Tor 0.0.9rc6 is out (fwd from [EMAIL PROTECTED])

2004-12-06 Thread Eugen Leitl
- Forwarded message from Roger Dingledine [EMAIL PROTECTED] -

From: Roger Dingledine [EMAIL PROTECTED]
Date: Mon, 6 Dec 2004 02:00:23 -0500
To: [EMAIL PROTECTED]
Subject: Tor 0.0.9rc6 is out
User-Agent: Mutt/1.2.5.1i
Reply-To: [EMAIL PROTECTED]

This release improves reliability for clients. It's not perfect yet,
but I think it's better. Let me know if it breaks something.

tarball:   http://tor.freehaven.net/dist/tor-0.0.9rc6.tar.gz
signature: http://tor.freehaven.net/dist/tor-0.0.9rc6.tar.gz.asc
win32 exe: http://tor.freehaven.net/dist/tor-0.0.9rc6-win32.exe
win32 sig: http://tor.freehaven.net/dist/tor-0.0.9rc6-win32.exe.asc
(use -dPr tor-0_0_9rc6 if you want to check out from cvs)

  o Bugfixes on 0.0.9pre:
- Clean up some more integer underflow opportunities (not exploitable
  we think).
- While hibernating, hup should not regrow our listeners.
- Send an end to the streams we close when we hibernate, rather
  than just chopping them off.
- React to eof immediately on non-open edge connections.

  o Bugfixes on 0.0.8.1:
- Calculate timeout for waiting for a connected cell from the time
  we sent the begin cell, not from the time the stream started. If
  it took a long time to establish the circuit, we would time out
  right after sending the begin cell.
- Fix router_compare_addr_to_addr_policy: it was not treating a port
  of * as always matching, so we were picking reject *:* nodes as
  exit nodes too. Oops.

  o Features:
- New circuit building strategy: keep a list of ports that we've
  used in the past 6 hours, and always try to have 2 circuits open
  or on the way that will handle each such port. Seed us with port
  80 so web users won't complain that Tor is slow to start up.
- Make kill -USR1 dump more useful stats about circuits.
- When warning about retrying or giving up, print the address, so
  the user knows which one it's talking about.
- If you haven't used a clean circuit in an hour, throw it away,
  just to be on the safe side. (This means after 6 hours a totally
  unused Tor client will have no circuits open.)

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp73pyYKl1bb.pgp
Description: PGP signature


Re: Michael Riconosciuto, PROMIS

2004-12-06 Thread Nomen Nescio
Bill Stewart shrieb:

 There are several different issues related to PROMIS

Thanks for your comments.

But what about the person Michael Riconosciuto? I did some searches
online and I got the feeling that a lot people see him as an
extremely intelligent person, a one-in-a-million type of person,
being involved and on the front line with such diverse areas as human
intelligence, weapons, electronics, computers, cryptography,
bio-warfare etc.

It's stated online that he has warned US about several terrorist
attacks before they ocurred, including but not limited to the
al-qaeda attacks. Is this somewhat related to him being jailed? Can
he verify that US didn't act on alerts in ways so sensitive that the
government simply cannot afford to let him speak up? Does he know
things relating to US wanting some wars that the public simply cannot
be told?

I think I read somewhere that people from NSA or CIA thought of him
as simply put a genius. Is it likely that he as such a genius is
simply too dangerous for his own good when he decided to speak the
truth and that the government is actively trying to shut him down and
indirectly speed up his death by denying him medical care for his
illness?

Why did he come clean and sign the affidavit? He himself stated
that he though he risked being killed or harmed in various ways if he
went through with it. And indeed, just a week or two afterwards he
got arrested!

Smells like a government retaliation, set-up and cover-up if I ever
saw one!

This is almost to good for even Hollywood!

There are many interesting questions here. Keep in mind that not all
of us were around and active with intelligence/computers/cryptography
10-20 years ago.


John Young: Does Cryptome hold any interesting documents involving
this case?





Re: Word Of the Subgenius...

2004-12-06 Thread John Kelsey
From: Tyler Durden [EMAIL PROTECTED]
Sent: Dec 4, 2004 8:33 PM
To: [EMAIL PROTECTED]
Subject: Word Of the Subgenius...

I thought JR Bob Dobbs got beamed up to that comet with those LA Koolaid 
kooks...

No, but I do believe the comet kooks engaged in bobbitization (or perhaps, 
merely bobbing).  

-TD

--John



RE: Word Of the Subgenius...

2004-12-06 Thread Trei, Peter


 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] Behalf Of Neil Johnson
 Sent: Sunday, December 05, 2004 9:06 AM
 To: R.W. (Bob) Erickson
 Cc: Steve Furlong; [EMAIL PROTECTED]
 Subject: Re: Word Of the Subgenius...
 
 
 On Sun, 2004-12-05 at 08:46 -0500, R.W. (Bob) Erickson wrote:
 
  To be bobbed is never the goal, 
  but bobless fear steers the undifferentiated bob
  along conventional paths,
  to the abattoir
 
 
 Where is Tim May when when you need him? :-)
 
Try scruz.general.

Peter




Word play bobs the literal minded

2004-12-06 Thread R.W. (Bob) Erickson
John Kelsey wrote:
From: Tyler Durden [EMAIL PROTECTED]
Sent: Dec 4, 2004 8:33 PM
To: [EMAIL PROTECTED]
Subject: Word Of the Subgenius...
   

 

I thought JR Bob Dobbs got beamed up to that comet with those LA Koolaid 
kooks...
   

No, but I do believe the comet kooks engaged in bobbitization (or perhaps, merely bobbing).  

 

-TD
   

--John
 

Word Play is disrespectful to the literal minded
who dont appreciate having their self-bobbing exposed.
Unauthorized decryption of motives and intentions must be outlawed.
The right to privacy and ignorance is paramount.


Get Rid of Garbage Emails.

2004-12-06 Thread Daniel



---Click 

Stop Spam Once and for all!

Eliminates porn too!


Want out of our database? Do not reply to this email. 

Copy and paste this link into your browser -

blocjunk.com/rmm.htm

Computer Technologies
848 N. Rainbow Blvd. #316Las Vegas, NV 89107


frederictoncofactordustysaskatchewanpigtailsunshinybrlynchburgoctillionblondthailandcopywriterdigressionfissurebrjarvinmousebradibidbernardowatchfulbrcrumblekowalskiGkEfdpkrumBcmCpnqDrmCrblUiarrheniuskafkabrcystalgapoiinhumancasherlockdaccabrburntflexuralsuperlunarywifebesetcapaciousbrwedgeswumimpassablecockleburmitchelllast 
/font/p
stop.gif

Get Rid of Garbage Emails.

2004-12-06 Thread Daniel



---Click 

Stop Spam Once and for all!

Eliminates porn too!


Want out of our database? Do not reply to this email. 

Copy and paste this link into your browser -

blocjunk.com/rmm.htm

Computer Technologies
848 N. Rainbow Blvd. #316Las Vegas, NV 89107


byrneassimilablemaraudbradleyearthysovereignbrgrandfatherhessestrivebalfourshakodeclaratorpalatebrextemporaneoustamalegustavebuzzjoyfulkittenishbrprontoautumnGkEsqtdlobdxfizBpzCdbeDfzCfoyUivarnishcigarbrvenerateevencreamerycasserolesiltboughtsonicbrbrochureadriennesleekbarnbombastelmirabrwilkinsgulljawbonecleavebustlegreater 
/font/p
stop.gif

Incoming Request cpunks (response)

2004-12-06 Thread Real WebcamGals
Hey cpunks,

Live Online Camchatter!
ID: Katherine261
Age: 24
Measurement: 36 28 36
Status: Married 
Fantasy: [EMAIL PROTECTED] off a complete stranger, and sw*low his load. 
Favorite sex*al position: Licking Di%k

To accept this invitation and register for your account, visit
http://www.ezchi.com/gen_ads/gen_mail.php?grid=80ape=gt4211


Don't want any more?
http://www.ezchi.com/nomoremail


Re: Word Of the Subgenius...

2004-12-06 Thread Steve Thompson
 --- Tyler Durden [EMAIL PROTECTED] wrote: 
 Bonus question:
 
 Who is the author of the origin question that inspired the copycats?

 Well, I remember May posting it but I don't think he was the ultimate 
 author. I suspect whoever posted it recently in fact dug it out of the 
 archives and re-posted it, a particularly lame maneuver if so.

Wrong.  The origin quote is Who is Socrates, now that we need him
written by Richard Mitchell as the title of chapter one in The Gift of
Fire.  Mitchell may have cribbed the line from another source, but in
this context it is the origin quote.  Ms. Harsh is in posession of the
original physical vector, having stolen it, but only the spooks will be
unofficially aware of that facet of the context.

Any non-spook readers (if any) can identify the copycats as spooks by
virtue of their use of mutations from the original.  The source is rare
enough that it is highly unlikely that anyone outside of English academia
would happen to bring it up of his own accord in 'casual' conversation. 
Google is, indeed, your friend in this matter.
 
 OR...perhaps ole' May is gettin' a little lonely out there!

I doubt it.  May has his gun collection for company.


Regards,

Steve


__ 
Post your free ad now! http://personals.yahoo.ca



Welcome to Hollywood.

