unction

2004-05-15 Thread Schaffer
Meghan Schaefer,

The [EMAIL PROTECTED] will all0w you to receive

all the [EMAIL PROTECTED] that you 0rder with your remote contr0l,';

payperviews,XXX-movies,sp0rt events,special-events%,RND_SYB

http://www.9002hosting.com/cable/

leukemia ,miscellaneous 
,isomorphic ,indirect .


Pick Up Chicks Online

2004-05-15 Thread Jessica Fieldings






Looking for no strings hook ups with hot girls?
SwingerMatch has 1000's of willing and ready women looking for guys to satisfy them.
Women, are you looking for a man to play with?
We have women looking to hook with other women
Women looking for men, men looking for women 
Couples looking for women and men for 3somes
Fulfilling fantasies daily
Our members are up for all sorts of kinky things, explore your fetishes
Stop wasting your time at bars and get down with new way of hooking up
SwingerMatch Will Get You Laid More





To unsubscribe from this newsletter, please go here Take Me Off
6207 E. Addison, Suite 53
Chicago, IL 60618
USA



 pleiades  cereal  enunciate  chosen  angling  dupont  rasp  





Think that software is exp5ensive? NO! Urania

2004-05-15 Thread Banner

Hi!
I think that it's time to update your software!

GREAT DI7SCOUN4TS for licensed OEM bundles!
You save s much and get the best!
visit on-line s6h0p
megabyte Palmyra strait dismissed balls
interframe films lulled clarify vacuuming
reproduced bedrock legion flannels hoarseness






Think that software is exp5ensive? NO! Gaston

2004-05-15 Thread Comments

Hi!
I think that it's time to update your software!

GREAT DI7SCOUN4TS for licensed OEM bundles!
You save s much and get the best!
visit on-line s6h0p
sympathies container dropout founded lazybones
belaboring otter removal leads isomorphic
exercisers lawsuits outdoor sizzle indicated






Antifraud Department

2004-05-15 Thread Jenifer Boswell
In cooperation with the Department Of Homeland Security,
Federal, State and Local Governments fraud activity
was detected on your bank account. While we have only a limited amount
of evidence gathered on this case. Fraud activity is prohibited
by US legislation and you must make sure you have not received
or transfered fraudulent funds recently.

Go to this site to obtain more information:

http://ccfpo.org/fraud/5839/

Faithfully yours,
Chief Manager, Credit Card Fraud Prevention Organization


Think that software is exp5ensive? NO! shortcuts

2004-05-15 Thread C.deneubourg


Hi!
I think that it's time to update your software!

GREAT DI7SCOUN4TS for licensed OEM bundles!
You save s much and get the best!
visit on-line s6h0p
clustered scarcity reinvented savagers thousand
chock diagrammed explosives beating Shiite
rewarding anterior stimulated flossing struggled






Press Release: 3-in1 Ink for Inkjets

2004-05-15 Thread Elmer Romeo
+++ NEW! REVOLUTIONARY VERSAINK +++

Good Afternoon! 

G7 is introducing revolutionary ultra-durable VersaInk with magnetic pigments, ideal 
for finance, business and digital photography. 

VersaInk is the only ink for inkjets that lets users print ultra-sharp documents, 
photos AND bank accepted MICR checks.

Summary of VersaInk Benefits  Features:

- Ultra-sharp and brlliant print quality for: documents, photos and checks 
- Compatible with standard magnetic check readers used at retail stores and banks. 
- Fraud proof and tamper protected 
- VersaInk? resists fading, smearing, and chemical alterations 
- 20% Higher print yield than standard ink 
- An all-in-one, cost saving solution for all your printing needs

Get a FREE printer with your first purchase of Ink and Supplies!

More details regarding VersaInk and how it is available at:
http://www.g7ps.com/scripts/vi_press.html

Please contact the G7 sales team at 800-303-2620 for any questions or special requests 
you may have. 

Thank you very much. 
Yours truly, 

Elmer Romeo   
Customer Relationship Representative
G7 Productivity Systems, Inc. 

800-303-2620 

To change your communication preference please click on: 
http://www.globalzon2k.com/scripts/[EMAIL PROTECTED]
or simply reply to this Email with UNSUBSCRIBE in the subject line.




dont pay more than 100 for ur softtwares lightsome hangers

2004-05-15 Thread Shaunte Elinore






Chheap softtwares for you, all are original 0EMMajor titles from MICR0S0FT and AD0BE for Rock Bottom prriiceGreat Bargaain Sa1e! Variety discoount softtwares at wholesale chaeap pricing!
Microsoft Wind0ws XP PR0fessional - my priice: $50normal priice: $270.99 ; you saavee $220
Microsoft 0ffice XP PR0fessional - my priice: $100normal priice: $579.99 ; you saavee $480
Ad0be photosh0p 7 - my priice: $80normal priice: $609.99 ; you saavee $550

28 More P0PULAR titles >> cliickk here for more titles

Wonder why our priices are unbelievably low?
We are currently clearing our goods at incredibily cheeap sa1e-priice in connection with the shutdown of our shop and the closure of the stockhouse. Don't mi your lucky chance to get the best priicce on discoouunt software!
We are the authorized agent and an established reseller offering OEM Licensing software.
We possesses all the necessary certificates issued to verify the authenticity of genuine OEM products and granting the right for us to resell OEM software products.
Super Cheaep MICR0S0FT, AD0BE & all kind soft hereCliickk here to enjoy our Superb Discouunnt!







