CNN.com - Privacy law muddles missing girl query - May 9, 2002

2002-05-10 Thread Jim Choate

http://www.cnn.com/2002/US/05/09/missing.girl.ap/index.html
-- 

 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - Wildlife
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Verba Volant 10-05-2002

2002-05-10 Thread Verba Volant

Verba Volant 10-05-2002,
Every day a new quotation translated into many languages. 

_ 
Quotation of the day:
Author -
Henry
David Thoreau
English - we should distrust any
enterprise that requires new clothes
Italian -
dovremmo diffidare di ogni impresa
che richieda un vestito nuovo
Spanish -
deberíamos desconfiar de cualquier
empresa que requiera un traje nuevo
French -
nous devrions nous méfier de toute
entreprise qui nécessite un nouvel habit
German -
wir sollten jedem Vorhaben, dass neue
Kleider braucht, misstrauen
Albanian -
nuk duhet të kemi besim në asnjë punë
që ka nevojë për veshje të reja
Asturian -
debemos desconfiar de les empreses
que requieran ropa nuevo
Basque -
ez ginateke fidatu behar jantzi
berria behar duen enpresaz
Bolognese -
arénn da stèr luntàn da tótti cäli
inpraiS ch'äl vójjen un ftièri nôv
Brazilian Portuguese -
devemos desconfiar de qualquer
empresa que necessite de novas roupas
Bresciano -
èn garès de mia fidas de tóte le
'mprese che le ghà bisogn de en vistit nóf
Breton -
ret e vefe deomp disfiziout e n'eus
forzh pe embregerezh a c'houlenn dilhad nevez
Calabrese -
averama diffidà di ogni impresa ca
vulera nu vestitu nuovu
Catalan -
hauríem de desconfiar de qualsevol
empresa que requereixi un vestit nou
Croatian -
trebali bismo biti nepovjerljivi
prema svakom poduhvatu koji traži novu odjecu
Czech -
meli bychom být neduveriví vuci
každému podniku, který vyžaduje nové šaty
Danish -
vi må være på vagt efter et hver
handlig som gør det nødvendig at have nye klæder
Dutch -
we moeten argwanend zijn tegenover
elke onderneming die nieuwe kledij vereist
Esperanto -
ni devus malfidi cia entrepreno kiu
postulas novajn vestajojn
Estonian -
me ei peaks usaldama ühtegi üritust,
mis nõuab uusi riideid
Ferrarese -
a durìen sempar difidan d'ogni
impresa cla vola'n vastì nóv
Finnish -
ei pitäisi luottaa hankkeisiin, jotka
vaativat uuden puvun
Flemish -
we moeten argwanend zijn tegenover
elke onderneming die nieuwe kledij vereist
Furlan -
'o varessin di malfidasi di ogni
imprêse ca domande un vestît gnûf
Galician -
debemos desconfiar da calquera
empresa que esixa roupa nova
Griko Salentino -
enn è nna pistèzzume is cànne
ppolemìsi p'ndiàzzete o rucho cinùrio
Hungarian -
egy olyan vállalkozásban sem szabad
bíznunk, amihez új ruhára van szükség
Judeo Spanish -
kale deskonfiarse de kada una i una
empreza ke tiene menester de un vistido muevo
Latin -
nobis diffidandum est cuivis
societati quae novam vestem petat
Latvian; Lettish -
mums vajadzetu neuzticeties jebkuram
pasakumam, kas prasa jaunas drebes
Leonese -
nun tendríamos que nos fiare d'una
empresa que necesita un traxe nuevu
Limburgian -
sjauw dich vér zaoke boeste nauw
kleer vér vandoen hébs
Lombardo Occidentale -
dovariom malfidà tutt i impres che
ciammen vestii noeuv
Mantuan -
gh avresom da star atenti a tut quel
che par faral agh vol an vestì nov
Mudnés -
a duvàm difidèr ed tótt al questiòun
chi s'oblighèn a màtter un vistî nóv
Neapolitan -
nun duvessemo crerere ‘e cose che
richiedeno nu vestito nuovo
Norwegian -
vi bør ikke stole på noen virksomhet
som forlanger nye klær
Occitan -
chalria malfisar de chasque empresa
qu’abie manca d’una vèsta novèla
Papiamentu -
nos mester deskonfiá di kada empresa
ku mester di pañanan nobo
Parmigiano -
as devriss difidär 'd tutti li
impresi ch'i gh'an bsogna d'spianär un vesti nov
Piemontese -
i dovrìo nen fidesse ëd n'imprèisa
che a ciama na muda neuva
Polish -
musimy byc nieufni wobec kazdego
przedsiewziecia, które wymaga nowego stroju
Portuguese -
devemos desconfiar de qualquer
empresa que exija roupa nova
Reggiano -
gh'arésen da ster atèint a tott i
quee ch'agh vol un vistii nov
Romagnolo -
a duvress gardèr ad traverss on da
fer par quel a'i vuress un vistoid nov 
_ 
All languages, please click on this link
http://www.logos.net/owa-l/press.frasiproc.carica?code=581
_ 
To unsubscribe from Verba Volant, please follow this link:
http://www.logos.net/owa-l/press.rol_ml.verbavolant1?lang=en
and write in the empty field next to unsubscribe the email address that
you find after TO: in the Verba Volant emails
alternatively write to the following address:
[EMAIL PROTECTED] always copying the EMAIL address written
after X-RCPT-TO: 


The Register: Safedoor not core, shuts doors (another e-business closes, UK)

2002-05-10 Thread Jim Choate

http://www.theregister.co.uk/content/6/25234.html
-- 

 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - Wildlife
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Jobs for home 5956mTC-7 9902TOiK8-282ALyT77-18

2002-05-10 Thread latest3207d452513r65





  

  
FREE
SERVICE

39 million people are working from the
comfort of their own home... why not you?




  
  

  
We will put you in touch with the world's finest and most
reputable companies that can provide you with the most lucrative
compensation packages so you can gain true financial freedom.

Don't spend hours searching for let us do it for you-FREE!



  
  


or email us now with your
phone number

Inquiries with a name and phone number will get priority listings.Home
business owners are
making an average of over $75,000

Put our expertise to work for you today. There is NOTHING TO BUY
and there is no obligation of any sort. You have nothing to lose,
contact us immediately.

Click
here and include your name and phone number and one of our trained,
friendly staff will return your call to get you listed...
...again it's all
FREE, no catches.


 
 Motivated
self-starters that include phone numbers will be
 given top priority
status.



  
To be removed click
here

  








1322SVFr9-117sfVg8056LETn6-795zbVy5500xUHr7-649Pkmi6568l52

Free Service 6267ihgg1-882WjuP7420vslD0-9-26

2002-05-10 Thread latest8034y83





  

  
FREE
SERVICE

39 million people are working from the
comfort of their own home... why not you?




  
  

  
We will put you in touch with the world's finest and most
reputable companies that can provide you with the most lucrative
compensation packages so you can gain true financial freedom.

Don't spend hours searching for let us do it for you-FREE!



  
  


or email us now with your
phone number

Inquiries with a name and phone number will get priority listings.Home
business owners are
making an average of over $75,000

Put our expertise to work for you today. There is NOTHING TO BUY
and there is no obligation of any sort. You have nothing to lose,
contact us immediately.

Click
here and include your name and phone number and one of our trained,
friendly staff will return your call to get you listed...
...again it's all
FREE, no catches.


 
 Motivated
self-starters that include phone numbers will be
 given top priority
status.



  
To be removed click
here

  








4665ARja6-006IiWe1162ZbqQ6-287emUZ1786EMzw5-035Fl45

Sinirsiz porno

2002-05-10 Thread nilgun1
Title: Video 34dw 



  
  

  
  
  


  
  
JetSeks Film Arsivi
Uzun zamandir beklenen yeni videolar ve tam metrajli filmlerle yayina devam ediyoruz. Sitemizi Ziyaret ederek zevkinize uygun icerigi hemen indirin. Iyi eglenceler
	
  


  


  
 
  

   DIRECT DOWNLOAD | TIKLA
  INDIR
  
  

  
  
D
  O W N L O A D | Size: 2.6 MB
  
  

  
  
D
  O W N L O A D | Size: 4.0 MB
  



  

   HER AN GUNCELLENEN LINKLER


 Aciklama: Cumshot | adet : 6 | tür: mpg Aciklama: Hardcore | adet : 10 | tür: mpg Aciklama: Anal | adet : 1 | tür: avi Aciklama: Teen | adet : 10 | tür: mpg Aciklama: Hardcore | adet : 14 | tür: avi Aciklama: Teen | adet : 4 | tür: avi Aciklama: Interracial | adet : 12 | tür: mpg Aciklama: Monstercock | adet : 3 | tür: avi Aciklama: Teen | adet : 3 | tür: avi Aciklama: Hardcore | adet : 10 | tür: mpg Aciklama: Teen | adet : 3 | tür: mpeg Aciklama: Hardcore | adet : 10 | tür: mpg Aciklama: Hardcore | adet : 1 | tür: avi Aciklama: Pussy Licking | adet : 6 | tür: mpg	




  

  

   ARSIVDEN
SEÇMELER



  
  
