Ich bein ein berliner.

2002-04-30 Thread matthew X

Riot police clashed with hundreds of leftist demonstrators after some of 
them broke into a supermarket on the eve of May Day in a traditional Berlin 
flashpoint.
Rioters lobbed bottles and rocks and fired flares at police who intervened 
to stop the looting, which erupted after dark at the end of an open-air 
rock concert that drew an estimated 5,000 people to the streets of 
Kreuzberg district.
A police helicopter whirred overhead as several hundred officers rushed in 
and dispersed the masked leftists, geared up for anti-globalisation 
protests in the capital on the May Day holiday tomorrow.
Several police officers were injured, police spokesman Christian Matzdorf 
said. He said he knew of no injuries to demonstrators. By midnight, police 
reported the situation under control.
Berlin's gritty Kreuzberg district has been the focus of riots on May Day 
and the night before that have become a fixture in the capital over the 
past 15 years.
About 10,000 people gathered at night around bonfires in a park several 
kilometres to the north to mark St Walpurgis Night, recalling a medieval 
rite of spring believed to scare off witches. Firefighters were called out 
to douse a trash fire set on a nearby thoroughfare.
WALPURGISNACHT. Witches, warlocks & demons hold revels in
Harz Mountains. Whole towns rush into streets, making as much
noise as possible. Church bells ring, bonfires are lit. In British
Isles, a scapegoat is chosen by lots and burned, hobby horse parades
are held, chasing evil away until Mid-summer's Night.




Real Blood.

2002-04-30 Thread matthew X

1871 - Gettin' Civilized, Ayn Rand Style?: Mob massacres more than 100
Apaches who had placed themselves under U.S. protection
at Camp Grant, Arizona.
1883 - Jaroslav Haek lives (1883-1923), Prague. Czech
novelist, anarchist, humorist, Bolshevik, story writer,
journalist.
Early in his career an active anarchist. A drunk, a
dog-stealer, & a cook who calculatedly pretended to
commit suicide & invented animals which did not exist
while editing the serious magazine "The
Animal World". Wrote a four-volume novel,
The Good Soldier Schweik, acclaimed
as one of the greatest satires in world literature.
1899 - US: Coeur d'Alene, Idaho miner's strike, 1,200
workers arrested, put into specially erected bullpens until
the strikes are broken.
In 1892, area mine workers launched a generation of deadly
warfare against armed & deputized strikebreakers.
This year, with mine owners refusing to recognize
unions & wildcat strikers dynamiting mines, Governor
Frank Steunenberg declared parts of Idaho were "in a
state of insurrection & rebellion."
Under martial law, President McKinley sent federal troops.
Steunenberg was a man of modest means before election, but
he left office rich, thanks to -- surprisingly -- the mining
companies.
1903 - Simone Larcher lives (true name Rachel Willissek)
(1903-1969), in Oise. French anarchist, proofreader,
antimilitarist.. With her companion, Louis Louvet,
she publishes the newspaper "L'anarchie", which
continues until 1929.
http://recollectionbooks.com/bleed/sinners/LarcherSimone.htm
1930 - Radical anti-psychiatrist, anti-capitalist Felix
Guattari lives, Paris.
1969 - 543,000 US soldiers are in South Vietnam making war.
1970 - Beloved & Respected Comrade Leader President Dick M
Nixon announces U.S. troops, supposedly seeking out a supreme
Communist command post known as "COSVN," had invaded
Cambodia. It was a total fabrication, & even Mel Laird &
Hank Kissinger went ballistic over this one. 30,000 US
troops & 40,000+ South Vietnamese troops
involved. This US action set the scene for Pol Pot to take
over Cambodia.
1975 - Miss Saigon?: Independence Day. Vietnam defeats the
US while Republicans are at the helm. North Vietnamese troops
enter Saigon. Vietnam is reunited after 30 years of resistance to
U.S. domination & 100 years of French colonial misrule.
1977 - Argentina: The organization of the mothers of Plaza
de Mayo founded.
1983 - Bl;uesman Muddy Waters dies of a heart attack.
1986 - West Germany: First use of CS gas against
anti-nuclear demonstrators, Wackersdorf.
 From the daily bleed




9-11,they wont try that again...yeah right.

2002-04-30 Thread matthew X

They came back to the WTC to finish what they started.They should have been 
assisted in this with trial information from the 1st attempt.Is DC now 
unfinished business? Has there been more invaluable intelligence learnt?
RR is close to desirable targets,especially the Pentagon.If caucasians took 
the plane using more people to flush out marshalls and shaped charges to 
blow doors then it should be relativly simple to finish the job on DC.
My passports for sale.
Some senile numbskull wrote...>>(That the dominant political philosophy is 
closely-attuned to what is now called "libertarianism" (but which used to 
be called "liberalism," or "classical liberalism") is more because that's 
the only political philosophy attuned to distributed, non-hierarchical 
systems. One might imagine a list oriented toward using strong crypto to 
help with fascism, or with Maoism, but there would be some deep conflicts. 
The absence of such groups, or even of "strong crypto for social welfare" 
milder forms, tells us a lot.) <<
Dominant where exactly? Planet Tim?
 >>the only political philosophy attuned to distributed, non-hierarchical 
systems. <<
Is anarchism,where does "libertarianism",especially as defined here get off 
trying to rip off classic anarchism? Your a shameless thief Mongo.
 >> One might imagine a list oriented toward using strong crypto to help 
with fascism, or with Maoism, but there would be some deep conflicts.<<
There is,(this one.) and there are,(conflicts,ones you dont condescend to 
debate.(to vulgar?,scared?)
 >>strong crypto for social welfare" milder forms,<<
Is there a shoat in the house? Mongo is turning into the math equivalent.




URGENT ASSISTANCE

2002-04-30 Thread MICHAEL OGOCHUKWU

FROM: MICHAEL OGOCHUKWU 
 
ATTN: PESIDENT\ CEO
   
REQUEST FOR ASSISTANCE-STRICTLY CONFIDENTIAL;

I am Michael Ogochukwu a top management staff in the Nigerian National
Petroleum Corporation (NNPC) and I head a seven-man tender’s board in
charge of Contract Awards and Payments Approvals. I came to know of you
in my search for a reliable and reputable person to handle a very confidential
transaction that involves the transfer of a huge sum of money to a foreign
account. There were series of contracts executed by a constordium Multinationals in 
the oil industry in favour of NNPC among
which were:   

The Supply of Y2K Compliant Personal Computers and Accessories to the
Warri, Port Harcourt and Kaduna Refineries. Supply of Drugs and Relief
materials to the victims of the Niger/ Delta crises. The construction of Schools, 
Hospitals and Housing Units in the Niger/Delta
Region. The original value of these contracts were deliberately over invoiced
in the sum of USD TWENTY FIVE MILLION, FIVE HUNDRED THOUSAND DOLLARS
(25.5M) which has now been approved and is now ready to be transferred
being that the Companies that actually executed these contracts have
been paid and the projects officially commissioned.

Consequently, my colleagues and I are willing to transfer the total amount
to your account for subsequent disbursement, since we as civil servants
are prohibited by the Code of Conduct Bureau (Civil Service Laws) from opening and/ or 
operating foreign accounts in our
names.

Needless to say, the trust reposed on you at this juncture is enormous.
In return, we have agreed to offer you 20% of the transferred sum, while
10% shall be set aside for incidental expenses (internal and external) between the 
parties in the course of the transaction. You will
be mandated to remit the balance 70% to other accounts in due course.
You must however NOTE that this transaction is subject to the following
terms and conditions: Our conviction of your transparent honesty and diligence. That 
you would
treat this transaction with utmost secrecy and confidentiality. That
as a foreign partner, you will follow our instructions to the letter.
Provide the account required, and competent to assist us on
profitable investment areas in your Country in an advisory capacity.

 
Furthermore, Modalities have been worked out at the highest levels of
the Ministry of Finance and the Central Bank of Nigeria for the immediate
transfer of the funds within 10 working days subject to your
satisfaction of the above stated terms. Our assurance is that your role
is risk free. To accord this transaction the legality it deserves and
for mutual security of the fund, the whole approval procedures
will be officially and legally processed with your name of any Company
you may nominate as the Bonafide beneficiary.
  
Once more, I want you to understand that having put in over 26 years
in the service of my country, I am averse to having my image and career
dented. This matter should therefore be treated with utmost secrecy and
urgency.


Kindly expedite action as we are behind schedule to enable us include
this transfer in the first batch of this financial quarter payment.


Please acknowledge the receipt of this message via my mail box.

Yours Sincerely,

Michael Ogochukwu





Re: Bad guys vs. Good guys

2002-04-30 Thread Steve Furlong

Tim May wrote:
> 
> On Tuesday, April 30, 2002, at 12:55  PM, Michael Motyka wrote:

<>

> But you make a good point, that the "net" to snare bad guys is snaring
> vastly more ordinary people.

And most of the sheeple _like_ it. They'd rather be safe than free. For
every complaint I've heard about having to reassure the bank that the
card wasn't stolen, I've heard a couple dozen praises for the wonderful
safe system that takes care of its members.


-- 
Steve FurlongComputer Condottiere   Have GNU, Will Travel

The reasonable man adapts himself to the world; the unreasonable one
persists in trying to adapt the world to himself. Therefore all
progress depends on the unreasonable man.  -- George Bernard Shaw




breaking news: the latest way to get customers 421100000000000

2002-04-30 Thread biuot453421100




PROMOTE YOUR PRODUCT OR 
SERVICE TO MILLIONS TODAY!
 


E-MAL MARKETING


- Bulk e-mail will make you money so fast, your head will 
spin!

- Our customers tell us that they would no longer be in 
business without it.

- Complete collection of e-mail software & unlimited 
addresses!

    See this product's web page
CLICK HERE
 


FAX MARKETING SYSTEM


- Fax broadcasting is the hot new way to market your product 
or service!

- You can not beat fax broadcasting for cost effectiveness 
and reliability

- System includes all software and 1 million business 
leads on disk
    
See this product's web page 
CLICK HERE

 


1 MILLION AMERICAN BUSINESS LEADS ON CD

- If you do telemarketing, mailing, or faxing this list 
will be a gold mine!