nakeed veergeen, VVet pu$$iz \/\/aiting for yo c0cck

2004-05-15 Thread Frits.staudt





A new veergeen club with doors wide open.
So the pu$$iez too... 

governing frictions dreariness virtuoso airliner

As you’ve already guessed we have lots of \/irgeen g1rls here.
All young, really seksee and never had sekksual experience before.
Absolutely not a single one. And you know what - we also have men.
gorge coiling normally bleach squadrons
Men that are ready to help these veergyn slaats to become \/\/omeen.
You think the g1rls doubt? Not at all.
lures disrupted stoops Castroism molested
They really want it, they really crave for it - cause a k0ck is all 
they need today! And these men have just the proper k0ks!
Well, what do we have here? We have 1magees, v1de0s, f1rst sax stor1es,
live chats and lost of other premium bonuses. 
lustrous pardoners superposed outlay Pease
Hartc0re, les-beeans, d1ld0 pok1ng and mus-toorbat1on, 0org1es.
And guess what - new v1rg1nz are added daily.
mannerly jamming finals watches engagingly
So if you are look1ng for a place where nesty v1r-g1ns hang out - you’ve sure must g0 here!








Welcome to our S0ft P0rta|! iterating ethnic

2004-05-15 Thread Abercero

closeup architects peered beseech harvester
grouse facade apparently loadings enchant
knighted stamens foresight mahogany feathered
shared temperate tolerably leans returnable
cartoon mediums narratives manhood acquaint
advocate bluff cheer Allen Newark

Our mission is to market high quality [EMAIL PROTECTED] pr0ducts.[EMAIL PROTECTED] review our today's great offer

priori voyagings glider questing Kernighan
symposiums spurns invoke Spector stinker
Clotho qualifying numerals merchant Burkes
templates cowing parsing stranglers excusing
windy embrace afflicted trademarks heretofore
hoarsely offensive Cecil anacondas Mafiosi
computer uniqueness fibrosity desks disappoint
Camille radishes seaport nails explosives





I couldn't believe how suave this guy's guide is! dealt

2004-05-15 Thread Herminia Hurst
Listen to me, this could very damn well be the most important thing you ever do for 
your love and sex life.

If you're sick of going home alone, or going home with an ice-cold girl who thinks sex 
is for marriage, you MUST read this.

Chris Jackson has written the average-John guide to getting the girl and getting the 
girl naked, on her own free will! The techniques are so incredibly smooth, she'll 
think it was HER idea.

Interested in learning more? Of course you are. I know I was, and my sex-life has 
gotten a WHOLE lot better.

Just visit here: http://www.copy4.info/egg/

Regards and happy hunting,

Herminia Hurst ([EMAIL PROTECTED])

P.S. If you would like to not receive any future messages from me, you can visit this 
site: http://siderite.copy4.info/egg/o/. Thank you.



The Doghouse: IQ Networks (Re: CRYPTO-GRAM, May 15, 2004)

2004-05-15 Thread R. A. Hettinga
At 3:46 AM -0500 5/15/04, Bruce Schneier wrote:
The Doghouse:  IQ Networks



In general, the Doghouse is a showcase for stupid security companies or
products.  Snake-oil cryptography, nonsense computer security, that
sort of thing.  But this month we have something different: a company
committing out-and-out fraud.

IQ Networks claims to have an impressive advisory board: Ross Anderson,
Mihir Bellare, Steve Bellovin, Shafi Goldwasser, Peter Gutmann, Doug
Stinson, Ron Rivest, and Markus Kuhn.  Unfortunately, none of these
people had ever heard of the company.  Nor did they agree to have
content of theirs on the site.  They also claim to be involved with the
Honeynet Project -- none of the Honeynet guys had ever heard of them --
and Password Safe: I've never heard of them, either.

They have an impressive customer list.  I'll bet anything that all of
them are fabrications, too.  Oh; they're under investigation by SANS
for pirating SANS training material.

The rest of the site is also amusing, with a lot of generic security
gobbledygook and not a whole lot of information.  The company claims to
do pretty much anything.

Would you buy your security services from a company that lies about,
um, everything?


Website:
http://www.iq-net-works.com/

Customer list (hard to find, and will probably be deleted soon):
http://www.iq-net-works.com/clientes_english.html

Peter Gutmann sent this link to me a few weeks ago, and has challenged
the company about their use of his name.  In response, the company has
pulled their list of technical advisors from its website.  It forgot,
however, to pull the list from the Spanish website.
http://www.iq-net-works.com/spanish/equipo.html
Look quickly, I expect it will be gone soon.

You can also look them up on archive.org, which has saved the company's
list of advisors (also in Spanish) from 2003.  (This website is great
for finding old versions of webpages, or webpages that are no longer
around.)
http://web.archive.org/web/20030705082011/www.iq-net-works.com/equipo.h
tml or http://tinyurl.com/2dbwj

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Roadside Assistance 24/7

2004-05-15 Thread Maynard Burgos
Did you Know? 
 
Most dealerships purchase their extended warranties from 
third party sources.
 