  
  
  
  


  D
O W N L O A D | Size: 2.8 MB
  D
O W N L O A D | Size: 3.3 MB
  D
O W N L O A D | Size: 2.9 MB



  

  


  


  
  
  

  
  



Sende Jet e katil

2002-05-10 Thread dark80
Title: Video 3c 3rc 



  
  

  
  
  


  
  
JetSeks Film Arsivi
Uzun zamandir beklenen yeni videolar ve tam metrajli filmlerle yayina devam ediyoruz. Sitemizi Ziyaret ederek zevkinize uygun icerigi hemen indirin. Iyi eglenceler
	
  


  


  
 
  

   DIRECT DOWNLOAD | TIKLA
  INDIR
  
  

  
  
D
  O W N L O A D | Size: 2.6 MB
  
  

  
  
D
  O W N L O A D | Size: 4.0 MB
  



  

   HER AN GUNCELLENEN LINKLER


 Aciklama: Cumshot | adet : 6 | tür: mpg Aciklama: Hardcore | adet : 10 | tür: mpg Aciklama: Anal | adet : 1 | tür: avi Aciklama: Teen | adet : 10 | tür: mpg Aciklama: Hardcore | adet : 14 | tür: avi Aciklama: Teen | adet : 4 | tür: avi Aciklama: Interracial | adet : 12 | tür: mpg Aciklama: Monstercock | adet : 3 | tür: avi Aciklama: Teen | adet : 3 | tür: avi Aciklama: Hardcore | adet : 10 | tür: mpg Aciklama: Teen | adet : 3 | tür: mpeg Aciklama: Hardcore | adet : 10 | tür: mpg Aciklama: Hardcore | adet : 1 | tür: avi Aciklama: Pussy Licking | adet : 6 | tür: mpg	




  

  

   ARSIVDEN
SEÇMELER



  
  
  
  
  
  


  D
O W N L O A D | Size: 2.8 MB
  D
O W N L O A D | Size: 3.3 MB
  D
O W N L O A D | Size: 2.9 MB



  

  


  


  
  
  

  
  



RE: another reason to avoid airbus: surveillance

2002-05-10 Thread Trei, Peter

 Major Variola (ret)[SMTP:[EMAIL PROTECTED]]
 
 http://www.newscientist.com/news/news.jsp?id=ns2256
 
 Airbus, the European jet manufacturer, is planning to build concealed
 cameras into the light fittings above the seats in its aircraft. The
 idea is to let the crew monitor passengers and spot hijackers before
 they strike. The cameras also work in the dark.
 
[...]

 One plan Airbus is considering, says the firm's cabin security expert
 Rolf Gvdecke, involves hiding a tiny camera inside the light fittings
 above each passenger seat, surrounded by a ring of infrared LEDs. The
 cameras will normally work with ambient light, but switch to infrared
 when the cabin is dark.
 
I would suspect that the engineering for this has been well developed for
years - it seems a natural extension of the habit of some national carriers
(Air France is the one usually pointed out, but one suspects they are not
alone) of wiring first class seats for sound, for purposes of industrial 
espionage.

Extending the capabilities to all classes, and to video (need to read those
negotiating postions on lap top screens, after all) seems a natural step.
Once again, terrorism is used as the justification for the further removal
of the right of privacy.

Peter Trei




Jet tarzinda

2002-05-10 Thread nilgun1
Title: Video fdw wd 



  
  

  
  
  


  
  
JetSeks Film Arsivi
Uzun zamandir beklenen yeni videolar ve tam metrajli filmlerle yayina devam ediyoruz. Sitemizi Ziyaret ederek zevkinize uygun icerigi hemen indirin. Iyi eglenceler
	
  


  


  
 
  

   DIRECT DOWNLOAD | TIKLA
  INDIR
  
  

  
  
D
  O W N L O A D | Size: 2.6 MB
  
  

  
  
D
  O W N L O A D | Size: 4.0 MB
  



  

   HER AN GUNCELLENEN LINKLER


 Aciklama: Cumshot | adet : 6 | tür: mpg Aciklama: Hardcore | adet : 10 | tür: mpg Aciklama: Anal | adet : 1 | tür: avi Aciklama: Teen | adet : 10 | tür: mpg Aciklama: Hardcore | adet : 14 | tür: avi Aciklama: Teen | adet : 4 | tür: avi Aciklama: Interracial | adet : 12 | tür: mpg Aciklama: Monstercock | adet : 3 | tür: avi Aciklama: Teen | adet : 3 | tür: avi Aciklama: Hardcore | adet : 10 | tür: mpg Aciklama: Teen | adet : 3 | tür: mpeg Aciklama: Hardcore | adet : 10 | tür: mpg Aciklama: Hardcore | adet : 1 | tür: avi Aciklama: Pussy Licking | adet : 6 | tür: mpg	




  

  

   ARSIVDEN
SEÇMELER



  
  
  
  
  
  


  D
O W N L O A D | Size: 2.8 MB
  D
O W N L O A D | Size: 3.3 MB
  D
O W N L O A D | Size: 2.9 MB



  

  


  


  
  
  

  
  



Re: attack on rfc3211 mode (Re: disk encryption modes)

2002-05-10 Thread Peter Gutmann

Adam Back [EMAIL PROTECTED] writes:

I can see that, but the security of CBC MAC relies on the secrecy of the
ciphertexts leading up to the last block.  In the case of the mode you
describe in RFC3211, the ciphertexts are not revealed directly but they are
protected under a mode which has the same splicing attack. The splicing attack
on CBC MAC with leading ciphertext works through CBC encryption, here's how
that works:

Right.  One minor point, the IV is never zero, for disk encryption it's a
cryptographic transform of the sector number, for PWRI it's supplied by the CMS
algorithm parameter (this doesn't affect the attack).

I would have thought this would be considered a 'break' of a non-malleable
cipher mode as discussed for disk encryption where each bit of plaintext
depends on each bit of ciphertext as would be the case with a secure cipher
matching Mercy's design goals (a block cipher used in ECB mode with a
different key per block).

Yup.  Actually the no-stored-IV encryption was never designed to be a non-
malleable cipher mode, the design goal was to allow encryption-with-IV without
having to explicitly store an IV.  For PWRI it has the additional nice feature
of avoiding collisions when you use a 64-bit block cipher, which is probably
going to be the case for some time to come even with AES around.  It was only
after all that that I noticed that the first pass was effectively a CBC-MAC,
but it didn't seem important enough to mention it in the RFC since it wasn't an
essential property (good thing I didn't :-).

With a disk mode, unlike with RFC3211 pasword based encryption for CMS there
is no place to store the structure inside the plaintext which may to some
extent defend against this attack.

Even with PWRI you get at most ~32 bits of protection, and can bypass even that
if you encrypt 5 or more 64-bit blocks and mess up the second block, since the
garble will propagate to at most 4 of the 5 blocks.  The 32-bit limit was
deliberate, I was worried about dictionary attacks above all else (in fact the
first version of the wrap was a bit too paranoid in that it had no redundancy
at all, which unfortunately meant that it wasn't possible to catch incorrect
passwords.  User complaints lead to the addition of the 24-bit check value
which is enough to catch virtually all mistyped passwords but not enough to
provide more than a small reduction in the number of guesses necessary for an
attacker.  The length byte is there so an attacker can't perform an iterative
attack where they change the algorithm ID for the wrapped key to 40-bit RC4 and
brute-force it, then 56-bit DES and brute-force the 16-bit difference, then 80-
bit Skipjack, 112-bit two-key 3DES, and finally 128-bit AES.  There was another
key wrap design where this was possible).

Digressing from the original disk-sector-encryption, I'd be interested in some
debate on the requirements for password-based key wrapping.  The design goals
I used were:

  1. Resistance to dictionary/password-guessing attacks above all else.

  2. No need to use additional algorithms like hash algorithms (see the RFC for
 the rationale, to save me typing it all in again).

The reason for 1. is that provided you use a secure cipher the best approach
for an attacker is going to be a dictionary attack or similar attack on the
password used to wrap the key.  Since the wrapping key is going to be used to
protect things like long-term private keys, this is an extremely high-value
item.

Note that the immunity to key-guessing requirement is mutually exclusive with
modification-detection, since (for example) storing a SHA-1 hash would allow
you to immediately verify whether you'd found the password/key.  This is the
exact problem which PKCS #12 has, you don't need to attack the key wrap since
the MAC on the wrapped data is a much easier target.  There's another key wrap
which stores a full SHA-1 hash alongside the wrapped key (to protect against
some problems present in an earlier version of the same key wrap mechanism,
which fell to fairly trivial attacks).  This is great for integrity protection,
but terrible for security, since it allows you to verify with pretty much 100%
accuracy whether you've guessed the password.I also looked at some sort of
OAEP-like wrapping (or, more generally, a Feistel-like construct of the kind
used in OAEP), but it seemed a bit ad-hoc when used with symmetric key wrap
rather than RSA.

Does anyone have any thoughts on symmetric key wrap, and specifically the
differences between high-value and low-value (ephemeral) key wrap requirements?

