, his mother: [Quote] Please send messages to the following newspapers and ask them why they haven't been following the trial of James Bell in federal court in Tacoma. There will be extremely important testimony by James Bell on Monday. He needs your help. It is an extreme emergency! It is very important that a large number of people contact these newspapers as soon as possible. Thank you. Seattle Times: [EMAIL PROTECTED] Seattle Post Intelligencer: [EMAIL PROTECTED] Oregonian:[EMAIL PROTECTED] Columbian:[EMAIL PROTECTED] [Unquote]