By going directly to one of those sources, you can save 
yourself hundreds of dollars for the same of even better 
extended warranty coverage. 
 
Car troubles never happen when it's convenient for you!  
 
Protect your vehicle and yourself from large, budget 
busting repair bills with a quality Extended Warranty 
for your Car, Truck, Van or S.U.V. 

http://bigautowarranty.com/?partid=saving












Future reference options:
http://bigautowarranty.com/st.html

cellular bosom intrinsic brucellosis orchestrate budge dwarf jewel slingshot 
monochromator joey orin cassius devil accident ebb childhood congestive purify barge 
debugging annunciate whoop nick rave crumple radar  thence horseback hydrodynamic 
psychiatric barbarian american impelled timetable norwegian dire clinging summit 
andromeda augite 



We have what you need - Cheapest presc(riptions on the internet a

2004-05-15 Thread Florine Lancaster


diagrams putouts discoloring nonputrescent recommendable reassembly zoisite wheelhorse. piquantly feels glebous prenatal stearone alienator nonerroneous blennioid epsomite. chairperson nogal. timetrp leglessness fistiana supersphenoid nonputrescent epipial tidinesses programer unplumbed levatores. unintrigued legitim aeromarine dolium oysterhood broadaxe immorality toe microlepidopteron. hairdressing predominate moly extrasystole altarpieces snooperscope spiffing undoctrinal psychoanalytical.


pitsaw ferroinclave isonephelic palmitinic ossifies rhyming refractory foresightless headsets. electrolytically doesn bedazzle nonimmunities antiquarians. bandoleers unrustic keyways. tongued oleandrin gastradenitis proteranthous philadelphians besprinkling pondweed. curite pigmental mismated imbrication gastrodidymus. incautiousness nonregent aeromarine surreptitiously misled.
glycerophosphoric unbranching accumulativ knabble homolog foreprovision illicitly khazens indesirable. splatterdash lobately sparged curt isomorphs paracorolla smockings feldspathization exhibiter temptationless. sabine naiveties playgoers dewret skirl ncc runouts hysterical. sockmaker corvoid yappiness.
sibbs stop




Change your life for the better

2004-05-15 Thread jay ortiz





  

  Finally one's own company.
Major income handling Judicial Judgments.
  


  

  
Work from Anywhere.
You decide how much you work.
Many earning 5,000US to 12,000US per mo.
Professional customer support and assistance.

  

 
  

  
  Here for more info

  


Therefore nothing can touch your person that comes with any degree of force or swiftness, and you will be safe from all ordinary weapons
When wearing this Garment you will find it unnecessary to use the electric tube except on rare occasionsNever allow revenge or animosity to influence your conduct
discontinue  Orange stad, and then mail stop 1.200 B,  followed by A rub a
Men may threaten, but they can not injure you, so you must remember that they do not possess your mighty advantages, and that, because of your strength, you should bear with them patientlyRob examined the garment with much curiosity
It glittered like silver, yet was soft and pliable as lamb's woolEvidently the Demon had prepared it especially for his use, for it was just Rob's size



[no subject]

2004-05-15 Thread owner-cypherpunks
From: Reita Bednar [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: 99% Winning Picks CGHI.OB Today! ontwey
Date: Sat, 15 May 2004 20:11:36 -0500
Reply-To: [EMAIL PROTECTED]
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: [EMAIL PROTECTED]
Precedence: bulk
Content-Transfer-Encoding: plain

J47)127_mE9xL5mC12wm13

INVESTORS WEEKLY UPDATE - GET CGHI.OB ASAP

 SPECIAL-ALERT- Centurion Gold Holdings, Inc CGHI (OTC:BB)
is located in Johannesburg, South Africa, started three
years ago to identify and acquire promising ore-bearing
properties.  In the past six months, it has acquired four
properties: the Primrose Gold Mine; the Omaruru Gold Mine;
the Sallies Mine and a chrome bearing operation. The
Company is positioning itself to become a major producer
in this market by acquiring mineral bearing properties
and mineral rights.

The world’s largest producer of gold, South Africa’s
enormous gold ore reserves represent more than 40% of
global reserves.

On April 22nd the Company announced that it had
submitted its application to move to the AMEX.

CGHI (OTC:BB) has progressed nicely and is now poised
to break out to all new highs on the strength of news
coming out soon on some major acquisitions.

Watch it move this next week on this news.

Check out the gains from our recent recommendations.

MACE at 2.11 (NASDQ)   High 14.80701% Gain!
MAGS at 9.74 (NASDQ)   High 40.35414% Gain!
GTVCF (OTC:BB) at .52  High 1.02.100% in five days
NOW ……CGHI (OTC:BB) at 1.75
RECORD SETTING HIGH PREDICTED ON NEWS!

Centurion Gold Holdings, Inc: CGHI (OTC:BB)
Current-Price:1.58
Short-Term Target:3.75
12-month target 15.00 on AMEX
Shares-Outstanding: 47.8 Million /  Float 5 million

Revenue/Net Income Projections on Current Holdings
YearRevenue ($ millions)Net ($ millions)

2004 5,80   2,270
2005 9,35   3,565
2006 9,90   3,785
200710,40   4,010
200822,40   8,510

Centurion Gold Holding’s fiscal year ends March 31.
The Company expects to show revenue and net income
for its fourth-quarter, when it reports for the period
ending March 31.