2004-12-06 Thread Timmy Benjamin

 Whats News
  * * *
  Piece Of Hollywood Is Being Released To The Public on
  Monday Morning! 
 Commanche Properties Inc - (CMCH.OTC) - Multi-million
  dollar producer of commercially marketable and high quality entertainment products
  that provides short term return on capital and long term residual income for
  partners and investors. Using their more than 75 years of combined experience
  in the entertainment industry and their big business smarts, CMCH is producing
  the Hollywood extravaganzas lending not only to the creative side, but also
  the business side of films. Scroll down to see their Credits and Scores.
 Why Analysts Recommend CMCH
Summary
Commanche Properties, Inc.s (CMCH.OTC) mission
  is to develop and produce commercially marketable, high quality entertainment
  products that will provide short term return on capital and long term residual
  income to their partners. CMCH strives to manufacture films that promote viewers
  thoughts and feelings as well as entertainment. CMCH is fully operational and
  can produce and promote any size show and almost any size film budget. CMCH
  welcomes the opportunity to bring the finest productions to audiences worldwide.
  CMCH will produce, exhibit and release entertainment in all media formats.
The expertise of the CMCH staff ranges over 75 years
  in the entertainment business. Anthony Tarantola has been in the entertainment
  business for his entire adult life. His expertise has varied from acting, directing
  movies, managing entertainers to his most recent Endeavor, Movie Productions.
  Anthony has worked internationally and domestically during his tenure and is
  educated in all aspects of the film making process. Anthony has also served
  as a Line Producer, Unit Production Manager and First Assistant Director, which
  affords him a greater foundational knowledge and experience for productions.
  Michael Ronga, Treasurer: Mr. Ronga has over twelve years of expansive accounting
  experience. Responsibilities included serving as acting CFO for startup companies,
  strategic planning, infrastructure formation, investment structuring and business
  development. Upon completion of the current film production, Aztec-Eagles, Michael
  will implement the sales, marketing and distribution campaign. Joanne Tarantola,
  Chief Executive Officer: Ms. Tarantola joined Commanche Properties in 1991 with
  over eight years of expansive accounting experience where she specialized in
  technology, communications and entertainment. Joanne's current responsibilities
  include forming corporate infrastructure, strategic planning, investment structuring
  and business development. 
Credits and Scores
Bonanno: A Godfather's Story (Motion Picture) 1999
  Directed by: Michael Poulette
  Cast includes but not limited to Martin Landau, Costas Mandylor, and Edward
  James Olmos 
Bound by Honor (Motion Picture) 1993
  Directed By Taylor Hackford
  Cast includes but not limited to Benjamin Bratt from Law and Order and Clear
  and Present Danger, Billy Bob Thornton from Armageddon, Sling Blade, and many
  other Blockbuster hits., Damian Chapa from The Rockford Files, Delroy Lindo
  from The Last Castle, Gone in 60 Seconds, and Romeo Must Die
Honor Thy Father (Motion Picture) 1973
  Directed by Paul Wendkos
  Based on the bestseller book by Gay Talese
  Cast includes but not limited to Critically acclaimed Joseph Bologna and Richard
  Castellano
A Man of Honor: The Autobiography of Joseph Bonanno
  By: Joseph Bonanno and Sergio Lalli
  Published by: New York's Simon and Schuster, 1983. 
  National Best Seller's List
In PreProduction
Pipe Dreams is a very intriguing action packed
  film staging from the Memorable 1980s in New York City.
  The twists and turns of the lives of two young Jewish Boys, who find adversity
  at such a young age now travel down a dark road that they now see as paved with
  Fame and Fortune.
 Ashtabula Moon, a feature film displaying
  the end of the Big 80s exhibiting the last gasp of Rock
  Before Grunge. How do the lives of an Aging Rock star, a Newly Agitated
  Divorced Mother, a Young Catholic School Girl, and a Mother Superior Nun School
  Principle all come together, what a twist?
Disclaimer and Disclosure Statement
  Certain statements contained in this news release may be forward-looking statements
  within the meaning of The Private Securities Litigation Reform Act of 1995.
  These statements may be identified by such terms as expect, believe,
  may, will, and intend or similar terms.
  We are NOT a registered investment advisor or a broker dealer. This is NOT an
  offer to buy or sell securities. This is for information purposes only. No recommendation
  that the securities of the companies profiled should be purchased, sold or held
  by individuals or entities that learn of the profiled companies. Investing in
  companies profiled is high-risk securities may result in the loss of your entire
  investment. Factual statements are made as 

Re: Michael Riconosciuto, PROMIS

2004-12-06 Thread Steve Thompson
 --- Neil Johnson [EMAIL PROTECTED] wrote: 
 On Sun, 2004-12-05 at 20:58 -0500, Steve Thompson wrote:
 [PROMIS]
 Yes, I have found that puzzling too.
 
 Articles I have read refer to the original version being in the public
 domain. You'd think the source code would be out there somewhere.

If that's true, then the government couldn't have stolen it.  However, I
suspect that mainfraim code of any sophistication is rarely released into
the public domain.  I imagine the author would be able to clear that up,
assuming he has no financial reason to falsify its history.
 
 The least Tin Foil Hat (TM) version of the story I found is at Wired
 
 http://www.wired.com/wired/archive/1.01/inslaw.html
 
 Which gives this description:
 
 Designed as case-management software for federal prosecutors, PROMIS
 has the ability to combine disparate databases, and to track people by
 their involvement with the legal system. Hamilton and others now claim
 that the DOJ has modified PROMIS to monitor intelligence operations,
 agents and targets, instead of legal cases.

Interesting.
 
 I find the claims made about this software (it's ability to reconcile
 data from many different sources automagically ) pretty vague and
 frankly, a little far fetched, based on what I know about software,
 databases, etc.

No kidding.  Databases are _hard_ to write efficiently, let alone to
arbitrarily integrate.
 
 (And that's not even including the modifications supposedly made to
 install a TEMPEST back door in later versions).

Perhaps I am stupid.  I don't know how one would go about modifying
application software to include a 'back door' that would presumably
enhance its suceptibility to TEMPEST attacks.  Isn't tempest all about EM
spectrum signal detection and capture?
 

Regards,

Steve


__ 
Post your free ad now! http://personals.yahoo.ca



KMSI December Newsletter

2004-12-06 Thread KMSI
Title: KMSI December Newsletter

		



	



KMSI December NewsletterDear list member,As we approach the end of 2004, our management team feels the energy in the marketplace increasing considerably.  Our client list has grown substantially, having added several new Fortune 1,000 companies, and three significant associations to our client list over the past month.  We have significantly expanded our management team and organized our staff into three regional operations in order to provide localized support to our clients and increase the spectrum of our consulting, content development and support services.  KMSI Releases KMx Version 3.1At KMSI we take pride in listening to our clients and we prioritize our development initiatives to meet their needs.  Over the next few weeks each of our clients will be introduced to the new functionality KMx Version 3.1 and receive support to accomplish the upgrade.  Each year we have provided a major release of the KMx platform to our clients and each new release has significantly increased the tremendous capabilities of our platform.  A few of the enhanced features now available in KMx Version 3.1 include:
- The evaluation and testing system now includes fill-in-the-blank questions
- The eCommerce system now provides a robust capability to define pricing based on user attributes
- The course development system now provides advanced sequencing and navigation, expanded pre-requisite management and customization of the course delivery environment
- The certification management system now provides the creation and management of multi-level certification and certificate programs
- The class management system now provides an enhanced attendance verification capability for the issuance of certificates or continuing education units
- The course catalog system now provides for anonymous catalog browsing prior to system log-on
- The class management system now provides for advanced waitlist functionality, automated reminders and self cancellation features
- The student interface now provides additional options for customization of screen and data elements and a new Activities Summary.
Click here for more informationKMx Client Success Story of the MonthA Major Multinational Automotive Manufacturing company needed to insure that manufacturing persons were properly trained on some very definite manufacturing practices.  In fact, as part of their ISO 9000 certification these manufacturing practices (of which there were over 3000 total) needed to be reviewed every six months, and a process needed that would allow verification that the manufacturing practice for a given persons task was read and understood by that person.  Using KMx, at two different locations in two different countries, this Automotive Manufacturer quickly and easily converted existing documents, procedures and other materials for online delivery, combined them with actual video footage from the line and created traceable eLearning modules along with course completion tests.  Now they have verifiable evidence that each person has gone through their own required material, evidence of what they saw, and how long it took them on each part, plus the documentation of knowledge gained through tracked testing.Click here for more informationNew Voice Over IP (VOIP) Technology PartnerKMSI recently entered into an agreement with Voxwire to offer enhanced virtual meeting room capabilities to our customers.  Voxwire MeetingRoom is an unlimited computer-to-computer web conferencing application that allows people to talk to each other, send text-messages, and see the same website or other presentation on their screens from anywhere in the world. Voxwire can be used for private communication or with large groups of participants and allows two-way communications in the classroom using VOIP technology.  This capability adds to the already industry leading collaboration options and virtual classroom functionality offered with KMx.  Click here for more informationNew Vice President of Operations - Eastern United StatesKMSI is pleased to announce that Brett Wilson has joined the company to support our KMx platform clients and lead our professional services activities in the Eastern U.S. and Canada.  Brett brings more than 20 years of experience in training development and training and education management. Before joining KMSI, he was Vice President of Services and Operations at subsidiary companies of Sylvan Learning Systems and the Educational Testing Service. Brett was formally Vice President of Operations at Carney Interactive and held various senior assignments at General Physics Corporation. He is a U.S. Navy veteran and holds a B.S. in Education.Click here for more informationHave a Wonderful Holiday Season and a Prosperous New YearTo all of our customers, partners, colleagues, friends and supporters, we wish you the happiest holiday season and a very special new year.  Thank you all for a great 2004.  We look forward to meeting and 

Re: Michael Riconosciuto, PROMIS

2004-12-06 Thread John Young
Cryptome hosts a 2000 book excerpt on PROMIS as
allegedly used by Mossad, though not much about
the technical details of the program:


http://cryptome.org/promis-mossad.htm

The file has links to other information on Riconosciuto
offered by Orlin Grabbe, a long-time supporter of
Riconosciuto.

