RE: Year in Jail for Web Links

2003-08-06 Thread John Young
Mac Norton wrote:

>There was a weapons charge as well, which will always complicate 
>matters considerably. 

There was a weapons charge -- Molotov cocktail -- in the first indictment 
which was dropped.

The second indictment was for the single charge of distribution of 
information, to wit:

  18:842(p)(2)(A) Distribution of Information Relating to Explosives,
  Destructive Devices and Weapons of Mass Destruction

  http://cryptome.org/usa-v-sma-dkt2.htm

Mac's right that this kind of information is idiot cousin of controlled
substances. Law is an prejudiced ass.

That is why Sherman, a minority youngster, took a hit in cracker 
Southern California while two old honkies on the Left Coast addicted 
to 1A who offer the same information get no re-education sentence 
at all -- well, as the Boston youngster wrote "yet."



2nd Brit Agent Named

2003-08-02 Thread John Young
This story is breaking in British news, though the name of
the agent has not yet been published there -- probably 
tonight or tomorrow unless OSA kills it like David Kelly.

-


http://cryptome.org/sean-maguire.htm

2 August 2003. Thanks to Anonymous. Kevin Fulton is 
reported to have named Stakeknife as Freddie Scappaticci.

Subject: Stakeknife
Date: Saturday 2nd August 2003

The agent Kevin Fulton has named another agent to solicitors in his
fight with the M.O.D. The agent is Sean Maguire from North Belfast.
He is also the editor of the North Belfast News, a local newspaper.
Fulton intends to call him as a witness in his legal action.

-



Re: Someone at the Pentagon read Shockwave Rider over the weekend

2003-07-29 Thread John Young
Tim May wrote:

>Yes, a bunch of "ideas futures" markets have existed for nearly a 
>decade. An acquaintance of mine, Robin Hanson, was actively promoting 
>such things in the late 80s and may have been involved in some of the 
>Extropians-type markets which arose a few years later (I recollect 
>several efforts with varying degrees of success).

Yes, Robin Hanson worked on DARPA's PAM program. Here's
his e-mail about it in May 2003:

-


http://www.mail-archive.com/[EMAIL PROTECTED]/msg03309.html

DARPA markets on MidEast

From: Robin Hanson 
Subject: DARPA markets on MidEast 
Date: Sat, 31 May 2003 07:27:22 -0700 

I've been involved for several years in helping DARPA to create 
some markets to help aggregate info on political, military, and 
economic changes in the Middle East, and the effect of US 
policy on such changes. For those interested, we are finally 
going public with some info on these markets: 

www.PolicyAnalysisMarket.org

Robin Hanson [EMAIL PROTECTED] http://hanson.gmu.edu
Assistant Professor of Economics, George Mason University
MSN 1D3, Carow Hall, Fairfax VA 22030-
703-993-2326 FAX: 703-993-2323 

-



Re: R.I.P. (was: Re: A 'Funky A.T.M.' Lets You Pay for Purchases Made Online)

2003-07-25 Thread John Young
Oh, like Uday and Qusay, you can't kill this immortal fucker, 
nobody got the guts to plow a TOW in it. Instead, thousands of
gutless have hari-kiried by exiting the battle for well.com 
nutlick where the dead live in perfect, silent synchrony, so that 
is a no-brain, no-work option. Sit still, children, repeat this.

Hell, start a DOA mail list to bitch about how stupid people are
outside of old folks cess-suck. Read yourself sitting on a one-holer.

Nothing wrong with cypherpunks that couldn't be cured, as ever,
by more fresh young meat totally ignorant and not giving a shit
about how it used to be, only hot to throw slop at what's 
puked by the wizened, the reputable, the stuffed with here's
how it's meant to be.

Now that revulsion against whoever has truth by tail is a dim 
memory of what cpunks was meant to be, was now and again, 
not a place for boozy glory days telling a sanitized tale of what 
never happened. Pontificators are usually hooted off the list,
save for a few protected species taxidermied for darts.

The old days, don't believe them, cypherpunks was and is toxic 
to serious makeovers and shutdowns and lock-outs, and, never 
forget that PLONKS are cries of shut the fuck up and listen to me.
Pluck the PLONKS, if you don't get them you aint earning your
stay. PLONKERS little-man your wee-wees.

Hiccups a fogey one hand hanging on the bar rail, the other
rooting the floor vomit for a chawtabaccy cud ricochet from
the spit bucket.

