Find a date, romance, and love

2004-09-16 Thread Lecia Menzella



  







  






























Goes succulently, smoothly, like laughs seducing, plainly
And what is a plan, but an elongated llama?

Invisibly going, the noose spills as woman.



good day: suspensory gratefulness portsman isoasparagine smectis dryopians



September 2004: Manhattan Office, Retail and Industrial Space Update

2004-09-16 Thread IGDNYC Inc.
Title: Manhattan Commercial Real Estate Broker - IGDNYC Inc






   

  
   
 
  
  
 
  
   


  


 
  


 
  September 2004: Manhattan Office, Retail and Industrial Space Update


 
  
		
		News Home
		
		
		IGDNYC In The News
		
		- Real Estate New York
		Will The New Year Bring
		New Activity?
		(January, 2004)
		
		
		September 2004 News
		
		
		Detailed Statistics
		and Graphs
		
		
		Average Prices By
		Neighborhood
		
		- Office
		
		- Retail
		
		- Industrial
		
		

		
	
		
		
		
		
		
		The downtown markets slowly deteriorate as new buildings are built and additional spaces are vacated as companies relocate... 
		
	
		
		
		Read the full article
		here...

		
		
		

	

	
		
		
	

	  


 
	
	
	To continue receiving our newsletter, please Go Here
	
	To add someone to our newsletter, please Go Here
	
	
	To prevent [EMAIL PROTECTED] from receiving subsequent newsletters, please Go Here
	or paste the following URL in your browser: http://www.igdnycr.com/cgi-bin/[EMAIL PROTECTED] 

	
	
	

 
  

 
  
   
  
 
  1841 
  Broadway, Suite 200, New York, NY 10023 Tel: 212.258.2700 
  Fax: 212.258.3286 [EMAIL PROTECTED]
  
		

  
  
  
  

   
  
  
  







RE: Symantec labels China censor-busting software as Trojan

2004-09-16 Thread James A. Donald
--
On 15 Sep 2004 at 9:45, Tyler Durden wrote:
 Hum. Seems the Chinese government is pretty effective at 
 self-preservation. Does this contradict the widely-held 
 Cypherpunk belief in the inevitability of deterioration of 
 the state?

The authors of Freegate believe that for technological reasons, 
the internet will win, and the chinese government will lose. 
They are chinese.  They are familiar with repression, and 
familiar with technology.   They are the kind of people who 
know what they are talking about.  They had had fifteen million 
downloads of their software, which is continually rewritten to
meet the latest threats and tactics from the chinese
government. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 /1akS93Sf2XKwg4FTmI8LdG6vC+cX53AeniWvjvD
 48vdg03WMvEq/iMRpuzdB5uOFSZBsdaVv5+zX6o3/



Re: Geopolitical Darwin Awards

2004-09-16 Thread James A. Donald
--
On 15 Sep 2004 at 2:38, Thomas Shaddack wrote:
 Maybe they are playing a different game. They [Iran] couldn't
 use the eventually produced nukes anyway, without being
 showered back with the same kind

They are fanatics.  They expect to get a six pack of virgins. 
And they will say Hey, it was not us, it was these terrorists
who happen to have somehow stolen some nukes from persons
unknown. We are completely opposed to terrorism, and are fully
cooperating with foreign investigations.


--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 /Y5bZ5vcTSLqigJSE6PrHkJplrE/rkCOv5ZqjTCd
 4hlcKGlAs6dJgsGrsyIqiOz5Qfdc2wMId/LdnAnXG



ebay/paypal info update

2004-09-16 Thread [EMAIL PROTECTED]

 
  

Dear eBay 
User,
During our regularly scheduled account 
maintenance and verification procedures, we have detected a slight error 
in your billing information.
This might be due to either of the 
following reasons:
1. A recent change in 
your personal information ( i.e. change of address).
2. Submitting invalid information during the initial 
sign up process.
3. An inability to accurately verify your selected 
option of payment due to an internal error within our processors.
Please update and verify your 
information by clicking the link below: 

https://arribada.ebay.com/saw-cgi/eBayISAPI.dll?PlaceCCInfo
If your account information is not 
updated within 48 hours then your ability to sell or 
bid on eBay will become restricted.
Thank you
The eBay Billing Department. 