Back then we telephoned Hamilton about his DoJ travails
and he politely refused to discuss the topic.

A TEMPEST backdoor in PROMIS would be interesting
for what it would take configure code to emit identifiable
signals. Code emits signals, as does any transmission, 
but not easily identifiable or correlatable with the code, 
but perhaps it can be done. 

Capabilities and sensitivity of interception is a dark world, 
as was TEMPEST in its early years. Now what passes 
for knowledge about TEMPEST is hardly all there is to 
know. Indeed, some think that most of the information 
about the technolody now in the public domain is disinfo.

The TEMPEST material released under FOI to Cryptome 
some years ago should be seen as part of the camouflage
about what's now being done in EM interception,
analysis, tracking, and not least, smoke blowing.

PROMIS is sufficiently old, if not a hoary horse, that
it could be used now to honey-pot eager buyers to
induce trust where it's not to be found, following the 
lead of Bill Gates, if not floater Robert Maxwell. Intel has
come a long way since the lazy days of the Cold War
when agent double-crossing and the inside US/USSR
mil-joke-con of Mutually Assured Destruction was all to 
worry about.




Top Gun Recruiting Manager Needed

2004-12-06 Thread NJ Recruiter
Dahl Consulting is working with a large NJ based firm, 50 miles west of 
Manahattan, to identify a Recruiting Manager with expertise in corporate 
staffing.  Considering the current economy, we would like you to forward this 
opportunity on to any peers that you may have that are looking for their next 
position. If you or any of our peers have the passion and the skill set to grow 
with an industry leader and want to make a substantial impact please email a MS 
Word Resume to [EMAIL PROTECTED]

We ask you for the following:

1. Forward this email on to your peers to increase awareness of this position.

2. Contact our office or email me if you know someone that is qualified for 
this position.

3. Because of today's tremendous industry pace we ask you to act immediately to 
increase our success.

 

Position Summary
This person will drive the staffing strategy to attain top professional to 
executive level talent.  This role will become fully engaged with leadership 
throughout the company while executing strategies designed to identify and 
acquire talent into the organization.  He/she will have excellent account 
management skills and the ability to coach Senior Level Executives on the 
recruitment and interview process.




Responsibilities
1.  Accountabilities include leading the development of on-going creative 
and cost effective sourcing strategies for various job families.
2.  Mentor/Coach/Consult with managers throughout the hiring process. 
3.  Develop, drive and execute comprehensive search strategies which are 
geared at building key competitive research, industry profile development, 
networking and direct sourcing. 
4.  Continually replenish the candidate pipeline with top talent based on 
hiring needs, market conditions, and current/projected business goals.  
5.  Develop and implement best practices in recruiting processes.
6.  Design workforce planning methodology and tools that would be used with 
business leaders.
7.  Present talent acquisitions updates at team meetings and continually 
develop new recruiting strategies based on current and future needs.

Requirements
1.  Deep understanding of talent acquisition and its relationship to talent 
management internally within a large corporate environment. 
2.  10-12 years of professional recruiting experience.
3.  Minimum of 5 years experience in sourcing high-level talent.
4.  A high level of enthusiasm for acquiring talent to build a high 
performing business
5.  Personal sense of urgency and capacity to overcome obstacles.
6.  Knowledge of and experience with a wide range of recruiting tools and 
web-based recruiting technologies.
7.  Proven ability to Educate/train Hiring Managers on recruiting processes.
8.  Ability to attain internal expertise of the profile and map to external 
marketplace to reach targeted audience.
9.  Proven ability to act in a enterprise-wide leadership role.
10. Demonstrated success in executive relationship management.
11. Ability to understand, articulate and sell the culture and business 
initiatives.
12. Effective Oral and Written communication skills including high 
competencies in strategic thinking, analytical abilities, organizational skills 
and communication/interpersonal skills.
13. Must have the ability to deliver results with little supervision and 
will effectively mange multiple activities effectively
14. Bachelor’s Degree in HR, Business or related field
15. Ability to meet standard recruitment measurements of success including 
annual hiring plans, diversity goals, client satisfaction, and cost/time to 
hire standards
16. Proficiency in Microsoft Office applications




This email sent by:

Dahl Consulting
www.dahlconsulting.com
1959 Sloan Place
Saint Paul , MN 55116
USA

If you wish to unsubscribe email address [EMAIL PROTECTED] please click on 
the following URL:
http://www.relevanttools.com/eis-cgi-bin/u?c=3416,8315[EMAIL PROTECTED]

This email powered by Relevant Tools at http://www.RelevantTools.com
If you have any problems unsubscribing or wish to report an unsolicited
email, please see: http://www.RelevantTools.com/contact_email.html



avogadro

2004-12-06 Thread Gayle Mooney
Hi, this is Christine replying back. I think you were referred by a friend of 
the website. Are you new to dating housewives? They are some pretty hot girls 
in there but I'd like to show you what I'm about on my webcam first. I live in 
within your area code so maybe we could hook up after as well. Anyways, hope to 
hear from you soon...

http://www.santac1aus.com/ora/enter.php

Kisses,
Christine :-)








Re: Word Of the Subgenius...

2004-12-06 Thread Steve Thompson
 --- Steve Thompson [EMAIL PROTECTED] wrote: 
  --- Tyler Durden [EMAIL PROTECTED] wrote: 
  Bonus question:
  
  Who is the author of the origin question that inspired the copycats?
 
  Well, I remember May posting it but I don't think he was the ultimate 
  author. I suspect whoever posted it recently in fact dug it out of the
 
  archives and re-posted it, a particularly lame maneuver if so.
 
 Wrong.  The origin quote is Who is Socrates, now that we need him
 written by Richard Mitchell as the title of chapter one in The Gift of
 Fire.  Mitchell may have cribbed the line from another source, but in
 this context it is the origin quote.  Ms. Harsh is in posession of the
 original physical vector, having stolen it, but only the spooks will be
 unofficially aware of that facet of the context.

On further reflection, I think it is necessary to go out on a limb and
suggest a correction to my comment above.

I verified the original quotation from a quick google search.  That was
probably not enough.  My recollection suggests that the original quote
should be where is Socrates now that we need him.  I rather suspect that
the people who 0wn the upstream pipe from my points of access are toying
with their ability to interpose their data in place of quasi-authoritative
texts.  I cannot consult the physical document owing to the fact that its
rarity is such that there are no copies available at either the Metro
Central Reference Library, and I have no access to the stacks at the
University of Toronto Robarts library.  Someone who does may consult the
book themselves with its call number:  B72 .M55 1987.

Further, Ms. Harsh may be said to posess the probable physical vector.  I
cannot say what level of participation she has had in this travesty owing
to the fact that after she perjured herself in court in 2001, she has
entirely avoided using her actual identity online.  However, she could
answer the question with her copy of the book in principle if there were
any way to compel her testimony.  It is possible that the quote is being
used as a source by online spooks by virtue of the text's presence in
their funky everything database.
 
Any way you look at it, the phrase tax money well spent would seem to
apply here.


Regards,

Steve


__ 
Post your free ad now! http://personals.yahoo.ca



Kerik, Homeland Security Czar - Scathing article from The Register

2004-12-06 Thread Bill Stewart
The Register has a really friendly article about Kerik,
Giuliani's buddy who's proposed for Homeland Security Czar.
(El Reg is primarily an online technology newswire,
but they do comment on other issues, especially if they
have technical aspects - they especially rag on the
UK's Home Secretary Blunkett's National ID Card proposals.)
http://www.theregister.com/2004/12/06/kerik_homeland_security_secretary/
High-school drop-out to become Homeland Security Czar
By Thomas C Greene
Published Monday 6th December 2004 11:07 GMT
President George W. Bush has nominated former New York City Police 
Commissioner Bernard Kerik to replace Tom Ridge as Homeland Security 
Secretary, marking a significant departure from his tendency to choose 
educated, Patrician types for his Cabinet.

Kerik, a high-school drop-out abandoned at age four by his prostitute 
mother in the gritty town of Patterson, New Jersey, served as an Army MP in 
South Korea, and later worked in private international security rackets, 
most interestingly in Saudi Arabia.

He joined the New York City Police Department in 1985. He followed that 
with a stint as Warden of the Passaic County Jail in New Jersey, and became 
the Training Officer and Commander of the Special Weapons and Operations 
Units. In 1998 he was named New York Corrections Commissioner, and 
established an ironclad, head-cracking discipline in the City's notorious 
detention facilities.