]=;& Uday



Re: Jerk with a t-shirt

2003-07-24 Thread John Young
The rights of property owners, especially commercial property,
are not as absolute as sometimes argued. Due to the public
services provided by governmental authorities, tax perqs not
the least, property owners are required to abide a diverse range
of laws and regulations to provide assurance that people on the
property are safe. These people include the property owner,
family members, employees, customers and others who may
not be capable of judging what is safe.

Similarly, retail property owners are obliged to provide assurances
to customers that they are safe as prescribed by zoning, building
and health codes. To be sure there is a lucrative industry of 
professionals who advise property owners how to skirt these
requirements -- public relations mongers, lobbyists, lawyers, 
zoning consultants, architects, engineers, planners, politicians, 
so-called public interest groups, bribers, liars, cheaters, the mob, 
whores, pimps, and so on. Most of these are lightly or unregulated, 
even those ostensibly licensed to protect the public interest are
happy to front for those whose only interest is criminal profit.

Keep this in mind: whenever someone argues for the right to
do what they want on their property they are blowing shit in your
face while picking your pocket and placing you and your beloved
mongrels in danger through a smart-ass range of distancing, exculpatory
mechanisms, not least several of the constitutional amendments 
which were set up for just that purpose by the original continental
landscape thieves and which are forever being updated to keep the 
our-screw-you-laws-are-fair-laws racket running smoothly. 

Thanks to two centuries of warping law and culture to bias stolen
property owners, no property owner takes full risk these days,
but some will have you killed if you question that, that's what the
justice and national security mob is paid handsomely to enforce.

Department of Homeland Security looks to be the greatest ever
privacy and property expropriation since the national security apparatus
was set up after WW2, stolen from the public in the name of protecting it, 
given over to the homesec contractors, mediated by the homesec 
slicksters. "Homeland" is the false positive, as was "national defense."

>I happen to agree with those who said that since he was on private property 
>the property owners had every right to boot him off. I just think you 
>should do a little more fact-checking before you post.
>
>Jack



Re: Unsubtle Wetwork

2003-07-19 Thread John Young
Perhaps a suicide but if so it was induced by Kelly's treatment,
not only by the goofus members of parliament, but more likely
by the Ministry of Defence threatening to punish him for violation
of the draconian Official Secrets Act.

The Brits for all their admirable humor about vulgarity -- the new
GCHQ called a "gaping anus" -- can be vile sonsofbitches
when it comes to demanding obedience to authority, with the
OSA a prime weapon to assure proper behavior or else. Beyond
that there can be truly devastating social outcast penalties,
and the worst of all, blackest of humor, withholding royal honors.

Too bad the British realm never had to experience the cleansing
guillotine -- by the populace not by the authorities.

Due to that lack, and the USA's similar lack of final justice, pea-brained
officials can get away with official murder, destruction of lives, lying
and cheating for personal gain while holding office, or best, after
leaving office.

Foster's "suicide" for the Clintons, like Kelly's, is a sign that the
time is ever ripe to execute the Tim May Final Option in lieu of
believing what appears in the media, is told to surviving families,
is joked about in the private clubs of capitals around the globe.

At least the Reds owned up to their ideological perfidy, unlike
those who truly believe in superiority, that is those who best
represent inferior humans.

No wonder the sonsofbitches fear assassination politics, not
just the Jim Bell laughable version, the hard-eyed kind that
comes in the night without warning.



Web Privacy War

2003-07-03 Thread John Young
WSJ today reports on the war between web privacy firms
and the feds:

  http://cryptome.org/web-priv-war.htm

Lance Cottrell and other privacy protection firms are featured --
does Anonymizer really bring in up to a $1M a year?

Lance says he doesn't keep logs thus cannot respond to
subpoenas. Other privacy firms are said to cooperate
with the feds. One brags that national security trumps
making money. As if they natsec is not the biggest money
maker of all time, though homesec is coming on strong.
Privsec in the race, though deniability is mandatory.

It notes the demise of Zero Knowledge just before the Patriot
Act started the boom in people seeking protection from 
official spies. Darn. But then we don't know what ZK is
doing black with the contacts it eagerly gathered in its 
meetings with the feds.



Re: Reporter writing article on proffr/mattd and threats

2003-07-03 Thread John Young
It is a fact that proffr/mattd is Declan. Confirming the practice
of cpunks confecting imaginary personas to vent their inner
evildoing then protesting the vile behavior, disclaiming any
contact with their perps. Then campaigning to have the shits
banned from an putative open liars forum.

