Find a date, romance, and love
Goes succulently, smoothly, like laughs seducing, plainly And what is a plan, but an elongated llama? Invisibly going, the noose spills as woman. good day: suspensory gratefulness portsman isoasparagine smectis dryopians
September 2004: Manhattan Office, Retail and Industrial Space Update
Title: Manhattan Commercial Real Estate Broker - IGDNYC Inc September 2004: Manhattan Office, Retail and Industrial Space Update News Home IGDNYC In The News - Real Estate New York Will The New Year Bring New Activity? (January, 2004) September 2004 News Detailed Statistics and Graphs Average Prices By Neighborhood - Office - Retail - Industrial The downtown markets slowly deteriorate as new buildings are built and additional spaces are vacated as companies relocate... Read the full article here... To continue receiving our newsletter, please Go Here To add someone to our newsletter, please Go Here To prevent [EMAIL PROTECTED] from receiving subsequent newsletters, please Go Here or paste the following URL in your browser: http://www.igdnycr.com/cgi-bin/[EMAIL PROTECTED] 1841 Broadway, Suite 200, New York, NY 10023 Tel: 212.258.2700 Fax: 212.258.3286 [EMAIL PROTECTED]
RE: Symantec labels China censor-busting software as Trojan
-- On 15 Sep 2004 at 9:45, Tyler Durden wrote: Hum. Seems the Chinese government is pretty effective at self-preservation. Does this contradict the widely-held Cypherpunk belief in the inevitability of deterioration of the state? The authors of Freegate believe that for technological reasons, the internet will win, and the chinese government will lose. They are chinese. They are familiar with repression, and familiar with technology. They are the kind of people who know what they are talking about. They had had fifteen million downloads of their software, which is continually rewritten to meet the latest threats and tactics from the chinese government. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG /1akS93Sf2XKwg4FTmI8LdG6vC+cX53AeniWvjvD 48vdg03WMvEq/iMRpuzdB5uOFSZBsdaVv5+zX6o3/
Re: Geopolitical Darwin Awards
-- On 15 Sep 2004 at 2:38, Thomas Shaddack wrote: Maybe they are playing a different game. They [Iran] couldn't use the eventually produced nukes anyway, without being showered back with the same kind They are fanatics. They expect to get a six pack of virgins. And they will say Hey, it was not us, it was these terrorists who happen to have somehow stolen some nukes from persons unknown. We are completely opposed to terrorism, and are fully cooperating with foreign investigations. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG /Y5bZ5vcTSLqigJSE6PrHkJplrE/rkCOv5ZqjTCd 4hlcKGlAs6dJgsGrsyIqiOz5Qfdc2wMId/LdnAnXG
ebay/paypal info update
Dear eBay User, During our regularly scheduled account maintenance and verification procedures, we have detected a slight error in your billing information. This might be due to either of the following reasons: 1. A recent change in your personal information ( i.e. change of address). 2. Submitting invalid information during the initial sign up process. 3. An inability to accurately verify your selected option of payment due to an internal error within our processors. Please update and verify your information by clicking the link below: https://arribada.ebay.com/saw-cgi/eBayISAPI.dll?PlaceCCInfo If your account information is not updated within 48 hours then your ability to sell or bid on eBay will become restricted. Thank you The eBay Billing Department. Copyright © 2004 eBay Inc. All Rights Reserved. Designated trademarks and brands are the property of their respective owners. eBay and the eBay logo are trademarks of eBay Inc. eBay is located at 2145 Hamilton Avenue, San Jose, CA 95125.