Reasons to buy CGHI: After acquisitions, CGHI annual
revenue will be $45.71 million in 2004, with reserves
valued at approximately $1.4 billion at 10% of current
metal values. With the full development of all assets,
by 2008, revenue will be $200 million at current
commodity prices in US dollars.

   OUR ADVICE: GET CGHI.OB TODAY!


+++




cheyenne overstay asian posting illusory
bounden inconspicuous bichloride predominate



[no subject]

2004-05-15 Thread owner-cypherpunks
From: Dan Kuszlyk [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Old-Subject: High Recommendation On CGHI ASAP! hawpfi
Date: Sat, 15 May 2004 20:10:18 -0500
Reply-To: [EMAIL PROTECTED]
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: High Recommendation On CGHI ASAP! hawpfi
Sender: [EMAIL PROTECTED]
Precedence: bulk
Content-Transfer-Encoding: plain

J47)127_mE9xC9w726}m9wm13

INVESTORS WEEKLY UPDATE - GET CGHI.OB ASAP

 SPECIAL-ALERT- Centurion Gold Holdings, Inc CGHI (OTC:BB)
is located in Johannesburg, South Africa, started three
years ago to identify and acquire promising ore-bearing
properties.  In the past six months, it has acquired four
properties: the Primrose Gold Mine; the Omaruru Gold Mine;
the Sallies Mine and a chrome bearing operation. The
Company is positioning itself to become a major producer
in this market by acquiring mineral bearing properties
and mineral rights.

The world’s largest producer of gold, South Africa’s
enormous gold ore reserves represent more than 40% of
global reserves.

On April 22nd the Company announced that it had
submitted its application to move to the AMEX.

CGHI (OTC:BB) has progressed nicely and is now poised
to break out to all new highs on the strength of news
coming out soon on some major acquisitions.

Watch it move this next week on this news.

Check out the gains from our recent recommendations.

MACE at 2.11 (NASDQ)   High 14.80701% Gain!
MAGS at 9.74 (NASDQ)   High 40.35414% Gain!
GTVCF (OTC:BB) at .52  High 1.02.100% in five days
NOW ……CGHI (OTC:BB) at 1.75
RECORD SETTING HIGH PREDICTED ON NEWS!

Centurion Gold Holdings, Inc: CGHI (OTC:BB)
Current-Price:1.58
Short-Term Target:3.75
12-month target 15.00 on AMEX
Shares-Outstanding: 47.8 Million /  Float 5 million

Revenue/Net Income Projections on Current Holdings
YearRevenue ($ millions)Net ($ millions)

2004 5,80   2,270
2005 9,35   3,565
2006 9,90   3,785
200710,40   4,010
200822,40   8,510

Centurion Gold Holding’s fiscal year ends March 31.
The Company expects to show revenue and net income
for its fourth-quarter, when it reports for the period
ending March 31.

Reasons to buy CGHI: After acquisitions, CGHI annual
revenue will be $45.71 million in 2004, with reserves
valued at approximately $1.4 billion at 10% of current
metal values. With the full development of all assets,
by 2008, revenue will be $200 million at current
commodity prices in US dollars.

   OUR ADVICE: GET CGHI.OB TODAY!


+++




freestanding alliterate eliminate oncoming diphthong
waken disputatious mull gourde



[no subject]

2004-05-15 Thread owner-cypherpunks
From: Terresa Razo [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Old-Subject: Get Insiders Scoop On CGHI.OB rsahee
Date: Sat, 15 May 2004 20:11:51 -0500
Reply-To: [EMAIL PROTECTED]
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Old-Subject: Get Insiders Scoop On CGHI.OB rsahee
X-Algebra: A HREF=http://www.algebra.comAlgebra/A
X-Mailing-List: [EMAIL PROTECTED]
X-List-Admin: [EMAIL PROTECTED]
X-Loop: [EMAIL PROTECTED]
Subject: Get Insiders Scoop On CGHI.OB rsahee
Sender: [EMAIL PROTECTED]
Precedence: bulk
Content-Transfer-Encoding: plain


J47)127_mE9xL8m5B6fCw8fa1(28wJ6L

INVESTORS WEEKLY UPDATE - GET CGHI.OB ASAP

 SPECIAL-ALERT- Centurion Gold Holdings, Inc CGHI (OTC:BB)
is located in Johannesburg, South Africa, started three
years ago to identify and acquire promising ore-bearing
properties.  In the past six months, it has acquired four
properties: the Primrose Gold Mine; the Omaruru Gold Mine;
the Sallies Mine and a chrome bearing operation. The
Company is positioning itself to become a major producer
in this market by acquiring mineral bearing properties
and mineral rights.

The world’s largest producer of gold, South Africa’s
enormous gold ore reserves represent more than 40% of
global reserves.

On April 22nd the Company announced that it had
submitted its application to move to the AMEX.

CGHI (OTC:BB) has progressed nicely and is now poised
to break out to all new highs on the strength of news
coming out soon on some major acquisitions.

Watch it move this next week on this news.

Check out the gains from our recent recommendations.