That's what non-fiction was invented for, telling lies to uphold
the truth -- which is itself a favorite conceit of the non-fictioneers.

Facts, just the irrefutable facts, are the makings of reputations
made in heaven and hell -- two more tools of the narrative
trade pliers.

Truth hoots. Prosecutors are hooters. If the facts don't convince
grand juries, avid readers all, then cook up an expert to swear
on a bible cookbook.



Re: Destroying government computers

2003-06-19 Thread John Young
Hatch issued a press release yesterday softening his remarks
but not recanting. His statement at the hearing does indeed
raise the national security threat of P2P in which mil and gov
computers using P2P could be attacked by evildoers and grab
nation-threatening information, or damage the machines.

This threat of commingling mil, gov and public users relates to
the recent CIA publication which says the Agency will not use
public networks to gather information in fear that classified
systems will be compromised. Thus, the Agency remains in the
dark about vast amounts of information available to the public,
which in turn likely distorts its intelligence reporting to national
authorities.

It would be wondrous if the Internet gradually turns the spooks
inward to protect their out of date secrets, even more so, such 
that they self-destruct like other historical institutions which
became so obsessed with their secrets they lost touch with
their supporters, indeed came to see their increasingly skeptical
supporters, outsiders, as the principal threats, and so instituted
even more spying among their supporters, meanwhile neglecting
genuine threats more distantly located.

That would fit the DC model of reality, the faith in inside information
no matter how foul just so long as only a few had access to it. Perfect
setup for manipulating the dimbulbs.

Belgium has a good idea to go after war criminals whereever they
hide behind national borders, or as in Congress, legislative
immunity coutured in national security.



US Encryption Export Clarified

2003-06-17 Thread John Young
The Bureau of Industry and Security today issued:

Export Administration Regulations: Encryption Clarifications and 
Revisions

SUMMARY: This rule amends the Export Administration Regulations 
(EAR) to clarify when encryption commodities and software may be 
given de minimis treatment, when short-range wireless devices 
incorporating encryption may be given mass market or retail treatment, 
and to provide guidance on when exporters are required to submit 
encryption review requests. It also expands the authorizations 
according to which travelers departing the United States may take 
encryption for their personal use, and clarifies that specially 
designed medical equipment and software are not controlled as 
encryption or ``information security'' items under the EAR. Finally 
this rule implements changes to the Wassenaar Arrangement List 
of dual-use items (agreed upon in the September 2002 meeting and 
finalized in December 2002) that eliminate from Export Control 
Classification Number (ECCN) 5A002 certain types of ``Personalized 
smart cards'' and equipment specially designed and limited to 
controlling access to copyright protected data.

-

http://cryptome.org/bis061703.txt



Re: RF Weapons

2001-05-03 Thread John Young

Tim May wrote:

>"Information Warfare" is again being trotted out in the context of 
>currently-deteriorating relations between the U.S.G. and the P.R.C. 
>(China). Wanna bet we start seeing recycled reports about plans to 
>knock out the stock exchanges, with "Chinese info-terrorists" 
>replacing the "IRA terrorists" who were said to be planning EMP/HERF 
>attacks on London several years ago?

DoJ's rep at the recent 2600 appeal hearing, Daniel Alter, said that 
DeCSS is comparable to a terrorist weapon that can knock out air 
control or other vital infrastructure. Some laughed at that, but Jim 
Bell got hung for using legal databases because of alleged intent 
to harm which meant he was not a protected journalist. As 2600
was distinguished from the New York Times though both linked
to DeCSS.

That intent to harm tips benign use of information into criminality.
It is probable that such tipping will soon be applied retroactively
to information liberators.

Thanks heavens nobody here is likely to be found guilty of that. No
matter that actual attacks on information instructure is most likely
to be made by its alleged protectors needing clearcut reasons
to raid and bust and send up the river those who dare to broadcast
information about government perfidy.

What will be less entertaining is when a recalcitrant log administrator
is shot for resisting a lawful command or a site operator assassinated
for refusing to pull an embarassing document. As seems is sure to
happen with the alleged perps who have legally posted police officers' 
personal data up in Seattle. 

What is it with Seattle, anyhow, all the crybercrime fighters there having 
a field day. Ah, yes they are they are the lynch folks who describe
cybercrime as terrorism, in accord with OMB, DoD and DoJ instructions
commaned by Congressional edict.