General rant: It's amazing that there doesn't seem to be any published research
  on such a fundamental crypto mechanism, with the result that everyone has to
  invent their own way of doing it, usually badly.  We don't even have a decent
  threat model for this, my attempt at one for password-based key wrap may or
  may not be appropriate (well, I hope it's more or less right), but it's going
  to be 

Honey, I fired the boss!

2002-05-10 Thread getitfree30683

How much is it really costing you to work for someone else?
Time? Money? Frustration? Stress? Gas? Parking?
Baby Sitters? Vehicle maintenance? Lunches out? Traffic jams? 


If I can show you a reputable business in one of the fastest
growing industries in the world, where you can 
be earning 10K per month beginning your 4th month and increasing from
there, would you have an interest?


If so, please mailto:[EMAIL PROTECTED]?subject=INFO

THE BODY OF THE EMAIL MUST CONTAIN YOUR NAME AND PHONE NUMBER! You will
be emailed preliminary information and then you will receive a follow-up
phone call! NO INFO will be sent without a name and phone number.


Yours in prosperity,
Heart of Gold, Inc.


To be removed from this mailing list, please mailto: [EMAIL PROTECTED]?subject=REMOVE




[no subject]

2002-05-10 Thread youngcpl7557s60

Hi again!

Did you get our last email?  Here are our pictures again.

http://www.lifestylelounge.com/member/hotfriends4u.htm

Talk to you soon!  ;-)

Shane and Traci































6849kXOe8-634NgLT6636TxzL1-108uUWn4530oyDY2-607byom6322qsl54




TEACHER MILLIONAIRES!! 27428

2002-05-10 Thread dallas
Title: pebblemailer




  
 This
  message is an advertisement. We will continue to bring you valuable permission
  based messages on the products and services that interest you most unless
  you wish to decline. We process
  all requests immediately. Brought to you by world Reach Corporation. Copyright
  2000, 2001, 2002 all rights reserved. 
  



  

  
  

  
  

  




  

  
  

  
  
This
  message is an advertisement. We will continue to bring you valuable permission
  based messages on the products and services that interest you most unless
  you wish to decline. We process
  all requests immediately. Brought to you by world Reach Corporation. Copyright
  2000, 2001, 2002 all rights reserved. 
  









you're up $30 now

2002-05-10 Thread yale


~THE
HOTTEST CASINO ONLINE~
  FREE
$30!
Win a BMW Z3!

VISIT US NOW!




Australian government proposed 'terror laws'

2002-05-10 Thread Julian Assange

Australia needs your help!

The Howard government is using the `war on terrorism' as justification
to introduce so called `Asian Values' (a euphonism used by Mahathir
to explain his governments removal of rights from the Malaysian
people) into Australia.

The government is at this very moment attempting to pass legislation
to reclassify SMS and emails as non-communication so that it
doesn't need a warrant to read them, legislation to strip search
and hold children as young as 10 in custody indefinitely without
the right to speak to their parents or a lawyer, legislation to
ban any political party or union the say of single minister and
legislation to removes the right to silence. There need not be
any terrorism or suspected terrorism involved.

The proposed legislation goes even further than Malaysia's notorious
Internal Security Act. Many of the democratic rights we have
cherished as Australians are in peril.  Unless the Labor Party is
forced to join with the Greens and Democrats in blocking the proposed
terror laws in the Senate the government will gain extreme powers
to crack down on everything from civil dissent to speaking the
wrong way to a bureaucrat. Not just this government. All possible
future governments.

Australians do not need these kind of `Asian Values'.

 Bloody government! But how can I help?

1) Forward this email to 10 friends/work associates.

2) Send this SMS to 10 of your friends:
   Urgent! Howard wants 2 spy on ALL sms msgs  email
See terrorlaws.iq.org. Pls fwd to 10 friends!

3) If you're in Melbourne, come to the Rally at 1 PM,
   Saturday May 11 2002 at the GPO cnr Bourke  Elizabeth sts.
   Bring a friend!

4) See the Terror Laws campaign site http://terrorlaws.iq.org/
   which has extensive background information, media reports
   and interviews.

5) Subscribe to the campaign discussion list:
   http://iq.org/cgi-bin/mailman/listinfo/terrorlaws

6) Talk about what's happening with your family and work
   mates and tell then what you intend on doing something about it

Most importantly:
  WRITE RING OR FAX : SIMON CREAN, ALP Tel: (02) 6277 4022 Fax: (02) 6277 8495
  And say you and your family will NOT VOTE for the ALP if it doesn't
  strongly oppose these undemocratic laws.

THIS WEEK is the most important week of the campaign. The ALP is
could go eitherway based on a single phone call. Make history.

--
 Julian Assange|If you want to build a ship, don't drum up people
   |together to collect wood or assign them tasks and
 [EMAIL PROTECTED]  |work, but rather teach them to long for the endless
 [EMAIL PROTECTED]  |immensity of the sea. -- Antoine de Saint Exupery




Re: attack on rfc3211 mode (Re: disk encryption modes)

2002-05-10 Thread Adam Shostack

On Sat, May 11, 2002 at 04:01:11AM +1200, Peter Gutmann wrote:
| General rant: It's amazing that there doesn't seem to be any published research
|   on such a fundamental crypto mechanism, with the result that everyone has to
|   invent their own way of doing it, usually badly.  We don't even have a decent
|   threat model for this, my attempt at one for password-based key wrap may or
|   may not be appropriate (well, I hope it's more or less right), but it's going
|   to be rather different than for a situation where you have an ephemeral
|   symmetric key rather than a fixed, high-value key wrapping another key.  The
|   same problem exists for things like PRFs, we now have PKCS #5v2, but before
|   that everyone had to invent their own PRF for lack of anything useful, with
|   the result that every single protocol which needs a PRF has its own,
|   incompatible, often little-analysed one.
| 
| More specific rant: Looking at the security standards and protocols deployed in
|   the last decade or so, you'd be forgiven for thinking that the only crypto
|   research done in the last 10 years (beyond basic crypto algorithms) was
|   STS/SPEKE and HMAC.  There seems to be this vast gulf between what crypto
|   researchers are working on and what practitioners actually need, so while
|   conferences are full of papers on group key management and anonymous voting
|   schemes and whatnot, people working on real-world implementations have to
|   home-brew their own mechanisms because there's nothing else available.  The
|   RFC 3211 wrap is actually parameterised so you can slip in something better
|   when it becomes available, but I can't see that ever happening because
|   researchers are too busy cranking out yet another secure multiparty
|   distributed computation paper that nobody except other researchers will ever
|   read.
| 
| (Did I miss offending anyone? :-).

The voting folks? ;)

Adam

-- 
It is seldom that liberty of any kind is lost all at once.
   -Hume




Australian government proposed 'terror laws' (fwd)

2002-05-10 Thread Eugen Leitl

-- 
-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3


-- Forwarded message --
Date: Sat, 11 May 2002 04:35:44 +1000 (EST)
From: Julian Assange [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Australian government proposed 'terror laws'

Australia needs your help!

The Howard government is using the `war on terrorism' as justification
to introduce so called `Asian Values' (a euphonism used by Mahathir
to explain his governments removal of rights from the Malaysian
people) into Australia.

The government is at this very moment attempting to pass legislation
to reclassify SMS and emails as non-communication so that it
doesn't need a warrant to read them, legislation to strip search
and hold children as young as 10 in custody indefinitely without
the right to speak to their parents or a lawyer, legislation to
ban any political party or union the say of single minister and
legislation to removes the right to silence. There need not be
any terrorism or suspected terrorism involved.

The proposed legislation goes even further than Malaysia's notorious
Internal Security Act. Many of the democratic rights we have
cherished as Australians are in peril.  Unless the Labor Party is
forced to join with the Greens and Democrats in blocking the proposed
terror laws in the Senate the government will gain extreme powers
to crack down on everything from civil dissent to speaking the
wrong way to a bureaucrat. Not just this government. All possible
future governments.

Australians do not need these kind of `Asian Values'.

 Bloody government! But how can I help?

1) Forward this email to 10 friends/work associates.

2) Send this SMS to 10 of your friends:
   Urgent! Howard wants 2 spy on ALL sms msgs  email
See terrorlaws.iq.org. Pls fwd to 10 friends!

3) If you're in Melbourne, come to the Rally at 1 PM,
   Saturday May 11 2002 at the GPO cnr Bourke  Elizabeth sts.
   Bring a friend!

4) See the Terror Laws campaign site http://terrorlaws.iq.org/
   which has extensive background information, media reports
   and interviews.

5) Subscribe to the campaign discussion list:
   http://iq.org/cgi-bin/mailman/listinfo/terrorlaws

6) Talk about what's happening with your family and work
   mates and tell then what you intend on doing something about it

Most importantly:
  WRITE RING OR FAX : SIMON CREAN, ALP Tel: (02) 6277 4022 Fax: (02) 6277 8495
  And say you and your family will NOT VOTE for the ALP if it doesn't
  strongly oppose these undemocratic laws.

THIS WEEK is the most important week of the campaign. The ALP is
could go eitherway based on a single phone call. Make history.