- Contains company name, address, 
phone, fax, SIC, # of employees & revenue
- List allows for 
UNLIMITED DOWNLOADS!
    
See this product's web page 
CLICK HERE
 
Visit our web site or 
call 618-288-6661 for more information.
 
 
 
 

to be taken off of our list
click here






Larger, Firmer Breast without Surgery CEMUQOK

2002-04-30 Thread Nicki Eastman

A Bigger Bust in 60 days or we'll Pay You   Guaranteed!

In just 5 seconds a day you can:

*Have Firmer, Larger Breast.  A 3 Cup Size increase in just 30-60 days.
*Increase your self confidence.
*Become a better Lover.
*Improved mood, increased libido, decreased PMS symptoms 
*Have Healthier skin, hair and nails.   
*Have The secret to total self confidence all the time. 

Click here now for TRUE Breast Enhancement

http://207.13.202.53

To visit our site you must be 18

To be removed send an email to [EMAIL PROTECTED]




Re: Bad guys vs. Good guys

2002-04-30 Thread Steve Furlong

"Daniel J. Boone" wrote:

> Don't forget, they arrested the guy who bought a truckload of candy at
> Costco just before Halloween

If you're talking about the New Jersey man, he was (a) not Arabic (b)
not a terrorist and (c) a candy wholesaler. He just wanted to turn a
profit by making little kiddies fat. I suppose the backers of the
current "fatty food" tax would like to let him rot, but the FBI didn't
see a case.


> I never did hear if they let him out or if he is still rotting in
> "preventive detention"

Cavity preventive dentition, perhaps.

-- 
Steve FurlongComputer Condottiere   Have GNU, Will Travel

The reasonable man adapts himself to the world; the unreasonable one
persists in trying to adapt the world to himself. Therefore all
progress depends on the unreasonable man.  -- George Bernard Shaw




The US Congress has more money for you

2002-04-30 Thread C S Baker

  The  IRS may OWE YOU MORE MONEY!

«¤»§«¤»¥«¤»¥«¤»§«¤»¥«¤»§«¤»¥«

Chances are, you and/or your spouse just paid your  "2001 Taxes" .  It sounds funny to 
say, but you weren't concerned about how much you paid in..infact 88% of taxpayers 
are only interested in what they get back and are unable to tell you what they paid to 
the IRS.

Why is this so strange?  Because, there is no other area of your life where you are 
more concerned about your "change" (what you get back) but don't know what you paid 
in.  Imagine reaching in your pocket or wallet and pulling out a bunch of bills and 
buying a sandwich and waiting for your change.and being excited, even elated with 
whatever change was given back.   Sounds pretty irresponsible, doesn't it?

Would you spend $8  right now, and learn how to stop paying  "to much" tax!   I will 
give you a 1 year 100% moneyback  guarantee on my system if it doesn't save you at 
least $600 in income taxes.  In fact it saves the average family $2,500 hard cash.  
That's an extra $200 a month!

* Would you like an extra $1000 back this year?
* Would you like to get back $2000 from your last years filing?
* Would you like to Add $100-$250 to your NEXT paycheck?

This system has everything you need, forms and how to guides to keep accurate records 
and take advantage of ALL your deductions.

There are several statistics I could give youbut this is my favorite.   In an 
independent review of approximately 850,000 monitored calls to the IRS with tax 
related questionsapproximately 410,000 were answered incorrectly to the benefit of 
the IRS.

Remember,  my system is simple and will only save you money AND IT'S 100% GUARANTEED 
OR YOUR MONEY BACK. 

Please pay through PayPal by Check or Credit Card.
https://www.paypal.com/xclick/business=TAXWH000%40yahoo.com&item_name=Tax+Reduction+System&item_number=2012002&amount=8.00

AOL People https://www.paypal.com/xclick/business=TAXWH000%40yahoo.com&item_name=Tax+Reduction+System&item_number=2012002&amount=8.00";>Click
 Here




Did you know that Congress has told the IRS to give Huge Refunds and Deductions to 
taxpayers who have a home based business, OR anyone who operated one at any time in 
1998, 1999 or 2000?


Order this complete system, 1 Year Guaranteeit will save you $600 in taxes  or 
your money back!

Special Price Only $8.00 for the system.

This system has everything you need, forms and how to guides.


Please pay through PayPal by Check or Credit Card.
https://www.paypal.com/xclick/business=TAXWH000%40yahoo.com&item_name=Tax+Reduction+System&item_number=2012002&amount=8.00

AOL People https://www.paypal.com/xclick/business=TAXWH000%40yahoo.com&item_name=Tax+Reduction+System&item_number=2012002&amount=8.00";>Click
 Here





«¤»§«¤»¥«¤»¥«¤»§«¤»¥«¤»§«¤»¥«


  How much will Uncle Sam keep this year?


The average person works about 20 minutes to earn $8.00,  and will pay out 35% - 50% 
of that in some kind of tax .

Why not spend $8 right now, and learn how to stop paying to much tax!  I'll give you a 
1 year guarantee on my system.


Order this complete system, 1 Year Guaranteeit will save you $600 in taxes  or 
your money back!

Special Price Only $8.00 for the system.

This system has everything you need, forms and how to guides.

Please pay through PayPal by Check or Credit Card.
https://www.paypal.com/xclick/business=TAXWH000%40yahoo.com&item_name=Tax+Reduction+System&item_number=2012002&amount=8.00

AOL People https://www.paypal.com/xclick/business=TAXWH000%40yahoo.com&item_name=Tax+Reduction+System&item_number=2012002&amount=8.00";>Click
 Here




Immediate Delivery

Thank You


   «¤»§«¤»¥«¤»¥«¤»§«¤»¥«¤»§«¤»¥«  


   «¤»§«¤»¥«¤»¥«¤»§«¤»¥«¤»§«¤»¥«
   «¤»§«¤»¥«¤»¥«¤»§«¤»¥«¤»§«¤»¥«   

UN_SUBSCRIBE INSTRUCTIONS
We respect your privacy, and will promptly un_subscribe you on request.
«¤»§«¤»¥«¤»¥«¤»§«¤»¥«¤»§«¤»¥«   
This e-mail is sent in with our strict anti-abuse regulations.
You are receiving this message for one of the following reasons:
1) We are on the same optin list;
2) You posted to one of our FFA pages;
3) You have responded to one of our ads; or
4) You have sent an e-mail to one of our email addresses.
By doing so, you have agreed to receive this message. Under Bill s. 11618
TITLE III passed by the 105th US  Congress this letter Cannot be considered
eSpam as long as the sender includes contact information & a method of
"re_moval." To be re_moved from future mailing please send an email to
[EMAIL PROTECTED] with un_subscribe or re_move in the subject. or click
[EMAIL PROTECTED]?subject=un_subscribe
Thank you.
  «¤»§«¤»¥«¤»¥«¤»§«¤»¥«¤»§«¤»¥« 








Register: Multiple Sun vulnerabilities reported... (fwd)

2002-04-30 Thread Jim Choate


http://theregister.co.uk/content/4/25083.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Re: Bad guys vs. Good guys

2002-04-30 Thread Tim May

On Tuesday, April 30, 2002, at 02:29  PM, Daniel J. Boone wrote:

> From: "Michael Motyka" <[EMAIL PROTECTED]>
>
>> I remember that in the weeks post 9-11 Safeway or one of the other
>> grocery store chains offered to profile customers. What are they
> going
>> to do? Question everyone who buys olive oil, chick peas, garlic and
>> sesame paste?
>
> Don't forget, they arrested the guy who bought a truckload of candy at
> Costco just before Halloween
>
> I never did hear if they let him out or if he is still rotting in
> "preventive detention"
>

The First, Second, Fourth, and Fifth Amendments were suspended for 
security reasons, so why not the Sixth?




--Tim May




ASSET & BACKGROUND CHECKS.. WE CHECK PEOPLE OUT!_

2002-04-30 Thread mitchell_doug

FULL NATIONAL Asset & Background Searches

Just call us Toll Free at (888) 729-8976 and PROTECT YOURSELF

AmericaFind Inc. 

24 hour OR LESS Turn Around Time. 

Just call us Toll Free at (888) 729-8976 and PROTECT YOURSELF

What do you Really Know about your Employee? 
What do you Really Know about your Lover? 
What do you Really Know about your Baby Sitter? 
What do you Really Know about your Business Associate? 

You NEED to protect yourself! You NEED to know the TRUTH!

WE CHECK PEOPLE OUT FOR YOU!!!

Just call us Toll Free at (888) 729-8976 and PROTECT YOURSELF

In 24 hours OR LESS we can tell you everything to allow you to make an informed 
decision!!

*All Real Estate owned in past 15 years, *All Corporations & DBA's, *STATE AND FEDERAL 
Civil Judgments,
*Bankruptcies and Liens covering past 15 years.!! *All State and Federal Misdemeanor 
and Felony Criminal Convictions.!! *Much more!

Do NOT go uninformed. Let AmericaFind Inc. Tell you the TRUTH!

REMEMBER..WE CHECK PEOPLE OUT FOR YOU!!

Just call us Toll Free at (888) 729-8976 and PROTECT YOURSELF. 

~

We Find Missing People for YOU.OR it's FREE!!

As seen on OPRAH Satisfaction GUARANTEED!!

 America Find your LOST LOVE from HIGH SCHOOL
 America Find the Person who SKIPPED TOWN owing you MONEY
 America Find the FRIEND you served with in COMBAT
 America Find that DEADBEAT PARENT

LET AMERICAFIND that MISSING PERSON for you!

Results in 12 hours or Less!
 
 CALL TOLL FREE!!! (877)-269-3892


Satisfaction GUARANTEED in WRITING on our Web Site!!

MANY Thousands Founds...MANY Thousands still lost. 

Let AMERICAFIND Help.


 CALL TOLL FREE!!! (877)-269-3892

~

AS A COURTESY, IF YOU WOULD LIKE
To be removed from further mailings send an email from the
address you want removed to mailto:[EMAIL PROTECTED]?subject=Remove













FULL NATIONAL Asset & Background Searches












Re: Cost-Effective Targeted Email - Guaranteed Results! - Discount Pricing!

2002-04-30 Thread Email4Profits27472315

If You're Marketing a Product, Service or MLM/Opportunity 
You Will Definitely Be Interested In What We Have To Offer.  