 
  



  


  


Copyright © 
2004 eBay Inc. All Rights Reserved. 
Designated trademarks and brands are the property of their respective 
owners. 
eBay and the eBay logo are trademarks of eBay Inc. 
eBay is located at 2145 Hamilton Avenue, San Jose, CA 95125.
  


  



  
  
  
  
  








Re: Geopolitical Darwin Awards

2004-09-16 Thread Tyler Durden
Who, the Iranians? Which ones are fanatics?
I'll grant there are some fanatics left in Iran, but Iran seems increasingly 
dominated by fairly sleezy clergy/judges. Like any government, theirs is 
deteriorating into a mere racket. And if you ask me, fanaticism never lasts 
very long anywhere, only for about a generation during turbulent times. Iran 
in particular is a special case...seems to me their cultural momentum will 
always outweigh any temporary fanaticism. A country that has a small but 
thriving prostitution industry can't be all that fanatical.

-TD

From: James A. Donald [EMAIL PROTECTED]
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: Re: Geopolitical Darwin Awards
Date: Thu, 16 Sep 2004 10:50:37 -0700
--
On 15 Sep 2004 at 2:38, Thomas Shaddack wrote:
 Maybe they are playing a different game. They [Iran] couldn't
 use the eventually produced nukes anyway, without being
 showered back with the same kind
They are fanatics.  They expect to get a six pack of virgins.
And they will say Hey, it was not us, it was these terrorists
who happen to have somehow stolen some nukes from persons
unknown. We are completely opposed to terrorism, and are fully
cooperating with foreign investigations.
--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 /Y5bZ5vcTSLqigJSE6PrHkJplrE/rkCOv5ZqjTCd
 4hlcKGlAs6dJgsGrsyIqiOz5Qfdc2wMId/LdnAnXG
_
FREE pop-up blocking with the new MSN Toolbar – get it now! 
http://toolbar.msn.click-url.com/go/onm00200415ave/direct/01/



Phones gain coded security

2004-09-16 Thread R. A. Hettinga
http://www.vnunet.com/print/1158147


IT Week

 Phones gain coded security

Certicom offers a cross platform security kit for handset developers
Daniel Robinson, IT Week 16 Sep 2004

Cryptography firm Certicom has announced a cross-platform security toolkit
for future mobile phone handsets. The Certicom Security Architecture for
Mobility will provide a common programming interface for developers to
access functions such as encryption across various mobile chipsets and
operating systems, according to the firm. The move should speed development
of handsets with better security.

Certicom's Security Architecture for Mobility (CSA) builds on the company's
Security Builder Middleware, a hardware abstraction layer that is optimised
to work with a specific chipset or hardware platform. The first supported
hardware will be Intel's Wireless Trusted Platform, which consists of
security functions that are built into Intel's PXA270 series of XScale
mobile chips. CSA will support this from the fourth quarter of this year,
and support for other mobile platforms will follow.

Pressure for greater security is coming from enterprise customers.
[Security] used to be seen as an add-on to IT systems, but lately it has
been regarded as something that has to be embedded from the beginning,
commented Certicom's vice-president of marketing, Roy Pereira.

CSA has resulted from Certicom's collaboration with Intel on security for a
major handset vendor, Pereira said. He declined to name the vendor, for
commercial reasons. Handset vendors are focused on applications, not
cryptography, Certicom said, and its middleware layer lets them easily
build in cryptography support, shortening the development time and giving
handset makers a common interface for encryption functions no matter what
the underlying chipset is.

They could move their code from a basic ARM chip to a PXA270 and get a
boost from the hardware support without having to rewrite, Pereira said.

CSA also includes a software cryptography module for platforms that do not
have on-chip encryption hardware. Other optional modules include Security
Builder IPSec, a library of VPN functions for resource-constrained devices;
Security Builder SSL for Secure Sockets Layer commun- ications; and
Security Builder PKI for managing digital certificates.