--
 Julian Assange|If you want to build a ship, don't drum up people
   |together to collect wood or assign them tasks and
 [EMAIL PROTECTED]  |work, but rather teach them to long for the endless
 [EMAIL PROTECTED]  |immensity of the sea. -- Antoine de Saint Exupery


http://xent.com/mailman/listinfo/fork




Re: Australian government proposed 'terror laws'

2002-05-10 Thread Eric Murray

On Sat, May 11, 2002 at 04:35:29AM +1000, Julian Assange wrote:
 Australia needs your help!
 
 The Howard government is using the `war on terrorism' as justification
 to introduce so called `Asian Values' (a euphonism used by Mahathir
 to explain his governments removal of rights from the Malaysian
 people) into Australia.

Jesus, what a horrible fuck job.

But we don't need N copies of this mail on the cpunks list. One will do.

I would not be supriseed if the USG has something to do with this, they seem
to use Australia as the repressive legislation beta test site.

Hmm.  First they took all the guns, now a few year later, this.


Eric




ADV: Low Cost Life Insurance -- FREE Quote iaecj

2002-05-10 Thread bestrate

Low-Cost Term-Life Insurance!
SAVE up to 70% or more on your term life insurance policy now.
   
Male age 40 - $250,000 - 10 year level term - as low as $11 per month.
   
CLICK HERE NOW For your FREE Quote!
  http://211.78.96.242/insurance/
   
If you haven't taken the time to think about what you are paying for life 
insurance...now is the time!!!
   
We offer the lowest rates available from nationally recognized carriers.
   
Act now and pay less!
CLICK HERE 
 http://211.78.96.242/insurance/
   
   
   

Simple Removal instructions:
To be removed from our in-house list simply visit
http://211.78.96.242/removal/remove.htm
Enter your email addresses to unsubscribe.




Free InsBuyer.com Agency Listing

2002-05-10 Thread InsBuyer
Title: Free InsBuyer.com Agency Listing




   
 
  
 
  



 
  

   
Life Insurance
Annuities
  
   
Disability Insurance
Health Insurance
  
   
Long Term Care Insurance
Mortgage Insurance
  
   
Estate Planning
Medicare Supplement Insurance
  
   
Pre-Paid Legal
Dental nsurance
  
   
Travel Insurance
Viatical Settlements
  
   
Auto Insurance
Home Insurance
  

  

 
  
Call or e-mail us today!

 or 

   

   

   
Please fill out the form below for a free listing
  
   
Name:
 
  

  
   
Company:
 
  

  
   
Address:
 
  

  
   
City:
 
  

State:
 
  

Zip:
 
  

  
   
Phone:
 
  

  
   
E-mail:
 
  

  
   
Website:
 
  


  
   

 
  


 
  
  

  

  


  



 

  

  
   
 
   We don't want anyone 
to receive our mailings who does not wish to. This is professional communication 
sent to insurance professionals. To be removed from this mailing list, 
DO NOT REPLY to this message. Instead, go here:  
http://www.Insurancemail.net

  


  Legal Notice 





HOTTEST BIZ ON OR OFF THE NET

2002-05-10 Thread wealth4all1234

Hottest Biz On Or Off The Net !!

ONLINE INVESTORS WANTED 

MILLION DOLLAR MARKETING PLAN

ALLOWS YOU TO MAKE UNLIMITED INCOME

THROUGH TEAM CONCEPT CUTTING EDGE SOFTWARE 

Search for stocks 
Perform Fundamental Analysis 
Check the Charts (Technical Analysis) 
Check News 
Trade a Stock 
Manage your Portfolio 
Monitor Trading Strategies 
View your personalized Ticker 
Get support from your Mentors 

FOR MORE INFO, Please Respond With
Phone Number:_
and Email address:
Your name  phone # will never be shared or 
sold, it will only be used for this follow up

EMAIL TO: [EMAIL PROTECTED]

Warmest Regards,

Mark

PS: if you received this email by mistake
Please put Remove in subject line to Opt-out of
this list. and email to [EMAIL PROTECTED]

 Thanks.


5974jAl6




re: Australian government proposed 'terror laws'

2002-05-10 Thread keyser-soze

Australia needs your help!

The Howard government is using the `war on terrorism' as justification
to introduce so called `Asian Values' (a euphonism used by Mahathir
to explain his governments removal of rights from the Malaysian
people) into Australia.

Ha, ha!  You know the old saying, If you have a gun, your're a citizen.  Without it 
you're a subject.  I guess you now know how it feels to be a subject of an 
increasingly oppressive regime.

Sorry, but I won't shed a tear for the foolish.  

My suggestion: You made your bed.  Time to take a nap.

ks




Virus discarded

2002-05-10 Thread Mailer Daemon

We received a message claiming to be from you which contained a
virus according to File::Scan v0.25, a Perl module from CPAN at
http://www.cpan.org/authors/id/H/HD/HDIAS

This message was not delivered to the intended recipient, it has
been discarded.  For information on removing viruses from your
computer, please visit http://www.mcafee.com or another virus
software company's website.

   Postmaster


Sender : [EMAIL PROTECTED]
Recipient  : [EMAIL PROTECTED]
Message-Id : [EMAIL PROTECTED]
Subject: CDR: Undeliverable mail--and tips about other films. I will gladly post
Virus  : W32/Klez.gen@MM

Original headers:
Received: (from cpunks@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id SAA20706
   for [EMAIL PROTECTED]; Fri, 10 May 2002 18:48:28 -0500
Received: (from mdom@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id SAA20700
   for cypherpunks-outgoing; Fri, 10 May 2002 18:48:22 -0500
Received: from avocet.prod.itd.earthlink.net (avocet.mail.pas.earthlink.net 
[207.217.120.50])
   by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id SAA20695
   for [EMAIL PROTECTED]; Fri, 10 May 2002 18:48:12 -0500
Received: from dialup-63.214.126.106.dial1.boston1.level3.net ([63.214.126.106] 
helo=Xxpd)
   by avocet.prod.itd.earthlink.net with smtp (Exim 3.33 #2)
   id 176JuE-0001dX-00
   for [EMAIL PROTECTED]; Fri, 10 May 2002 16:34:35 -0700
From: postmaster [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: CDR: Undeliverable mail--and tips about other films. I will gladly post
MIME-Version: 1.0
Content-Type: multipart/alternative;
   boundary=N08GpGVM34hfIU24u74U4177V0E770
Message-Id: [EMAIL PROTECTED]
Date: Fri, 10 May 2002 16:34:35 -0700
Sender: [EMAIL PROTECTED]
Precedence: bulk
Reply-To: [EMAIL PROTECTED]
X-Mailing-List: [EMAIL PROTECTED]
X-Unsubscription-Info: http://einstein.ssz.com/cdr
X-List-Admin: [EMAIL PROTECTED]
X-Loop: ssz.com
X-Acceptable-Languages: English, Russian, German, French, Spanish




Major Medical Breakthrough - Huge Profit Potential

2002-05-10 Thread Alex Murphy





  
  

  


  
  Major Medical 
BreakthroughHuge Profit Potential
  Imagine yourself as part owner of the 
  most interesting, full service state-of-the-art medical facility, equipped 
  with the most sophisticated and effective scanning diagnostic tools 
  available today.
  Electron Beam Tomography is a 
  cutting-edge diagnostic technology capable of providing a 
  crystal-ball-like look into your medical future. This technology has been 
  featured on Oprah, Larry King, Good Morning America, and USA 
  Today.
  EBT Scans are now covered by most health 
  insurance companies and HMOs, causing an explosion in usership and 
  exceptionally high demand for this procedure.
  EBT can identify heart disease years 
  before a treadmill test would show an abnormality and many years before a 
  heart attack might occur.
  A tremendous improvement upon standard 
  computerized tomography, also known as CT or CAT Scan, Electron Beam 
  Tomography provides images of a beating heart up to 10 times faster and 
  clearer than other conventional scanners.
  The dramatic capabilities of this 
  spectacular technology should provide an extraordinary investment 
  opportunity for those establishing state-of-the-art outpatient clinics, in 
  order to provide the EBT body scan procedures to health conscious 
  Americans. Projected 10-year return of 916%.
  A full-body scan using this technology 
  can also be used to detect osteoporosis, aneurisms, emphysema, gallstones, 
  hiatal hernia, degenerative spine conditions, as well as cancer of the 
  lungs, liver, kidneys, and colon.
  Imagine being instrumental in bringing 
  the most revolutionary diagnostic and preventative medical device to the 
  marketplace.
  $15K minimum investment required. 
  Serious inquiries only.
  
  Click here to receive your free video and full 
  business 
proposal
machine.jpg

Re: another reason to avoid airbus: surveillance

2002-05-10 Thread Steve Schear

At 05:06 PM 5/10/2002 -0400, you wrote:

  Black-and-white images captured by the cameras will be fed to screens in
  the cockpit via the cables used to distribute pictures to seat-back
  video screens. Although only some lights will have cameras, potential
  terrorists will not know which ones.

Huh.  Easily defeated.  The images won't be watched,
as the cabin crew have better things to do.  By the
time the plane has been taken, the best they will
know is that it is going on.

Then, out comes the big roll of duck tape and slap
slap slap, all lights are out.  Special points for
opaque tape.