 Start Generating As Many ORDERS and/or SIGN-UPS as You Can Handle!

 
 We currently have discounts on 3 advertising programs:


 Targeted Email Promotion:  You'll have a fresh targeted 
 list extracted and compiled based on your target market.  
 We'll create the email ad for you.  We'll email out your ad to 
 the targeted list and forward you the replies via email as they 
 come in.  We filter all responses through our own email 
 accounts.  No flames, complaints or headaches. 
 Extremely cost-effective, targeted email advertising!

 Platinum Email Promotion:  We have an IN-HOUSE 
 List of people who have responded by email to various ads,
 such as business opportunities, business products and services,
 as well as health/nutritional products and other consumer products.
 Naturally, as these people have responded to ads in the past, this
 is a pretty responsive list!  These people have "raised there hand"
 indicating a very specific interest in your type of offer!

 Mass Email Promotion:  We can send out a Full-Page Email Ad
 To 1 Million Deliverable General Consumer Emails For Your 
 Business At Wholesale Prices!  


   When you work with us, here's what you get:

 - Fresh, targeted, qualified leads!
 - Free Ad Copy!
 - Free Target Market Research!
 - Free Database Setup and Maintenance
 - Free email sending, reply filtering, and reply forwarding
 - Free Referral Program!

 And...

   Free Unlimited Personalized Marketing Support!!  


Contact Us To Discuss Increasing Your Business Cash Flow

   
Submit The Following Information And You'll Receive The Full Details And Discount Pricing Shortly

  
Name:   Phone Number:   
Best Time To Call:  MorningsAfternoonsEveningsNights  Website URL:   Email:   Business Type:   
"Yes!  Please send details and discount pricing on the following programs!" 
(check all that apply):
 
 Targeted Email Promotion
 Platinum Email Promotion
 Mass Email Promotion


   


Call For Details and Discount Pricing
Toll Free:  1-866-853-8319  ext. 1
(24 Hours)

 Or, Send Email To:
==>  LeadGeneration7  <==  

 Start Generating As Many ORDERS and/or SIGN-UPS as You Can Handle!




To unsubscribe Click Here



CNN-Whitehouse

2002-04-30 Thread Jim Choate

http://www.whitehouse.org/news/2002/042602.asp
   



 The law is applied philosophy and a philosphical 
system is
 only as valid as its first principles.

James Patrick Kelly - "Wildlife"

 [EMAIL PROTECTED] 
www.ssz.com
 [EMAIL PROTECTED]  www.open-
forge.org






CNN.com - Where's SDMI? Code to battle piracy is MIA - April 30, 2002 (fwd)

2002-04-30 Thread Jim Choate


http://www.cnn.com/2002/TECH/ptech/04/30/digital.insecurities.ap/index.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Register: RSA removes patent block to SAML uptake (fwd)

2002-04-30 Thread Jim Choate


http://theregister.co.uk/content/53/25089.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Need To Know - The 'point' of the internet (not), IP in Europe (fwd)

2002-04-30 Thread Jim Choate


http://www.ntk.net/


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Yahoo! News - Head of Congressional Probe Into Sept. 11 Quits (fwd)

2002-04-30 Thread Jim Choate


http://story.news.yahoo.com/news?tmpl=story&u=/nm/20020430/ts_nm/congress_intelligence_dc_2&printer=1


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





CNN.com - Experts: Vivendi hack charge doesn't compute - April 30, 2002 (fwd)

2002-04-30 Thread Jim Choate


http://www.cnn.com/2002/TECH/internet/04/30/vivendi.vote.hack.reut/index.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





[±¤ °í] ¹«·á ȨÆäÀÌÁö Á¦ÀÛÁß°³

2002-04-30 Thread HomeBay
Title: Ȩº£ÀÌ È«º¸¸á











	

 







		


 


 


 





 
  

			
			

+ 
Ŭ¸¯ÇÏ½Ã¸é ¹Ù·Î ÀúÈñ ÀÚ·á¿¡¼­ ±ÍÇÏÀÇ À̸ÞÀÏ ÁÖ¼Ò°¡ »èÁ¦µË´Ï´Ù   ¢Ñ ¼ö½Å°ÅºÎ
	
	









Re: Language

2002-04-30 Thread R. A. Hettinga

At 4:08 AM -0400 on 4/30/02, Steve Furlong wrote:


> This was obviously a forgery, and not an especially well-done forgery.
> Jim C, you've got company as a forgee.

Didn't even notice when it went by, but it's nice to know I have fans in
Singapore(?)...

Cheers,
RAH
Who hasn't done anything worth forging around here in quite a while, and
who probably thinks it the Klez virus, or something...

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




Re: Cost-Effective Targeted Email - Guaranteed Results! - Discount Pricing!

2002-04-30 Thread Email4Profit27842211

If You're Marketing a Product, Service or MLM/Opportunity 
You Will Definitely Be Interested In What We Have To Offer.  

 Start Generating As Many ORDERS and/or SIGN-UPS as You Can Handle!

 
 We currently have discounts on 3 advertising programs:


 Targeted Email Promotion:  You'll have a fresh targeted 
 list extracted and compiled based on your target market.  
 We'll create the email ad for you.  We'll email out your ad to 
 the targeted list and forward you the replies via email as they 
 come in.  We filter all responses through our own email 
 accounts.  No flames, complaints or headaches. 
 Extremely cost-effective, targeted email advertising!

 Platinum Email Promotion:  We have an IN-HOUSE 
 List of people who have responded by email to various ads,
 such as business opportunities, business products and services,
 as well as health/nutritional products and other consumer products.
 Naturally, as these people have responded to ads in the past, this
 is a pretty responsive list!  These people have "raised there hand"
 indicating a very specific interest in your type of offer!

 Mass Email Promotion:  We can send out a Full-Page Email Ad
 To 1 Million Deliverable General Consumer Emails For Your 
 Business At Wholesale Prices!  


   When you work with us, here's what you get:

 - Fresh, targeted, qualified leads!
 - Free Ad Copy!
 - Free Target Market Research!
 - Free Database Setup and Maintenance
 - Free email sending, reply filtering, and reply forwarding
 - Free Referral Program!

 And...

   Free Unlimited Personalized Marketing Support!!  


Contact Us To Discuss Increasing Your Business Cash Flow

   
Submit The Following Information And You'll Receive The Full Details And Discount Pricing Shortly

  
Name:   Phone Number:   
Best Time To Call:  MorningsAfternoonsEveningsNights  Website URL:   Email:   Business Type:   
"Yes!  Please send details and discount pricing on the following programs!" 
(check all that apply):
 
 Targeted Email Promotion
 Platinum Email Promotion
 Mass Email Promotion


   


Call For Details and Discount Pricing
Toll Free:  1-866-853-8319  ext. 1
(24 Hours)

 Or, Send Email To:
==>  LeadGeneration5  <==  

 Start Generating As Many ORDERS and/or SIGN-UPS as You Can Handle!




To unsubscribe Click Here



Paid Too Much for Your Senior Seminar System?

2002-04-30 Thread Morgan
Title: Paid Too Much for Your Senior Seminar System?




   
 
  
 
  

 
  

 
  

 
   



   

  Plus...
  Instruction and guidance from an Annuity Sales 
  Pro that has consistantly helped agents produce millions 
  of dollars in annuity premium each and every year!

  

  

 
   

 
  Call today to become our next success story!

 
  

 
  — or — 

   

   

   
Please fill out the form below for more information
  
   
Name:
 
  

  
   
E-mail:
 
  

  
   
Phone:
 
  

  
   
City:
 
  

State:
 
  


  
   
 
 
  

 
 
  
  

  

  

  

 

 
  Note: We can 
make this offer to only one qualified agent or financial planner per 
250,000 population.

  

  
   
 
   We don't want anybody 
to receive our mailings who does not wish to receive them. This is professional 
communication sent to insurance professionals. To be removed from this 
mailing list, DO NOT REPLY to this message. Instead, go here: 
 http://www.InsuranceMail.net
Legal Notice  

  






Re: Re: Bad guys vs. Good guys

2002-04-30 Thread Daniel J. Boone

From: "Michael Motyka" <[EMAIL PROTECTED]>

> I remember that in the weeks post 9-11 Safeway or one of the other
> grocery store chains offered to profile customers. What are they
going
> to do? Question everyone who buys olive oil, chick peas, garlic and
> sesame paste?

Don't forget, they arrested the guy who bought a truckload of candy at
Costco just before Halloween

I never did hear if they let him out or if he is still rotting in
"preventive detention"





Re: Bad guys vs. Good guys

2002-04-30 Thread Tim May

On Tuesday, April 30, 2002, at 12:55  PM, Michael Motyka wrote:

> As a simple illustration of the inability to separate the "Good Guys"
> from the "Bad Guys" I use my experiences with my Visa card company. I
> use the damn thing to buy gas a few times a week and every so often I'll
> use it for a big ticket item like a PC or a Spa for example. At which
> time I generally have to spend 20 minutes on the phone with the numbnutz
> at the credit company explaining that despite the fact that their SW
> tells them I behave like a credit card thief ( testing the card at the
> relatively low-risk gas pump then buying a laptop ) I really am the
> customer, the card is in my posession and I really do want to use it. I
> usually get a warning about my language at which point I am allowed the
> priveledge of speaking with some sort of manager. Maybe I am a bad guy
> since I curse and almost never carry a credit card balance. Very
> unpatriotic.

This has never happened to me, even the time I bought my $23,000 Ford 
Explorer on my VISA card. (This really happened.) There may be some 
difference between our types of cards or backgrounds, etc.

But you make a good point, that the "net" to snare bad guys is snaring 
vastly more ordinary people.

The seizure of funds in politically incorrect bank accounts is of course 
another example.

> I remember that in the weeks post 9-11 Safeway or one of the other
> grocery store chains offered to profile customers. What are they going
> to do? Question everyone who buys olive oil, chick peas, garlic and
> sesame paste? The whole surveillance thing is bound to proceed at
> breakneck speed and bound also to be a useless waste of effort. The next
> terrorist event will probably be something quite unexpected and not
> easily detected.