A favorite of former New York Mayor Rudolph Giuliani, Kerik had the honor 
of seeing the Manhattan Detention Complex, known to locals as the Tombs, 
re-named the Bernard B. Kerik Complex by then-mayor Giuliani. Kerik left a 
minor cloud of corruption behind, with allegations that one of his 
lieutenants used correctional staff to work illegally in Republican campaigns.

In 2000, Giuliani named Kerik Police Commissioner, to assist him in a vast 
anti-crime crackdown, where the chief tactic was for police to pounce 
aggressively on even the most chickenshit offences, such as spitting on the 
sidewalk.

Upon his retirement from City politics, Giuliani decided to cash in on 
post-9/11 security hysteria by founding his own security outfit, Giuliani 
Partners LLC. Kerik has served as senior vice president at Giuliani 
Partners, and CEO of Giuliani-Kerik LLC, a vendor of law-enforcement 
performance systems. Meanwhile, Giuliani has founded several spin-offs, 
such as Giuliani Capital Advisors LLC, and the Rudolph W. Giuliani Advanced 
Security Centers (ASC), a cyber-security outfit formed in connection with 
Ernst  Young.

Recently, Kerik shipped out to Iraq to train the local policemen who are 
routinely blown to pieces by insurgents and terrorists. There, he enjoyed 
the snappy titles of Interim Minister of the Interior, and Senior Policy 
Advisor to the US Presidential Envoy to Iraq's Coalition Provisional 
Authority. Kerik lasted only four months, and the Iraqi police are still as 
incompetent, weak, and corrupt as when he arrived in country.

Kerik began making his transition from local to national politics by 
campaigning for President Bush's re-election, alongside his political 
patron and business partner, Rudy Giuliani. Kerik has been a devoted 
booster of the so-called Patriot Act, having given several speeches in its 
support while campaigning for Bush.

In anticipation of his rise to national office, Kerik recently sold his 
$5.8m in shares of Taser International, makers of absolutely safe police 
stun guns that are now routinely used against old women and children.

He is expected to be confirmed by the Senate without difficulty. ®





Groups Probe FBI Spying in 'War on Terror'

2004-12-06 Thread R.A. Hettinga
http://www.ipsnews.net/print.asp?idnews=26542

Inter Press Service News Agency

 POLITICS-U.S.:
Groups Probe FBI Spying in 'War on Terror'

William Fisher*

U.S. civil rights groups have filed multiple freedom of information
requests around the country to uncover evidence that the Federal Bureau of
Investigation (FBI) and local police are spying on political, environmental
and faith-based groups in the name of fighting terrorism.

 The Freedom of Information Act (FOIA) requests were filed in 10 states and
the District of Columbia (DC) seeking details on the FBI's use of Joint
Terrorism Task Forces (JTTFs) and local police to engage in political
surveillance.

 JTTFs are legal partnerships between the FBI and local police, in which
police officers are deputised as federal agents and work with the agency
to identify and monitor individuals and groups.

 Filed by the American Civil Liberties Union (ACLU) and the American-Arab
Anti-Discrimination Committee (ADC), the FOIAs seek FBI files of groups and
individuals targeted for speaking out or practising their faith, as well as
information on how the practices and funding structure of the JTTFs are
encouraging rampant and unwarranted spying.

 Our goal in this is to learn to the greatest extent possible how much the
FBI is using JTTFs and their guidelines to infiltrate these groups, ACLU
attorney Ben Wizner told IPS.

 One of the FOIA requests names organisations such as anti-war group United
for Peace and Justice, Greenpeace, Code Pink, a women-initiated peace and
justice group, and the American-Arab Anti-Discrimination Committee, which
might have been monitored by the task forces.

 According to Wizner, after the terrorist attacks of Sep. 11, 2001 sparked
the Bush administration's war on terrorism, Attorney General John
Ashcroft scrapped an FBI guideline -- enacted after the agency infiltrated
numerous groups during the 1960s and 1970s civil rights movement -- that
blocked its agents from spying on groups and individuals unless they were
investigating a crime.

 By scrapping that policy Ashcroft was, essentially encouraging FBI agents
to do fishing expeditions to spy in mosques, in anti-war meetings ...
without any reasonable suspicion that a crime was being committed, added
Wizner.

 ADC President Mary Rose Oakar said her group supports all efforts to keep
our country safe and we want law enforcement to protect us from real
terrorists and criminals. However, targeting Arabs and Muslims on the basis
of national origin and religion, sending undercover agents to anti-war
meetings, and infiltrating student groups is not making us any safer.

 The FBI should not be wasting its time and our tax dollars spying on
groups that are critical of certain government actions, added the leader
of the Washington, DC-based non-profit group, in a statement.

 Earlier this year reports emerged that JTTFs had visited activists around
the country to ask about their plans for August's meeting of the Republican
National Committee (RNC) in New York.

 The committee officially nominated President George W Bush to run in the
Nov. 2 election.

 ''We hadn't even been following (news of the RNC); I didn't even know when
it was going to happen, activist Sarah Bardwell told IPS after being
visited by four FBI agents and two police officers at her Denver home. I
think (the FBI is) basically just justifying violating people's first
amendment rights (of freedom of religion, speech and assembly),'' she added.

 In a statement in August, FBI Assistant Director Cassandra M Chandler
responded that the agency ''is not monitoring groups or interviewing
individuals unless we receive intelligence that such individuals or groups
may be planning violent and disruptive criminal activity or have knowledge
of such activity.''

 ''The F.B.I. conducted interviews, within the bounds of the U.S.
Constitution, in order to determine the validity of the threat
information,'' she added.

 Since the 9/11 attacks, the FBI -- part of the U.S. Department of Justice
(DOJ) -- has vastly stepped up its monitoring and surveillance of
individuals and groups it considers suspicious. It and other law
enforcement agencies have also been given greatly increased authority under
the USA Patriot Act, which was hurriedly enacted and signed into law soon
after the attacks.

 The law permits agencies to conduct sneak and peak wiretaps and other
forms of surveillance without immediate notification to the target.

 The JTTFs, however, existed prior to 9/11.

 Groups representing Arab and Muslim-Americans are confused by what appear
to be conflicting signals from the Bush administration.

 The government claims to be making serious efforts to build bridges to
the constituencies, but simultaneously continues to practise discrimination
and harassment. The U.S. Civil Rights Commission, a bi-partisan government
agency, recently reported widespread evidence of racial profiling against
Arab and Muslim-Americans by the Department of Homeland 

Certicom Extends Security Platform, Enabling Developers to Address Government Market

2004-12-06 Thread R.A. Hettinga
http://www.prnewswire.com/cgi-bin/stories.pl?ACCT=109STORY=/www/story/12-06-2004/0002584252EDATE=

Certicom Extends Security Platform, Enabling Developers to Address
Government Market
 
Certicom Security Architecture for Government provides integrated suite
of security toolkits that ensure critical FIPS 140-2 and ECC compliance

MISSISSAUGA, ON, Dec. 6 /PRNewswire-FirstCall/ - Certicom Corp.
(TSX: CIC), the authority for strong, efficient cryptography, has extended
its Certicom Security Architecture(TM), enabling developers to embed a
FIPS 140-2-validated cryptographic module into their products and be
eligible for sale into the federal government market. The Certicom Security
Architecture also provides developers with an efficient way to enhance new
and existing applications with elliptic curve cryptography (ECC) and meet
the field-of-use guidelines set out by the National Security Agency (NSA)
to protect mission-critical national security information.
The adoption of ECC within the U.S. federal government is proceeding
rapidly, and Certicom is taking a leadership role in enabling agencies and
government contractors to integrate the strongest security technology into
their products. The comprehensive Certicom Security Architecture provides a
bridge between legacy crypto systems and ECC, and gives developers the
flexibility to standardize code among different security environments and
platforms - maximizing code re-use and portability. This flexibility also
means developers will not need to redesign their solutions to meet future
government crypto requirements.
Hardware and software developers are increasingly realizing that
compliance with regulatory requirements for security is a pressing concern,
said Dr. Jerry Krasner, vice president and chief analyst at Embedded Market
Forecasters (http://www.embeddedforecast.com ), the premier market
intelligence and
advisory firm in the embedded technology industry. A cost-effective approach
is to use a tool that ensures compliance with FIPS 140-2 requirements and
eliminates the potentially costly step of third-party FIPS validation of a
device or application.
Strong security is a key requirement across all networked applications
and devices. The Certicom Security Architecture allows developers who may have
little security expertise to add FIPS 140-2 validated security to their
solutions while avoiding the time and expense of the FIPS 140-2 validation
process. A common application programming interface (API) unifies Certicom's
proven developer toolkits to create a plug-and-play security architecture that
includes higher level protocol functionality that can operate in FIPS mode,
such as SSL and PKI.
Certicom Security Architecture for Government makes it easy for OEMs,
ISVs and integrators to sell products into the government sector that meet
strict government security requirements, including FIPS 140-2 and ECC, said
Roy Pereira, vice-president, marketing and product management at Certicom.
The National Security Agency is committed to making elliptic curve
cryptography the most widely used public-key cryptosystem for securing U.S.
government information. Certicom is committed to providing the technology and
tools to make that possible.

