Tor 0.0.9rc6 is out (fwd from [EMAIL PROTECTED])
- Forwarded message from Roger Dingledine [EMAIL PROTECTED] - From: Roger Dingledine [EMAIL PROTECTED] Date: Mon, 6 Dec 2004 02:00:23 -0500 To: [EMAIL PROTECTED] Subject: Tor 0.0.9rc6 is out User-Agent: Mutt/1.2.5.1i Reply-To: [EMAIL PROTECTED] This release improves reliability for clients. It's not perfect yet, but I think it's better. Let me know if it breaks something. tarball: http://tor.freehaven.net/dist/tor-0.0.9rc6.tar.gz signature: http://tor.freehaven.net/dist/tor-0.0.9rc6.tar.gz.asc win32 exe: http://tor.freehaven.net/dist/tor-0.0.9rc6-win32.exe win32 sig: http://tor.freehaven.net/dist/tor-0.0.9rc6-win32.exe.asc (use -dPr tor-0_0_9rc6 if you want to check out from cvs) o Bugfixes on 0.0.9pre: - Clean up some more integer underflow opportunities (not exploitable we think). - While hibernating, hup should not regrow our listeners. - Send an end to the streams we close when we hibernate, rather than just chopping them off. - React to eof immediately on non-open edge connections. o Bugfixes on 0.0.8.1: - Calculate timeout for waiting for a connected cell from the time we sent the begin cell, not from the time the stream started. If it took a long time to establish the circuit, we would time out right after sending the begin cell. - Fix router_compare_addr_to_addr_policy: it was not treating a port of * as always matching, so we were picking reject *:* nodes as exit nodes too. Oops. o Features: - New circuit building strategy: keep a list of ports that we've used in the past 6 hours, and always try to have 2 circuits open or on the way that will handle each such port. Seed us with port 80 so web users won't complain that Tor is slow to start up. - Make kill -USR1 dump more useful stats about circuits. - When warning about retrying or giving up, print the address, so the user knows which one it's talking about. - If you haven't used a clean circuit in an hour, throw it away, just to be on the safe side. (This means after 6 hours a totally unused Tor client will have no circuits open.) - End forwarded message - -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBM: 48.07078, 11.61144http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net pgp73pyYKl1bb.pgp Description: PGP signature
Re: Michael Riconosciuto, PROMIS
Bill Stewart shrieb: There are several different issues related to PROMIS Thanks for your comments. But what about the person Michael Riconosciuto? I did some searches online and I got the feeling that a lot people see him as an extremely intelligent person, a one-in-a-million type of person, being involved and on the front line with such diverse areas as human intelligence, weapons, electronics, computers, cryptography, bio-warfare etc. It's stated online that he has warned US about several terrorist attacks before they ocurred, including but not limited to the al-qaeda attacks. Is this somewhat related to him being jailed? Can he verify that US didn't act on alerts in ways so sensitive that the government simply cannot afford to let him speak up? Does he know things relating to US wanting some wars that the public simply cannot be told? I think I read somewhere that people from NSA or CIA thought of him as simply put a genius. Is it likely that he as such a genius is simply too dangerous for his own good when he decided to speak the truth and that the government is actively trying to shut him down and indirectly speed up his death by denying him medical care for his illness? Why did he come clean and sign the affidavit? He himself stated that he though he risked being killed or harmed in various ways if he went through with it. And indeed, just a week or two afterwards he got arrested! Smells like a government retaliation, set-up and cover-up if I ever saw one! This is almost to good for even Hollywood! There are many interesting questions here. Keep in mind that not all of us were around and active with intelligence/computers/cryptography 10-20 years ago. John Young: Does Cryptome hold any interesting documents involving this case?
Re: Word Of the Subgenius...
From: Tyler Durden [EMAIL PROTECTED] Sent: Dec 4, 2004 8:33 PM To: [EMAIL PROTECTED] Subject: Word Of the Subgenius... I thought JR Bob Dobbs got beamed up to that comet with those LA Koolaid kooks... No, but I do believe the comet kooks engaged in bobbitization (or perhaps, merely bobbing). -TD --John
RE: Word Of the Subgenius...