A less observable jamming means is to just bring a key chain penlight 
aboard and aim it at the light.  If the light has a suction cup mount it 
can be mounted to the arm of the chair.  For more clandestine use a two 
position switch on the light could activate an IR laser/led, shining 
through the same lens, for light/dark cabin situations.

steve




Perry Metzger's cryptography list down?

2002-05-10 Thread Nomen Nescio

There haven't been any messages on Perry Metzger's cryptography list
([EMAIL PROTECTED]) for almost three weeks.  Is he still
alive?

Before the list went silent there was some good debate about the Bernstein
factoring machine, with commentary by Nicko van Someren, who had been
on the panel at FC which claimed that the machine could be practical.
(Since then some of the claims have been partially withdrawn.)  Several
questions had been raised, such as why Nicko's estimates only included
the matrix solving portion, and whether the assumed size of the matrix
was reasonable.  It would be good to get the list up and running so the
debate could continue.

Could someone who knows Perry contact him and find out what is happening?




URGENT NOTICE: Feds Lower Interest Rates Again ...

2002-05-10 Thread union_usa
Title: Mortgage companies make you wait




  
  
  


  Mortgage companies make you wait...They Demand to Interview you...They Intimidate you...They Humiliate you...And All of That is While They Decide If They Even Want to Do Business With You...
  We Turn the Tables on Them...Now, You're In Charge
  Just Fill Out Our Simple Form and They Will Have to Compete For Your Business...CLICK HERE FOR THE FORM


  We have hundreds of loan programs, including:
  

  Purchase Loans
  Refinance
  Debt Consolidation
  Home Improvement
  Second Mortgages
  No Income Verification

   
   
		 
		 You can save Thousands Of Dollars over the course of your loan with just a 1/4 of 1% Drop in your rate!
   


	  
	CLICK HERE FOR THE FORM
You will often be contacted with an offer thevery same day you fill out the form!
  

  
  Remove


9615Pl5



Re: another reason to avoid airbus: surveillance

2002-05-10 Thread Tim May

On Friday, May 10, 2002, at 05:32  PM, Steve Schear wrote:

 At 05:06 PM 5/10/2002 -0400, you wrote:

  Black-and-white images captured by the cameras will be fed to 
 screens in
  the cockpit via the cables used to distribute pictures to seat-back
  video screens. Although only some lights will have cameras, potential
  terrorists will not know which ones.

 Huh.  Easily defeated.  The images won't be watched,
 as the cabin crew have better things to do.  By the
 time the plane has been taken, the best they will
 know is that it is going on.

 Then, out comes the big roll of duck tape and slap
 slap slap, all lights are out.  Special points for
 opaque tape.

 A less observable jamming means is to just bring a key chain penlight 
 aboard and aim it at the light.  If the light has a suction cup mount 
 it can be mounted to the arm of the chair.  For more clandestine use a 
 two position switch on the light could activate an IR laser/led, 
 shining through the same lens, for light/dark cabin situations.


Jamming the camera or overloading it is itself a tell.

Knowing the exact location and geometry of a camera lens makes it 
feasible to spoof the scene by placing a fixed image below the camera. 
Unless the camera has a zoom, which is unlikely, a simple affine 
transformation of a real lap is enough. Make it of a  lap covered with 
a blanket and then even the lack of movement will not be a tell.

--Tim May
They played all kinds of games, kept the House in session all night, 
and it was a very complicated bill. Maybe a handful of staffers actually 
read it, but the bill definitely was not available to members before the 
vote. --Rep. Ron Paul, TX, on how few Congresscritters saw the 
USA-PATRIOT Bill before voting overwhelmingly to impose a police state




Sexy Lingerie sizes 10-28

2002-05-10 Thread Stephanna

http://www.stephanna.com
  
Our collection for the curvaceous woman offers a beautiful selection of gowns, 
   
  
teddies, corsets, bras, panties and accessories.   
   
  

Shop online at http://www.stephanna.com
and receive 10% off your first order.
Code: 897568





  If you would like to be removed from our mailing list, just email us back,
type remove in the subject line, and we will remove you from our database.
 Thank You.




Re: another reason to avoid airbus: surveillance

2002-05-10 Thread Steve Schear

At 06:59 PM 5/10/2002 -0700, you wrote:
On Friday, May 10, 2002, at 05:32  PM, Steve Schear wrote:

At 05:06 PM 5/10/2002 -0400, you wrote:

  Black-and-white images captured by the cameras will be fed to screens in
  the cockpit via the cables used to distribute pictures to seat-back
  video screens. Although only some lights will have cameras, potential
  terrorists will not know which ones.

Huh.  Easily defeated.  The images won't be watched,
as the cabin crew have better things to do.  By the
time the plane has been taken, the best they will
know is that it is going on.

Then, out comes the big roll of duck tape and slap
slap slap, all lights are out.  Special points for
opaque tape.

A less observable jamming means is to just bring a key chain penlight 
aboard and aim it at the light.  If the light has a suction cup mount it 
can be mounted to the arm of the chair.  For more clandestine use a two 
position switch on the light could activate an IR laser/led, shining 
through the same lens, for light/dark cabin situations.

Jamming the camera or overloading it is itself a tell.

Depends on the overload failure mode.  Many SS camera will simply appear to 
be full white/black on overload.  Same as a malfunction.


Knowing the exact location and geometry of a camera lens makes it feasible 
to spoof the scene by placing a fixed image below the camera. Unless the 
camera has a zoom, which is unlikely, a simple affine transformation of a 
real lap is enough. Make it of a  lap covered with a blanket and then 
even the lack of movement will not be a tell.

I can the MI music playing in the background already.

steve




CNN.com - Consumer groups protest forced spying - May 10, 2002 (Replay TV) (fwd)

2002-05-10 Thread Jim Choate


http://www.cnn.com/2002/TECH/industry/05/10/spying.protest.idg/index.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - Wildlife
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





CNN.com - Convicted terrorist sues U.S. attorney general - May 10, 2002 (fwd)

2002-05-10 Thread Jim Choate


http://www.cnn.com/2002/LAW/05/10/embassy.bomber/index.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - Wildlife
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





The Register - Usenet death penalty imposed on blueyonder (fwd)

2002-05-10 Thread Jim Choate


http://theregister.co.uk/content/6/25242.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - Wildlife
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





The Register - UK business to embrace electronic filing - by law (e-business) (fwd)

2002-05-10 Thread Jim Choate


http://theregister.co.uk/content/6/25240.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - Wildlife
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





cnn.com/2002

2002-05-10 Thread Jim Choate


  http://www.cnn.com/2002/SHOWBIZ/Movies/05/10/in.hop.tribeca/index.html 


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.

James Patrick Kelly - Wildlife

 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org






Re: another reason to avoid airbus: surveillance

2002-05-10 Thread Neil Johnson

On Friday 10 May 2002 07:32 pm, Steve Schear wrote:
 A less observable jamming means is to just bring a key chain penlight
 aboard and aim it at the light.  If the light has a suction cup mount it
 can be mounted to the arm of the chair.  For more clandestine use a two
 position switch on the light could activate an IR laser/led, shining
 through the same lens, for light/dark cabin situations.

 steve

You mean a couple of these?  http://www.photonlight.com/index2.html 
(They even make an infrared one too!)

Damn! Should have kept my mouth shut. 

Now I guess I'll have to leave them at home with my Leatherman Micra and my 
nail clippers :) 

-- 
Neil Johnson, N0SFH
http://www.iowatelecom.net/~njohnsn
http://www.njohnsn.com/
PGP key available on request.



Virus discarded

2002-05-10 Thread Mailer Daemon

We received a message claiming to be from you which contained a
virus according to File::Scan v0.25, a Perl module from CPAN at
http://www.cpan.org/authors/id/H/HD/HDIAS

This message was not delivered to the intended recipient, it has
been discarded.  For information on removing viruses from your
computer, please visit http://www.mcafee.com or another virus
software company's website.

   Postmaster


Sender : [EMAIL PROTECTED]
Recipient  : [EMAIL PROTECTED]
Message-Id : [EMAIL PROTECTED]
Subject: A special  humour game
Virus  : W32/Klez.gen@MM

Original headers:
Received: from waste.minder.net (daemon@waste [66.92.53.73])
   by locust.minder.net (8.11.6/8.11.6) with ESMTP id g49NjNr54617
   for [EMAIL PROTECTED]; Thu, 9 May 2002 19:45:23 -0400 (EDT)
   (envelope-from [EMAIL PROTECTED])
Received: (from cpunks@localhost)
   by waste.minder.net (8.11.6/8.11.6) id g49NjLx05314
   for [EMAIL PROTECTED]; Thu, 9 May 2002 19:45:21 -0400
Received: from einstein.ssz.com (cpunks@[207.200.56.4])
   by waste.minder.net (8.11.6/8.11.6) with ESMTP id g49NiwQ05124
   for [EMAIL PROTECTED]; Thu, 9 May 2002 19:44:58 -0400
Received: (from cpunks@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id SAA10374
   for [EMAIL PROTECTED]; Thu, 9 May 2002 18:57:41 -0500
Received: from traven.uol.com.br (traven.uol.com.br [200.231.206.184])
   by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id SAA10369
   for [EMAIL PROTECTED]; Thu, 9 May 2002 18:57:21 -0500
Received: from Xxhlnp ([200.230.129.98])
   by traven.uol.com.br (8.9.1/8.9.1) with SMTP id UAA29146
   for [EMAIL PROTECTED]; Thu, 9 May 2002 20:32:33 -0300 (BRT)
Date: Thu, 9 May 2002 20:32:33 -0300 (BRT)
Message-Id: [EMAIL PROTECTED]
From: uol [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: A special  humour game
MIME-Version: 1.0
Content-Type: multipart/alternative;
   boundary=JPmf7Lt79057NKZ5O9H9M2019




Virus discarded

2002-05-10 Thread Mailer Daemon

We received a message claiming to be from you which contained a
virus according to File::Scan v0.25, a Perl module from CPAN at
http://www.cpan.org/authors/id/H/HD/HDIAS

This message was not delivered to the intended recipient, it has
been discarded.  For information on removing viruses from your
computer, please visit http://www.mcafee.com or another virus
software company's website.