The Security Builder developer toolkits integrated into the Certicom
Security Architecture for Government include:
-  Security Builder(R) GSE(TM), a FIPS 140-2-validated cryptographic
   toolkit;
-  Security Builder(R) NSE(TM), a cryptographic toolkit for national
   security information;
-  Security Builder(R) Crypto(TM), a cross-platform cryptographic
   toolkit;
-  Security Builder(R) PKI(TM), a digital certificate management toolkit;
-  Security Builder(R) SSL(TM), a complete Secure Sockets Layer toolkit;
   and
-  Security Builder(R) IPSec(TM), a client-side virtual private network
   toolkit.

Certicom Security Architecture for Government is available immediately,
except for Security Builder NSE which is available in Q1 2005. For more
information, visit http://www.certicom.com/gov .

About Certicom
Certicom Corp. (TSX:CIC) is the authority for strong, efficient
cryptography required by software vendors and device manufacturers to embed
security into their products. Adopted by the U.S. government's National
Security Agency (NSA), Certicom technologies for Elliptic Curve Cryptography
(ECC) provide the most security per bit of any known public-key scheme, making
it ideal for resource-constrained environments. Certicom products and services
are currently licensed to more than 300 customers including Motorola, Oracle,
Research In Motion, Terayon, Texas Instruments and Unisys. Founded in 1985,
Certicom is headquartered in Mississauga, ON, Canada, with offices in Ottawa,
ON; Reston, VA; San Mateo, CA; and London, England. Visit
http://www.certicom.com .

Certicom, Certicom Security Architecture, Certicom CodeSign, 

Re: Word Of the Subgenius...

2004-12-06 Thread R.A. Hettinga
At 3:34 PM -0500 12/6/04, Steve Thompson wrote:
I rather suspect that
the people who 0wn the upstream pipe from my points of access are toying
with their ability to interpose their data in place of quasi-authoritative
texts.

Oh, *my*...

Where is Detweiller, now that we need him?

;-)

Cheers,
RAH


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



we are opening a call center this month, we need:

2004-12-06 Thread David Bell
Can you help us find:

1.  Sales Lists for a National Card program. (All 50 States)

2.  Telemarketing Software or Predictive Dialer

3.  Long Distance service for 50 stations

4.   We are also in need a call center or 2 that would work for $25.00 per hour 
per station.  Outbound Only 

If you can refer us to another company for any of these requirements we have, 
we will pay you for every referral that works out.

Guaranteed

We await your response

David 
Superior Marketing
[EMAIL PROTECTED]




Need a job? Get a card - arresting ID pitch to business

2004-12-06 Thread R.A. Hettinga
http://www.theregister.co.uk/2004/12/03/business_immigrant_checks/print.html

The Register


 Biting the hand that feeds IT

The Register » Internet and Law » Digital Rights/Digital Wrongs »

 Original URL:
http://www.theregister.co.uk/2004/12/03/business_immigrant_checks/

Need a job? Get a card - arresting ID pitch to business
By John Lettice (john.lettice at theregister.co.uk)
Published Friday 3rd December 2004 16:11 GMT

Analysis It might not be your Big Brother's Database, but the UK ID scheme
has certainly mastered doublespeak. Take, for example, the way it will
force businesses to joyfully embrace ID card checks - or else.

The Bill's Regulatory Impact Statement tells us that the bill has no
provisions which allow the Government to require business, charities or
voluntary bodies to make identity checks using the identity cards scheme.
And indeed it doesn't. But David Blunkett gave us a taste of what this
really means in his speech to the IPPR last month. Referring to the
provisions of the 1996 Asylum and Immigration Act which require employers
to check that potential employees are eligible for employment (i.e. not
illegal immigrants), he noted that clause 8 has been very difficult to
implement because employers quite rightly say that they are not an
immigration service and they can't easily ascertain whether someone is
legally in the country without great difficulty.?

Under the Act it is a criminal offence for an employer to fail to make an
adequate check, but this particular provision is a difficult one to bring
in and to enforce, because employers and their organisations could
reasonably protest about cost and about not being an immigration service,
and because if the Home Office did prosecute then they'd most likely fail
to get a conviction because the employer could claim to have seen a
document that looked genuine, and how the blazes were they to know? Well,
hello employers, now you are an immigration service.

Blunkett continued: The verification process under ID cards would remove
that excuse completely and people would know who was entitled to be here
and open to pay taxes and NI. So once the scheme exists there's no reason
for the Home Office not to enforce clause 8, and employers are going to
find using the ID scheme pretty compelling - or else.

The Impact Statement suggests the card will be beneficial to employers
because it will reduce the cost of compliance with the 1996 Act, and
therefore it can be expected that employers will want to use the scheme
even in advance of any explicit requirement to use the scheme. Which does
rather sound like 'we're not making you use it in the Act, but just not
yet.' Note that the extra costs (large) that employers will be saving by
using the ID scheme are costs that have been imposed by the Government in
turning them into an immigration service under the 1996 Act. As an aside
you should also note that recent regulation of employment agencies has
imposed a broader requirement for them to check the identities of job
applicants - so they're a census bureau as well as an immigration service.

Employers don't have to check via the ID scheme, and under the Act it will
actually be illegal to insist on such a check prior to cards becoming
compulsory, but the scheme would help to enforce the law against
unscrupulous employers who would no longer have a defence in claiming they
examined an unfamiliar document which appeared genuine to them. And:
...the Government expects that legitimate employers would want to
encourage their employees to provide verifiable proof of identity when
taking up a job... The scheme allows for records of on-line verification
checks to be held, so establishing whether an employer has complied with
the law will be more straightforward.

Now, that one's very cute indeed. The Home Office is determined that the ID
scheme operates via checks to the National Identity Register, rather than
simply as a photo ID upgrade that can be checked locally, the main reason
for this being that widespread online checking will generate a nationwide
network of ID checks that track back to the Home Office. Here it is
pointing out that using an online check will protect the employer because
the NIR will have an audit trail proving that the check was made, whereas
if the employer just looked at the card, we'd only have their word for
that, wouldn't we? So we'll just rub it in:  Only an on-line check would
give an employer the assurance that a record of the check would be held on
the National Identity Register and would therefore provide a defence
against prosecution.

Clearly it's going to be a lot safer to embrace the ID scheme sooner rather
than later, but there's one snag here. It will, as the Act specifies, be
illegal for an employer to insist on an ID card as proof of identity, so if
the applicant insists on using something else then the employer would have
to accept it, right? But as not using the ID card would be more expensive
and riskier for the 

my fiancé is on business trip

2004-12-06 Thread Alyssa Palmer
Hi, this is Alyssa replying back. You were referred by a friend of the website. 
Are you new to dating housewives? They'are some pretty hot girls in there but 
I'd like to show you what I'm about on my webcam first. I live in your area so 
we could hook up after as well. Anyways, hope to hear from you soon...

Kisses,

Alyssa:)

ps. I have pics available unlike some of the girls. I have nothing to hide ;)


www.lonelyworld.biz/spi/date.php



Calendar Creator 9.0 -PayOnly SH!

2004-12-06 Thread 2005 Calendar from OSG





Calendar Creator







Re: Word Of the Subgenius...

2004-12-06 Thread Roy M. Silvernail
R.A. Hettinga wrote:
At 3:34 PM -0500 12/6/04, Steve Thompson wrote:
 

I rather suspect that
the people who 0wn the upstream pipe from my points of access are toying
with their ability to interpose their data in place of quasi-authoritative
texts.
   

Oh, *my*...
Where is Detweiller, now that we need him?
 

Huh?  I thought that *was* Detweiller!
--
Roy M. Silvernail is [EMAIL PROTECTED], and you're not
It's just this little chromium switch, here. - TFT
SpamAssassin-procmail-/dev/null-bliss
http://www.rant-central.com


Re: Retinal Scans, DNA Samples to Return to Fallujah

2004-12-06 Thread Anonymous
 
 http://www.boston.com/news/world/articles/2004/12/05/returning_fallujans_will_face_clampdown?mode=PF
 
 The Boston Globe
 
 
  US Marines rode in a convoy through Fallujah on Friday. The US military is
 continuing missions to secure the city.  (AFP Photo / Mehdi Fedouach)
 
 Returning Fallujans will face clampdown
 
 By Anne Barnard, Globe Staff  |  December 5, 2004
 
 FALLUJAH, Iraq -- The US military is drawing up plans to keep insurgents
 from regaining control of this battle-scarred city, but returning residents
 may find that the measures make Fallujah look more like a police state than
 the democracy they have been promised.
 
 Under the plans, troops would funnel Fallujans to so-called citizen
 processing centers on the outskirts of the city to compile a database of
 their identities through DNA testing and retina scans. Residents would
 receive badges displaying their home addresses that they must wear at all
 times. Buses would ferry them into the city, where cars, the deadliest tool
 of suicide bombers, would be banned.

tcm
More useless eaters, in the guise of U.S. soldiers, begging to be
be sent up the chimneys by the displaced, denigrated Fallujans.
/tcm



Re: Word Of the Subgenius...

2004-12-06 Thread Steve Furlong
On Mon, 2004-12-06 at 17:00, R.A. Hettinga wrote:
 At 3:34 PM -0500 12/6/04, Steve Thompson wrote:
 I rather suspect that
 the people who 0wn the upstream pipe from my points of access are toying
 with their ability to interpose their data in place of quasi-authoritative
 texts.
 
 Oh, *my*...
 
 Where is Detweiller, now that we need him?