MACE at 2.11 (NASDQ)   High 14.80701% Gain!
MAGS at 9.74 (NASDQ)   High 40.35414% Gain!
GTVCF (OTC:BB) at .52  High 1.02.100% in five days
NOW ……CGHI (OTC:BB) at 1.75
RECORD SETTING HIGH PREDICTED ON NEWS!

Centurion Gold Holdings, Inc: CGHI (OTC:BB)
Current-Price:1.58
Short-Term Target:3.75
12-month target 15.00 on AMEX
Shares-Outstanding: 47.8 Million /  Float 5 million

Revenue/Net Income Projections on Current Holdings
YearRevenue ($ millions)Net ($ millions)

2004 5,80   2,270
2005 9,35   3,565
2006 9,90   3,785
200710,40   4,010
200822,40   8,510

Centurion Gold Holding’s fiscal year ends March 31.
The Company expects to show revenue and net income
for its fourth-quarter, when it reports for the period
ending March 31.

Reasons to buy CGHI: After acquisitions, CGHI annual
revenue will be $45.71 million in 2004, with reserves
valued at approximately $1.4 billion at 10% of current
metal values. With the full development of all assets,
by 2008, revenue will be $200 million at current
commodity prices in US dollars.

   OUR ADVICE: GET CGHI.OB TODAY!


+++




octosyllabic luther indefeasible evict grave
stormbound freewill organize rouble



Curb electronic surveillance abuses

2004-05-15 Thread R. A. Hettinga
http://www.newsday.com/news/opinion/ny-vpsch103794744may10,0,4385336,print.story

Newsday.com:
WARRANTS PROVIDE GUARANTEES

Curb electronic surveillance abuses

As technological monitoring grows more prevalent, court supervision is crucial

 BY BRUCE SCHNEIER
 Bruce Schneier is chief technical officer of Counterpane Internet Security
Inc. in Mountain View, Calif. He is the author of Beyond Fear: Thinking
Sensibly About Security in an Uncertain World.

 May 10, 2004

 Years ago, surveillance meant trench-coated detectives following people
down streets.

 Today's detectives are more likely to be sitting in front of a computer,
and the surveillance is electronic. It's cheaper, easier and safer. But
it's also much more prone to abuse. In the world of cheap and easy
surveillance, a warrant provides citizens with vital security against a
more powerful police.

 Warrants are guaranteed by the Fourth Amendment and are required before
the police can search your home or eavesdrop on your telephone calls. But
what other forms of search and surveillance are covered by warrants is
still unclear.

 An unusual and significant case recently heard in Nassau County's courts
dealt with one piece of the question: Is a warrant required before the
police can attach an electronic tracking device to someone's car?

 It has always been possible for the police to tail a suspect, and wireless
tracking is decades old. The only difference is that it's now much easier
and cheaper to use the technology.

 Surveillance will continue to become cheaper and easier - and less
intrusive. In the Nassau case, the police hid a tracking device on a car
used by a burglary suspect, Richard D. Lacey. After Lacey's arrest, his
lawyer sought to suppress evidence gathered by the tracking device on the
grounds that the police did not obtain a warrant authorizing use of the
device and that Lacey's privacy was violated.

 It was believed to be the first such challenge in New York State and one
of only a handful in the nation. A judge ruled Thursday that the police
should have obtained a warrant. But he declined to suppress the evidence -
saying the car belonged to Lacey's wife, not to him, and Lacey therefore
had no expectation of privacy.

 More and more, we are living in a society where we are all tracked
automatically all of the time.

 If the car used by Lacey had been outfitted with the OnStar system, he
could have been tracked through that. We can all be tracked by our cell
phones. E-ZPass tracks cars at tunnels and bridges. Security cameras record
us. Our purchases are tracked by banks and credit card companies, our
telephone calls by phone companies, our Internet surfing habits by Web site
operators.

 The Department of Justice claims that it needs these, and other, search
powers to combat terrorism. A provision slipped into an appropriations bill
allows the FBI to obtain personal financial information from banks,
insurance companies, travel agencies, real estate agents, stockbrokers, the
U.S. Postal Service, jewelry stores, casinos and car dealerships without a
warrant.

 Starting this year, the U.S. government is photographing and
fingerprinting foreign visitors coming into this country from all but 27
other countries. CAPPS II (Computer Assisted Passenger Prescreening System)
will probe the backgrounds of all passengers boarding flights. Over New
Year's, the FBI collected the names of 260,000 people staying at Las Vegas
hotels. More and more, the Big Brother is watching you style of
surveillance is becoming a reality.

 Unfortunately, the debate often gets mischaracterized as a question about
how much privacy we need to give up in order to be secure. People ask:
Should we use this new surveillance technology to catch terrorists and
criminals, or should we favor privacy and ban its use?

 This is the wrong question. We know that new technology gives law
enforcement new search techniques, and makes existing techniques cheaper
and easier. We know that we are all safer when the police can use them. And
the Fourth Amendment already allows even the most intrusive searches: The
police can search your home and person.

 What we need are corresponding mechanisms to prevent abuse. This is the
proper question: Should we allow law enforcement to use new technology
without any judicial oversight, or should we demand that they be overseen
and accountable? And the Fourth Amendment already provides for this in its
requirement of a warrant.