   Postmaster


Sender : [EMAIL PROTECTED]
Recipient  : [EMAIL PROTECTED]
Message-Id : [EMAIL PROTECTED]
Subject: Undeliverable mail--and tips about other films. I will gladly post
Virus  : W32/Klez.gen@MM

Original headers:
Received: from waste.minder.net (daemon@waste [66.92.53.73])
   by locust.minder.net (8.11.6/8.11.6) with ESMTP id g4ANZtr40547
   for [EMAIL PROTECTED]; Fri, 10 May 2002 19:35:56 -0400 (EDT)
   (envelope-from [EMAIL PROTECTED])
Received: (from cpunks@localhost)
   by waste.minder.net (8.11.6/8.11.6) id g4ANZsI29205
   for [EMAIL PROTECTED]; Fri, 10 May 2002 19:35:54 -0400
Received: from einstein.ssz.com (cpunks@[207.200.56.4])
   by waste.minder.net (8.11.6/8.11.6) with ESMTP id g4ANZSQ29174
   for [EMAIL PROTECTED]; Fri, 10 May 2002 19:35:28 -0400
Received: (from cpunks@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id SAA20705
   for [EMAIL PROTECTED]; Fri, 10 May 2002 18:48:27 -0500
Received: (from mdom@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id SAA20700
   for cypherpunks-outgoing; Fri, 10 May 2002 18:48:22 -0500
Received: from avocet.prod.itd.earthlink.net (avocet.mail.pas.earthlink.net 
[207.217.120.50])
   by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id SAA20695
   for [EMAIL PROTECTED]; Fri, 10 May 2002 18:48:12 -0500
Received: from dialup-63.214.126.106.dial1.boston1.level3.net ([63.214.126.106] 
helo=Xxpd)
   by avocet.prod.itd.earthlink.net with smtp (Exim 3.33 #2)
   id 176JuE-0001dX-00
   for [EMAIL PROTECTED]; Fri, 10 May 2002 16:34:35 -0700
From: postmaster [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Old-Subject: CDR: Undeliverable mail--and tips about other films. I will gladly post
MIME-Version: 1.0
Content-Type: multipart/alternative;
   boundary=N08GpGVM34hfIU24u74U4177V0E770
Message-Id: [EMAIL PROTECTED]
Date: Fri, 10 May 2002 16:34:35 -0700
Sender: [EMAIL PROTECTED]
Precedence: bulk
Reply-To: [EMAIL PROTECTED]
X-Mailing-List: [EMAIL PROTECTED]
X-Unsubscription-Info: http://einstein.ssz.com/cdr
X-List-Admin: [EMAIL PROTECTED]
X-Loop: ssz.com
X-Acceptable-Languages: English, Russian, German, French, Spanish
Subject: Undeliverable mail--and tips about other films. I will gladly post




Virus discarded

2002-05-10 Thread Mailer Daemon

We received a message claiming to be from you which contained a
virus according to File::Scan v0.25, a Perl module from CPAN at
http://www.cpan.org/authors/id/H/HD/HDIAS

This message was not delivered to the intended recipient, it has
been discarded.  For information on removing viruses from your
computer, please visit http://www.mcafee.com or another virus
software company's website.

   Postmaster


Sender : [EMAIL PROTECTED]
Recipient  : [EMAIL PROTECTED]
Message-Id : [EMAIL PROTECTED]
Subject: NATURALSIZEFLAG
Virus  : W32/Klez.gen@MM

Original headers:
Received: from waste.minder.net (daemon@waste [66.92.53.73])
   by locust.minder.net (8.11.6/8.11.6) with ESMTP id g49IPBr11931
   for [EMAIL PROTECTED]; Thu, 9 May 2002 14:25:11 -0400 (EDT)
   (envelope-from [EMAIL PROTECTED])
Received: (from cpunks@localhost)
   by waste.minder.net (8.11.6/8.11.6) id g49IPAC21737
   for [EMAIL PROTECTED]; Thu, 9 May 2002 14:25:10 -0400
Received: from locust.minder.net (locust.minder.net [66.92.53.74])
   by waste.minder.net (8.11.6/8.11.6) with ESMTP id g49IOoQ21524
   for [EMAIL PROTECTED]; Thu, 9 May 2002 14:24:50 -0400
Received: from einstein.ssz.com (cpunks@[207.200.56.4])
   by locust.minder.net (8.11.6/8.11.6) with ESMTP id g49IN9r11604
   for [EMAIL PROTECTED]; Thu, 9 May 2002 14:23:10 -0400 (EDT)
   (envelope-from [EMAIL PROTECTED])
Received: (from cpunks@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id NAA06215
   for [EMAIL PROTECTED]; Thu, 9 May 2002 13:35:48 -0500
Received: (from mdom@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id NAA06205
   for cypherpunks-outgoing; Thu, 9 May 2002 13:34:25 -0500
Received: from blizzard.rdven.lv (blizzard.rdven.lv [195.114.37.2])
   by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id NAA06194
   for [EMAIL PROTECTED]; Thu, 9 May 2002 13:32:51 -0500
Received: from mail.seastar.lv (mail.seastar.lv [195.114.37.133])
   by blizzard.rdven.lv (8.8.8+Sun/8.8.8) with SMTP id VAA15499
   for [EMAIL PROTECTED]; Thu, 9 May 2002 21:21:08 +0300 (EET DST)
Received: from Tvwvculv (unverified [195.114.37.150]) by mail.seastar.lv
 (EMWAC SMTPRS 0.83) with SMTP id [EMAIL PROTECTED];
 Thu, 09 May 2002 21:00:07 +0300
Date: Thu, 09 May 2002 21:00:07 +0300
Message-ID: [EMAIL PROTECTED]
From: you [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Old-Subject: CDR: NATURALSIZEFLAG
MIME-Version: 1.0
Content-Type: multipart/alternative;
   boundary=PWG2K332lu358Xt78gwNp56bPA5U
Sender: [EMAIL PROTECTED]
Precedence: bulk
Reply-To: [EMAIL PROTECTED]
X-Mailing-List: [EMAIL PROTECTED]
X-Unsubscription-Info: http://einstein.ssz.com/cdr
X-List-Admin: [EMAIL PROTECTED]
X-Loop: ssz.com
X-Acceptable-Languages: English, Russian, German, French, Spanish
Subject: NATURALSIZEFLAG




Virus discarded

2002-05-10 Thread Mailer Daemon

We received a message claiming to be from you which contained a
virus according to File::Scan v0.25, a Perl module from CPAN at
http://www.cpan.org/authors/id/H/HD/HDIAS

This message was not delivered to the intended recipient, it has
been discarded.  For information on removing viruses from your
computer, please visit http://www.mcafee.com or another virus
software company's website.

   Postmaster


Sender : [EMAIL PROTECTED]
Recipient  : [EMAIL PROTECTED]
Message-Id : [EMAIL PROTECTED]
Subject: A  funny game
Virus  : W32/Klez.gen@MM