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Neil Johnson Sent: Sunday, December 05, 2004 9:06 AM To: R.W. (Bob) Erickson Cc: Steve Furlong; [EMAIL PROTECTED] Subject: Re: Word Of the Subgenius... On Sun, 2004-12-05 at 08:46 -0500, R.W. (Bob) Erickson wrote: To be bobbed is never the goal, but bobless fear steers the undifferentiated bob along conventional paths, to the abattoir Where is Tim May when when you need him? :-) Try scruz.general. Peter
Word play bobs the literal minded
John Kelsey wrote: From: Tyler Durden [EMAIL PROTECTED] Sent: Dec 4, 2004 8:33 PM To: [EMAIL PROTECTED] Subject: Word Of the Subgenius... I thought JR Bob Dobbs got beamed up to that comet with those LA Koolaid kooks... No, but I do believe the comet kooks engaged in bobbitization (or perhaps, merely bobbing). -TD --John Word Play is disrespectful to the literal minded who dont appreciate having their self-bobbing exposed. Unauthorized decryption of motives and intentions must be outlawed. The right to privacy and ignorance is paramount.
Get Rid of Garbage Emails.
---Click Stop Spam Once and for all! Eliminates porn too! Want out of our database? Do not reply to this email. Copy and paste this link into your browser - blocjunk.com/rmm.htm Computer Technologies 848 N. Rainbow Blvd. #316Las Vegas, NV 89107 frederictoncofactordustysaskatchewanpigtailsunshinybrlynchburgoctillionblondthailandcopywriterdigressionfissurebrjarvinmousebradibidbernardowatchfulbrcrumblekowalskiGkEfdpkrumBcmCpnqDrmCrblUiarrheniuskafkabrcystalgapoiinhumancasherlockdaccabrburntflexuralsuperlunarywifebesetcapaciousbrwedgeswumimpassablecockleburmitchelllast /font/p stop.gif
Get Rid of Garbage Emails.
---Click Stop Spam Once and for all! Eliminates porn too! Want out of our database? Do not reply to this email. Copy and paste this link into your browser - blocjunk.com/rmm.htm Computer Technologies 848 N. Rainbow Blvd. #316Las Vegas, NV 89107 byrneassimilablemaraudbradleyearthysovereignbrgrandfatherhessestrivebalfourshakodeclaratorpalatebrextemporaneoustamalegustavebuzzjoyfulkittenishbrprontoautumnGkEsqtdlobdxfizBpzCdbeDfzCfoyUivarnishcigarbrvenerateevencreamerycasserolesiltboughtsonicbrbrochureadriennesleekbarnbombastelmirabrwilkinsgulljawbonecleavebustlegreater /font/p stop.gif
Incoming Request cpunks (response)
Hey cpunks, Live Online Camchatter! ID: Katherine261 Age: 24 Measurement: 36 28 36 Status: Married Fantasy: [EMAIL PROTECTED] off a complete stranger, and sw*low his load. Favorite sex*al position: Licking Di%k To accept this invitation and register for your account, visit http://www.ezchi.com/gen_ads/gen_mail.php?grid=80ape=gt4211 Don't want any more? http://www.ezchi.com/nomoremail
Re: Word Of the Subgenius...
--- Tyler Durden [EMAIL PROTECTED] wrote: Bonus question: Who is the author of the origin question that inspired the copycats? Well, I remember May posting it but I don't think he was the ultimate author. I suspect whoever posted it recently in fact dug it out of the archives and re-posted it, a particularly lame maneuver if so. Wrong. The origin quote is Who is Socrates, now that we need him written by Richard Mitchell as the title of chapter one in The Gift of Fire. Mitchell may have cribbed the line from another source, but in this context it is the origin quote. Ms. Harsh is in posession of the original physical vector, having stolen it, but only the spooks will be unofficially aware of that facet of the context. Any non-spook readers (if any) can identify the copycats as spooks by virtue of their use of mutations from the original. The source is rare enough that it is highly unlikely that anyone outside of English academia would happen to bring it up of his own accord in 'casual' conversation. Google is, indeed, your friend in this matter. OR...perhaps ole' May is gettin' a little lonely out there! I doubt it. May has his gun collection for company. Regards, Steve __ Post your free ad now! http://personals.yahoo.ca
Welcome to Hollywood.