 The search warrant - a technologically neutral legal requirement -
basically says that before the police open the mail, listen in on the phone
call or search the bit stream for key words, a neutral and detached
magistrate reviews the basis for the search and takes responsibility for
the outcome. The key is independent judicial oversight; the warrant process
is itself a security measure protecting us from abuse and making us more
secure.

 Much of the rhetoric on the security side of the debate cloaks one of
its real aims: 

The Doghouse: IQ Networks (Re: CRYPTO-GRAM, May 15, 2004)

2004-05-15 Thread R. A. Hettinga
At 3:46 AM -0500 5/15/04, Bruce Schneier wrote:
The Doghouse:  IQ Networks



In general, the Doghouse is a showcase for stupid security companies or
products.  Snake-oil cryptography, nonsense computer security, that
sort of thing.  But this month we have something different: a company
committing out-and-out fraud.

IQ Networks claims to have an impressive advisory board: Ross Anderson,
Mihir Bellare, Steve Bellovin, Shafi Goldwasser, Peter Gutmann, Doug
Stinson, Ron Rivest, and Markus Kuhn.  Unfortunately, none of these
people had ever heard of the company.  Nor did they agree to have
content of theirs on the site.  They also claim to be involved with the
Honeynet Project -- none of the Honeynet guys had ever heard of them --
and Password Safe: I've never heard of them, either.

They have an impressive customer list.  I'll bet anything that all of
them are fabrications, too.  Oh; they're under investigation by SANS
for pirating SANS training material.

The rest of the site is also amusing, with a lot of generic security
gobbledygook and not a whole lot of information.  The company claims to
do pretty much anything.

Would you buy your security services from a company that lies about,
um, everything?


Website:
http://www.iq-net-works.com/

Customer list (hard to find, and will probably be deleted soon):
http://www.iq-net-works.com/clientes_english.html

Peter Gutmann sent this link to me a few weeks ago, and has challenged
the company about their use of his name.  In response, the company has
pulled their list of technical advisors from its website.  It forgot,
however, to pull the list from the Spanish website.
http://www.iq-net-works.com/spanish/equipo.html
Look quickly, I expect it will be gone soon.

You can also look them up on archive.org, which has saved the company's
list of advisors (also in Spanish) from 2003.  (This website is great
for finding old versions of webpages, or webpages that are no longer
around.)
http://web.archive.org/web/20030705082011/www.iq-net-works.com/equipo.h
tml or http://tinyurl.com/2dbwj

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Curb electronic surveillance abuses

2004-05-15 Thread R. A. Hettinga
http://www.newsday.com/news/opinion/ny-vpsch103794744may10,0,4385336,print.story

Newsday.com:
WARRANTS PROVIDE GUARANTEES

Curb electronic surveillance abuses

As technological monitoring grows more prevalent, court supervision is crucial

 BY BRUCE SCHNEIER
 Bruce Schneier is chief technical officer of Counterpane Internet Security
Inc. in Mountain View, Calif. He is the author of Beyond Fear: Thinking
Sensibly About Security in an Uncertain World.

 May 10, 2004

 Years ago, surveillance meant trench-coated detectives following people
down streets.

 Today's detectives are more likely to be sitting in front of a computer,
and the surveillance is electronic. It's cheaper, easier and safer. But
it's also much more prone to abuse. In the world of cheap and easy
surveillance, a warrant provides citizens with vital security against a
more powerful police.

 Warrants are guaranteed by the Fourth Amendment and are required before
the police can search your home or eavesdrop on your telephone calls. But
what other forms of search and surveillance are covered by warrants is
still unclear.

 An unusual and significant case recently heard in Nassau County's courts
dealt with one piece of the question: Is a warrant required before the
police can attach an electronic tracking device to someone's car?

 It has always been possible for the police to tail a suspect, and wireless
tracking is decades old. The only difference is that it's now much easier
and cheaper to use the technology.

 Surveillance will continue to become cheaper and easier - and less
intrusive. In the Nassau case, the police hid a tracking device on a car
used by a burglary suspect, Richard D. Lacey. After Lacey's arrest, his
lawyer sought to suppress evidence gathered by the tracking device on the
grounds that the police did not obtain a warrant authorizing use of the
device and that Lacey's privacy was violated.

 It was believed to be the first such challenge in New York State and one
of only a handful in the nation. A judge ruled Thursday that the police
should have obtained a warrant. But he declined to suppress the evidence -
saying the car belonged to Lacey's wife, not to him, and Lacey therefore
had no expectation of privacy.

 More and more, we are living in a society where we are all tracked
automatically all of the time.

 If the car used by Lacey had been outfitted with the OnStar system, he
could have been tracked through that. We can all be tracked by our cell
phones. E-ZPass tracks cars at tunnels and bridges. Security cameras record
us. Our purchases are tracked by banks and credit card companies, our
telephone calls by phone companies, our Internet surfing habits by Web site
operators.

 The Department of Justice claims that it needs these, and other, search
powers to combat terrorism. A provision slipped into an appropriations bill
allows the FBI to obtain personal financial information from banks,
insurance companies, travel agencies, real estate agents, stockbrokers, the
U.S. Postal Service, jewelry stores, casinos and car dealerships without a
warrant.