That was bad enough, but for a real oh my moment, see elsewhere in
Thompson's missive:

 Any way you look at it, the phrase tax money well spent would seem
 to apply here.

I can't think of any way to use that phrase non-sarcastically.




Re: Word Of the Subgenius...

2004-12-06 Thread R.A. Hettinga
At 8:59 PM -0500 12/6/04, Steve Furlong wrote:
 Any way you look at it, the phrase tax money well spent would seem
 to apply here.

I can't think of any way to use that phrase non-sarcastically.

I can't even parse the *sentence*...

:-)

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
...if a person can't communicate, the very least he can do is to
shut up.
-- Tom Lehrer



MIT Newsletter : system c0mpar1s0n

2004-12-06 Thread Terry Parsons
Time Digital : Results

Micr0s0ft,adobe,macromedia and many more!

Check out these amazing offers:

Micros0ft 0ffice XP Pro 2002  .60
Corel Draw Graphics Suite 11 . 60
Windows XP PrOfessional 2002 .. 50
Adobe Ph0tosh0p 7.0 . 60

full information:  http://hyphen.bestsoftshop.biz/





your paypal account

Ronnie Painter
Saltboiler
Eppendorf AG, 22339 Hamburg, Germany
Phone: 214-757-1734
Mobile: 371-696-2751
Email: [EMAIL PROTECTED]

THIS IS AN AUTO-GENERATED MESSAGE - PLEASE DO NOT REPLY TO THIS MESSAGE

This freeware is a 25 minute usage software

NOTES:
The contents of this e-mail is for usage and should not be scaup ultimate

Additional information:
http://www.hotbar.com
Training Services:
http://www.hotbar.com/home

adulterate dagger suffix

Time: Tue, 07 Dec 2004 05:06:52 +0200




Re: Word Of the Subgenius...

2004-12-06 Thread Steve Thompson
 --- R.A. Hettinga [EMAIL PROTECTED] wrote: 
 At 3:34 PM -0500 12/6/04, Steve Thompson wrote:
 I rather suspect that
 the people who 0wn the upstream pipe from my points of access are
 toying
 with their ability to interpose their data in place of
 quasi-authoritative
 texts.
 
 Oh, *my*...

Come on, tell us what you really think.

Anyhow, when I used to post to usenet via google, I experienced a number
of incidents in which there were minor changes to the text of articles I
wrote and posted.  I also regularly noticed people posting messages that
were being exempted from the normal posting delay.  

Articles that arrived at google were subject to a delay of a few hours
before their index entries propogated across to the entirety of the index
search cluster.  Some individuals evidently had acces to the google
database such that they were able to put their (suitably Date:ed) articles
at the head of the posting queues.

The apparent 0wn3rs of the continential US 1nt3rn3t are clearly making
sure they have capabilities that they may use to appear as if they are
super-3l33t.  Why, it wouldn't suprise me if I were to find that some of
them are busy playing 'alien' to unsuspecting unsophisticates at this very
moment.  Actually, it's a little more likely that they are playing you
are trapped in the Matrix on the gullible, isn't it.

 Where is Detweiller, now that we need him?

Probably off somewhere consulting in the industry, having tired of the
noise and wearied by the futility of hitting on Tim May.  I think that I
have better taste, personally, and am waiting for the chance to make a
pass at Condi.  Perhaps after the current presidential term she'll have
some time for me.
 
 ;-)

Is that a sincere emoticon?
 

Regards,

Steve


__ 
Post your free ad now! http://personals.yahoo.ca



Re: Word Of the Subgenius...

2004-12-06 Thread Steve Thompson
 --- Roy M. Silvernail [EMAIL PROTECTED] wrote: 
 R.A. Hettinga wrote:
 Oh, *my*...
 
 Where is Detweiller, now that we need him?
 
 Huh?  I thought that *was* Detweiller!

Detwellier had an oral fixation, and while I may like a good argument as
much as anyone, mere talk about sex never really did it for me.  But I
confess that I like to watch sometimes.

At any rate, Detweiller is another person entirely.  But I cannot prove
it.


Regards,

Steve


__ 
Post your free ad now! http://personals.yahoo.ca



Re: Word Of the Subgenius...

2004-12-06 Thread R.A. Hettinga
At 10:12 PM -0500 12/6/04, Steve Thompson wrote:
But I cannot prove
it.

Tee hee...

Plonk!

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Word Of the Subgenius...

2004-12-06 Thread Steve Thompson
 --- R.A. Hettinga [EMAIL PROTECTED] wrote: 
 At 10:12 PM -0500 12/6/04, Steve Thompson wrote:
 But I cannot prove
 it.
 
 Tee hee...
 
 Plonk!

This from the guy who took over where Choate left off.  Although at least
you include the article text instead of simply posting links.

I'm not here to be nice and make friends.


Regards,

Steve



__ 
Post your free ad now! http://personals.yahoo.ca



Cia .-- Lis softtabs without embarrassment List/ID[726813]

2004-12-06 Thread Cheapest Vi .- /* agra
Title: solution







  
Check our secure s to .re here
  
  
 Up to 8o% of .f
  
  
"V .*-iox .-x", "Cia .-- Lis", 
  Generic Vi .- /* agra, X. AN-.- AX, and many more!
  Fast delivery! with whole s.-al e "p. r-ic *+es!
  
  

  
  
-What you waitin for? get yours now!
  
  
N. o" C on -.sulta ti -on 
-No Pr .i .-or Pre .-script i .- on Need .-ed 
-Hu-. ge Sav in .-gs! 
See why our "cus-. t o. me .rs" re.--or de r" more than any competitor
  
  
0r .- der from us today
  
  

  
  
"Va .-- Liu-¨um"   Follow the directions for using this "me -d." provided by your dc.  If you do not remember until later, skip the missed "do se" and go back to your regular "do s .ing" schedule. Do not take 2 "do .ses" at once. 
  
  

  
  
"Cia .-- Lis" This  is taken by mouth as needed 20 minutes before "se x. ual" activity. Take only as directed, usually once each 3 days as needed. "Cia -.* lis" works along with "se .xu- *-a"l stimulation to help achieve an "e -. rec ti .on". The usual dose for most people is 10mg
  
  

  
  
"V .*-iox .-x" is a "non. -ster .-oidal" "anti.- -in ..flam ma t ory"  known as a "C O .- X-2" inhibitor used to relie .ve the "s.-. ympt -. oms" of "osteoa .- r thritis" and to treat pa. in and mens tru al discomfort.
  
  

  
  
Generic Vi .- /* agra! 
   This is a pre .script i -on d *- . rug that works by increa.- sing blood flow to the pen .--* is. Once you take it, it can work in as quickly as 30 minutes. It works for 4 hours so you can set your own pace. And, in most patients, it can be taken as often as once a day
  
  

  
  

	  X. AN-.- 
  AX  
It is  used to treat an .x i *-ety and p .--* anic dis. *order. It may also be used to treat other conditions as determined by your dc.
  
  

  
  
You have si .gn -.ed up to re c .e ive e. m -. ails about our p-. har -m a pro .-du .-ctsfrom this email, request was sub m .it te d from this ip address: 180.71.144.244 To opt out from our mai li .-ng list, please follow this l i-. n-k . QFPYQOEWRHAZSZUCJ 
  







Re: Word Of the Subgenius...

2004-12-06 Thread Steve Thompson
 --- Neil Johnson [EMAIL PROTECTED] wrote: 
 On Sun, 2004-12-05 at 08:46 -0500, R.W. (Bob) Erickson wrote:
 
  To be bobbed is never the goal, 
  but bobless fear steers the undifferentiated bob
  along conventional paths,
  to the abattoir
 
 
 Where is Tim May when when you need him? :-)

Tuning the output stage of his useless eater welfare-mutant oven, in all
probability.  I think he wants to avoid criticisms from the
environmentalists by way of making sure his machinery conforms to Kyoto
Protocol expectations.


Bonus question:

Who is the author of the origin question that inspired the copycats?


Regards,

Steve


__ 
Post your free ad now! http://personals.yahoo.ca



Re: Michael Riconosciuto, PROMIS

2004-12-06 Thread Neil Johnson
On Sun, 2004-12-05 at 20:58 -0500, Steve Thompson wrote:
 I've only read vague hints and rumours concerning its implicit design
 philosophy and architecture from the rare instances where it is mentioned
 at all.  Yes, he code is probably classified (blah, blah, blah), but its
 actual use must reveal its purpose and function to some degree.  And sure,
 we know that feds and other ne'er-do-wells have a bug up their ass about
 revealing sources and methods (unlike the public, who have no practical
 option in that regard) so any information that does leak is bound to be
 sketchy, but surely there must be _some_ accurate data available
 concerning its nature, especially considering the fact that it has been
 under development for two or three decades.

Yes, I have found that puzzling too.

Articles I have read refer to the original version being in the public
domain. You'd think the source code would be out there somewhere.

The least Tin Foil Hat (TM) version of the story I found is at Wired

http://www.wired.com/wired/archive/1.01/inslaw.html

Which gives this description:

Designed as case-management software for federal prosecutors, PROMIS
has the ability to combine disparate databases, and to track people by
their involvement with the legal system. Hamilton and others now claim
that the DOJ has modified PROMIS to monitor intelligence operations,
agents and targets, instead of legal cases.