However, CSA offers more than just encryption, according to Pereira. It
supports the secure boot feature of Intel's Wireless Trusted Platform,
which checks the handset has not been tampered with before starting the
operating system. Certicom said it would support all major handset
platforms, including those with on-chip security hardware.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Geopolitical Darwin Awards

2004-09-16 Thread J.A. Terranson

On Thu, 16 Sep 2004, Tyler Durden wrote:

 They are fanatics.  They expect to get a six pack of virgins.
 And they will say Hey, it was not us, it was these terrorists
 who happen to have somehow stolen some nukes from persons
 unknown. We are completely opposed to terrorism, and are fully
 cooperating with foreign investigations.


This sounds like dubya, not the ayatollahs.


-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  ...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them.  Osama Bin Laden
- - -

  There aught to be limits to freedom!George Bush
- - -

Which one scares you more?



WE SHIIP OUT ORIGINAL SOFTWARES AT CHEAP (FROM $20) TO ALL COUNTRIES sound man height

2004-09-16 Thread Tiffani Corinne





receive did search passing cast him before months, oclock especially group pity say? understand given among long" yours address pattern company started hurried all! well account ninety pardon wood kind.
Softwares Super CHEEAP & Shiip to All CountriesWe have every POPULAR softwares u NEED!You name it & we got it!
Micr0soft Wind0ws XP Professional - my price: $50 ;  normal : $299.00 ; you saave $249.00
Micr0soft 0ffice XP Professional - my price: $100 ;  normal : $ 499.95; you saave $399.95
Micr0soft 0ffice 2003 Professional - my price: $80 ;  normal : $499.95 ; you saave $419.95
Nort0n Antivirus 2004 Professional - my price: $15 ;  normal : $69.95 ; you saave $54.95
Ad0be Acrobaat V 6.0 Professional PC - my price: $100 ;  normal : $449.95 ; you saave $349.95
Ad0be Ph0toshop CS V 8.0 PC - my price: $80 ;  normal : $609.99 ; you save $529.99
Ad0be Pagemaker V 7.0 PC  - my price: $80 ;  normal : $599.95 ; you saave $519.95
CorelDraw Graphics Suite V 12 PC - my price: $100 ;  normal : $349.95 ; you saave $249.95
We do have full range softwares : Mac, 321Studios, Ad0be, Alias Maya, Autodesk, Borland, Corel, Crystal Reports. Executive, File maker, Intuit, Macrmedia, Mc/\fee, Micros0ft. Nero, Pinnacle Systems, PowerQuest, Quark, Red Hat, Riverdeep, Roxio, SuSe. Symantec, VMware Softwares & 262 More P0PULAR titles F0R you>> Checkk out 262 more popu1ar softwares on our site
Start from $15-$60 each softwareAbsolute N0 expensive price for you-- === Come to our site here === ---
dont want any
author practice be till her altogether entertain added" wear allow america moving afraid laid added told.





Re: potential new IETF WG on anonymous IPSec

2004-09-16 Thread Joe Touch

Ian Grigg wrote:
Bill Stewart wrote:
Also, the author's document discusses protecting BGP to prevent
some of the recent denial-of-service attacks,
and asks for confirmation about the assertion in a message
on the IPSEC mailing list suggesting
   E.g., it is not feasible for BGP routers to be configured with the
   appropriate certificate authorities of hundreds of thousands of 
peers.
Routers typically use BGP to peer with a small number of partners,
though some big ISP gateway routers might peer with a few hundred.
(A typical enterprise router would have 2-3 peers if it does BGP.)
If a router wants to learn full internet routes from its peers,
it might learn 1-200,000, but that's not the number of direct connections
that it has - it's information it learns using those connections.
And the peers don't have to be configured rapidly without external 
assistance -
you typically set up the peering link when you're setting up the
connection between an ISP and a customer or a pair of ISPs,
and if you want to use a CA mechanism to certify X.509 certs,
you can set up that information at the same time.
On the backbone, between BGP peers, one would have thought
that there are relatively few attackers, as the staff are
highly trusted and the wires are hard to access - hence no
active attacks going on and only some passive eavesdropping
attacks.  Also, anyone setting up BGP routing knows the other
party, so there is a prior relationship.
My understanding of the attacks this past spring is that:
a) they were indeed on the backbone BGP peers
b) that those peers had avoided setting up
   preshared keys or getting mutually-authenticatable
   certificates because of the configuration overhead
   (small on a per-pair basis, but may be large
   in aggregate)
While inspired by this issue, there may be other solutions (e.g., IMO 
IPsec) which are more appropriate for BGP peers.