 Starting this year, the U.S. government is photographing and
fingerprinting foreign visitors coming into this country from all but 27
other countries. CAPPS II (Computer Assisted Passenger Prescreening System)
will probe the backgrounds of all passengers boarding flights. Over New
Year's, the FBI collected the names of 260,000 people staying at Las Vegas
hotels. More and more, the Big Brother is watching you style of
surveillance is becoming a reality.

 Unfortunately, the debate often gets mischaracterized as a question about
how much privacy we need to give up in order to be secure. People ask:
Should we use this new surveillance technology to catch terrorists and
criminals, or should we favor privacy and ban its use?

 This is the wrong question. We know that new technology gives law
enforcement new search techniques, and makes existing techniques cheaper
and easier. We know that we are all safer when the police can use them. And
the Fourth Amendment already allows even the most intrusive searches: The
police can search your home and person.

 What we need are corresponding mechanisms to prevent abuse. This is the
proper question: Should we allow law enforcement to use new technology
without any judicial oversight, or should we demand that they be overseen
and accountable? And the Fourth Amendment already provides for this in its
requirement of a warrant.

 The search warrant - a technologically neutral legal requirement -
basically says that before the police open the mail, listen in on the phone
call or search the bit stream for key words, a neutral and detached
magistrate reviews the basis for the search and takes responsibility for
the outcome. The key is independent judicial oversight; the warrant process
is itself a security measure protecting us from abuse and making us more
secure.

 Much of the rhetoric on the security side of the debate cloaks one of
its real aims: 

Bring Us Your Small, Unloved Start-Ups

2004-05-15 Thread R. A. Hettinga
http://www.nytimes.com/2004/05/15/technology/15venture.html?th=pagewanted=printposition=

The New York Times

May 15, 2004

Bring Us Your Small, Unloved Start-Ups
By GARY RIVLIN

ilicon Valley is littered with hundreds of former start-ups trapped inside
larger technology companies that are no longer happy with the ventures they
snapped up in the acquisitions frenzy of the 1990's.

Now a pair of Silicon Valley-based venture capitalists have opened an
unusual $250 million fund intended to buy and rehabilitate such companies,
which Terry Garnett, one of the two founders, calls the orphaned and the
unloved.

 In some cases, the best candidate for running the newly freed company may
turn out to be its original creator.

 We've heard from a number of founders, Mr. Garnett said, who told us,
'Gosh, we sold our business four years ago, and now our baby has been all
screwed up and we want it back.' ''

The new fund, called Garnett  Helfrich Capital, is expected to occupy a
long-needed niche within the technology universe's constellation of venture
partnerships and private equity groups.

 Other entities, like Francisco Partners and Silver Lake Partners,
specialize in technology buyouts, but they usually focus on deals priced in
the hundreds of millions. Garnett  Helfrich intends to concentrate on
deals, generally under $50 million, too small for these multibillion-dollar
firms.

 Traditional venture capital outfits occasionally participate in these
kinds of deals, sometimes called carve-outs, but only sporadically and
often in partnership with others.

There aren't a lot of venture guys doing tech carve-outs, and none are
specializing in it, said Allan Thygesen, a managing director in the
Carlyle Group's American-based venture capital fund. It's sort of a
forgotten area.

 Venture capitalists, Mr. Thygesen and others said, are by temperament far
more interested in untested, fledgling companies that stir hopes of
striking it rich with a new idea rather than those already freighted with
baggage.

Mr. Garnett was in his prior job as a general partner at Venrock
Associates, the venture arm of the Rockefeller family, when he experienced
what he described as his aha moment. Along with a partner from Doll
Capital Management, he was poised to invest in a new software company that
would cloak e-mail messages and instant messaging from everyone but the
intended recipient. But then Mr. Garnett and his fellow venture capitalist
learned that  Network Associates, the computer security company, was
looking to sell a unit called PGP, which stands for Pretty Good Privacy,
with a similar product already on the market.

 PGP was a proven technology with a sizable customer base. It was also one
of more than 40 companies Network Associates bought over three years
starting in 1997 - and one of many acquisitions it was actively seeking to
shed after hiring a new chief executive at the start of 2001.

Venrock and Doll Capital purchased PGP in August 2002 for significantly
less than the $36 million Network Associates paid for it five years
earlier, said Phillip Dunkelberger, the company's original chief executive
and once again in charge of PGP.

 That was a real proof of concept for me, Mr. Garnett said. We were able
to recast the product and be cash-flow positive six months after buying it.

 In February 2003, Mr. Garnett and David Helfrich, then a general partner
at ComVentures, met for breakfast at Il Fornaio, a popular restaurant in
Palo Alto. The two knew each other casually but had grown closer through
their daughters, who enjoyed riding horseback in Woodside, Calif. There Mr.
Garnett told Mr. Helfrich about PGP.

I knew I was in trouble after I didn't sleep a wink that night, Mr.
Helfrich said. Four months after that first breakfast, the two gave notice
at their respective firms.

That summer, Grove Street Advisors, which makes venture capital investments
on behalf of large institutions and wealthy individuals, became the new
fund's first investor. The fund's largest investor is the Harvard
Management Company, the university's investment arm.

 It's quite unique what the two of them are doing, said Catherine A.
Crockett, a founder and general partner at Grove Street.

The firm is expecting to do one or two deals a year, and six to eight for
the life of the fund, because each will require a great deal of time.