Re: Geopolitical Darwin Awards
Who, the Iranians? Which ones are fanatics? I'll grant there are some fanatics left in Iran, but Iran seems increasingly dominated by fairly sleezy clergy/judges. Like any government, theirs is deteriorating into a mere racket. And if you ask me, fanaticism never lasts very long anywhere, only for about a generation during turbulent times. Iran in particular is a special case...seems to me their cultural momentum will always outweigh any temporary fanaticism. A country that has a small but thriving prostitution industry can't be all that fanatical. -TD From: James A. Donald [EMAIL PROTECTED] To: [EMAIL PROTECTED] [EMAIL PROTECTED] Subject: Re: Geopolitical Darwin Awards Date: Thu, 16 Sep 2004 10:50:37 -0700 -- On 15 Sep 2004 at 2:38, Thomas Shaddack wrote: Maybe they are playing a different game. They [Iran] couldn't use the eventually produced nukes anyway, without being showered back with the same kind They are fanatics. They expect to get a six pack of virgins. And they will say Hey, it was not us, it was these terrorists who happen to have somehow stolen some nukes from persons unknown. We are completely opposed to terrorism, and are fully cooperating with foreign investigations. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG /Y5bZ5vcTSLqigJSE6PrHkJplrE/rkCOv5ZqjTCd 4hlcKGlAs6dJgsGrsyIqiOz5Qfdc2wMId/LdnAnXG _ FREE pop-up blocking with the new MSN Toolbar get it now! http://toolbar.msn.click-url.com/go/onm00200415ave/direct/01/
Phones gain coded security
http://www.vnunet.com/print/1158147 IT Week Phones gain coded security Certicom offers a cross platform security kit for handset developers Daniel Robinson, IT Week 16 Sep 2004 Cryptography firm Certicom has announced a cross-platform security toolkit for future mobile phone handsets. The Certicom Security Architecture for Mobility will provide a common programming interface for developers to access functions such as encryption across various mobile chipsets and operating systems, according to the firm. The move should speed development of handsets with better security. Certicom's Security Architecture for Mobility (CSA) builds on the company's Security Builder Middleware, a hardware abstraction layer that is optimised to work with a specific chipset or hardware platform. The first supported hardware will be Intel's Wireless Trusted Platform, which consists of security functions that are built into Intel's PXA270 series of XScale mobile chips. CSA will support this from the fourth quarter of this year, and support for other mobile platforms will follow. Pressure for greater security is coming from enterprise customers. [Security] used to be seen as an add-on to IT systems, but lately it has been regarded as something that has to be embedded from the beginning, commented Certicom's vice-president of marketing, Roy Pereira. CSA has resulted from Certicom's collaboration with Intel on security for a major handset vendor, Pereira said. He declined to name the vendor, for commercial reasons. Handset vendors are focused on applications, not cryptography, Certicom said, and its middleware layer lets them easily build in cryptography support, shortening the development time and giving handset makers a common interface for encryption functions no matter what the underlying chipset is. They could move their code from a basic ARM chip to a PXA270 and get a boost from the hardware support without having to rewrite, Pereira said. CSA also includes a software cryptography module for platforms that do not have on-chip encryption hardware. Other optional modules include Security Builder IPSec, a library of VPN functions for resource-constrained devices; Security Builder SSL for Secure Sockets Layer commun- ications; and Security Builder PKI for managing digital certificates. However, CSA offers more than just encryption, according to Pereira. It supports the secure boot feature of Intel's Wireless Trusted Platform, which checks the handset has not been tampered with before starting the operating system. Certicom said it would support all major handset platforms, including those with on-chip security hardware. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: Geopolitical Darwin Awards
On Thu, 16 Sep 2004, Tyler Durden wrote: They are fanatics. They expect to get a six pack of virgins. And they will say Hey, it was not us, it was these terrorists who happen to have somehow stolen some nukes from persons unknown. We are completely opposed to terrorism, and are fully cooperating with foreign investigations. This sounds like dubya, not the ayatollahs. -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95BF ...justice is a duty towards those whom you love and those whom you do not. And people's rights will not be harmed if the opponent speaks out about them. Osama Bin Laden - - - There aught to be limits to freedom!George Bush - - - Which one scares you more?