The whole point of the CA model is that there is no prior
relationship and that the network is a wild wild west sort
of place
Except that certs need to be signed by authorities that are trusted.
- both of these assumptions seem to be reversed
in the backbone world, no?  So one would think that using
opportunistic cryptography would be ideal for the BGP world?
iang
I wouldn't think that the encryption need be opportunistic; in the BGP 
backbone world, as you noted, peers are known a-priori, and should have 
certs that could be signed by well-known, trusted CAs.

Joe


signature.asc
Description: OpenPGP digital signature


WE SHIIP WORLDWIDE ORIGINAL SOFTWARES AT CHEAP monday seat hundred

2004-09-16 Thread Tresa Concepcion





us stand suddenly description note! difference disease pattern practically old youth, straight meet days sat was miss dont" blood commit at do dress year doing.
Softwares Super CHEEAP & Shiip to All CountriesWe have every POPULAR softwares u NEED!You name it & we got it!
Micr0soft Wind0ws XP Professional - my price: $50 ;  normal : $299.00 ; you saave $249.00
Micr0soft 0ffice XP Professional - my price: $100 ;  normal : $ 499.95; you saave $399.95
Micr0soft 0ffice 2003 Professional - my price: $80 ;  normal : $499.95 ; you saave $419.95
Nort0n Antivirus 2004 Professional - my price: $15 ;  normal : $69.95 ; you saave $54.95
Ad0be Acrobaat V 6.0 Professional PC - my price: $100 ;  normal : $449.95 ; you saave $349.95
Ad0be Ph0toshop CS V 8.0 PC - my price: $80 ;  normal : $609.99 ; you save $529.99
Ad0be Pagemaker V 7.0 PC  - my price: $80 ;  normal : $599.95 ; you saave $519.95
CorelDraw Graphics Suite V 12 PC - my price: $100 ;  normal : $349.95 ; you saave $249.95
We do have full range softwares : Mac, 321Studios, Ad0be, Alias Maya, Autodesk, Borland, Corel, Crystal Reports. Executive, File maker, Intuit, Macrmedia, Mc/\fee, Micros0ft. Nero, Pinnacle Systems, PowerQuest, Quark, Red Hat, Riverdeep, Roxio, SuSe. Symantec, VMware Softwares & 262 More P0PULAR titles F0R you>> Checkk out 262 more popu1ar softwares on our site
Start from $15-$60 each softwareAbsolute N0 expensive price for you-- === Come to our site here === ---
dont want any
whenever settled principal age makes once cried matter, doing soul consequence sort red write justice prettier towards calendar.