Robb London accused Jim Bell in WWA of what Daniel Alter accused
Emmanuel Goldstein in SDNY -- distributing information is mass 
destruction. Intending to harm they chant.




Re: Technological Solution

2001-04-29 Thread John Young

Tim May wrote:

>None of the non-cryptographic methods are very resistant to legal, 
>technical, sniffing, and black bag attacks. And only multiply-chained 
>encrypted-at-each-stage messages, a la remailers, are adequate for 
>high-value messages.

Those who've read it know that Jim Bamford's "Body of Secrets" ends
with a paragraph on NSA's being unable to cope with the spread of
communications protection technology and has come to rely more
and more on the Special Collection Service, a joint NSA-CIA black
bag operation and other methods of gaining access to targeted material.

This comes after decades of NSA disparaging the CIA's reliance on
HUMINT in favor of COMINT, ELINT, and a host of technological
intelligence gathering methods. Bamford says that NSA's prowess in
these methods accounts for its humongous growth into the premier
intel agency -- in budget and in personnel. Until the technology it
invented, fostered and funded made its way into the private world
and then to other countries intel (and allegedly criminal) organizations.
>From computers to crypto to means to crack or get around those.

What will come of Special Collection Service application inside the
United States as the fervor for homeland defense burgeons and 
the redefinition of "foreign enemies" to include anyone in the US
considered to be a threat, is worth pondering, in particular as SCS
techniques are shared with domestic agencies to fight the drug war
and for counterterrorism -- all domestic agencies now becoming
rapidly militarized in policy, training, equipment and close working
with DoD. 

Recall DEA planting the bug on Jim Bell for IRS -- the
agency is the most militarized due to the DoD and intel agencies
being ordered to fight the drug war in the US and overseas. 
Recall, too, the amazing 30 agents which raided Jim's home, 
according to trial testimony by Jeff Gordon, the were all shocked
and frightened at the chem-warfare stuff allegedly found there,
until the EPA calmed the tough guys. That's the reason Jim's 
home is listed in the EPA's most hazardous sites compendium 
for the year of the raid.

Last week, as Declan noted there were a series of congressional
hearings on homeland security legislation and increased funding
for combating high-tech crime. We offer the lengthy testimony
on several bills providing for homeland defense and combating
terrorism:

  http://cryptome.org/homeland-terr.htm  (286K)

As I noted a few days ago, information is now listed with nuclear,
biological and chemical threats to the nation, and requires similar
intelligence about its danger to the homeland.

This could lead to the the technologies Tim lists being defined
as homeland information-terrorist threats as our very own Stasi
secret police grows rapidly -- informers squealing on family
members, vast lists of suspects, and so on. No wonder the
CIA has held on to the East German lists of enemies of the
state -- its own citizenry -- so fervently. 

US intel is looking for reasons to live and where best than pursuing
you know who, ably assisted by the industry set up by ex-intel
members. Those down-sized by the end of the Cold War got
bills to pay.

Finally, reading the NYT account of Kerry's team killing the 
Vietnamese is sobering. The article is much more disturbing
than accounts of it have portrayed. Kerry's and other killers'
spin over the years have induced an intolerance for reading
the grim shit that the military does when it is out of control.

And be sure to reflect on Bamford's account of the Joint
Chiefs planning to fake a terrorist attack on the US to warrant
a Cuban offensive. That shit could be in the works even
now -- homeland defense is aiming to be a humongous
growth industry. One easy way to get that underway is to
fake a nationally disruptive infowar attack -- or is that already 
underway.




Undermining government power and authority

2001-04-25 Thread John Young

At a conference yesterday at Columbia on whether encryption
will protect privacy -- among panelists Whit Diffie and Steve Levy --
panelist John Podesta, former Clinton chief of staff, argued that law
will be needed to combat privacy-trasngressive technology, that 
encryption will not be up to the task. Two lawyers from the floor
repeated the point.

Podesta munged the issue of the needs of intelligence and
law enforcement to invade privacy, munged it as if still obeying
secret instructions from those cabals.

Steve Levy reminded that Podesta before working for Clinton was 
on the other side of the crypto/privacy wars, aiding I believe Steve 
said, EFF. Podesta smiled at Steve's pinprick.

A youngster from the floor observed that in recent years since
the relaxation of crypto export controls not a damn thing had been
done to actually increase the protection of the privacy of individuals, 
that on the contrary programs for governmental invasion of privacy 
had increased in the US and around the world. Podesta smiled at 
the wisdom of babes, techies just don't get reality politics, he appeared 
to gloat, with the non-techies smiling at his pretense survivalism.