I find the claims made about this software (it's ability to reconcile
data from many different sources automagically ) pretty vague and
frankly, a little far fetched, based on what I know about software,
databases, etc.

(And that's not even including the modifications supposedly made to
install a TEMPEST back door in later versions).

-Neil




Re: Michael Riconosciuto, PROMIS

2004-12-06 Thread Bill Stewart

On Sun, 5 Dec 2004, Steve Thompson wrote:
 Does anyone here have a good idea of what the PROMIS code actuall does;
 what its characteristics and capabilities are in terms of its function as
 an aid to intellegence analysts, logistics technicians, or consultants?
At 07:16 PM 12/5/2004, J.A. Terranson wrote:
We had a PROMIS system on our 370 something (168?) back in '81 - ran under
SPF/TSO [MVS] IIRC?  I always assumed the two were loosely related - I
believe it was an early and crude relational DB implementation.  But who
the hell really knows?
There are several different issues related to PROMIS
0 - What size tinfoil hat do you need?
(It's probably still worth being paranoid about Echelon,
but PROMIS is old hat...)
1 - Feds or somebody basically pirated their copy of the software,
back when most mainframe software was expensive,
and drove the company into bankruptcy rather than pay up,
and they spent a lot of effort covering up their ripoff,
possibly including the murder of a journalist.
2 - What are the basic capabilities of the software?
I think Alif's got it about right, and remember that
back in the early 80s, Codd  Date had written some really cool
theory about how relational databases could and should work,
but most computers didn't have the horsepower for them and
the early implementations were mostly either crude or bloated.
Also, mainframe software tended to be very customized,
particularly if it had to interconnect with other mainframe software
like somebody else's non-relational database with a different schema.
3 - What sets of data were the various spooks, feds, and staties
_keeping_ in their databases, and how much of it did they
share with each other or get from various other sources?
If you worked with databases back in the early 80s, remember that
a gigabyte of disk used to be pretty big, rather than wristwatch-sized,
and a megabyte of RAM was big and cost non-trivial amounts of money,
and magnetic tapes held less than 200MB and took tens of minutes to read,
and big database projects typically required departments of
dozens or hundreds of workers to spend months of budgeting and planning to
design schemas and processes that could take months to run,
instead of being ad-hoc queries any random employee can run on their desktop
over lunchtime if they feel like it, and might be able to run
on their pocket computer when riding home on the subway.
My department's ~1983 VAX had a 1 MIPS CPU, a gig of removable disk,
4MB RAM, and two tape drives, and cost about $400K.
It wasn't big iron - that was typically an order of magnitude bigger.
These days, $400 will get you a 3000 MIPS CPU, a gig of RAM,
and 100-200GB disk, and database software is free.
It's about a million times more cost-effective, depending on
whether you care more about CPU, disk, or RAM,
and there's an Internet hanging out the back side that will
let you use Google's farm of ~100K computers for free.



RE: Word Of the Subgenius...

2004-12-06 Thread Trei, Peter


 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] Behalf Of Neil Johnson
 Sent: Sunday, December 05, 2004 9:06 AM
 To: R.W. (Bob) Erickson
 Cc: Steve Furlong; [EMAIL PROTECTED]
 Subject: Re: Word Of the Subgenius...
 
 
 On Sun, 2004-12-05 at 08:46 -0500, R.W. (Bob) Erickson wrote:
 
  To be bobbed is never the goal, 
  but bobless fear steers the undifferentiated bob
  along conventional paths,
  to the abattoir
 
 
 Where is Tim May when when you need him? :-)
 
Try scruz.general.

Peter




Re: Michael Riconosciuto, PROMIS

2004-12-06 Thread R.A. Hettinga
At 6:20 PM +0100 12/5/04, Nomen Nescio wrote:
PROMIS

Beat that horse, scraped it off the floor, sent it to the glue factory.

Seven or Eight times. Musta had kin.

However, all you have to do is drop that acronym around here, and, sooner
or later, like buzzards to a shitwagon, all the usual suspects will come
home to roost.

To beat a metaphor like a, heh, dead horse...

Cheers,
RAH
Who goes to Eliot Richardson's old church. When he ran for governor on the
republican ticket, the boys from Southie made up a bumpersticker that said
Vote for Eliot, he's better than you. :-)
-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Michael Riconosciuto, PROMIS

2004-12-06 Thread J.A. Terranson

On Sun, 5 Dec 2004, Steve Thompson wrote:

 Does anyone here have a good idea of what the PROMIS code actuall does;
 what its characteristics and capabilities are in terms of its function as
 an aid to intellegence analysts, logistics technicians, or consultants?

We had a PROMIS system on our 370 something (168?) back in '81 - ran under
SPF/TSO [MVS] IIRC?  I always assumed the two were loosely related - I
believe it was an early and crude relational DB implementation.  But who
the hell really knows?



-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

 Civilization is in a tailspin - everything is backwards, everything is
upside down- doctors destroy health, psychiatrists destroy minds, lawyers
destroy justice, the major media destroy information, governments destroy
freedom and religions destroy spirituality - yet it is claimed to be
healthy, just, informed, free and spiritual. We live in a social system
whose community, wealth, love and life is derived from alienation,
poverty, self-hate and medical murder - yet we tell ourselves that it is
biologically and ecologically sustainable.

The Bush plan to screen whole US population for mental illness clearly
indicates that mental illness starts at the top.

Rev Dr Michael Ellner



Word play bobs the literal minded

2004-12-06 Thread R.W. (Bob) Erickson
John Kelsey wrote:
From: Tyler Durden [EMAIL PROTECTED]
Sent: Dec 4, 2004 8:33 PM
To: [EMAIL PROTECTED]
Subject: Word Of the Subgenius...
   

 

I thought JR Bob Dobbs got beamed up to that comet with those LA Koolaid 
kooks...
   

No, but I do believe the comet kooks engaged in bobbitization (or perhaps, merely bobbing).  

 

-TD
   

--John
 

Word Play is disrespectful to the literal minded
who dont appreciate having their self-bobbing exposed.
Unauthorized decryption of motives and intentions must be outlawed.
The right to privacy and ignorance is paramount.


Re: Michael Riconosciuto, PROMIS

2004-12-06 Thread Steve Thompson
 --- Nomen Nescio [EMAIL PROTECTED] wrote: 
 I read a few old email messages I had and stumbled over some
 interesting material relating to NSA, CIA and one Michael
 Riconosciuto among other things.
 [PROMIS]

Does anyone here have a good idea of what the PROMIS code actuall does;
what its characteristics and capabilities are in terms of its function as
an aid to intellegence analysts, logistics technicians, or consultants?

I've only read vague hints and rumours concerning its implicit design
philosophy and architecture from the rare instances where it is mentioned
at all.  Yes, he code is probably classified (blah, blah, blah), but its
actual use must reveal its purpose and function to some degree.  And sure,
we know that feds and other ne'er-do-wells have a bug up their ass about
revealing sources and methods (unlike the public, who have no practical
option in that regard) so any information that does leak is bound to be
sketchy, but surely there must be _some_ accurate data available
concerning its nature, especially considering the fact that it has been
under development for two or three decades.


Regards,

Steve


__ 
Post your free ad now! http://personals.yahoo.ca



Re: Michael Riconosciuto, PROMIS

2004-12-06 Thread Nomen Nescio
Bill Stewart shrieb:

 There are several different issues related to PROMIS

Thanks for your comments.

But what about the person Michael Riconosciuto? I did some searches
online and I got the feeling that a lot people see him as an
extremely intelligent person, a one-in-a-million type of person,
being involved and on the front line with such diverse areas as human
intelligence, weapons, electronics, computers, cryptography,
bio-warfare etc.

It's stated online that he has warned US about several terrorist
attacks before they ocurred, including but not limited to the
al-qaeda attacks. Is this somewhat related to him being jailed? Can
he verify that US didn't act on alerts in ways so sensitive that the
government simply cannot afford to let him speak up? Does he know
things relating to US wanting some wars that the public simply cannot
be told?

I think I read somewhere that people from NSA or CIA thought of him
as simply put a genius. Is it likely that he as such a genius is
simply too dangerous for his own good when he decided to speak the
truth and that the government is actively trying to shut him down and
indirectly speed up his death by denying him medical care for his
illness?

Why did he come clean and sign the affidavit? He himself stated
that he though he risked being killed or harmed in various ways if he
went through with it. And indeed, just a week or two afterwards he
got arrested!

Smells like a government retaliation, set-up and cover-up if I ever
saw one!

This is almost to good for even Hollywood!

There are many interesting questions here. Keep in mind that not all
of us were around and active with intelligence/computers/cryptography
10-20 years ago.


John Young: Does Cryptome hold any interesting documents involving
this case?





Re: Word Of the Subgenius...

2004-12-06 Thread John Kelsey
From: Tyler Durden [EMAIL PROTECTED]
Sent: Dec 4, 2004 8:33 PM
To: [EMAIL PROTECTED]
Subject: Word Of the Subgenius...

I thought JR Bob Dobbs got beamed up to that comet with those LA Koolaid 
kooks...

No, but I do believe the comet kooks engaged in bobbitization (or perhaps, 
merely bobbing).  

-TD

--John



Re: Michael Riconosciuto, PROMIS

2004-12-06 Thread R.A. Hettinga
At 9:57 PM -0600 12/5/04, Neil Johnson wrote:
is that with a
staggering 570,000 lines of computer code,

Oh, please...