Re: potential new IETF WG on anonymous IPSec

2004-09-16 Thread Bill Stewart
At 02:17 PM 9/16/2004, Joe Touch wrote:
Ian Grigg wrote:
On the backbone, between BGP peers, one would have thought
that there are relatively few attackers, as the staff are
highly trusted and the wires are hard to access - hence no
active attacks going on and only some passive eavesdropping
attacks.  Also, anyone setting up BGP routing knows the other
party, so there is a prior relationship.
My understanding of the attacks this past spring is that:
a) they were indeed on the backbone BGP peers
b) that those peers had avoided setting up
   preshared keys or getting mutually-authenticatable
   certificates because of the configuration overhead
   (small on a per-pair basis, but may be large
   in aggregate)
The interesting attacks were a sequence-number guessing attack
using forged TCP RST packets, which tell the TCP session to tear down,
therefore dropping the BGP connection (typically between two ISPs).
The attackers didn't need to be trusted backbone routers -
they could be randoms anywhere on the Internet.
BGP authentication doesn't actually help this problem,
because the attack simply kills the connection at a TCP layer
rather than lying to the BGP application.
A simple way to avoid most of this problem is to
filter packets at the edges so that customer connections
can't send IP (or ICMP, while you're at it) packets
to the core addresses on the routers that do the BGP signalling.
(It's not a complete solution, because both ends of the connection
need to so that, or need to do spoof-proofing so nobody can forge packets
from those addresses, or both.)  Customers can still send packets
to the ISP edge routers supporting their own connections,
but killing your own internet connection is much less entertaining
than killing somebody else's, and if the customer is managing their own router,
their users probably have an easier time killing that end of the connection
than convincing the ISP's end to drop the connection.
(One downside to this approach is that customers can't simply ping routers
to get information about paths, latencies, capacities, etc.,
but that's not necessarily a bad thing.  Also, you can set things up
so they can traceroute to the far end of a connection and still get
traceroute responses from the intermediate routers.)
While inspired by this issue, there may be other solutions (e.g., IMO 
IPsec) which are more appropriate for BGP peers.
...
I wouldn't think that the encryption need be opportunistic; in the BGP 
backbone world, as you noted, peers are known a-priori, and should have 
certs that could be signed by well-known, trusted CAs.
I agree with Joe.  You can fix most of the problems using ACLs,
but IPSEC does have some appeal to it.
You don't even need CAs - pre-shared secrets are perfectly adequate,
but if you want to use a CA-based IPSEC implementation for convenience,
you can agree on what CA to use when you're agreeing on other parameters.

Bill Stewart  [EMAIL PROTECTED] 



Re: potential new IETF WG on anonymous IPSec

2004-09-16 Thread Joe Touch

Bill Stewart wrote:
At 02:17 PM 9/16/2004, Joe Touch wrote:
Ian Grigg wrote:
On the backbone, between BGP peers, one would have thought
that there are relatively few attackers, as the staff are
highly trusted and the wires are hard to access - hence no
active attacks going on and only some passive eavesdropping
attacks.  Also, anyone setting up BGP routing knows the other
party, so there is a prior relationship.

My understanding of the attacks this past spring is that:
a) they were indeed on the backbone BGP peers
b) that those peers had avoided setting up
   preshared keys or getting mutually-authenticatable
   certificates because of the configuration overhead
   (small on a per-pair basis, but may be large
   in aggregate)
The interesting attacks were a sequence-number guessing attack
using forged TCP RST packets, which tell the TCP session to tear down,
therefore dropping the BGP connection (typically between two ISPs).
The attackers didn't need to be trusted backbone routers -
they could be randoms anywhere on the Internet.
BGP authentication doesn't actually help this problem,
because the attack simply kills the connection at a TCP layer
rather than lying to the BGP application.
FWIW, the other system we were referring to - TCP-MD5 - works at the TCP 
layer. It rejects packets within TCP, before any further TCP processing, 
that don't match the MD5 hash. It isn't BGP authentication.

This is why I refer to it as TCP-MD5 rather than BGP-MD5, even though 
the latter is more common.

Joe


signature.asc
Description: OpenPGP digital signature


Re: potential new IETF WG on anonymous IPSec

2004-09-16 Thread Major Variola (ret)
At 02:17 PM 9/16/04 -0700, Joe Touch wrote:
Except that certs need to be signed by authorities that are trusted.

Name one.





Re: public-key: the wrong model for email?

2004-09-16 Thread Major Variola (ret)
At 10:28 PM 9/16/04 +0200, Hadmut Danisch wrote:
Because PKC works for this AliceBob communication scheme. If you
connect to a web server, then what you want to know, or what
authentication means is: Are you really www.somedomain.com?
That's the AliceBob model. SSL is good for that.