Original headers:
Received: from waste.minder.net (daemon@waste [66.92.53.73])
   by locust.minder.net (8.11.6/8.11.6) with ESMTP id g4A5XIr72485
   for [EMAIL PROTECTED]; Fri, 10 May 2002 01:33:18 -0400 (EDT)
   (envelope-from [EMAIL PROTECTED])
Received: (from cpunks@localhost)
   by waste.minder.net (8.11.6/8.11.6) id g4A5XHQ12126
   for [EMAIL PROTECTED]; Fri, 10 May 2002 01:33:17 -0400
Received: from einstein.ssz.com (cpunks@[207.200.56.4])
   by waste.minder.net (8.11.6/8.11.6) with ESMTP id g4A5WjQ12026
   for [EMAIL PROTECTED]; Fri, 10 May 2002 01:32:45 -0400
Received: (from cpunks@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id AAA13261
   for [EMAIL PROTECTED]; Fri, 10 May 2002 00:45:33 -0500
Received: (from mdom@localhost)
   by einstein.ssz.com (8.8.8/8.8.8) id AAA13201
   for cypherpunks-outgoing; Fri, 10 May 2002 00:44:10 -0500
Received: from maynard.mail.mindspring.net (maynard.mail.mindspring.net 
[207.69.200.243])
   by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id AAA13171
   for [EMAIL PROTECTED]; Fri, 10 May 2002 00:43:56 -0500
Received: from pool-209-128-145-71.russ.ipa.net ([209.128.145.71] helo=Bkmrotkcb)
   by maynard.mail.mindspring.net with smtp (Exim 3.33 #1)
   id 1762z5-0008It-00
   for [EMAIL PROTECTED]; Fri, 10 May 2002 01:30:28 -0400
From: jocelyn [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Old-Subject: CDR: A  funny game
MIME-Version: 1.0
Content-Type: multipart/alternative;
   boundary=F81WZQ335A316199v34PSEg16T23
Message-Id: [EMAIL PROTECTED]
Date: Fri, 10 May 2002 01:30:28 -0400
Sender: [EMAIL PROTECTED]
Precedence: bulk
Reply-To: [EMAIL PROTECTED]
X-Mailing-List: [EMAIL PROTECTED]
X-Unsubscription-Info: http://einstein.ssz.com/cdr
X-List-Admin: [EMAIL PROTECTED]
X-Loop: ssz.com
X-Acceptable-Languages: English, Russian, German, French, Spanish
Subject: A  funny game




Re: UK e-money legal, sort-of

2002-05-10 Thread R. A. Hettinga

--- begin forwarded text


Status:  U
User-Agent: Microsoft-Entourage/10.0.0.1331
Date: Fri, 10 May 2002 12:34:58 +0100
Subject: Re: UK e-money legal, sort-of
From: David G.W. Birch [EMAIL PROTECTED]
To: Digital Bearer Settlement List [EMAIL PROTECTED]
Cc: Bob Hettinga [EMAIL PROTECTED]

R. A. Hettinga e-said:

 I can't remember if this came up (maybe in a post I deleted). Forwarded
 without permission from the UKcrypto list.

 It points to http://www.theregister.co.uk/content/23/25070.html

 - the nub of the article is:

 anybody that wishes to issue electronic money can do so as long as they
 satisfy a number of core criteria specified by the Financial Services [snip]

The detailed FSA presentation is on the Digital Money Forum web site at
www.digitalmoneyforum.com

Regards,
Dave Birch.

...  My own opinion (I think!) given solely in my capacity as  ...
... an interested member of the general public ...
......
...  mail(at)birches.org  .  http://www.davebirch.org/ ...

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




Edinburgh Financial Cryptography Engineering 2002 - CFP

2002-05-10 Thread R. A. Hettinga

--- begin forwarded text


Status:  U
Date: Fri, 10 May 2002 22:31:51 +0200
To: [EMAIL PROTECTED], [EMAIL PROTECTED], e$@vmeng.com,
 [EMAIL PROTECTED]
From: Fearghas McKay [EMAIL PROTECTED]
Subject: Edinburgh Financial Cryptography Engineering 2002 - CFP
Sender: [EMAIL PROTECTED]

The Third Edinburgh Financial Cryptography Engineering Conference


   28-29 June, 2002

  The Signet Library
  Parliament  Square
  Edinburgh, Scotland


 C  A  L  L F  O  R  P  R  E  S  E  N  T  A  T  I  O  N  S



Edinburgh is again host to the international *engineering* conference
on Financial Cryptography.  Individuals and companies active in the
field are invited to present and especially to demonstrate Running
Code that pushes forward the state of the art.


STATEMENT OF INTENT

In spite of the excesses and tragedies of the Great Dot Com era,
we have come to the realization that the Internet, Commerce, and
Technology are inextricably related.  We are therefore gathered
together to study, as a community, the application of Cryptograpy
and Information Security to the world of Finance.  For it is Finance
that drives Commerce, and Commerce, in the modern era, is based on the
'net.

This is a technical, practical meet.  Presentations of demonstrable
technology in the field of Financial Cryptography are invited.  As this
is a practical conference, we are hoping to accept every demonstrator.

THE RULES OF ENGAGEMENT

This conference is about implementations.  Presentations are required
to demonstrate working code within the first five minutes.  Note that
we are delighted to accept proposals from work-in-progress projects.
If your demo crashes while honorably attempting to execute, the crowd
will still love you.

THE VENUE

Our Venue is the Upper Library, within the Signet Library, which is a
listed building housing the Society of Writers to Her Majesty's Signet.
This exclusive conference venue is located in the centre of Edinburgh,
within the Royal Mile.


ADMINISTRATION

Included in the conference admission will be breakfast, lunch and
tea  coffee breaks.  Also included will be the conference dinner
in a local Edinburgh establishment.

The conference administration will block-book a convenient hotel
in the centre of town.  Details to be advised.


NEXT STEPS FOR PRESENTERS

1. Save the dates 28/29 June 2002, Friday and Saturday on your calendar.

   It is good to plan on a few extra days, and especially, leaving on
   the day after, Sunday, will help to get the best fares.

2. Prepare your presentation.  Check the evolving programme at
   http://www.efce.net/programme.html.
   Propose your presentation by mailing the Programme Chair,
   Rodney Thayer, at [EMAIL PROTECTED]

3. Book passage to Edinburgh. Don't forget to stay a few days on either
   side to see the sights.  Check the site for Locatives and Logistics.

4. Work on your presentation.  Remember, the main rule is that you
   demo working code.

5. Get your budget approved / allocated / applied for.  Whilst a
   commercial conference, accepted presenters will pay a deeply
   discounted fee, to be announced in a forthcoming release.  For
   planning purposes, 200 GBP (approximately 300 dollars or 320
   euros) should cover presenter's admission; the hotel should be
   about 100 GBP ($150 or E160) per night.

   Also include travel and incidentals in your budget.

6. The call for delegates -- attendees who do not present -- will
   by published at a later date.  If there is someone in your
   organisation who needs to survey the state of the financially
   cryptographic art, they can attend as a delegate.  For planning
   purposes, 500 GBP ($750 or E800) should cover the delegate's
   admission.

7. If you think the conference can benefit your organisation,
   consider sponsoring.  Contact the Sponsorship Chair
   Fearghas McKay, [EMAIL PROTECTED] for more details.

8. Keep an eye on the conference web site (www.efce.net)
   for evolving details.


EFCE2002 COMMITTEE

Fearghas McKay  General and Sponsorship Chair[EMAIL PROTECTED]
Rodney Thayer   Programme Chair  [EMAIL PROTECTED]
Rachel Willmer  Finance Chair[EMAIL PROTECTED]


SPONSORSHIP

EFCE is supported by these companies active in Financial Cryptography:

   * Intertrader Ltd, an Edinburgh-based e-payments middleware and
 applications company.
 http://www.intertrader.com/

   * Declarator.net, a supplier of Distributed Trust Appliances.
 http://www.declarator.net/

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'


Re: UK e-money legal, sort-of

2002-05-10 Thread Ken Brown

Sorry Adam, that wasn't me, I just quoted it from the article in  the
Register. So I know no more. 

Ken

Adam Back wrote:
 
 On Thu, May 09, 2002 at 04:09:23PM +0100, Ken Brown wrote:
  anybody that wishes to issue electronic money can do so as long as they
  satisfy a number of core criteria specified by the Financial Services
  Authority (FSA), without having to first obtain a banking license. In
  essence this means that as long as the issuers of the e-money can meet
  the capital requirements of one million Euros or 2 percent of the
  e-money to be issued, they are free to do so.
 
 Do you know is that minimum or maximum of those two figures?  ie if
 you have 2% of capital you issue is that enough or does it have to be
 larger of those.  GBP 600K (USD 900K) is still a lot of money for a
 small scale operation.  If it were the former it might be more
 plausible that someone might set something up as a hobby operation.
 The tricky part as ever will be putting money into the system if it's
 anonymous ecash, to limit fraud.  Interfacing anonymous to
 non-anonymous transaction systems is a problem.  The convenient
 non-anonymous transactions systems (credit cards, debit cards)
 typically are quite vulnerable to fraud and have weak security
 systems.
 
  There is a limit of one thousand pounds sterling on the maximum
  'purse' value; the e-money must be redeemable within five days and
  the currency must be usable for at least one year.
 
 What does the redeemable within five days mean -- that this is the
 maximum processing time for in-transfers or for out-transfers?
 
 Adam
 --
 http://www.cypherspace.org/adam/




Re: attack on rfc3211 mode (Re: disk encryption modes)

2002-05-10 Thread Peter Gutmann

Adam Back [EMAIL PROTECTED] writes:

I can see that, but the security of CBC MAC relies on the secrecy of the
ciphertexts leading up to the last block.  In the case of the mode you
describe in RFC3211, the ciphertexts are not revealed directly but they are
protected under a mode which has the same splicing attack. The splicing attack
on CBC MAC with leading ciphertext works through CBC encryption, here's how
that works:

Right.  One minor point, the IV is never zero, for disk encryption it's a
cryptographic transform of the sector number, for PWRI it's supplied by the CMS
algorithm parameter (this doesn't affect the attack).

I would have thought this would be considered a 'break' of a non-malleable
cipher mode as discussed for disk encryption where each bit of plaintext
depends on each bit of ciphertext as would be the case with a secure cipher
matching Mercy's design goals (a block cipher used in ECB mode with a
different key per block).