Which was obvious on the evening of 9/11, that the next attack would be 
something quite different.

But the goals of establishing a surveillance state are still being 
accomplished, so why argue?

--Tim May
> -
"The whole of the Bill [of Rights] is a declaration of the right of the
people at large or considered as individuals... It establishes some
rights of the individual as unalienable and which consequently, no
majority has a right to deprive them of." -- Albert Gallatin of the New 
York Historical Society, October 7, 1789




SPECIAL DEALS ON MEDS

2002-04-30 Thread belle


PHENTERMINE, 
  XENICAL, VIAGRA & TENUATE
PLUS MANY OTHER PRESCRIPTION DRUGS!
You Can Get Them Delivered Directly To Your 
Door 
  With A
  Free Easy Online Doctor's Consultation Included
We Have A Full Online Pharmacy! No prior 
prescription 
  required.
FDA Approved and Totally Confidential!

Click Here 
  and Order Now!
It is in our best interest not to send email to those who do 
not 
wish to receive our promotions asit is a waste of our time and resources 
as 
well as yours. If you wish to be excluded from our future mailings please 

type remove in the subject line after click here




Re: Bad guys vs. Good guys

2002-04-30 Thread Michael Motyka

As a simple illustration of the inability to separate the "Good Guys"
from the "Bad Guys" I use my experiences with my Visa card company. I
use the damn thing to buy gas a few times a week and every so often I'll
use it for a big ticket item like a PC or a Spa for example. At which
time I generally have to spend 20 minutes on the phone with the numbnutz
at the credit company explaining that despite the fact that their SW
tells them I behave like a credit card thief ( testing the card at the
relatively low-risk gas pump then buying a laptop ) I really am the
customer, the card is in my posession and I really do want to use it. I
usually get a warning about my language at which point I am allowed the
priveledge of speaking with some sort of manager. Maybe I am a bad guy
since I curse and almost never carry a credit card balance. Very
unpatriotic.

I remember that in the weeks post 9-11 Safeway or one of the other
grocery store chains offered to profile customers. What are they going
to do? Question everyone who buys olive oil, chick peas, garlic and
sesame paste? The whole surveillance thing is bound to proceed at
breakneck speed and bound also to be a useless waste of effort. The next
terrorist event will probably be something quite unexpected and not
easily detected.

Oh well, it makes a good discussion topic and a good freak show ( on the
TV news I mean, not here, no freaks here ).

Mike




Re: Bad guys vs. Good guys

2002-04-30 Thread georgemw

On 29 Apr 2002 at 12:29, Tim May wrote:

> The deep error which has been with us for a long time is the assumption 
> that we can create legal systems or surveillance systems which go after 
> "bad guys" but not "good guys." That is, that we can separate "bad guys" 
> like Mohammed Atta from "good guys," all in advance of actual criminal 
> or terrorist acts.
> 

...
 
> What people want to know is "Will Person X commit a crime in the 
> future?" (And hence we should deny him access to strong crypto _now_,  
> for example, which is the whole point of attempting to surveil, 
> restrict, and use data mining to ferret out bad trends.)
> 
> Even the strongest believer in the law of the excluded middle would not 
> argue that the "Will Person X commit a crime in the future?" has a "Yes" 
> or "No" answer at the _present_ time. (Well, actually, I suppose some 
> folks _would_. They would say "I personally don't know if he will, but 
> in 50 years he either will have committed a crime or he will not have 
> committed a crime.")
> 

I think, though, that it wouldn't be too hard to find a bunch of people
that agree that Person X is a hell of a lot more likely to
commit a crime than Person Y.  The point of this data mining, I
gather, is not to actually predict individual crimes (which
is probably impossible even in principle and definitely impossible
in practice) but rather to devide the populace into
"sheeple" who only need occasional monitioring to ensure that
they continue to fit the sheeple profile and "potential future 
criminals" who would be subject to more extensive monitoring.

The problem with selling a system like this to the public is
how to convince them that the system won't be branding 
as "future criminals" people who have not committed a crime
and quite likely never will based on such things as what
restaurants they eat at or what books they read, when in fact
that is precisely what the system is designed to do. 


> Can we Identify the Bad Guys?
> 
> Getting back to law enforcement attempting to predict the future, the 
> lack of any meaningful way to predict who will be a future Mohammed Atta 
> or Charles Manson, and who thus "should" be restricted in his civil 
> liberties, is the important point.
> 
> Could any amount of data mining have identified Mohammed Atta and his 
> two dozen or so co-conspirators? Sure, *now* we know that an "indicator" 
> is "Unemployed Arab taking flying lessons," but we surely did not know 
> this prior to 9/11.
> 
> Finding correlations ("took flying lessons," "showed interest in 
> chemical engineering," "partied at a strip club") is not hard. But not 
> very useful.
>
 I think the LEOs and sheeple would be willing to accept the 
general rule that anyone who has lots of money to spend yet has 
no declared legitimate source of income is probably some kind
of criminal.  With a sufficiently broad definition of "criminal".
the reasoning is actually pretty good.
 
> To the law enforcement world, this means _everyone_ must be tracked and 
> surveilled, dossiers compiled.
>
No doubt.
 
> All of the talk about "safeguards" in the data mining is just talk. Any 
> safeguard sufficient to give John Q. Public protection will give 
> Mohammed Atta protection...because operationally they are identical 
> persons: there is no subobject classifier which can distinguish them! By 
> saying Mohammed Atta is indistinguishable from other Arab men who 
> generally fit the same criteria...assuming we don't know in *advance* 
> that "Unemployed Arab taking flying lessons" is an important subobject 
> classifier.
> 

I think the kind of "abuses" that they're trying to "safeguard"
against are things like an IRS agent triggering an audit on a 
neighbor in retalliation for playing the stereo too loud. As
opposed to auditing someone because playing music too
loud is part of the tax evader profile, which would be completely
proper.  I hope the distinction is clear. 

> Indeed, the major "changes in ground truth" (what is actually seen on 
> the "ground," as in a battle) have come from technology. It was the 
> invention and sale of the Xerox machine and VCR that altered legal ideas 
> about copyright and "fair use," not a bunch of lawyers pontificating. In 
> both cases, the ground truth had already shifted, in a kind of 
> knowledgequake, and the Supremes had only two choices: accept the new 
> reality by arguing about "fair use" and "time-shifting," or declare such 
> machines contraband and authorize the use of storm troopers to collect 
> the millions of copiers and VCRs aleady sold. They chose the first 
> option.
> 

It might be amusing to speculate as to what the result
would have been had they attempted to choose the second option.
Or maybe not.


> Precisely! This is why the talk fo how the Cypherpunks list (and similar 
> lists) should not be political is so wrong-headed: without a political 
> compass, where would we head?
> 

I think this comes from different meanings of the word p

The Stock Info that You Wanted

2002-04-30 Thread Momentum Researcher
Title: April 2002






April
2002 (Late Edition) 
Vector Energy: OTCBB: VECT
The
Momentum ResearcherTM
For the Investor who
rides the volume.
News Update: Vector Energy
Corporation is an Acquisition Target

Vector’s
Spectacular Performance Continues to make it a Great Buy! 
Trading 76% Below Book! 


VECTOR
ENERGY – OTCBB: VECT


Price
Target:  $0.50-$0.75

Symbol:  
VECT

Book
Value per share:  $0.25


Shares
Outstanding:  41,501,449 

Market
Cap:  $3,112,609

52
Week High/Low: $0.29 - $0.03
TMR has written about
Vector Energy Corporation (VECT) for some time and it has already paid off. 
Vector climbed from $0.04 per share to $0.12 per share. 
Vector traded recently at $0.075 per share and TMR
looks for Vector to climb back to the $0.15 to $0.20 per share range
since Vector will be reducing its secured debt. Vector will potentially reduce
all of its secured debt of almost $3 million this coming year and has just found
another $1.2 million of annual revenue from its Bateman Lake field. The momentum
investor can ride the volume on a spectacular performer for the next 6 to 12
months.
ABOUT
THE COMPANY


Vector Energy Corporation is a Houston based oil and gas
company primarily involved in the acquisition, development, and production of
natural gas and crude oil. The Company owns or has substantial interest in
various onshore wells located in Texas, Louisiana, and Oklahoma including an
offshore property in the Mustang Island area with an estimated 15bcf of net
proved reserves.
REASONS
TO OWN THE STOCK


The Momentum Researcher 
likes VECT for these reasons:


Vector will bring in $935,000 to $1.3 million cash from
auctioning some of its producing properties in Gregg & Harrison Counties in
Texas and Claiborne Parish, Louisiana.  The
auction, to be held on April 30, 2002, will further assist debt reduction.
Because of Vector’s debt reduction plan, its secured lender has extended
Vector’s debt for an additional two months and reduced its amortization
schedule.
The Mideast crisis has created an uncertainty about the
supply of Arab oil therefore increasing oil prices. 
Combined with a rebound in the economy, increased factory production and
a decline in the huge storage reserves of gas, oil and gas prices are rebounding
and expected to stay firm over the next 12 to 18 months.
Vector
has tested its Bateman Lake Number 22 well and results indicate 3,379 psi with
over 6,000 feet of oil in the tubing.  The
well is expected to produce 200 barrels of oil and 500 Mcf of gas per day. 
At current prices this will add $200,000 of revenue per month.
Vector
is reducing its debt.  Vector will
potentially add approximately $3 million to reducing all of its secured debt
this year through:

  
A workover program that will add a
  potential $2.5 million of revenue by reworking 4 wells in the Bateman Lake
  Field, St. Mary’s Parish, LA.
  
  
$2.65 million in production payments
  from the sale of Vector’s interest in the Westbrook and Elder fields.
  
  
An auction of some of Vector’s
  mature producing properties bringing in at least $935,000.
  
  
  

Vector is following its 2002 strategy of
reducing debt, improving cash flow and making acquisitions of oil and gas
properties.  The market believes
Vector’s strategy is working as shown by the significant increase in
Vector’s stock price.


INVESTMENT
CONSIDERATION


TMR
sees that Vector is becoming a stronger target to be acquired. 
  Vector’s stock value
already is building fast. Vector’s focus on reducing debt, increasing cash
flow, reworking productive properties and making more acquisitions for 2002 is
working. With its stock trading way below book value and its debt reduction
plan, TMR conservatively targets a price per share for Vector in the
$0.50 to $0.75 range long term and of $0.15 to $0.20 in the short term range.
Investors, ride the volume now!
 