What makes you think verislime or other CAs are authenticating?
You can't sue them, they are 0wn3d by a State (and so can
issue false certs, just like States issue false meatspace IDs), etc.

If I send you an encrypted e-mail, I do want that _you_ Ed Gerck,
can read it only. That's still the AliceBob model. PGP and S/MIME
are good for that.

What makes you think that EG is a physical entity, if you haven't met
him and learned to trust him through out of band channels?

The sender of an e-mail does not need to pretend beeing a particular
person or sender. Any identity of the 8 (10?) billion humans on earth
will do it.

What makes you think that, given 1e10 humans, there are 1e10 identities?

Ie, why do you think there is a one-to-one mapping?

PKC is good as long as the communication model is a closed and
relatively small user group. A valid signature of an unknown sender
has at least the meaning that the sender belongs to that user group.

PKC is only as good as the means by which you obtain the public key.
A server, a CA, are all worthless.

The emperor has no clothes, get used to it.




Fwd: Did you seen this ?

2004-09-16 Thread Alannah Cho

She was going at the speed of thirteen knots and a half. 







discontinue

No bill of attainder or ex post facto Law shall be passed; One might have said that we were in a bath of quicksilver!! The frigate passed at some distance from the Marquesas and the Sandwich Islands, crossed the tropic of Cancer, and made for the China Seas!! 



RE: Symantec labels China censor-busting software as Trojan

2004-09-16 Thread Tyler Durden
Hum, well, I always kind of thought May felt/wrote that some dis-assembly of 
the state was inevitable given the possibility of strong crypto, and even in 
China I would maintain that there's already enough computer power+anonymity 
that encrypted communications can/will occur. (Remember, China is BIG...as 
big as the mainland US plus Alaska, and much of it far less accessible...and 
let's not forget that there are areas the size of Western Europe where Han 
dominance is not particularly appreciated.) I tend to agree, though that the 
bootstrapping process can be greatly retarded in the presence of a heavy 
police statebut above a certain threshold it can unfold quickly.

What I wonder if whether W and his buddies were up late drinkin' one night 
and figured out that we were nearing the threshold you speak of, a threshold 
they believed they had to save humanity from. I mean, what if just anyone 
could send any message they wanted without their government listening in? 
Someone's gotta be in charge, after all, and it better be us and not the 
ragheads 'cause God loves US and plans on sending all of them to hell unless 
they see the error of their distinctly non-American ways.

-TD

From: Major Variola (ret) [EMAIL PROTECTED]
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: RE: Symantec labels China censor-busting software as Trojan
Date: Wed, 15 Sep 2004 16:45:00 -0700
At 09:45 AM 9/15/04 -0400, Tyler Durden wrote:
Hum. Seems the Chinese government is pretty effective at
self-preservation.
Does this contradict the widely-held Cypherpunk belief in the
inevitability
of deterioration of the state?
We have always held that a sufficiently policed state can defeat
crypto.
If the RIAA could put a vidcam in your computer room, things are easy.
If crypto is illegal, things are easy.  (We have remarked on how,
modulo stego, crypto traffic is trivial to detect with any entropy
measure.  Got PGP headers?)
China is a police state.  A state with freedom of expression ---which
does
not include much or all of Europe--- is less so.   China is also a
nukepower,
so it is likely to persist.
_
Get ready for school! Find articles, homework help and more in the Back to 
School Guide! http://special.msn.com/network/04backtoschool.armx



jpegs are vectors

2004-09-16 Thread Major Variola (ret)
http://news.bbc.co.uk/2/hi/technology/3661678.stm

Image flaw exposes Windows PCs
Computer users could be open to attack
from malicious hackers because of the
way that Windows displays some
images.

A buffer overrun of course.  But this is even better than the PNG
vulnerability reported earlier this year.

All your service packs are belong to us.