Whats News * * * Piece Of Hollywood Is Being Released To The Public on Monday Morning! Commanche Properties Inc - (CMCH.OTC) - Multi-million dollar producer of commercially marketable and high quality entertainment products that provides short term return on capital and long term residual income for partners and investors. Using their more than 75 years of combined experience in the entertainment industry and their big business smarts, CMCH is producing the Hollywood extravaganzas lending not only to the creative side, but also the business side of films. Scroll down to see their Credits and Scores. Why Analysts Recommend CMCH Summary Commanche Properties, Inc.s (CMCH.OTC) mission is to develop and produce commercially marketable, high quality entertainment products that will provide short term return on capital and long term residual income to their partners. CMCH strives to manufacture films that promote viewers thoughts and feelings as well as entertainment. CMCH is fully operational and can produce and promote any size show and almost any size film budget. CMCH welcomes the opportunity to bring the finest productions to audiences worldwide. CMCH will produce, exhibit and release entertainment in all media formats. The expertise of the CMCH staff ranges over 75 years in the entertainment business. Anthony Tarantola has been in the entertainment business for his entire adult life. His expertise has varied from acting, directing movies, managing entertainers to his most recent Endeavor, Movie Productions. Anthony has worked internationally and domestically during his tenure and is educated in all aspects of the film making process. Anthony has also served as a Line Producer, Unit Production Manager and First Assistant Director, which affords him a greater foundational knowledge and experience for productions. Michael Ronga, Treasurer: Mr. Ronga has over twelve years of expansive accounting experience. Responsibilities included serving as acting CFO for startup companies, strategic planning, infrastructure formation, investment structuring and business development. Upon completion of the current film production, Aztec-Eagles, Michael will implement the sales, marketing and distribution campaign. Joanne Tarantola, Chief Executive Officer: Ms. Tarantola joined Commanche Properties in 1991 with over eight years of expansive accounting experience where she specialized in technology, communications and entertainment. Joanne's current responsibilities include forming corporate infrastructure, strategic planning, investment structuring and business development. Credits and Scores Bonanno: A Godfather's Story (Motion Picture) 1999 Directed by: Michael Poulette Cast includes but not limited to Martin Landau, Costas Mandylor, and Edward James Olmos Bound by Honor (Motion Picture) 1993 Directed By Taylor Hackford Cast includes but not limited to Benjamin Bratt from Law and Order and Clear and Present Danger, Billy Bob Thornton from Armageddon, Sling Blade, and many other Blockbuster hits., Damian Chapa from The Rockford Files, Delroy Lindo from The Last Castle, Gone in 60 Seconds, and Romeo Must Die Honor Thy Father (Motion Picture) 1973 Directed by Paul Wendkos Based on the bestseller book by Gay Talese Cast includes but not limited to Critically acclaimed Joseph Bologna and Richard Castellano A Man of Honor: The Autobiography of Joseph Bonanno By: Joseph Bonanno and Sergio Lalli Published by: New York's Simon and Schuster, 1983. National Best Seller's List In PreProduction Pipe Dreams is a very intriguing action packed film staging from the Memorable 1980s in New York City. The twists and turns of the lives of two young Jewish Boys, who find adversity at such a young age now travel down a dark road that they now see as paved with Fame and Fortune. Ashtabula Moon, a feature film displaying the end of the Big 80s exhibiting the last gasp of Rock Before Grunge. How do the lives of an Aging Rock star, a Newly Agitated Divorced Mother, a Young Catholic School Girl, and a Mother Superior Nun School Principle all come together, what a twist? Disclaimer and Disclosure Statement Certain statements contained in this news release may be forward-looking statements within the meaning of The Private Securities Litigation Reform Act of 1995. These statements may be identified by such terms as expect, believe, may, will, and intend or similar terms. We are NOT a registered investment advisor or a broker dealer. This is NOT an offer to buy or sell securities. This is for information purposes only. No recommendation that the securities of the companies profiled should be purchased, sold or held by individuals or entities that learn of the profiled companies. Investing in companies profiled is high-risk securities may result in the loss of your entire investment. Factual statements are made as
Re: Michael Riconosciuto, PROMIS