The
Momentum Researcher is an independent research service. This news release is
based on independent analysis but also relies on information supplied by sources
believed to be reliable. This report may not be the opinion of Vector Energy
Corporation management. The Momentum Researcher has been paid a fee of
$1,000.00. The Momentum Researcher does not buy or sell Vector Energy
Corporation common shares in the open market nor does it hold or own any Vector
Energy Corporation common or preferred shares. The
information contained in this report is not intended to be, and shall not
constitute, an offer to sell or solicitation of any offer to buy any security.
It is intended for information only. Some statements may contain so-called
“forward-looking statements” within the meaning of Section 27A of the
Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934.
The Private Securities Litigation Reform Act of 1995 provides a safe harbor for
forward-looking statements made by Vector or on its behalf. These
forward-looking statements are not historical facts, bu

Bad guys vs. Good guys

2002-04-30 Thread Tim May

Note: I wrote the following item to Dave Molnar, as part of our off-line 
conversation. I ended up summing-up a bunch of points I wanted to put 
out to the list, and Dave has given me permission to include his 
remarks. A few places refer to "you"...this is why.

On Monday, April 29, 2002, at 09:06  AM, David A Molnar wrote:

On Mon, 29 Apr 2002, Tim May wrote:
to Help the Cause. I pointed out to him the Big Brotherish trends and
how his data mining software would be more likely to be used to track
dissidents than it would be to stop an Arab from hijacking a plane.

Yes, this was what disturbed me a bit at the workshop. Privacy issues 
were
discussed, but most of the time it seemed like lip service. No one 
brought
up the issue of oversight, control, and explanation of the new methods
we'd all develop. Not to mention that the problems we were supposed to
solve started out vague and stayed pretty vague.

[Note: this is a discussion about "data mining," the subject of a couple 
of recent workshops and conferences, post 911. I was referring to a 
friend of mine who runs a very successful data mining operation, in the 
hedge fund business, and how he wants to apply his expertise to help the 
anti-terrorism battle.]

The deep error which has been with us for a long time is the assumption 
that we can create legal systems or surveillance systems which go after 
"bad guys" but not "good guys." That is, that we can separate "bad guys" 
like Mohammed Atta from "good guys," all in advance of actual criminal 
or terrorist acts.

Your later point about how the creators of these data mining systems 
want "protections" which prevent systems from going too far, from 
extracting too much information, from compiling too many dossier 
entries...this is just one of many examples. (Others being: restrictions 
on cash and crypto and many other things, surveillance cameras, etc.) 
The talk of "safeguards" misses the important error.

The error is that any system usable by John Q. Public to protect his 
privacy is usable by Mohammed Atta to protect HIS privacy, absent some 
way to classify John Q. Public and Mohammed Atta into two different 
classes. Such a system was not in place on Sept 10th, and it is unlikely 
to ever be in place. (The upcoming film "Minority Report" is just the 
latest treatment of this theme: can criminals be classified in advance 
of their crimes? Phrenologists used to measure head shape, now we have 
"personality inventory" tests in grade school, trying to separate out 
the future psychopaths and thought criminals from the rest of the herd.)

Given that such a classifier (in topos terms, a "subobject classifier") 
does not exist at present, the only solution is then to ban all forms of 
cash, for example. Or place surveillance cameras in all public places. 
Or to set up comprehensive national dossier systems.  And the 
"safeguards" in data mining will of course be either subverted or 
ignored, as any safeguard which protects John Q. Public wll, perforce, 
protect "future Columbine killers," future Charles Mansons, and future 
Mohammed Attas.

The radical view many of us espouse is actually the one envisaged by the 
Founders: protection from government is more important than catching a 
few criminals in advance of their crimes. (Probably a more elegant, 
universal way of phrasing this...)

Yes, some people who use digital cash will be bad guys. Yes, some people 
who use remailers will be child porn sellers. Yes, etc.

[Note: the following is more speculative, meant as a comment to Dave, a 
math major. When I outline my full proposal on how category theory and 
topos theory apply to our kind of issues, I'll lay out the arguments in 
much more detail.]

The topos connection is very real, in terms of outlook shift. If someone 
says "Is Person X a criminal or not a criminal?," this is not meaningful 
in terms of future actions. It is only meaningful in terms of a 
*constructive* proof: has this person already *committed* a crime? If a 
crime can be demonstrated and the right causal links established, the 
person has been proved to have committed a crime. This is of course the 
intuitionist (in Brouwer's sense) position (which I am now realizing I 
support, and that others should support, and that it in fact matches 
reality in many important ways).


---Digression on Intuitionism---

Intuitionism is defined at length in online sources, e.g., Mathworld. It 
has nothing to do with mysticism or irrationality. Rather, it's an 
alternative to conventional 20th century logic. In the intuitionist 
view, infinity is not used and the "law of the excluded middle" is not 
used. This has implications for the Axiom of Choice and its equivalent 
forms. Radical when Brouwer first proposed it nearly a century ago, but 
used extensively in the 1960s. Closely related to "time-varying sets," 
where set membership is a function of time, naturally enough. ("John is 
now a member of the set of civilians, but tomorrow he becomes a

Bad guys vs. Good guys

2002-04-30 Thread Tim May

Note: I wrote the following item to Dave Molnar, as part of our off-line 
conversation. I ended up summing-up a bunch of points I wanted to put 
out to the list, and Dave has given me permission to include his 
remarks. A few places refer to "you"...this is why.

On Monday, April 29, 2002, at 09:06  AM, David A Molnar wrote:
>
> On Mon, 29 Apr 2002, Tim May wrote:
>> to Help the Cause. I pointed out to him the Big Brotherish trends and
>> how his data mining software would be more likely to be used to track
>> dissidents than it would be to stop an Arab from hijacking a plane.
>
> Yes, this was what disturbed me a bit at the workshop. Privacy issues 
> were
> discussed, but most of the time it seemed like lip service. No one 
> brought
> up the issue of oversight, control, and explanation of the new methods
> we'd all develop. Not to mention that the problems we were supposed to
> solve started out vague and stayed pretty vague.

[Note: this is a discussion about "data mining," the subject of a couple 
of recent workshops and conferences, post 911. I was referring to a 
friend of mine who runs a very successful data mining operation, in the 
hedge fund business, and how he wants to apply his expertise to help the 
anti-terrorism battle.]

The deep error which has been with us for a long time is the assumption 
that we can create legal systems or surveillance systems which go after 
"bad guys" but not "good guys." That is, that we can separate "bad guys" 
like Mohammed Atta from "good guys," all in advance of actual criminal 
or terrorist acts.

Your later point about how the creators of these data mining systems 
want "protections" which prevent systems from going too far, from 
extracting too much information, from compiling too many dossier 
entries...this is just one of many examples. (Others being: restrictions 
on cash and crypto and many other things, surveillance cameras, etc.) 
The talk of "safeguards" misses the important error.

The error is that any system usable by John Q. Public to protect his 
privacy is usable by Mohammed Atta to protect HIS privacy, absent some 
way to classify John Q. Public and Mohammed Atta into two different 
classes. Such a system was not in place on Sept 10th, and it is unlikely 
to ever be in place. (The upcoming film "Minority Report" is just the 
latest treatment of this theme: can criminals be classified in advance 
of their crimes? Phrenologists used to measure head shape, now we have 
"personality inventory" tests in grade school, trying to separate out 
the future psychopaths and thought criminals from the rest of the herd.)

Given that such a classifier (in topos terms, a "subobject classifier") 
does not exist at present, the only solution is then to ban all forms of 
cash, for example. Or place surveillance cameras in all public places. 
Or to set up comprehensive national dossier systems.  And the 
"safeguards" in data mining will of course be either subverted or 
ignored, as any safeguard which protects John Q. Public wll, perforce, 
protect "future Columbine killers," future Charles Mansons, and future 
Mohammed Attas.

The radical view many of us espouse is actually the one envisaged by the 
Founders: protection from government is more important than catching a 
few criminals in advance of their crimes. (Probably a more elegant, 
universal way of phrasing this...)

Yes, some people who use digital cash will be bad guys. Yes, some people 
who use remailers will be child porn sellers. Yes, etc.

[Note: the following is more speculative, meant as a comment to Dave, a 
math major. When I outline my full proposal on how category theory and 
topos theory apply to our kind of issues, I'll lay out the arguments in 
much more detail.]

The topos connection is very real, in terms of outlook shift. If someone 
says "Is Person X a criminal or not a criminal?," this is not meaningful 
in terms of future actions. It is only meaningful in terms of a 
*constructive* proof: has this person already *committed* a crime? If a 
crime can be demonstrated and the right causal links established, the 
person has been proved to have committed a crime. This is of course the 
intuitionist (in Brouwer's sense) position (which I am now realizing I 
support, and that others should support, and that it in fact matches 
reality in many important ways).


---Digression on Intuitionism---

Intuitionism is defined at length in online sources, e.g., Mathworld. It 
has nothing to do with mysticism or irrationality. Rather, it's an 
alternative to conventional 20th century logic. In the intuitionist 
view, infinity is not used and the "law of the excluded middle" is not 
used. This has implications for the Axiom of Choice and its equivalent 
forms. Radical when Brouwer first proposed it nearly a century ago, but 
used extensively in the 1960s. Closely related to "time-varying sets," 
where set membership is a function of time, naturally enough. ("John is 
now a member of the set of civilians

Re: p2p and asymmetric bandwidth (Re: Fear and Futility atCodeCon)

2002-04-30 Thread Ben Laurie

[EMAIL PROTECTED] wrote:
> 
> --
> On 29 Apr 2002 at 14:58, Sampo Syreeni wrote:
> > [IPv6] nicely solves the problem with NATs, true. However, most
> > firewalls I know are there for security reasons. Those will
> > likely be adapted to work for 6to4 as well. The transition
> > period will likely see some cracks where p2p can work, but I
> > suspect those will be closed in due course.
> 
> Customers want P2P.  Businesses will supply it.  The reason they
> are not supplying it now is that there is an IP shortage.