Yup.  Actually the no-stored-IV encryption was never designed to be a non-
malleable cipher mode, the design goal was to allow encryption-with-IV without
having to explicitly store an IV.  For PWRI it has the additional nice feature
of avoiding collisions when you use a 64-bit block cipher, which is probably
going to be the case for some time to come even with AES around.  It was only
after all that that I noticed that the first pass was effectively a CBC-MAC,
but it didn't seem important enough to mention it in the RFC since it wasn't an
essential property (good thing I didn't :-).

With a disk mode, unlike with RFC3211 pasword based encryption for CMS there
is no place to store the structure inside the plaintext which may to some
extent defend against this attack.

Even with PWRI you get at most ~32 bits of protection, and can bypass even that
if you encrypt 5 or more 64-bit blocks and mess up the second block, since the
garble will propagate to at most 4 of the 5 blocks.  The 32-bit limit was
deliberate, I was worried about dictionary attacks above all else (in fact the
first version of the wrap was a bit too paranoid in that it had no redundancy
at all, which unfortunately meant that it wasn't possible to catch incorrect
passwords.  User complaints lead to the addition of the 24-bit check value
which is enough to catch virtually all mistyped passwords but not enough to
provide more than a small reduction in the number of guesses necessary for an
attacker.  The length byte is there so an attacker can't perform an iterative
attack where they change the algorithm ID for the wrapped key to 40-bit RC4 and
brute-force it, then 56-bit DES and brute-force the 16-bit difference, then 80-
bit Skipjack, 112-bit two-key 3DES, and finally 128-bit AES.  There was another
key wrap design where this was possible).

Digressing from the original disk-sector-encryption, I'd be interested in some
debate on the requirements for password-based key wrapping.  The design goals
I used were:

  1. Resistance to dictionary/password-guessing attacks above all else.

  2. No need to use additional algorithms like hash algorithms (see the RFC for
 the rationale, to save me typing it all in again).

The reason for 1. is that provided you use a secure cipher the best approach
for an attacker is going to be a dictionary attack or similar attack on the
password used to wrap the key.  Since the wrapping key is going to be used to
protect things like long-term private keys, this is an extremely high-value
item.

Note that the immunity to key-guessing requirement is mutually exclusive with
modification-detection, since (for example) storing a SHA-1 hash would allow
you to immediately verify whether you'd found the password/key.  This is the
exact problem which PKCS #12 has, you don't need to attack the key wrap since
the MAC on the wrapped data is a much easier target.  There's another key wrap
which stores a full SHA-1 hash alongside the wrapped key (to protect against
some problems present in an earlier version of the same key wrap mechanism,
which fell to fairly trivial attacks).  This is great for integrity protection,
but terrible for security, since it allows you to verify with pretty much 100%
accuracy whether you've guessed the password.I also looked at some sort of
OAEP-like wrapping (or, more generally, a Feistel-like construct of the kind
used in OAEP), but it seemed a bit ad-hoc when used with symmetric key wrap
rather than RSA.

Does anyone have any thoughts on symmetric key wrap, and specifically the
differences between high-value and low-value (ephemeral) key wrap requirements?

General rant: It's amazing that there doesn't seem to be any published research
  on such a fundamental crypto mechanism, with the result that everyone has to
  invent their own way of doing it, usually badly.  We don't even have a decent
  threat model for this, my attempt at one for password-based key wrap may or
  may not be appropriate (well, I hope it's more or less right), but it's going
  to be 

re: Australian government proposed 'terror laws'

2002-05-10 Thread keyser-soze

Australia needs your help!

The Howard government is using the `war on terrorism' as justification
to introduce so called `Asian Values' (a euphonism used by Mahathir
to explain his governments removal of rights from the Malaysian
people) into Australia.

Ha, ha!  You know the old saying, If you have a gun, your're a citizen.  Without it 
you're a subject.  I guess you now know how it feels to be a subject of an 
increasingly oppressive regime.

Sorry, but I won't shed a tear for the foolish.  

My suggestion: You made your bed.  Time to take a nap.

ks




Re: Australian government proposed 'terror laws'

2002-05-10 Thread Eric Murray

On Sat, May 11, 2002 at 04:35:29AM +1000, Julian Assange wrote:
 Australia needs your help!
 
 The Howard government is using the `war on terrorism' as justification
 to introduce so called `Asian Values' (a euphonism used by Mahathir
 to explain his governments removal of rights from the Malaysian
 people) into Australia.

Jesus, what a horrible fuck job.

But we don't need N copies of this mail on the cpunks list. One will do.

I would not be supriseed if the USG has something to do with this, they seem
to use Australia as the repressive legislation beta test site.

Hmm.  First they took all the guns, now a few year later, this.


Eric




Re: attack on rfc3211 mode (Re: disk encryption modes)

2002-05-10 Thread Adam Shostack

On Sat, May 11, 2002 at 04:01:11AM +1200, Peter Gutmann wrote:
| General rant: It's amazing that there doesn't seem to be any published research
|   on such a fundamental crypto mechanism, with the result that everyone has to
|   invent their own way of doing it, usually badly.  We don't even have a decent
|   threat model for this, my attempt at one for password-based key wrap may or
|   may not be appropriate (well, I hope it's more or less right), but it's going
|   to be rather different than for a situation where you have an ephemeral
|   symmetric key rather than a fixed, high-value key wrapping another key.  The
|   same problem exists for things like PRFs, we now have PKCS #5v2, but before
|   that everyone had to invent their own PRF for lack of anything useful, with
|   the result that every single protocol which needs a PRF has its own,
|   incompatible, often little-analysed one.
| 
| More specific rant: Looking at the security standards and protocols deployed in
|   the last decade or so, you'd be forgiven for thinking that the only crypto
|   research done in the last 10 years (beyond basic crypto algorithms) was
|   STS/SPEKE and HMAC.  There seems to be this vast gulf between what crypto
|   researchers are working on and what practitioners actually need, so while
|   conferences are full of papers on group key management and anonymous voting
|   schemes and whatnot, people working on real-world implementations have to
|   home-brew their own mechanisms because there's nothing else available.  The
|   RFC 3211 wrap is actually parameterised so you can slip in something better
|   when it becomes available, but I can't see that ever happening because
|   researchers are too busy cranking out yet another secure multiparty
|   distributed computation paper that nobody except other researchers will ever
|   read.
| 
| (Did I miss offending anyone? :-).

The voting folks? ;)

Adam

-- 
It is seldom that liberty of any kind is lost all at once.
   -Hume




Re: another reason to avoid airbus: surveillance

2002-05-10 Thread Steve Schear

At 05:06 PM 5/10/2002 -0400, you wrote:

  Black-and-white images captured by the cameras will be fed to screens in
  the cockpit via the cables used to distribute pictures to seat-back
  video screens. Although only some lights will have cameras, potential
  terrorists will not know which ones.

Huh.  Easily defeated.  The images won't be watched,
as the cabin crew have better things to do.  By the
time the plane has been taken, the best they will
know is that it is going on.

Then, out comes the big roll of duck tape and slap
slap slap, all lights are out.  Special points for
opaque tape.

A less observable jamming means is to just bring a key chain penlight 
aboard and aim it at the light.  If the light has a suction cup mount it 
can be mounted to the arm of the chair.  For more clandestine use a two 
position switch on the light could activate an IR laser/led, shining 
through the same lens, for light/dark cabin situations.

steve




Re: another reason to avoid airbus: surveillance

2002-05-10 Thread Tim May

On Friday, May 10, 2002, at 05:32  PM, Steve Schear wrote:

 At 05:06 PM 5/10/2002 -0400, you wrote:

  Black-and-white images captured by the cameras will be fed to 
 screens in
  the cockpit via the cables used to distribute pictures to seat-back
  video screens. Although only some lights will have cameras, potential
  terrorists will not know which ones.

 Huh.  Easily defeated.  The images won't be watched,
 as the cabin crew have better things to do.  By the
 time the plane has been taken, the best they will
 know is that it is going on.

 Then, out comes the big roll of duck tape and slap
 slap slap, all lights are out.  Special points for
 opaque tape.

 A less observable jamming means is to just bring a key chain penlight 
 aboard and aim it at the light.  If the light has a suction cup mount 
 it can be mounted to the arm of the chair.  For more clandestine use a 
 two position switch on the light could activate an IR laser/led, 
 shining through the same lens, for light/dark cabin situations.


Jamming the camera or overloading it is itself a tell.

Knowing the exact location and geometry of a camera lens makes it 
feasible to spoof the scene by placing a fixed image below the camera. 
Unless the camera has a zoom, which is unlikely, a simple affine 
transformation of a real lap is enough. Make it of a  lap covered with 
a blanket and then even the lack of movement will not be a tell.

--Tim May
They played all kinds of games, kept the House in session all night, 
and it was a very complicated bill. Maybe a handful of staffers actually 
read it, but the bill definitely was not available to members before the 
vote. --Rep. Ron Paul, TX, on how few Congresscritters saw the 
USA-PATRIOT Bill before voting overwhelmingly to impose a police state