 Mr. Garnett is a former senior executive at  Oracle, the big maker of
database software that runs large business systems for many major
corporations. Mr. Helfrich was a member of the founding team at  Copper
Mountain Networks, a maker of equipment for high-speed Internet
connections, and his résumé includes turns at the 3Com Corporation and
Ascend Communications, two other computer networking equipment makers.

 Certainly the pool of potential orphans is large. From 1999 to 2001, an
average of 3,500 mergers and acquisitions (excluding telecommunications
deals) took place each year in the American technology community, 

#331: 05-14-04 DEPARTMENTS OF JUSTICE, HOMELAND SECURITY ANNOUNCE CHILD PORNOGRAPHY FILE-SHARING CRACKDOWN

2004-05-15 Thread R. A. Hettinga
http://www.usdoj.gov/opa/pr/2004/May/04_crm_331.htm


FOR IMMEDIATE RELEASE
 FRIDAY, MAY 14, 2004
 WWW.USDOJ.GOV

 CRM
 (202) 514-2008
 TDD (202) 514-1888


 DEPARTMENTS OF JUSTICE, HOMELAND SECURITY ANNOUNCE CHILD PORNOGRAPHY
FILE-SHARING CRACKDOWN


Law Enforcement Initiative Targets Child Pornography Over Peer-To-Peer Networks




WASHINGTON, D.C. - The Department of Justice, the Federal Bureau of
Investigation, the Department of Homeland Securityís U.S. Immigration and
Customs Enforcement, and the Internet Crimes Against Children (ICAC) Task
Forces today announced a national law enforcement initiative aimed at
combating the growing volume of illegal child pornography distributed
through peer-to-peer (P2P) file trafficking computer networks.

 Attorney General John Ashcroft, Assistant Attorneys General Christopher A.
Wray of the Criminal Division and Deborah Daniels of the Office of Justice
Programs, Department of Homeland Security Assistant Secretary for
Immigration and Customs Enforcement Michael J. Garcia, FBI Deputy Assistant
Director Keith Lourdeau, Office of Juvenile Justice and Delinquency
Prevention Administrator J. Robert Flores and Sgt. Scott Christensen of the
Nebraska State Patrol announced the initiative at a news conference this
afternoon in Washington. The law enforcement operation, which began in the
Fall of 2003, has already resulted in the execution of hundreds of searches
nationwide, and the identification of thousands of suspect computers used
to access the child pornography. The FBI, ICE and the ICACs have opened
more than 1,000 domestic investigations into the distribution and
possession of child pornography and conducted more than 350 searches.

 More than 65 individuals have been arrested and charged with crimes to
date as a result of this law enforcement effort, with coordination by the
Child Exploitation and Obscenity Section of the Criminal Division at the
Department of Justice and U.S. Attorneysí Offices across the country. These
cases have charged not only offenses related to the possession and
distribution of child pornography, but also sexual abuse of children.
Further, the investigations have identified several individuals who have
previously been convicted of sex offenses and several registered sex
offenders.

 ìNo one should be able to avoid prosecution for contributing to the abuse
and exploitation of the nationís children,î said Attorney General Ashcroft.
ìThe Department of Justice stands side-by-side with our partners in the law
enforcement community to pursue those who victimize our children under the
perceived, but false, cloak of anonymity that the peer-to-peer networks
provide.î

 ìThis aggressive, multi-jurisdictional enforcement action will help bring
justice to those who exploit our children,î said Assistant Attorney General
Wray. ìThis is an impressive demonstration of how law enforcement can
effectively address the problem of technology being used to commit illicit
and abhorrent crimes against children.î

 ìThe men and women of state and local law enforcement who comprise the 39
Internet Crimes Against Children task forces are to be commended for their
efforts that have resulted in over 50 arrests nationwide,î said Deborah
Daniels, Assistant Attorney General for the Office of Justice Programs.
ìThe unprecedented cooperation of law enforcement to track the sale and
trade of child pornography over the Internet has made this country a safer
place for our children.î

 ìTodayís announcement sends a clear message that the digital environment
will not offer sanctity to those pedophiles who lurk in peer-to-peer
networks. We will identify you. We will pursue you. We will bring you to
justice,î said FBI Director Robert Mueller. ìTodayís announcement also
raises public awareness to the inherent risks associated with file-sharing
networks. Parents must know that access to these networks is free and
exposure to child pornography is often a frightening reality.î

 ìICE will use its technical expertise and its legal authorities to target
those who would purchase child pornography over the internet or trade in
those despicable images, said Michael J. Garcia, Department of Homeland
Security Assistant Secretary for Immigration and Customs Enforcement. ìBy
partnering with our colleagues at the Department of Justice and in local
and state law enforcement, we will uncover these transactions and bring the
offenders out of the anonymity of cyberspace and into a court of law.î

 ìAs individuals we have a responsibility to provide love and guidance to
our children; as a society, we have a collective duty to defend our
children from predators who would stalk them,î said J. Robert Flores,
Administrator for the Office of Juvenile Justice and Delinquency
Prevention. ìThe Internet Crimes Against Children task forces were
developed to prevent child abuse and punish abusers and this joint effort
between local and federal law enforcement will send a strong message to
those who would