--- Neil Johnson [EMAIL PROTECTED] wrote: On Sun, 2004-12-05 at 20:58 -0500, Steve Thompson wrote: [PROMIS] Yes, I have found that puzzling too. Articles I have read refer to the original version being in the public domain. You'd think the source code would be out there somewhere. If that's true, then the government couldn't have stolen it. However, I suspect that mainfraim code of any sophistication is rarely released into the public domain. I imagine the author would be able to clear that up, assuming he has no financial reason to falsify its history. The least Tin Foil Hat (TM) version of the story I found is at Wired http://www.wired.com/wired/archive/1.01/inslaw.html Which gives this description: Designed as case-management software for federal prosecutors, PROMIS has the ability to combine disparate databases, and to track people by their involvement with the legal system. Hamilton and others now claim that the DOJ has modified PROMIS to monitor intelligence operations, agents and targets, instead of legal cases. Interesting. I find the claims made about this software (it's ability to reconcile data from many different sources automagically ) pretty vague and frankly, a little far fetched, based on what I know about software, databases, etc. No kidding. Databases are _hard_ to write efficiently, let alone to arbitrarily integrate. (And that's not even including the modifications supposedly made to install a TEMPEST back door in later versions). Perhaps I am stupid. I don't know how one would go about modifying application software to include a 'back door' that would presumably enhance its suceptibility to TEMPEST attacks. Isn't tempest all about EM spectrum signal detection and capture? Regards, Steve __ Post your free ad now! http://personals.yahoo.ca
KMSI December Newsletter
Title: KMSI December Newsletter KMSI December NewsletterDear list member,As we approach the end of 2004, our management team feels the energy in the marketplace increasing considerably. Our client list has grown substantially, having added several new Fortune 1,000 companies, and three significant associations to our client list over the past month. We have significantly expanded our management team and organized our staff into three regional operations in order to provide localized support to our clients and increase the spectrum of our consulting, content development and support services. KMSI Releases KMx Version 3.1At KMSI we take pride in listening to our clients and we prioritize our development initiatives to meet their needs. Over the next few weeks each of our clients will be introduced to the new functionality KMx Version 3.1 and receive support to accomplish the upgrade. Each year we have provided a major release of the KMx platform to our clients and each new release has significantly increased the tremendous capabilities of our platform. A few of the enhanced features now available in KMx Version 3.1 include: - The evaluation and testing system now includes fill-in-the-blank questions - The eCommerce system now provides a robust capability to define pricing based on user attributes - The course development system now provides advanced sequencing and navigation, expanded pre-requisite management and customization of the course delivery environment - The certification management system now provides the creation and management of multi-level certification and certificate programs - The class management system now provides an enhanced attendance verification capability for the issuance of certificates or continuing education units - The course catalog system now provides for anonymous catalog browsing prior to system log-on - The class management system now provides for advanced waitlist functionality, automated reminders and self cancellation features - The student interface now provides additional options for customization of screen and data elements and a new Activities Summary. Click here for more informationKMx Client Success Story of the MonthA Major Multinational Automotive Manufacturing company needed to insure that manufacturing persons were properly trained on some very definite manufacturing practices. In fact, as part of their ISO 9000 certification these manufacturing practices (of which there were over 3000 total) needed to be reviewed every six months, and a process needed that would allow verification that the manufacturing practice for a given persons task was read and understood by that person. Using KMx, at two different locations in two different countries, this Automotive Manufacturer quickly and easily converted existing documents, procedures and other materials for online delivery, combined them with actual video footage from the line and created traceable eLearning modules along with course completion tests. Now they have verifiable evidence that each person has gone through their own required material, evidence of what they saw, and how long it took them on each part, plus the documentation of knowledge gained through tracked testing.Click here for more informationNew Voice Over IP (VOIP) Technology PartnerKMSI recently entered into an agreement with Voxwire to offer enhanced virtual meeting room capabilities to our customers. Voxwire MeetingRoom is an unlimited computer-to-computer web conferencing application that allows people to talk to each other, send text-messages, and see the same website or other presentation on their screens from anywhere in the world. Voxwire can be used for private communication or with large groups of participants and allows two-way communications in the classroom using VOIP technology. This capability adds to the already industry leading collaboration options and virtual classroom functionality offered with KMx. Click here for more informationNew Vice President of Operations - Eastern United StatesKMSI is pleased to announce that Brett Wilson has joined the company to support our KMx platform clients and lead our professional services activities in the Eastern U.S. and Canada. Brett brings more than 20 years of experience in training development and training and education management. Before joining KMSI, he was Vice President of Services and Operations at subsidiary companies of Sylvan Learning Systems and the Educational Testing Service. Brett was formally Vice President of Operations at Carney Interactive and held various senior assignments at General Physics Corporation. He is a U.S. Navy veteran and holds a B.S. in Education.Click here for more informationHave a Wonderful Holiday Season and a Prosperous New YearTo all of our customers, partners, colleagues, friends and supporters, we wish you the happiest holiday season and a very special new year. Thank you all for a great 2004. We look forward to meeting and