Podesta noted that the 125th anniversary of the gummed-envelope
was approaching. That that technology is trusted for privacy because
of custom and law backing the custom. He stated that any privacy
technology is going to be workable only if backed by law enforcemcent,
and, not least custom.

He added that the fact that gummed envelopes can be easily opened
by intelligence agencies and law enforcement did not bother people.
Sub rosa, implied: people with nothing to hide.

There were some murmurings of dissent to Podesta's real politic remarks 
but except for the young techies, not much.

Indeed, as a newcomer to privacy and encryption conferences, and there
are dozens of them now being sponsored, not much new is being said.
One suspects that a numbing down is going on, to establish a custom
of acceptance that privacy-invasion by government is as inevitable
as death and taxes. Encryption in this view is just food for the gullible
non-techies.

The same is going on with technological means of digital content
protection of all kinds, the techies are being dismissed as too idealistic
in their promises of strong protection, that instead only global law and
treaties will protect intellectual property cartels. As promised by the
cartelish DMCA.

So why would anybody support undermining government power and 
authority in the face of such confidence that no way Jose? Plot to undermine
government go to jail, do research to undermine, get clubbed with DMCA.

Just think about undermining, your brainwaves will be logged.

Bamford reports that in the 1960s the USG was picking up Tempest
emanations from Russian encryption machines in Cuba from a
surveillance ship four miles away. And lots more techie stuff that
would terrify a law solves all believer. But then that may be why
Podesta was scared shitless by lawless technology -- having
been briefed on what contemporary shit is going on to surveil
him and everybody else, behind the calls for NSA going deaf
and the FBI pretending to be shocked at its diminished abilities.




Re: Right to anon. speech online upheld in US district court

2001-04-25 Thread John Young

Declan hoplessed:

>I'm just encouraging you to refrain from baiting the resident sharks.

That'd plonk the whole discoursing shebang, I mean lockbox all 
golden tongues everywhere. 

Then journalisming kaput, and professorialing, and congressionaling, and
getting inside the barflied nobodies's indifference to yarping of yarpingists,
the tube-hating and baiting of sports, windfall, millionaires.

Christ, Declan, you trying to unplug Gore's invention of the shark baiting
gizmo. What you gonna do with the rest of your worthlessing wasting
a mindless on bad grass distributed by NORML to cheapskate 
short-attention-spanning purveyists.

Bamford tree-cuts 400 pages to explain NSA's billion-megawatt baiting
of the dimbulb galaxy of shark attackers.




RE: Right to anon. speech online upheld in US district court

2001-04-24 Thread John Young

Aimee Farr spun:

>Finally, the law has an impressive track record, in stark contrast to
>'crypto-anarchy.'

So law proponents ever adversarial, no matter the facts. Homework
on the exegesis of cryptoanarchy would demonstrate otherwise:
it is law (and its siamese twin, order) which appears whereever
cryptoanarchy rises to prominence in a people -- L&O a perfect
means to strenghening strangleholds.

Opposition to organized control of law and order is timeless,
spaceless. Time and space a conceit of L&O in the scientific
realm.

Opposition to government is timeless and spaceless, or was
until the notion of imperial full employment was concocted,
imperialism coming to America during WW2. And now more
people work for government in the US than in any other nation
today, and most others of the citizenry get a piece of the dole
in one way or the other.

That does not mean there is not considerable anti-government
sentiment among the govs beneficiaries, perhaps the most
vociferous of gov critics are those who know it from the inside.

This interior dissent, too, is bred by imperialism, with it incessant
interior struggle among it beneficiaries.

It is no accident that cypherpunks was founded by and is fed by 
dissident beneficiaries of government largesse and protection
from bad, bad people who give shit not for L&O in any disguise.

National defense education, with it emphasis on training an
elite citizenry, has produced thousands of Jim and Jane Bells 
still searching for what was promised the smart guys if they just 
abided the rules. Their promisers chuckling at the bright-eyed
idiots who never knew what it was like to survive under 
oldtime cryptoanarchy -- when keeping secrets from the 
day's tax criminals was the highest accomplishment --
especially the rats in their midst whispering rules of right
and wrong, what history proved and didn't, who was
first and who is clueless.

Me, I'm an immortal, got medical and preaching licenses to 
prove it, in the name of Anonymous, awarded by Anonymous.