Keith Henson Needs Help (fwd)

2004-09-16 Thread J.A. Terranson

Besides forwarding the below, let me point out (for those few who aren't
familiar with this case) a few choice tidbits (taken from the web site
that has been tracking this case since it's inception,
http://www.operatingthetan.com/ ):

On 26 Apr 2001, Keith Henson was convicted of interfering with a
religion, a misdemeanor under California law, for picketing outside
Scientology...

At trial, the judge threw out all Henson's witnesses, disallowed any
testimony about his reasons for picketing the cult, and allowed the
prosecution to present excerpts from Henson's Internet postings out of
context; the Scientology witnesses also committed perjury which Henson was
unable to rebut.

The worst part of all this is that the underlying charges of terrorism
were based on this *obviously* sarcastic thread from usenet:
http://www.operatingthetan.com/evidposts.txt

This is an incredibly serious abuse of our so-called justice system -
anything you can do to help Henson out may come back to help *you* out
someday.  No none of the cosmic karma crap, but I guarantee you that if we
allow people to be imprisoned for making jokes that are politically
offensive, by specifically preventing them from presenting any exculpatory
evidence at trial (a rapidly increasing practice in our courts), we will
*all* suffer for it.

Send mail.  Physical mail!  Ask your friends to do it too.  The only thing
more important than getting the angry little midget monster out of the
White House are these kind of incredible abuses of the system.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  ...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them.  Osama Bin Laden
- - -

  There aught to be limits to freedom!George Bush
- - -

Which one scares you more?

-- Forwarded message --
Date: Thu, 16 Sep 2004 00:16:46 -0400
From: R. A. Hettinga [EMAIL PROTECTED]
To: [EMAIL PROTECTED], [EMAIL PROTECTED],
 [EMAIL PROTECTED]
Subject: Keith Henson Needs Help


http://www.kuro5hin.org/print/2004/9/14/32340/5809

kuro5hin.org || technology and culture, from the trenches

Keith Henson Needs Help (MLP)
By Baldrson
Wed Sep 15th, 2004 at 07:42:14 AM EST

 For those who don't know him, Keith Henson co-founded the L5 Society, was
President of Xanadu Corporation and was a featured character in The Great
Mambo Chicken and the Transhuman Condition: Science Slightly Over the Edge.
He's about to be deported from Canada to the United States where he faces
time in the infamous California prison system.



Recently on the cryonics mailing list Keith Henson issued a plea for help:
 ... at this point I am a failed refugee. The only thing that can keep me
from being deported to the US on short notice is an appeal to the Minister
of Citizenship and Immigration. Her office gets 15,000 letters a week so it
takes a well known case to reach the level where it gets attention.
 What is going on here and why should anyone care?

 The short story is that Keith has been fighting against Scientology and as
a result ended up fleeing the United States to Canada to avoid a
misdemeanor conviction brought against him by Scientologists. Here's the
prosecuting attorney's speech given the jury on the charges:
 Now, His Honor read to you in the beginning of the case that the defendant
has been charged with three counts. First count is -- now, these are
numeric numbers and they mean nothing to you, so I will give you names for
what they are. The first one is 422, violation of Penal Code Section 422.
And 664/422 and 422.6. Now I'll give them names. 422 is terrorist threats.
Now, that conjures up images of Beruit or the Twin Towers bombing, but
that's not what it means. It just means a threat that causes someone
terror, that frightens people. That's what Count One is. Count two is
664/422, is the attempt, the attempt to do the exact same thing, to cause
to threaten, to attempt to threaten and cause terror or frighten someone.
And the last count is 422.6. And that's essentially defined as the
interference with someone's rights guaranteed by the Constitution, their
civil rights, and in this case the right to practice their religion without
fear. Essentially 422.6 is a hate crime. Now, let's talk about the first
count, and we'll go count by count. The first count, 422, again I told you
was just threats that caused people to be afraid. Essentially the elements
are these: Number one, there has to be somewhat of a threat. There has to
be a threat. The person has to intend there to be a threat. And lastly,
that the victims have a reasonable fear. However, the person doesn't have
to have to want to carry it out. There has to be no intention to carry out
the threat.
 Keith's been in Canada for a few years and is trying to remain there as a
refugee.