Absolutely not so - the reason they are not supplying it now is that
letting arbitrary machines inside your firewall advertise services is a
fantastically huge security hole.

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html   http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff




Bad guys vs. Good guys

2002-04-30 Thread Tim May

Note: I wrote the following item to Dave Molnar, as part of our off-line 
conversation. I ended up summing-up a bunch of points I wanted to put 
out to the list, and Dave has given me permission to include his 
remarks. A few places refer to "you"...this is why.

On Monday, April 29, 2002, at 09:06  AM, David A Molnar wrote:
>
> On Mon, 29 Apr 2002, Tim May wrote:
>> to Help the Cause. I pointed out to him the Big Brotherish trends and
>> how his data mining software would be more likely to be used to track
>> dissidents than it would be to stop an Arab from hijacking a plane.
>
> Yes, this was what disturbed me a bit at the workshop. Privacy issues 
> were
> discussed, but most of the time it seemed like lip service. No one 
> brought
> up the issue of oversight, control, and explanation of the new methods
> we'd all develop. Not to mention that the problems we were supposed to
> solve started out vague and stayed pretty vague.

[Note: this is a discussion about "data mining," the subject of a couple 
of recent workshops and conferences, post 911. I was referring to a 
friend of mine who runs a very successful data mining operation, in the 
hedge fund business, and how he wants to apply his expertise to help the 
anti-terrorism battle.]

The deep error which has been with us for a long time is the assumption 
that we can create legal systems or surveillance systems which go after 
"bad guys" but not "good guys." That is, that we can separate "bad guys" 
like Mohammed Atta from "good guys," all in advance of actual criminal 
or terrorist acts.

Your later point about how the creators of these data mining systems 
want "protections" which prevent systems from going too far, from 
extracting too much information, from compiling too many dossier 
entries...this is just one of many examples. (Others being: restrictions 
on cash and crypto and many other things, surveillance cameras, etc.) 
The talk of "safeguards" misses the important error.

The error is that any system usable by John Q. Public to protect his 
privacy is usable by Mohammed Atta to protect HIS privacy, absent some 
way to classify John Q. Public and Mohammed Atta into two different 
classes. Such a system was not in place on Sept 10th, and it is unlikely 
to ever be in place. (The upcoming film "Minority Report" is just the 
latest treatment of this theme: can criminals be classified in advance 
of their crimes? Phrenologists used to measure head shape, now we have 
"personality inventory" tests in grade school, trying to separate out 
the future psychopaths and thought criminals from the rest of the herd.)

Given that such a classifier (in topos terms, a "subobject classifier") 
does not exist at present, the only solution is then to ban all forms of 
cash, for example. Or place surveillance cameras in all public places. 
Or to set up comprehensive national dossier systems.  And the 
"safeguards" in data mining will of course be either subverted or 
ignored, as any safeguard which protects John Q. Public wll, perforce, 
protect "future Columbine killers," future Charles Mansons, and future 
Mohammed Attas.

The radical view many of us espouse is actually the one envisaged by the 
Founders: protection from government is more important than catching a 
few criminals in advance of their crimes. (Probably a more elegant, 
universal way of phrasing this...)

Yes, some people who use digital cash will be bad guys. Yes, some people 
who use remailers will be child porn sellers. Yes, etc.

[Note: the following is more speculative, meant as a comment to Dave, a 
math major. When I outline my full proposal on how category theory and 
topos theory apply to our kind of issues, I'll lay out the arguments in 
much more detail.]

The topos connection is very real, in terms of outlook shift. If someone 
says "Is Person X a criminal or not a criminal?," this is not meaningful 
in terms of future actions. It is only meaningful in terms of a 
*constructive* proof: has this person already *committed* a crime? If a 
crime can be demonstrated and the right causal links established, the 
person has been proved to have committed a crime. This is of course the 
intuitionist (in Brouwer's sense) position (which I am now realizing I 
support, and that others should support, and that it in fact matches 
reality in many important ways).


---Digression on Intuitionism---

Intuitionism is defined at length in online sources, e.g., Mathworld. It 
has nothing to do with mysticism or irrationality. Rather, it's an 
alternative to conventional 20th century logic. In the intuitionist 
view, infinity is not used and the "law of the excluded middle" is not 
used. This has implications for the Axiom of Choice and its equivalent 
forms. Radical when Brouwer first proposed it nearly a century ago, but 
used extensively in the 1960s. Closely related to "time-varying sets," 
where set membership is a function of time, naturally enough. ("John is 
now a member of the set of civilians

[±¤°í]¿¥ÇǾ²¸®°¡ ²ÇÂ¥ ¹«ºñ À×±Û¸®½¬µµ ²ÇÂ¥!!!

2002-04-30 Thread ¿µ¾îÄ£±¸
Title: : Á¶È­À¯ÀÇ ¹Ì±¹¿µ¾î :




  
  
 
  

 
  

 
  

 
  
  

 
  
* º» ¸ÞÀÏÀº Á¤º¸Åë½ÅºÎ ±Ç°í»çÇ׿¡ ÀÇ°Å (±¤°í)ÀÓÀ» ¹àÀÔ´Ï´Ù. Çã¶ô¾øÀÌ È«º¸¸ÞÀÏÀ» º¸³»µå·Á ÁË¼Û ÇÕ´Ï´Ù. ±ÍÇÏÀÇ E-MAILÀº °Ô½ÃÆÇ µî 
ÀÎÅÍ³Ý »ó¿¡¼­ ¾Ë°Ô µÇ¾úÀ¸¸ç, E-mailÀ» Á¦¿ÜÇÑ ¾î¶°ÇÑ Á¤º¸µµ ¾ËÁö ¸øÇÔÀ» ¹àÈü´Ï´Ù. ÇÊ¿ä¾ø´Â ¸ÞÀÏÀÏ °æ¿ì, ºÒÆíÇϽôõ¶óµµ ¹Ý¼ÛÇÏ¿© Áֽøé 
´õ ÀÌ»ó ¹ß¼ÛµÇÁö ¾Êµµ·Ï ÇÏ°Ú½À´Ï´Ù.  This mail is designed for a Commercial use to inform a special sales 
event. If you don't want this type of information, Press button below and press left button on next screen will erase 
your email 
address from our email system. Thank you

  

  
 







RE: Got carried away...

2002-04-30 Thread Trei, Peter

> Optimizzin Al-gorithym[SMTP:[EMAIL PROTECTED]]
> 
> 
> At 09:02 AM 4/30/02 -0400, Steve Furlong wrote:
> >Ken Brown wrote:
> >
> >> ... An even
> >> if cars were "like little tanks" why not open them with ordinary
> >> physical keys, like real tanks?
> >
> >US tanks don't have built-in locks as in private autos. They have heavy
> >wire loops or bars and are locked with ordinary (if rather heavy-duty)
> >padlocks.
> 
> Of course, no security is impenatrable, and a few years ago 
> some (possibly unbalanced :-) yahoo stole a tank IIRC from 
> a SoCal National Guard and demonstrated that the Jersey 
> barriers on the 5 were not up to the task.  Eventually a cop
> climbed it and shot the guy in the tank.  Remember to 
> lock that door.
> 
> An inspiring bit of surrealtv, that was.
> 
> 
Shawn Nelson, 1995, Clairemont CA (a suburb of San Diego)

Nelson was an alcoholic plumber who had just lost his job, wife,
and home. He was an Army reservist. He had tank training 
and access - he was not just some random yahoo off the street.

The helicopter footage is pretty spectacular - he drove the 
tank around a suburban neighbourhood for a while, crushing
cars and RVs, and taking out numerous fire hydrants and
telephone poles. No one was injured.

He tried to jump the median of a highway rather than
run over a bunch of (occupied) police cars, and got 
high-centered. The cops used bolt cutters to open 
the M-60's hatch, and then shot him.

Now THAT's Road Rage.

Peter Trei




Re: Got carried away...

2002-04-30 Thread Optimizzin Al-gorithym

At 09:02 AM 4/30/02 -0400, Steve Furlong wrote:
>Ken Brown wrote:
>
>> ... An even
>> if cars were "like little tanks" why not open them with ordinary
>> physical keys, like real tanks?
>
>US tanks don't have built-in locks as in private autos. They have heavy

>wire loops or bars and are locked with ordinary (if rather heavy-duty)
>padlocks.

Of course, no security is impenatrable, and a few years ago some
(possibly
unbalanced :-) yahoo stole a tank IIRC from a SoCal National Guard and
demonstrated
that the Jersey barriers on the 5 were not up to the task.  Eventually a
cop
climbed it and shot the guy in the tank.  Remember to lock that door.

An inspiring bit of surrealtv, that was.




Re: VB ile Programlama / % 50 indirim

2002-04-30 Thread ARTER
Title: ARTER YAYINCILIK MUHENDISLIK DANISMANLIK









 


 
  
  
   
   












   
   
   
  
   
  
  Referanslarimizdan  bazilari: 
  Türk Telekom
  Genel Müdürlügü
  Disbank Gn. Md.
  
  Alarko Holding
  Anadolu Sigorta
  Gn. Md. 
  Telsim
  Ege
  Üniversitesi   
  Alkim Kimya
  Sanayii
  Hema
  Disli ve Makina San. Tic. A.S.
  DSi Antalya
  Böl. Md. 
  DSi Bursa   Böl. Md.
  inönü Üniversitesi
  Kombassan
  ……..
   
   
   
   
   
   
  
 


Amatör veya profesyonel olarak,

 

Visual Basic ile Programlama

Database

Visual
Basic ve Database

 

konulari ile ilgileniyorsaniz sitemizi ziyaret ediniz.

-

Sitemizi daha evvel ziyaret
ettiyseniz,

 %50'yi asan indirimlerimizi

ve

sitemizi güncelledigimizi

 

sizlere duyurmaktan mutluyuz.

 

www.arterweb.com

 

 

Aradiginiz pek çok seyi sitemizde bulabileceksiniz.