Teller lied, the NYT says, it was a young physicist who
designed the H-bomb, the very one who later became
a fierce opponent of nuclear weapons. A rat.




RE: The Culture of Secrecy, Disinformation, and , Propaganda...

2001-04-22 Thread John Young

No, as far I know, no Gzr'd MAD scientist subs here, though there 
may be some of their spies taking nyms of pinpoint targets. 

Most, if not all, MAD scientists work for governments which love 
to underwrite their demonic abilities and absence of scruples. 
Aiming these natsec producers of WMD at external and internal
enemies of the state is what political economy of state artfully 
conceals. Nobody mega-slaughters like states of political 
assassinations.

Putting limits on the flow of information is an ancient WMD,
resurrected by the USA in fear of allowing citizens to know too
much, following the precedent of earlier overreachers convinced
of their superiority claim to keep secrets, and their claim of
the right to kill to guard those secrets -- most of which conceal
perks and privilieges of government officals and their contractors.

As often noted here, private murder will never come close to
matching organized state killing sanctified by church, family
and the commonweal. Surveillance of the commonwealth
is booming business.

Pure evil is a state without opposition, though many aim at
that omnipotent beatitude, law and order the drug of
officials.

The tails of such states and officials and contractors beg tickling,
incessantly. Prime contractors, remember, are lawyers and other
state-blessed professionals. And do they ever caution: don't mess
with Texas -- we got to report threats or lose our ticket.

Nothing new about this chatter, it's been around as long as organized
crime, oops, government. Snitches are dual users.




Re: The Culture of Secrecy, Disinformation, and , Propaganda...

2001-04-22 Thread John Young

Jim Choate aptly accused everybody:

>You're a fucking paranoid, schizo, liar.

That's me, all right, an admirer of country porn, this list.

I offered the WWA DA's Witness Arranger to call me
anytime they needed a witness on short notice, for any
purpose, to hang around, to testify any way desired,
to recant, to re-testify more obligingly, to spill my guts
to the media, to hound (never stalk, never legally
investigate, never seek news about) competing witnesses
and fame-seeking officials, concoct lurid allegations based
on inside information and private correspondence, and 
recant them under the influence of sonbitch intervenors, 
to overreach due to elite education and tit-abuse, to damn 
all parties on earth, to home-jail myself, chained to a computer,l
wear a wire and tote a sensor as fashion statements, buttonhole 
jurors and would-bes wearing "Burn Him" buttons, demanding
screaming constitutional protection to issue exaggerated 
homeland threats, aping highest authorities.

This for free, as a bonafide fucking paranoid, schizo, liar,
FPSL, sometimes called TLAs.




RIAA Warns SDMI Hackers

2001-04-20 Thread John Young

RIAA and The SDMI Foundation on April 9 warned Ed Felten
and his researchers not to publish their paper about the 
weaknesses of the SDMI content protection system at the 
4th International Information Hiding Workshop to be held 
April 25-29, 2001. Their paper is public:

  http://cryptome.org/sdmi-attack.htm (41K text with 11 images)

Zipped text and images:

  http://cryptome.org/sdmi-attack.zip  (328K)




CIA CPIC/West

2001-04-18 Thread John Young

I am seeking information on a CIA operation known as
CPIC/West located in Bend, Oregon. This is a sister
station of CPIC/Miami, or OC/Miami, or CPIC/East, which 
was described on this list in 1998 by Kenneth C. Stahl, 
a former communications specialist for the Agency.

  http://www.anaserve.com/~wethepeople/messages/5.html

  http://cypherpunks.venona.com/date/1998/10/msg00247.html

The Oregon operation may be known also as CIA-ISTAC,
also possibly located in Bend, Oregon, which was a subject
of a recent federal trial in Tacoma, Washington.




Re: very effective communication

2001-04-17 Thread John Young

BF quoted:

>"Terrorists are the only true avant-garde artists because they're the
>only ones who are still capable of really surprising people."
>---Laurie Anderson

When Robb London hurled the careerist word "terrorism" the left 
bank of Jim-gawkers hissedly overwrit their cryptoed HDs, the 
right bank of techno-Quanticoeds caressed their de-degaussers.

Jeff Gordon said he cypherpunkishly PGPs, and employs avant-garde 
tools to breach its sanctuary for daft believers. You mean B&E or 
ratfinkerfucker, a fool tsked. Jeff thumbed a hole in n out.