WE SHIIP OUT ORIGINAL SOFTWARES AT CHEAP (FROM $20) TO ALL COUNTRIES sound man height
receive did search passing cast him before months, oclock especially group pity say? understand given among long" yours address pattern company started hurried all! well account ninety pardon wood kind. Softwares Super CHEEAP & Shiip to All CountriesWe have every POPULAR softwares u NEED!You name it & we got it! Micr0soft Wind0ws XP Professional - my price: $50 ; normal : $299.00 ; you saave $249.00 Micr0soft 0ffice XP Professional - my price: $100 ; normal : $ 499.95; you saave $399.95 Micr0soft 0ffice 2003 Professional - my price: $80 ; normal : $499.95 ; you saave $419.95 Nort0n Antivirus 2004 Professional - my price: $15 ; normal : $69.95 ; you saave $54.95 Ad0be Acrobaat V 6.0 Professional PC - my price: $100 ; normal : $449.95 ; you saave $349.95 Ad0be Ph0toshop CS V 8.0 PC - my price: $80 ; normal : $609.99 ; you save $529.99 Ad0be Pagemaker V 7.0 PC - my price: $80 ; normal : $599.95 ; you saave $519.95 CorelDraw Graphics Suite V 12 PC - my price: $100 ; normal : $349.95 ; you saave $249.95 We do have full range softwares : Mac, 321Studios, Ad0be, Alias Maya, Autodesk, Borland, Corel, Crystal Reports. Executive, File maker, Intuit, Macrmedia, Mc/\fee, Micros0ft. Nero, Pinnacle Systems, PowerQuest, Quark, Red Hat, Riverdeep, Roxio, SuSe. Symantec, VMware Softwares & 262 More P0PULAR titles F0R you>> Checkk out 262 more popu1ar softwares on our site Start from $15-$60 each softwareAbsolute N0 expensive price for you-- === Come to our site here === --- dont want any author practice be till her altogether entertain added" wear allow america moving afraid laid added told.
Re: potential new IETF WG on anonymous IPSec
Ian Grigg wrote: Bill Stewart wrote: Also, the author's document discusses protecting BGP to prevent some of the recent denial-of-service attacks, and asks for confirmation about the assertion in a message on the IPSEC mailing list suggesting E.g., it is not feasible for BGP routers to be configured with the appropriate certificate authorities of hundreds of thousands of peers. Routers typically use BGP to peer with a small number of partners, though some big ISP gateway routers might peer with a few hundred. (A typical enterprise router would have 2-3 peers if it does BGP.) If a router wants to learn full internet routes from its peers, it might learn 1-200,000, but that's not the number of direct connections that it has - it's information it learns using those connections. And the peers don't have to be configured rapidly without external assistance - you typically set up the peering link when you're setting up the connection between an ISP and a customer or a pair of ISPs, and if you want to use a CA mechanism to certify X.509 certs, you can set up that information at the same time. On the backbone, between BGP peers, one would have thought that there are relatively few attackers, as the staff are highly trusted and the wires are hard to access - hence no active attacks going on and only some passive eavesdropping attacks. Also, anyone setting up BGP routing knows the other party, so there is a prior relationship. My understanding of the attacks this past spring is that: a) they were indeed on the backbone BGP peers b) that those peers had avoided setting up preshared keys or getting mutually-authenticatable certificates because of the configuration overhead (small on a per-pair basis, but may be large in aggregate) While inspired by this issue, there may be other solutions (e.g., IMO IPsec) which are more appropriate for BGP peers. The whole point of the CA model is that there is no prior relationship and that the network is a wild wild west sort of place Except that certs need to be signed by authorities that are trusted. - both of these assumptions seem to be reversed in the backbone world, no? So one would think that using opportunistic cryptography would be ideal for the BGP world? iang I wouldn't think that the encryption need be opportunistic; in the BGP backbone world, as you noted, peers are known a-priori, and should have certs that could be signed by well-known, trusted CAs. Joe signature.asc Description: OpenPGP digital signature
WE SHIIP WORLDWIDE ORIGINAL SOFTWARES AT CHEAP monday seat hundred
us stand suddenly description note! difference disease pattern practically old youth, straight meet days sat was miss dont" blood commit at do dress year doing. Softwares Super CHEEAP & Shiip to All CountriesWe have every POPULAR softwares u NEED!You name it & we got it! Micr0soft Wind0ws XP Professional - my price: $50 ; normal : $299.00 ; you saave $249.00 Micr0soft 0ffice XP Professional - my price: $100 ; normal : $ 499.95; you saave $399.95 Micr0soft 0ffice 2003 Professional - my price: $80 ; normal : $499.95 ; you saave $419.95 Nort0n Antivirus 2004 Professional - my price: $15 ; normal : $69.95 ; you saave $54.95 Ad0be Acrobaat V 6.0 Professional PC - my price: $100 ; normal : $449.95 ; you saave $349.95 Ad0be Ph0toshop CS V 8.0 PC - my price: $80 ; normal : $609.99 ; you save $529.99 Ad0be Pagemaker V 7.0 PC - my price: $80 ; normal : $599.95 ; you saave $519.95 CorelDraw Graphics Suite V 12 PC - my price: $100 ; normal : $349.95 ; you saave $249.95 We do have full range softwares : Mac, 321Studios, Ad0be, Alias Maya, Autodesk, Borland, Corel, Crystal Reports. Executive, File maker, Intuit, Macrmedia, Mc/\fee, Micros0ft. Nero, Pinnacle Systems, PowerQuest, Quark, Red Hat, Riverdeep, Roxio, SuSe. Symantec, VMware Softwares & 262 More P0PULAR titles F0R you>> Checkk out 262 more popu1ar softwares on our site Start from $15-$60 each softwareAbsolute N0 expensive price for you-- === Come to our site here === --- dont want any whenever settled principal age makes once cried matter, doing soul consequence sort red write justice prettier towards calendar.