 

ARTER YAYINCILIK MÜHENDiSLiK DANISMANLIK

 

 

 









Re: haos -- from MathWorld

2002-04-30 Thread Ken Brown


Jim Choate wrote:
> 
> http://mathworld.wolfram.com/Chaos.html


Er, yes, it is a great site. It even has a definition of mathematical
chaos:

 
"A dynamical system is chaotic if it 
1. Has a dense collection of points with periodic orbits, 
2. Is sensitive to the initial condition of the system (so that
initially nearby points can evolve quickly into very
different states), and
3. Is topologically transitive. 
Chaotic systems exhibit irregular, unpredictable behavior (the butterfly
effect). The boundary between linear and chaotic   behavior is often
characterized by period doubling, followed by quadrupling, etc.,
although other routes to chaos are also
possible"

And this implies that "chaotic" means the same as "stochastic"

One of the reasons I don't like the word "chaotic" is that it misleads
people into thinking it is the same as random, or as stochastic.




Re: Got carried away...

2002-04-30 Thread Steve Furlong

Ken Brown wrote:

> ... An even
> if cars were "like little tanks" why not open them with ordinary
> physical keys, like real tanks?

US tanks don't have built-in locks as in private autos. They have heavy
wire loops or bars and are locked with ordinary (if rather heavy-duty)
padlocks.

-- 
Steve FurlongComputer Condottiere   Have GNU, Will Travel

The reasonable man adapts himself to the world; the unreasonable one
persists in trying to adapt the world to himself. Therefore all
progress depends on the unreasonable man.  -- George Bernard Shaw




Re: Got carried away...

2002-04-30 Thread Mike Rosing

On Mon, 29 Apr 2002, Neil Johnson wrote:

> 
> I made a sign for a friend who had recently purchased a Vette. 
> It said "please ignore, this car is just a AMC Pacer with a REALLY GOOD paint 
> job".
> 

You gotta be old enough to remember the pacer for that to make sense tho
:-)  I hope it was big enough to read from a distance.

Patience, persistence, truth,
Dr. mike





Re: Upcoming workshop on category theory and concurrency

2002-04-30 Thread Ken Brown

KPJ wrote:

[...]

> I have noticed this on-line anomaly which several people:
> they require more data on an online communication subject than on an offline
> communication subject. Appears irrational to me: online security can never
> become higher than physical security of the subject. But I disgress.

Not security, bandwidth. Millions of people can address me through
email, and hundreds do, every day.  Not enough time to read, so heaps is
skipped. In an ordinary day I doubt if as many as 5 strangers come up to
me and talk to me face to face, without me having approached them first,
and I live in a big city.  Also body language & stuff.




Fwd: GnuPG 1.0.7 released

2002-04-30 Thread Peter Kuhm


===SNIP===

To: [EMAIL PROTECTED]
From: Werner Koch <[EMAIL PROTECTED]>
Date: Tue, 30 Apr 2002 12:07:55 +0200


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hello!

The GNU Privacy Guard (GnuPG) is GNU's tool for secure communication
and data storage.  It is a complete and free replacement of PGP and
can be used to encrypt data and to create digital signatures.  It
includes an advanced key management facility and is compliant with the
proposed OpenPGP Internet standard as described in RFC2440.  This new
release has a lot of features beyond OpenPGP which will be included in
a soon to be published RFC2440 successor.

Version 1.0.7 has been released yesterday and is available at most
mirrors (see below) now.  If you can't get it from a mirror, use the
primary location:
  
  ftp://ftp.gnupg.org/gcrypt/gnupg/gnupg-1.0.7.tar.gz  (2.3MB)
  ftp://ftp.gnupg.org/gcrypt/gnupg/gnupg-1.0.7.tar.gz.sig

Due to some new translations and the work we did over the last 11
months, the diff against 1.0.6 is somewhat large:
  
  ftp://ftp.gnupg.org/gcrypt/gnupg/gnupg-1.0.6-1.0.7.diff.gz  (1.3MB)

MD5 checksums of the above files are:

  d8b36d4dfd213a1a1027b1877acbc897  gnupg-1.0.7.tar.gz
  99d92e0658972b42868d7564264797ad  gnupg-1.0.6-1.0.7.diff.gz

Some new things in this version:

* Secret keys are now stored and exported in a new format which
  uses SHA-1 for integrity checks.  This format renders the
  Rosa/Klima attack useless.  Other OpenPGP implementations might
  not yet support this, so the option --simple-sk-checksum creates
  the old vulnerable format.

* The default cipher algorithm for encryption is now CAST5,
  default hash algorithm is SHA-1.  This will give us better
  interoperability with other OpenPGP implementations.

* Symmetric encrypted messages now use a fixed file size if
  possible.  This is a tradeoff: it breaks PGP 5, but fixes PGP 2,
  6, and 7.  Note this was only an issue with RFC-1991 style
  symmetric messages.

* Photographic user ID support.  This uses an external program to
  view the images.

* Enhanced keyserver support via keyserver "plugins".  GnuPG comes
  with plugins for the NAI LDAP keyserver as well as the HKP email
  keyserver.  It retains internal support for the HKP HTTP
  keyserver.

* Nonrevocable signatures are now supported.  If a user signs a
  key nonrevocably, this signature cannot be taken back so be
  careful!

* Multiple signature classes are usable when signing a key to
  specify how carefully the key information (fingerprint, photo
  ID, etc) was checked.

* --pgp2 mode automatically sets all necessary options to ensure
  that the resulting message will be usable by a user of PGP 2.x.

* --pgp6 mode automatically sets all necessary options to ensure
  that the resulting message will be usable by a user of PGP 6.x.

* Signatures may now be given an expiration date.  When signing a
  key with an expiration date, the user is prompted whether they
  want their signature to expire at the same time.

* Revocation keys (designated revokers) are now supported if
  present.  There is currently no way to designate new keys as
  designated revokers.

* Permissions on the .gnupg directory and its files are checked
  for safety.

* --expert mode enables certain silly things such as signing a
  revoked user id, expired key, or revoked key.

* Some fixes to build cleanly under Cygwin32.

* New tool gpgsplit to split OpenPGP data formats into packets.

* New option --preserve-permissions.

* Subkeys created in the future are not used for encryption or
  signing unless the new option --ignore-valid-from is used.

* Revoked user-IDs are not listed unless signatures are listed too
  or we are in verbose mode.

* There is no default comment string with ascii armors anymore
  except for revocation certificates and --enarmor mode.

* The command "primary" in the edit menu can be used to change the
  primary UID, "setpref" and "updpref" can be used to change the
  preferences.

* Fixed the preference handling; since 1.0.5 they were erroneously
  matched against against the latest user ID and not the given one.

* RSA key generation.

* Merged Stefan's patches for RISC OS in.  See comments in
  scripts/build-riscos. 

* It is now possible to sign and conventional encrypt a message (-cs).

* The MDC feature flag is supported and can be set by using
  the "updpref" edit command.

* The status messages GOODSIG and BADSIG are now returning the primary
  UID, encoded using %XX escaping (but with spaces left as spaces,
  so that it should not break too much)

* Support for GDBM based keyrings has been removed.

* The entire keyring management has been revamped.

* The way signature stati are store has changed so that v3
  

Slashdot | Optical Waveguides in Photonic Crystals

2002-04-30 Thread Jim Choate

http://slashdot.org/science/02/04/30/1144228.shtml?tid=126
-- 

 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Re: which tends to extreme early specialisation,

2002-04-30 Thread Jim Choate


On Tue, 30 Apr 2002, Ken Brown wrote:

> Jim Choate wrote:
> > 
> > On Thu, 25 Apr 2002, Ken Brown wrote:
> > 
> > > One of the classic examples of what is now called "chaos" (a word that I
> > > don't like in this context). The exact trajectory taken by simple models
> > 
> > Uhuh...
> > 
> > > of predator-prey systems is often very sensitively dependent on initial
> > > conditions.  Of course in real life these things are stochastic anyway
> > 
> > Then I take it you don't like 'stochastic' since they really mean the same
> > thing in this context.
> 
> Same as what? "Stochastic" certainly doesn't mean the same thing as
> "chaotic" in this context, so I assume you didn't mean that.
> 
> [...]

> What I meant was that many biologists, even people who teach biology,

I see you've borrowed somebodies backpedalling bicycle.

Actually, in this context the difference between chaotic and stochastic is
one of degree. Both -require- the use of a RNG in at least one variable in
the system equations.

They are equivalent from this perspetive of analysis.

I'll go hog wild and give you another freebie I bet you don't have.

All RNG's are 'irrational generators' in that the sequence of numbers that
they generate must be irrational (ie don't repeat infinity-distribution
wise).


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org






Stochastic -- from MathWorld

2002-04-30 Thread Jim Choate

http://mathworld.wolfram.com/Stochastic.html
-- 

 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





haos -- from MathWorld

2002-04-30 Thread Jim Choate

http://mathworld.wolfram.com/Chaos.html
-- 

 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Re: Got carried away...

2002-04-30 Thread Ken Brown

I think I'll stick to my bicycle.

Why would anyone would want to waste their money on a car like that? Or
even trust their body to it?  I suppose insurance companies might have
an interest in limiting use of a car to people who were paid-up. An even
if cars were "like little tanks" why not open them with ordinary
physical keys, like real tanks? At least if someone nicks your keys they
leave your body behind. I want to use my retinas for seeing with.


Jan Dobrucki wrote:
 
> I have been thinking about the window problem and the ignition too.
> What I was thinking was a car of the not so far future. Where there
> wont be any windows because the driver will see the outside throu a
> camera and he wont need regular lights cause there'll be ultraviolet
> or something like that. The car will be like a little tank, so to
> speak. If the thief can't get in, then the ignition problem wouldn't
> exist. So someone can steel the pgp keys of the driver, but what if
> the key was, say a tatoe on his hand and would be visible only when
> the drivers was thinking of say... green fried tomatoes.
> Ok, so the thief managed to get into the car. There still voice
> recognition, fingerprints, retina scan, DNA scan, and whatever you
> can think of. I know this will be expensive, but in the future, well
> lets just say I don't think it's going to be sweet.