Re: GPS bugs (was: Jim Bell Trial: Third Day (fwd))

2001-04-13 Thread John Young

Jim's home in Vancouver, WA, is on a hill overlooking the 
Oregon border; from his house you can see more of Oregon
than Washington. So going across the border for him must 
have been so common as to be barely unnoticeable as with 
most twin-citizens. 

Not for Jeff's evil-intended eye, and his pea-brain which 
must have gone searching for a statute that perfectly fit 
a borderless prey, waiting for dark night to pounce via
fairly dumb GPS gadget (or maybe a TS "illuminator" that
needed no electronic emission, just a shaped object).

If Mueller in Bend, OR, hadn't been invented by the CIA,
Jeff would have had concoct Jim a cross-border target
himself -- and maybe the Agency did him a favor.

CIA ISTAC is still listed in the .GOV database, the only
"CIA" listing. And a search on "Central Intelligence
Agency" only brings up a busy signal.

In contrast, ARIN offers dozens of listings for 
"Central Intelligence Agency."




Breeding Rats Galore

2001-04-13 Thread John Young

Anonymous writes:

[Quote]

Over the past few days, I found the story about James Bell in 
Tacoma who is being hung out to dry it seems.

I thought that the group I am associated with would enjoy reading all
the info you have on James Bell, so I pieced together some of the posts
about him and the link to Wired's articles.

That post was not incredibly controversial, nor were any threats made
against any person or group by myself or the respondents, yet I have
evidence that starting today, I am being watched, and trailed as I
drive.

Is there something magic about the James Bell case that causes
alphabet agencies to investigate those that openly discuss it?

This is a real question to which I hope you will reply: Considering the
type of data you post on your sites, do you find that you're being
watched, or has that period come and gone?  Have you ever requested your
FBI file through the FOIA?  I don't know that I have one, but I may send
off a request just to see.

I would love to hear your suggestions on how to react to "being watched"
if you've been frustrated by similar experiences.  Also, on the FOIA.

[Unquote]

Would the DoD, CIA and FBI use Jeff Gordon's pissant operation to 
conceal a burgeoning homeland defense Stasi octupussy? Yes, and here's why:

Federal Register: April 13, 2001

DEPARTMENT OF DEFENSE

Defense Science Board

SUMMARY: The Defense Science Board Task Force on Intelligence Needs for 
Homeland Defense--Follow-On Initiative will meet in closed session on 
April 11, 2001, at Los Alamos National Laboratory, Albuquerque, NM, 
April 12-13, 2001, at Sandia National Laboratory, Albuquerque, NM. This 
Task Force will explore the intelligence ramifications posed by a 
changing spectrum of threat regimes, including biological, chemical, 
information, nuclear, and radiological weapons.
The mission of the Defense Science Board is to advise the Secretary 
of Defense and the Under Secretary of Defense for Acquisition, 
Technology & Logistics on scientific and technical matters as they 
affect the perceived needs of the Department of Defense. At this 
meeting, the Defense Science Board Task Force will: consider the board 
spectrum of intelligence issues from early threat detection to 
deterrence, through response--including attribution; evaluate the 
collection and analysis of target-related information and weapon unique 
information; examine the role of HUMINT against these missions as well 
as the technology that the HUMINT collectors needs to be equipped with; 
consider strategic indications and warning and tactical warning 
dissemination and how the two need to be merged; analyze methodology to 
correlate large data flows spatially temporally and functionally (Low 
SNR); and assess the robustness of today's intelligence apparatus for 
coping with these challenges.
In accordance with Section 10(d) of the Federal Advisory Committee 
Act, P.L. No. 92-463, as amended (5 U.S.C. App. II), it has been 
determined that this Defense Science Board meeting, concerns matters 
listed in 5 U.S.C. 552b(c)(1), and that accordingly these meetings will 
be closed to the public.
Due to critical mission requirements and scheduling conflicts, 
there is insufficient time to provide timely notice required by section 
10(a)(2) of the

[[Page 19145]]

Federal Advisory Committee Act and Subsection 101-6.1015(b) of the GSA 
Final Rule on Federal Advisory Committee Management, 41 CFR part 101-6, 
which further requires publication at least 15 calendar days prior to 
the meeting of the Task Force.

Dated: April 19, 2001. [Yes, 19.]