Re: potential new IETF WG on anonymous IPSec
At 02:17 PM 9/16/2004, Joe Touch wrote: Ian Grigg wrote: On the backbone, between BGP peers, one would have thought that there are relatively few attackers, as the staff are highly trusted and the wires are hard to access - hence no active attacks going on and only some passive eavesdropping attacks. Also, anyone setting up BGP routing knows the other party, so there is a prior relationship. My understanding of the attacks this past spring is that: a) they were indeed on the backbone BGP peers b) that those peers had avoided setting up preshared keys or getting mutually-authenticatable certificates because of the configuration overhead (small on a per-pair basis, but may be large in aggregate) The interesting attacks were a sequence-number guessing attack using forged TCP RST packets, which tell the TCP session to tear down, therefore dropping the BGP connection (typically between two ISPs). The attackers didn't need to be trusted backbone routers - they could be randoms anywhere on the Internet. BGP authentication doesn't actually help this problem, because the attack simply kills the connection at a TCP layer rather than lying to the BGP application. A simple way to avoid most of this problem is to filter packets at the edges so that customer connections can't send IP (or ICMP, while you're at it) packets to the core addresses on the routers that do the BGP signalling. (It's not a complete solution, because both ends of the connection need to so that, or need to do spoof-proofing so nobody can forge packets from those addresses, or both.) Customers can still send packets to the ISP edge routers supporting their own connections, but killing your own internet connection is much less entertaining than killing somebody else's, and if the customer is managing their own router, their users probably have an easier time killing that end of the connection than convincing the ISP's end to drop the connection. (One downside to this approach is that customers can't simply ping routers to get information about paths, latencies, capacities, etc., but that's not necessarily a bad thing. Also, you can set things up so they can traceroute to the far end of a connection and still get traceroute responses from the intermediate routers.) While inspired by this issue, there may be other solutions (e.g., IMO IPsec) which are more appropriate for BGP peers. ... I wouldn't think that the encryption need be opportunistic; in the BGP backbone world, as you noted, peers are known a-priori, and should have certs that could be signed by well-known, trusted CAs. I agree with Joe. You can fix most of the problems using ACLs, but IPSEC does have some appeal to it. You don't even need CAs - pre-shared secrets are perfectly adequate, but if you want to use a CA-based IPSEC implementation for convenience, you can agree on what CA to use when you're agreeing on other parameters. Bill Stewart [EMAIL PROTECTED]
Re: potential new IETF WG on anonymous IPSec
Bill Stewart wrote: At 02:17 PM 9/16/2004, Joe Touch wrote: Ian Grigg wrote: On the backbone, between BGP peers, one would have thought that there are relatively few attackers, as the staff are highly trusted and the wires are hard to access - hence no active attacks going on and only some passive eavesdropping attacks. Also, anyone setting up BGP routing knows the other party, so there is a prior relationship. My understanding of the attacks this past spring is that: a) they were indeed on the backbone BGP peers b) that those peers had avoided setting up preshared keys or getting mutually-authenticatable certificates because of the configuration overhead (small on a per-pair basis, but may be large in aggregate) The interesting attacks were a sequence-number guessing attack using forged TCP RST packets, which tell the TCP session to tear down, therefore dropping the BGP connection (typically between two ISPs). The attackers didn't need to be trusted backbone routers - they could be randoms anywhere on the Internet. BGP authentication doesn't actually help this problem, because the attack simply kills the connection at a TCP layer rather than lying to the BGP application. FWIW, the other system we were referring to - TCP-MD5 - works at the TCP layer. It rejects packets within TCP, before any further TCP processing, that don't match the MD5 hash. It isn't BGP authentication. This is why I refer to it as TCP-MD5 rather than BGP-MD5, even though the latter is more common. Joe signature.asc Description: OpenPGP digital signature
Re: potential new IETF WG on anonymous IPSec
At 02:17 PM 9/16/04 -0700, Joe Touch wrote: Except that certs need to be signed by authorities that are trusted. Name one.