Re: [9fans] md5sum of plan9.iso.bz2 (fwd)

2002-04-30 Thread Jim Choate


-- Forwarded message --
Date: Tue, 30 Apr 2002 10:08:48 +0200
From: Lucio De Re <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: [9fans] md5sum of plan9.iso.bz2

On Tue, Apr 30, 2002 at 05:03:12PM +0900, [EMAIL PROTECTED] wrote:
> 
> What is md5sum of plan9.iso.bz2 ?
> 
The "bunzip2 -t" validated copy I have has:

MD5 (plan9.iso.bz2) = d788b526a503c270ada540317c78191d
d788b526a503c270ada540317c78191dplan9.iso.bz2

++L




which tends to extreme early specialisation,

2002-04-30 Thread Ken Brown

Jim Choate wrote:
> 
> On Thu, 25 Apr 2002, Ken Brown wrote:
> 
> > One of the classic examples of what is now called "chaos" (a word that I
> > don't like in this context). The exact trajectory taken by simple models
> 
> Uhuh...
> 
> > of predator-prey systems is often very sensitively dependent on initial
> > conditions.  Of course in real life these things are stochastic anyway
> 
> Then I take it you don't like 'stochastic' since they really mean the same
> thing in this context.

Same as what? "Stochastic" certainly doesn't mean the same thing as
"chaotic" in this context, so I assume you didn't mean that.

[...]
 
> > so the variables in your model should actually be probability
> > distributions, which makes the sums much harder and leads to
> > considerable handwaving.
> 
> unpredictabilty <> hand waving.

What I meant was that many biologists, even people who teach biology,
don't have the maths to describe the  models in detail.   So the books
and lectures tend to handwaving. The mutual incomprehension between
maths & biology can get extreme at times.

And even if they did their students, or the readers of their books,
certainly don't. I have been present at a practical class when a student
complained to the lecturer that he had promised that there would be "no
mathematics" on this course. She was moaning about something simple to
do with exponentials - the sort of algebra they tried to teach us at the
age of 12 or 13. From the lecturer's point of view it *wasn't*
mathematics, it was just general knowledge, the sort of thing he'd
expect any reasonably educated person to know about, or at least able to
pick up quickly.  As the course was about (amongst other things) enzyme
reaction kinetics it is a bit hard to understand how anyone could
imagine getting though it without at least that level of maths.

Possibly a worse problem in UK education than in most other countries. 
We encourage extreme early specialisation. In our schools you can drop
mathematics at 15 or 16 if you want, even if you later go on to study
science subjects at university. Well, you'd have trouble getting on to a
physics or engineering course, but you could do biology.  The most
advanced maths I did in what you would call high school was very
introductory calculus - simple differentiation mostly. Also  the
briefest introduction to integration. We weren't expected to be able to
do it, just know what it was, only a couple of hour's teaching. And that
was an /optional/ course, I could have got away without it. Not a
mention of matrices, nothing even approaching statistics, probability, 
number theory, none of what they then called "modern maths" (anything
which mentioned sets or topology), no algebra more advanced than the
quadratic equation formula (which we were expected to be able to use,
but not derive or prove).  And I was someone on a science track
(Biology, Chemistry, Physics) at a selective school that specialised in
science. My undergraduate courses included pick-ups on statistics and
probability, without which it would be impossible to take Biology, but
that was all.

Then these biologists who are semi-literate in maths become graduate
students and, need to do some modelling, and meet up with mathematicians
or physicists who may not have studied any biology since the age of 13. 
Of course all these folk did science at school - they probably have
never had any serious language or history teaching at all. It is
compulsory in British schools to do at least one modern language,
usually French for some reason, but only between the ages of 12 and 16,
and it is usually badly taught. In my experience most people who go on
to do science simply fail the class - they make you go to it, but you
don't have to pass to get onto other courses. There is no requirement to
"graduate" in classes you don't intend to continue with, so loads of
kids don't.

The same works the other way even more strongly. Most people studying
arts or humanities at university will never have passed a science exam
or maths exam in their lives,  and will have dropped or failed most of
the subjects *before* GCSE. I think the US equivalent to that would be
leaving a junior high school to go to a senior high school.  They are
exams you take at 15 or 16, and most of the brighter kids only attempt
the ones that they intend to continue later.

Of course the other side of the coin is that what we call "6th form"
education, 16-18, is, in sciences at any rate, the equivalent of the
first year of University in other countries.  So the system is good at
producing very knowledgeable people, very young. One of the reasons that
British research is significantly more productive than French or German.
By the time the French or German advanced student catches up with their
British counterpart in knowledge of their specialised subject they are
probably in their late 20s.

I didn't intend to write this rant... don't get me onto school sport

Ken




Re: BBC2 to recreate Stanford Prison Experiment

2002-04-30 Thread Ken Brown

A quick walk round South London would show that a very large number of
men (including myself) shave their heads anyway - probably not as many
as 5 years ago, when it was almost normal, but a significant minority.

Ken

Generic Poster wrote:
> 
> ..from an ad in circulation on BBC2 (UK) if I recall inaccurately.
> 
> "If they shaved your head, would you lose your individuality?
> 
> If they took away your name, would they take your identity?
> 
> [..]
> 
> 16(?) men. Half with power, half with none. See how events unfold in:
> 
> The Experiment.
> 
> Coming soon to BBC2..."
> 
> --
> 
> "We don't need no steenking badges!!!"
> - Blazing Saddles.




Encryption scales to fit smaller RF ID tags

2002-04-30 Thread Eugen Leitl

http://www.eet.com/at/news/OEG20020408S0058

Encryption scales to fit smaller RF ID tags

By Chappell Brown
EE Times
April 9, 2002 (8:42 a.m. EST)
 
BURLINGTON, Mass. ? Armed with a simplified mathematical approach to 
public-key encryption, NTRU Cryptosystems Inc. here is introducing 
intellectual property that can add security to virtually any circuit. The 
most recent product based on the approach is a circuit block that can be 
added to small wireless products such as smart cards and point-of-sale ID 
tags. NTRU claims the approach is as secure as the popular RSA public-key 
encryption system but is computationally much simpler.

"Public-key cryptography is necessary in systems of high scale or high 
security. Their primary advantage is that they allow for encryption keys 
to be widely distributed without fear of compromise," said Scott Crenshaw, 
chief executive officer of NTRU. "NTRU's core technology solves a 
fundamental problem for public-key cryptography." Until now, Crenshaw 
said, "public-key systems required very large numbers of gates ? 50,000 
gates, 100,000 gates ? or in software, it required a Pentium-class 
machine. NTRU's system, on the other hand, fits into a very small number 
of gates and can run on a low-end microcontroller."

Two approaches

The company's product line, GenuID, is segmented into two areas: software 
running on low-end microcontrollers and a processor core that can be 
inserted into designs. "We run the software implementation faster than RSA 
can run on a Pentium," claimed Crenshaw, referring to the most popular 
form of public-key encryption, RSA (named for its inventors: Ron Rivest, 
Adi Shamir and Leonard Adleman). Tool kits both for implementing readers 
and for the back-end system are also available.

RSA's contactless smart cards sell for $3 to $5, Crenshaw said, while 
GenuID chips sell for 50 cents to $1. "This is significant for 
manufacturers ? it opens up new application areas that require security," 
he said.

The different approach to encryption began with a group of math professors 
at Brown University. They realized that a more computationally efficient 
version would open a huge market for low-end security. Jeffrey Hoffstein, 
Joseph Silverman, Jill Pipher and Daniel Lieman ? who co-founded NTRU ? 
studied the conventional approach and realized that the basic strategy, 
based on integer arithmetic, took a toll computationally. While integer 
math is well-understood and relatively easy to implement in software, the 
underlying computer models are complex in terms of the conventional 
structure of digital CPUs.

Modular math

The RSA uses numbers with 1,024 bits. In contrast, the NTRU algorithm is 
based on byte boundaries that even an 8-bit microprocessor can handle. The 
algorithm is based on modular arithmetic, which operates on arrays of 
bytes.

Public-key cryptography depends on an algorithm that is easy to run in one 
direction only. For example, multiplying two large prime numbers is easier 
computationally than finding the two prime factors of some number that has 
been generated in this way. Thus, if an encryption system is based on 
prime-number computational asymmetry, it will be tough for a code cracker 
to take a brute-force approach to deducing the original two numbers. Using 
known benchmarks for computer systems, a cryptologist simply needs to 
determine two prime numbers that are large enough to make the prime 
factoring algorithm impossible to execute in a reasonable amount of time. 
Other hard-to-solve mathematical problems have also been used to create 
computationally asymmetrical algorithms.

With the NTRU approach, the basic computational context goes from integer 
arithmetic to polynomial algebra.

Rather than encode information as digits representing numbers, NTRU uses 
sequences of integers that form the coefficients of a polynomial. That 
simplifies computation. "The NTRU system only uses adds and shifts, which 
are easier to perform than full integer arithmetic," Crenshaw said. The 
security algorithms are 2,000 times faster and 50 times smaller than other 
public-key methods, he said.

The system can attach a secure digital "signature" to a document that can 
be verified as valid using only a public key. The private key is 
represented by two small polynomials, which generate a very large system 
of polynomials. The public key is derived from the two private-key 
polynomials using convolution and is able to generate the same set of 
polynomials as the two private-key polynomials. A digital message is then 
hashed and encoded as a pair of polynomials that are essentially random.

A pair of polynomials in the set generated by the private keys is computed 
from the private key so that they are within a predetermined, close bound 
to the hashed message. One of the nearest-neighbor polynomials then 
becomes the digital signature. The original message is sent along with the 
signature, and the recipient, after using the same has

Distributed computing meets PtoP.

2002-04-30 Thread matthew X

http://australianit.news.com.au/articles/0,7204,4223115%5E15321%5E%5Enbv%5E15
306,00.html
KaZaA lite is being hunted down by this Sharman Outfit as ISPs in OZ are
asked by artists group ARIA for take downs
http://australianit.news.com.au/articles/0,7204,4224567%5E15306%5E%5Enbv%5E,0
0.html
More KaZaA
http://theage.com.au/articles/2002/04/26/1019441306209.html
Secreted in KaZaA software is Altnet  and its about to be activated,
warns Nathan Cochrane.
The 20 million users of KaZaA Media Desktop, the world's most popular
file-swapping software, have little more than a month to decide if they
want their computers hijacked.
That's the time-frame laid down last Wednesday by Sharman Networks chief
executive Nikki Hemming for the activation of Altnet, an alternative
network to the Internet used to create a giant virtual supercomputer.
More...