 Well, I'll confess my bias. Although Keith and I have known each other
since the early days of the L5 

Re: Geopolitical Darwin Awards

2004-09-16 Thread James A. Donald
--
On 15 Sep 2004 at 2:38, Thomas Shaddack wrote:
 Maybe they are playing a different game. They [Iran] couldn't
 use the eventually produced nukes anyway, without being
 showered back with the same kind

They are fanatics.  They expect to get a six pack of virgins. 
And they will say Hey, it was not us, it was these terrorists
who happen to have somehow stolen some nukes from persons
unknown. We are completely opposed to terrorism, and are fully
cooperating with foreign investigations.


--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 /Y5bZ5vcTSLqigJSE6PrHkJplrE/rkCOv5ZqjTCd
 4hlcKGlAs6dJgsGrsyIqiOz5Qfdc2wMId/LdnAnXG



Re: Geopolitical Darwin Awards

2004-09-16 Thread Tyler Durden
Who, the Iranians? Which ones are fanatics?
I'll grant there are some fanatics left in Iran, but Iran seems increasingly 
dominated by fairly sleezy clergy/judges. Like any government, theirs is 
deteriorating into a mere racket. And if you ask me, fanaticism never lasts 
very long anywhere, only for about a generation during turbulent times. Iran 
in particular is a special case...seems to me their cultural momentum will 
always outweigh any temporary fanaticism. A country that has a small but 
thriving prostitution industry can't be all that fanatical.

-TD

From: James A. Donald [EMAIL PROTECTED]
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: Re: Geopolitical Darwin Awards
Date: Thu, 16 Sep 2004 10:50:37 -0700
--
On 15 Sep 2004 at 2:38, Thomas Shaddack wrote:
 Maybe they are playing a different game. They [Iran] couldn't
 use the eventually produced nukes anyway, without being
 showered back with the same kind
They are fanatics.  They expect to get a six pack of virgins.
And they will say Hey, it was not us, it was these terrorists
who happen to have somehow stolen some nukes from persons
unknown. We are completely opposed to terrorism, and are fully
cooperating with foreign investigations.
--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 /Y5bZ5vcTSLqigJSE6PrHkJplrE/rkCOv5ZqjTCd
 4hlcKGlAs6dJgsGrsyIqiOz5Qfdc2wMId/LdnAnXG
_
FREE pop-up blocking with the new MSN Toolbar – get it now! 
http://toolbar.msn.click-url.com/go/onm00200415ave/direct/01/



RE: Symantec labels China censor-busting software as Trojan

2004-09-16 Thread James A. Donald
--
On 15 Sep 2004 at 9:45, Tyler Durden wrote:
 Hum. Seems the Chinese government is pretty effective at 
 self-preservation. Does this contradict the widely-held 
 Cypherpunk belief in the inevitability of deterioration of 
 the state?

The authors of Freegate believe that for technological reasons, 
the internet will win, and the chinese government will lose. 
They are chinese.  They are familiar with repression, and 
familiar with technology.   They are the kind of people who 
know what they are talking about.  They had had fifteen million 
downloads of their software, which is continually rewritten to
meet the latest threats and tactics from the chinese
government. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 /1akS93Sf2XKwg4FTmI8LdG6vC+cX53AeniWvjvD
 48vdg03WMvEq/iMRpuzdB5uOFSZBsdaVv5+zX6o3/



Re: Geopolitical Darwin Awards

2004-09-16 Thread J.A. Terranson

On Thu, 16 Sep 2004, Tyler Durden wrote:

 They are fanatics.  They expect to get a six pack of virgins.
 And they will say Hey, it was not us, it was these terrorists
 who happen to have somehow stolen some nukes from persons
 unknown. We are completely opposed to terrorism, and are fully
 cooperating with foreign investigations.


This sounds like dubya, not the ayatollahs.


-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  ...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them.  Osama Bin Laden
- - -

  There aught to be limits to freedom!George Bush
- - -

Which one scares you more?