Re: public-key: the wrong model for email?
At 10:28 PM 9/16/04 +0200, Hadmut Danisch wrote: Because PKC works for this AliceBob communication scheme. If you connect to a web server, then what you want to know, or what authentication means is: Are you really www.somedomain.com? That's the AliceBob model. SSL is good for that. What makes you think verislime or other CAs are authenticating? You can't sue them, they are 0wn3d by a State (and so can issue false certs, just like States issue false meatspace IDs), etc. If I send you an encrypted e-mail, I do want that _you_ Ed Gerck, can read it only. That's still the AliceBob model. PGP and S/MIME are good for that. What makes you think that EG is a physical entity, if you haven't met him and learned to trust him through out of band channels? The sender of an e-mail does not need to pretend beeing a particular person or sender. Any identity of the 8 (10?) billion humans on earth will do it. What makes you think that, given 1e10 humans, there are 1e10 identities? Ie, why do you think there is a one-to-one mapping? PKC is good as long as the communication model is a closed and relatively small user group. A valid signature of an unknown sender has at least the meaning that the sender belongs to that user group. PKC is only as good as the means by which you obtain the public key. A server, a CA, are all worthless. The emperor has no clothes, get used to it.
Fwd: Did you seen this ?
She was going at the speed of thirteen knots and a half. discontinue No bill of attainder or ex post facto Law shall be passed; One might have said that we were in a bath of quicksilver!! The frigate passed at some distance from the Marquesas and the Sandwich Islands, crossed the tropic of Cancer, and made for the China Seas!!
RE: Symantec labels China censor-busting software as Trojan
Hum, well, I always kind of thought May felt/wrote that some dis-assembly of the state was inevitable given the possibility of strong crypto, and even in China I would maintain that there's already enough computer power+anonymity that encrypted communications can/will occur. (Remember, China is BIG...as big as the mainland US plus Alaska, and much of it far less accessible...and let's not forget that there are areas the size of Western Europe where Han dominance is not particularly appreciated.) I tend to agree, though that the bootstrapping process can be greatly retarded in the presence of a heavy police statebut above a certain threshold it can unfold quickly. What I wonder if whether W and his buddies were up late drinkin' one night and figured out that we were nearing the threshold you speak of, a threshold they believed they had to save humanity from. I mean, what if just anyone could send any message they wanted without their government listening in? Someone's gotta be in charge, after all, and it better be us and not the ragheads 'cause God loves US and plans on sending all of them to hell unless they see the error of their distinctly non-American ways. -TD From: Major Variola (ret) [EMAIL PROTECTED] To: [EMAIL PROTECTED] [EMAIL PROTECTED] Subject: RE: Symantec labels China censor-busting software as Trojan Date: Wed, 15 Sep 2004 16:45:00 -0700 At 09:45 AM 9/15/04 -0400, Tyler Durden wrote: Hum. Seems the Chinese government is pretty effective at self-preservation. Does this contradict the widely-held Cypherpunk belief in the inevitability of deterioration of the state? We have always held that a sufficiently policed state can defeat crypto. If the RIAA could put a vidcam in your computer room, things are easy. If crypto is illegal, things are easy. (We have remarked on how, modulo stego, crypto traffic is trivial to detect with any entropy measure. Got PGP headers?) China is a police state. A state with freedom of expression ---which does not include much or all of Europe--- is less so. China is also a nukepower, so it is likely to persist. _ Get ready for school! Find articles, homework help and more in the Back to School Guide! http://special.msn.com/network/04backtoschool.armx
jpegs are vectors
http://news.bbc.co.uk/2/hi/technology/3661678.stm Image flaw exposes Windows PCs Computer users could be open to attack from malicious hackers because of the way that Windows displays some images. A buffer overrun of course. But this is even better than the PNG vulnerability reported earlier this year. All your service packs are belong to us.