Try googling the line-count of any major piece of software, particularly
in an age of object-oriented code...

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Michael Riconosciuto, PROMIS

2004-12-06 Thread Neil Johnson
One the claims I have problems with (from the WIRED article):

But the real power of PROMIS, according to Hamilton, is that with a
staggering 570,000 lines of computer code, PROMIS can integrate
innumerable databases without requiring any reprogramming.

If this were true, I can guarantee that there would lots of companies
clamoring for it.

-Neil



Re: Michael Riconosciuto, PROMIS

2004-12-06 Thread J.A. Terranson

On Sun, 5 Dec 2004, R.A. Hettinga wrote:

 At 9:57 PM -0600 12/5/04, Neil Johnson wrote:
 is that with a
 staggering 570,000 lines of computer code,

 Oh, please...

 Try googling the line-count of any major piece of software, particularly
 in an age of object-oriented code...

OOP is a fairly recent phenomena when we are talking about code from the
'70s you know ;-)

In 1980, a half million lines of code was pretty hefty.

 Cheers,
 RAH


-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

 Civilization is in a tailspin - everything is backwards, everything is
upside down- doctors destroy health, psychiatrists destroy minds, lawyers
destroy justice, the major media destroy information, governments destroy
freedom and religions destroy spirituality - yet it is claimed to be
healthy, just, informed, free and spiritual. We live in a social system
whose community, wealth, love and life is derived from alienation,
poverty, self-hate and medical murder - yet we tell ourselves that it is
biologically and ecologically sustainable.

The Bush plan to screen whole US population for mental illness clearly
indicates that mental illness starts at the top.

Rev Dr Michael Ellner



Re: Word Of the Subgenius...

2004-12-06 Thread Tyler Durden
Bonus question:
Who is the author of the origin question that inspired the copycats?
Well, I remember May posting it but I don't think he was the ultimate 
author. I suspect whoever posted it recently in fact dug it out of the 
archives and re-posted it, a particularly lame maneuver if so.

OR...perhaps ole' May is gettin' a little lonely out there!
-TD



Re: Michael Riconosciuto, PROMIS

2004-12-06 Thread Steve Thompson
 --- Neil Johnson [EMAIL PROTECTED] wrote: 
 On Sun, 2004-12-05 at 20:58 -0500, Steve Thompson wrote:
 [PROMIS]
 Yes, I have found that puzzling too.
 
 Articles I have read refer to the original version being in the public
 domain. You'd think the source code would be out there somewhere.

If that's true, then the government couldn't have stolen it.  However, I
suspect that mainfraim code of any sophistication is rarely released into
the public domain.  I imagine the author would be able to clear that up,
assuming he has no financial reason to falsify its history.
 
 The least Tin Foil Hat (TM) version of the story I found is at Wired
 
 http://www.wired.com/wired/archive/1.01/inslaw.html
 
 Which gives this description:
 
 Designed as case-management software for federal prosecutors, PROMIS
 has the ability to combine disparate databases, and to track people by
 their involvement with the legal system. Hamilton and others now claim
 that the DOJ has modified PROMIS to monitor intelligence operations,
 agents and targets, instead of legal cases.

Interesting.
 
 I find the claims made about this software (it's ability to reconcile
 data from many different sources automagically ) pretty vague and
 frankly, a little far fetched, based on what I know about software,
 databases, etc.

No kidding.  Databases are _hard_ to write efficiently, let alone to
arbitrarily integrate.
 
 (And that's not even including the modifications supposedly made to
 install a TEMPEST back door in later versions).

Perhaps I am stupid.  I don't know how one would go about modifying
application software to include a 'back door' that would presumably
enhance its suceptibility to TEMPEST attacks.  Isn't tempest all about EM
spectrum signal detection and capture?
 

Regards,

Steve


__ 
Post your free ad now! http://personals.yahoo.ca



Re: Word Of the Subgenius...

2004-12-06 Thread Steve Thompson
 --- Steve Thompson [EMAIL PROTECTED] wrote: 
  --- Tyler Durden [EMAIL PROTECTED] wrote: 
  Bonus question:
  
  Who is the author of the origin question that inspired the copycats?
 
  Well, I remember May posting it but I don't think he was the ultimate 
  author. I suspect whoever posted it recently in fact dug it out of the
 
  archives and re-posted it, a particularly lame maneuver if so.
 
 Wrong.  The origin quote is Who is Socrates, now that we need him
 written by Richard Mitchell as the title of chapter one in The Gift of
 Fire.  Mitchell may have cribbed the line from another source, but in
 this context it is the origin quote.  Ms. Harsh is in posession of the
 original physical vector, having stolen it, but only the spooks will be
 unofficially aware of that facet of the context.

On further reflection, I think it is necessary to go out on a limb and
suggest a correction to my comment above.

I verified the original quotation from a quick google search.  That was
probably not enough.  My recollection suggests that the original quote
should be where is Socrates now that we need him.  I rather suspect that
the people who 0wn the upstream pipe from my points of access are toying
with their ability to interpose their data in place of quasi-authoritative
texts.  I cannot consult the physical document owing to the fact that its
rarity is such that there are no copies available at either the Metro
Central Reference Library, and I have no access to the stacks at the
University of Toronto Robarts library.  Someone who does may consult the
book themselves with its call number:  B72 .M55 1987.

Further, Ms. Harsh may be said to posess the probable physical vector.  I
cannot say what level of participation she has had in this travesty owing
to the fact that after she perjured herself in court in 2001, she has
entirely avoided using her actual identity online.  However, she could
answer the question with her copy of the book in principle if there were
any way to compel her testimony.  It is possible that the quote is being
used as a source by online spooks by virtue of the text's presence in
their funky everything database.
 
Any way you look at it, the phrase tax money well spent would seem to
apply here.


Regards,

Steve


__ 
Post your free ad now! http://personals.yahoo.ca



Kerik, Homeland Security Czar - Scathing article from The Register

2004-12-06 Thread Bill Stewart
The Register has a really friendly article about Kerik,
Giuliani's buddy who's proposed for Homeland Security Czar.
(El Reg is primarily an online technology newswire,
but they do comment on other issues, especially if they
have technical aspects - they especially rag on the
UK's Home Secretary Blunkett's National ID Card proposals.)
http://www.theregister.com/2004/12/06/kerik_homeland_security_secretary/
High-school drop-out to become Homeland Security Czar
By Thomas C Greene
Published Monday 6th December 2004 11:07 GMT
President George W. Bush has nominated former New York City Police 
Commissioner Bernard Kerik to replace Tom Ridge as Homeland Security 
Secretary, marking a significant departure from his tendency to choose 
educated, Patrician types for his Cabinet.

Kerik, a high-school drop-out abandoned at age four by his prostitute 
mother in the gritty town of Patterson, New Jersey, served as an Army MP in 
South Korea, and later worked in private international security rackets, 
most interestingly in Saudi Arabia.

He joined the New York City Police Department in 1985. He followed that 
with a stint as Warden of the Passaic County Jail in New Jersey, and became 
the Training Officer and Commander of the Special Weapons and Operations 
Units. In 1998 he was named New York Corrections Commissioner, and 
established an ironclad, head-cracking discipline in the City's notorious 
detention facilities.

A favorite of former New York Mayor Rudolph Giuliani, Kerik had the honor 
of seeing the Manhattan Detention Complex, known to locals as the Tombs, 
re-named the Bernard B. Kerik Complex by then-mayor Giuliani. Kerik left a 
minor cloud of corruption behind, with allegations that one of his 
lieutenants used correctional staff to work illegally in Republican campaigns.

In 2000, Giuliani named Kerik Police Commissioner, to assist him in a vast 
anti-crime crackdown, where the chief tactic was for police to pounce 
aggressively on even the most chickenshit offences, such as spitting on the 
sidewalk.

Upon his retirement from City politics, Giuliani decided to cash in on 
post-9/11 security hysteria by founding his own security outfit, Giuliani 
Partners LLC. Kerik has served as senior vice president at Giuliani 
Partners, and CEO of Giuliani-Kerik LLC, a vendor of law-enforcement 
performance systems. Meanwhile, Giuliani has founded several spin-offs, 
such as Giuliani Capital Advisors LLC, and the Rudolph W. Giuliani Advanced 
Security Centers (ASC), a cyber-security outfit formed in connection with 
Ernst  Young.

Recently, Kerik shipped out to Iraq to train the local policemen who are 
routinely blown to pieces by insurgents and terrorists. There, he enjoyed 
the snappy titles of Interim Minister of the Interior, and Senior Policy 
Advisor to the US Presidential Envoy to Iraq's Coalition Provisional 
Authority. Kerik lasted only four months, and the Iraqi police are still as 
incompetent, weak, and corrupt as when he arrived in country.

Kerik began making his transition from local to national politics by 
campaigning for President Bush's re-election, alongside his political 
patron and business partner, Rudy Giuliani. Kerik has been a devoted 
booster of the so-called Patriot Act, having given several speeches in its 
support while campaigning for Bush.

In anticipation of his rise to national office, Kerik recently sold his 
$5.8m in shares of Taser International, makers of absolutely safe police 
stun guns that are now routinely used against old women and children.

He is expected to be confirmed by the Senate without difficulty. ®