---

DEPARTMENT OF DEFENSE

Defense Science Board

SUMMARY: The Defense Science Board Task Force on Managed Information 
Dissemination Follow-On Initiative will meet in closed session on April 
11-12, 2001, at SAIC, 4001 N. Fairfax Drive, Arlington, VA.
The mission of the Defense Science Board is to advise the Secretary 
of Defense and the Under Secretary of Defense for Acquisition, 
Technology & Logistics on scientific and technical matters as they 
affect the perceived needs of the Department of Defense. At this 
meeting, the Defense Science Board Task Force will review the need and 
feasibility of a coordinated information dissemination capability 
within the U.S. Government encompassing tactical, operational, and 
strategic information. Specifically, they will investigate detailed and 
actionable recommendations with respect to enabling ``channels'' and 
establishing appropriate ``brand identity''; DoD's role in a U.S. 
strategic information dissemination capability; policy, legal, and 
economic issues hindering U.S. capabilities; and identify new and 
emerging technologies capable of enhancing U.S. capabilities.
In accordance with section 10(d) of the Federal Advisory Committee 
Act, Pub. L. No. 92-463, as amended (5 U.S.C. App. II), it has been 
determined that this Defense Science Board meeting c

Re: TannerWatch: Jack don't need no body language

2001-04-10 Thread John Young

Irv Benzion wrote:

>You are probably unaware as was I that it
>is illegal to criticize a federal judge or 
>his/her actions or to cause "disrespect" to 
>the federal court system.

There it is. This citizen unit is going down. So
ordered. Period.

Following Sasquatch's footsteps.




Re: contempt of court and online legal info

2001-04-08 Thread John Young

Ms Miller,

Judge Tanner fobade me to publish names of jurors on
the Internet, and, apparently, filings which had not
already been published on our site Cryptome.org:

  http://cryptome.org/jdb032801.htm

I have since found that the case docket has been
withdrawn from the court's website, and I have
chosen to publish the docket with a note:

  http://cryptome.org/jdb040401.htm

I'm traveling in the Northwest at present but 
checking e-mail. I may testify for Jim Bell on 
Monday but that is not certain. Jim is
scheduled to continue his testimony on Monday
and promises "bombshell" disclosures.

The trial has been disturbingly prejudicial
toward Jim, from judge to prosecutor to federal
agents' investigative methodologies and testimony,
to treatment of Jim in the courtroom. A nasty
display of official vengeance, of which Judge 
Tanner's closing of the public record is only 
a part.

Regards,

John




AR Politics

2001-04-08 Thread John Young

(Cyberpass is down.)

Jim testified for himself Friday afternoon,
presenting as good a narrative as Jeff's. He's
due to continue on Monday.

Both Jim and Jeff made little use of exhibits,
and an observer might think their testimony
was scripted by a single writer: both had
been well-rehearsed in acting style and voice
direction to perform a single story with two
Rashomons of the same events, both equally compelling
or unbelievable depending on what a viewer wanted
to see.

The main difference is that Jeff has the backing of
a bloated, self-serving justice system: the courthouse, 
the judge, the agents of several TLAs, guards, marshals, 
SEATAC, and much more maw needing cases -- Tacoma court
is a wasteland of little used overspending.

Jim has a roll of the dice with the jurors, all of
whom are  dressed and look more like Jim than the
mani-uniformed and dark-suited officials and rats.

Jim has no witnesses: Judge Jack denied all requests,
compared to a couple of dozen for the government.
Most of Jim's request for discovery have been denied,
while the gov gets all it asks for. At the end of
Friday Judge Jack denied Jim's request for access to 
his own discovery notes for use during his testimony.

Jim has so far demonstrated that he is several
grades of intelligence above that of his official
tormentors. And far less prejudicial.

So what if the show is scripted that way, that the
hero is doomed to be condemned by the king's police,
for crowd-pleasing anti-revolutionary politics.

And it's blood-quickening incendiary.

A local says the news media are staying away from the
trial in fear of subpoena -- for the trial, for the
grand jury cooking up iA victims. 




USA v. James Bell, Tacoma

2001-04-08 Thread John Young

James Bell asks through Lou Bell, his mother:

[Quote]

Please  send messages to the following newspapers and ask them why they
haven't been following the trial of James Bell in federal court in Tacoma.
There will be extremely important testimony by James Bell on Monday.  
He needs your help.

It is an extreme emergency!  It is very important that a large number of
people contact these newspapers as soon as possible.  Thank you.

Seattle Times: [EMAIL PROTECTED]
Seattle Post Intelligencer: [EMAIL PROTECTED]
Oregonian:[EMAIL PROTECTED]
Columbian:[EMAIL PROTECTED]

[Unquote]