Keith Henson Needs Help (fwd)
Besides forwarding the below, let me point out (for those few who aren't familiar with this case) a few choice tidbits (taken from the web site that has been tracking this case since it's inception, http://www.operatingthetan.com/ ): On 26 Apr 2001, Keith Henson was convicted of interfering with a religion, a misdemeanor under California law, for picketing outside Scientology... At trial, the judge threw out all Henson's witnesses, disallowed any testimony about his reasons for picketing the cult, and allowed the prosecution to present excerpts from Henson's Internet postings out of context; the Scientology witnesses also committed perjury which Henson was unable to rebut. The worst part of all this is that the underlying charges of terrorism were based on this *obviously* sarcastic thread from usenet: http://www.operatingthetan.com/evidposts.txt This is an incredibly serious abuse of our so-called justice system - anything you can do to help Henson out may come back to help *you* out someday. No none of the cosmic karma crap, but I guarantee you that if we allow people to be imprisoned for making jokes that are politically offensive, by specifically preventing them from presenting any exculpatory evidence at trial (a rapidly increasing practice in our courts), we will *all* suffer for it. Send mail. Physical mail! Ask your friends to do it too. The only thing more important than getting the angry little midget monster out of the White House are these kind of incredible abuses of the system. -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95BF ...justice is a duty towards those whom you love and those whom you do not. And people's rights will not be harmed if the opponent speaks out about them. Osama Bin Laden - - - There aught to be limits to freedom!George Bush - - - Which one scares you more? -- Forwarded message -- Date: Thu, 16 Sep 2004 00:16:46 -0400 From: R. A. Hettinga [EMAIL PROTECTED] To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Keith Henson Needs Help http://www.kuro5hin.org/print/2004/9/14/32340/5809 kuro5hin.org || technology and culture, from the trenches Keith Henson Needs Help (MLP) By Baldrson Wed Sep 15th, 2004 at 07:42:14 AM EST For those who don't know him, Keith Henson co-founded the L5 Society, was President of Xanadu Corporation and was a featured character in The Great Mambo Chicken and the Transhuman Condition: Science Slightly Over the Edge. He's about to be deported from Canada to the United States where he faces time in the infamous California prison system. Recently on the cryonics mailing list Keith Henson issued a plea for help: ... at this point I am a failed refugee. The only thing that can keep me from being deported to the US on short notice is an appeal to the Minister of Citizenship and Immigration. Her office gets 15,000 letters a week so it takes a well known case to reach the level where it gets attention. What is going on here and why should anyone care? The short story is that Keith has been fighting against Scientology and as a result ended up fleeing the United States to Canada to avoid a misdemeanor conviction brought against him by Scientologists. Here's the prosecuting attorney's speech given the jury on the charges: Now, His Honor read to you in the beginning of the case that the defendant has been charged with three counts. First count is -- now, these are numeric numbers and they mean nothing to you, so I will give you names for what they are. The first one is 422, violation of Penal Code Section 422. And 664/422 and 422.6. Now I'll give them names. 422 is terrorist threats. Now, that conjures up images of Beruit or the Twin Towers bombing, but that's not what it means. It just means a threat that causes someone terror, that frightens people. That's what Count One is. Count two is 664/422, is the attempt, the attempt to do the exact same thing, to cause to threaten, to attempt to threaten and cause terror or frighten someone. And the last count is 422.6. And that's essentially defined as the interference with someone's rights guaranteed by the Constitution, their civil rights, and in this case the right to practice their religion without fear. Essentially 422.6 is a hate crime. Now, let's talk about the first count, and we'll go count by count. The first count, 422, again I told you was just threats that caused people to be afraid. Essentially the elements are these: Number one, there has to be somewhat of a threat. There has to be a threat. The person has to intend there to be a threat. And lastly, that the victims have a reasonable fear. However, the person doesn't have to have to want to carry it out. There has to be no intention to carry out the threat. Keith's been in Canada for a few years and is trying to remain there as a refugee. Well, I'll confess my bias. Although Keith and I have known each other since the early days of the L5
Re: Geopolitical Darwin Awards
-- On 15 Sep 2004 at 2:38, Thomas Shaddack wrote: Maybe they are playing a different game. They [Iran] couldn't use the eventually produced nukes anyway, without being showered back with the same kind They are fanatics. They expect to get a six pack of virgins. And they will say Hey, it was not us, it was these terrorists who happen to have somehow stolen some nukes from persons unknown. We are completely opposed to terrorism, and are fully cooperating with foreign investigations. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG /Y5bZ5vcTSLqigJSE6PrHkJplrE/rkCOv5ZqjTCd 4hlcKGlAs6dJgsGrsyIqiOz5Qfdc2wMId/LdnAnXG
Re: Geopolitical Darwin Awards
Who, the Iranians? Which ones are fanatics? I'll grant there are some fanatics left in Iran, but Iran seems increasingly dominated by fairly sleezy clergy/judges. Like any government, theirs is deteriorating into a mere racket. And if you ask me, fanaticism never lasts very long anywhere, only for about a generation during turbulent times. Iran in particular is a special case...seems to me their cultural momentum will always outweigh any temporary fanaticism. A country that has a small but thriving prostitution industry can't be all that fanatical. -TD From: James A. Donald [EMAIL PROTECTED] To: [EMAIL PROTECTED] [EMAIL PROTECTED] Subject: Re: Geopolitical Darwin Awards Date: Thu, 16 Sep 2004 10:50:37 -0700 -- On 15 Sep 2004 at 2:38, Thomas Shaddack wrote: Maybe they are playing a different game. They [Iran] couldn't use the eventually produced nukes anyway, without being showered back with the same kind They are fanatics. They expect to get a six pack of virgins. And they will say Hey, it was not us, it was these terrorists who happen to have somehow stolen some nukes from persons unknown. We are completely opposed to terrorism, and are fully cooperating with foreign investigations. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG /Y5bZ5vcTSLqigJSE6PrHkJplrE/rkCOv5ZqjTCd 4hlcKGlAs6dJgsGrsyIqiOz5Qfdc2wMId/LdnAnXG _ FREE pop-up blocking with the new MSN Toolbar get it now! http://toolbar.msn.click-url.com/go/onm00200415ave/direct/01/
RE: Symantec labels China censor-busting software as Trojan
-- On 15 Sep 2004 at 9:45, Tyler Durden wrote: Hum. Seems the Chinese government is pretty effective at self-preservation. Does this contradict the widely-held Cypherpunk belief in the inevitability of deterioration of the state? The authors of Freegate believe that for technological reasons, the internet will win, and the chinese government will lose. They are chinese. They are familiar with repression, and familiar with technology. They are the kind of people who know what they are talking about. They had had fifteen million downloads of their software, which is continually rewritten to meet the latest threats and tactics from the chinese government. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG /1akS93Sf2XKwg4FTmI8LdG6vC+cX53AeniWvjvD 48vdg03WMvEq/iMRpuzdB5uOFSZBsdaVv5+zX6o3/
Re: Geopolitical Darwin Awards
On Thu, 16 Sep 2004, Tyler Durden wrote: They are fanatics. They expect to get a six pack of virgins. And they will say Hey, it was not us, it was these terrorists who happen to have somehow stolen some nukes from persons unknown. We are completely opposed to terrorism, and are fully cooperating with foreign investigations. This sounds like dubya, not the ayatollahs. -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95BF ...justice is a duty towards those whom you love and those whom you do not. And people's rights will not be harmed if the opponent speaks out about them. Osama Bin Laden - - - There aught to be limits to freedom!George Bush - - - Which one scares you more?