Re: Michael Riconosciuto, PROMIS
Cryptome hosts a 2000 book excerpt on PROMIS as allegedly used by Mossad, though not much about the technical details of the program: http://cryptome.org/promis-mossad.htm The file has links to other information on Riconosciuto offered by Orlin Grabbe, a long-time supporter of Riconosciuto. Back then we telephoned Hamilton about his DoJ travails and he politely refused to discuss the topic. A TEMPEST backdoor in PROMIS would be interesting for what it would take configure code to emit identifiable signals. Code emits signals, as does any transmission, but not easily identifiable or correlatable with the code, but perhaps it can be done. Capabilities and sensitivity of interception is a dark world, as was TEMPEST in its early years. Now what passes for knowledge about TEMPEST is hardly all there is to know. Indeed, some think that most of the information about the technolody now in the public domain is disinfo. The TEMPEST material released under FOI to Cryptome some years ago should be seen as part of the camouflage about what's now being done in EM interception, analysis, tracking, and not least, smoke blowing. PROMIS is sufficiently old, if not a hoary horse, that it could be used now to honey-pot eager buyers to induce trust where it's not to be found, following the lead of Bill Gates, if not floater Robert Maxwell. Intel has come a long way since the lazy days of the Cold War when agent double-crossing and the inside US/USSR mil-joke-con of Mutually Assured Destruction was all to worry about.
Top Gun Recruiting Manager Needed
Dahl Consulting is working with a large NJ based firm, 50 miles west of Manahattan, to identify a Recruiting Manager with expertise in corporate staffing. Considering the current economy, we would like you to forward this opportunity on to any peers that you may have that are looking for their next position. If you or any of our peers have the passion and the skill set to grow with an industry leader and want to make a substantial impact please email a MS Word Resume to [EMAIL PROTECTED] We ask you for the following: 1. Forward this email on to your peers to increase awareness of this position. 2. Contact our office or email me if you know someone that is qualified for this position. 3. Because of today's tremendous industry pace we ask you to act immediately to increase our success. Position Summary This person will drive the staffing strategy to attain top professional to executive level talent. This role will become fully engaged with leadership throughout the company while executing strategies designed to identify and acquire talent into the organization. He/she will have excellent account management skills and the ability to coach Senior Level Executives on the recruitment and interview process. Responsibilities 1. Accountabilities include leading the development of on-going creative and cost effective sourcing strategies for various job families. 2. Mentor/Coach/Consult with managers throughout the hiring process. 3. Develop, drive and execute comprehensive search strategies which are geared at building key competitive research, industry profile development, networking and direct sourcing. 4. Continually replenish the candidate pipeline with top talent based on hiring needs, market conditions, and current/projected business goals. 5. Develop and implement best practices in recruiting processes. 6. Design workforce planning methodology and tools that would be used with business leaders. 7. Present talent acquisitions updates at team meetings and continually develop new recruiting strategies based on current and future needs. Requirements 1. Deep understanding of talent acquisition and its relationship to talent management internally within a large corporate environment. 2. 10-12 years of professional recruiting experience. 3. Minimum of 5 years experience in sourcing high-level talent. 4. A high level of enthusiasm for acquiring talent to build a high performing business 5. Personal sense of urgency and capacity to overcome obstacles. 6. Knowledge of and experience with a wide range of recruiting tools and web-based recruiting technologies. 7. Proven ability to Educate/train Hiring Managers on recruiting processes. 8. Ability to attain internal expertise of the profile and map to external marketplace to reach targeted audience. 9. Proven ability to act in a enterprise-wide leadership role. 10. Demonstrated success in executive relationship management. 11. Ability to understand, articulate and sell the culture and business initiatives. 12. Effective Oral and Written communication skills including high competencies in strategic thinking, analytical abilities, organizational skills and communication/interpersonal skills. 13. Must have the ability to deliver results with little supervision and will effectively mange multiple activities effectively 14. Bachelors Degree in HR, Business or related field 15. Ability to meet standard recruitment measurements of success including annual hiring plans, diversity goals, client satisfaction, and cost/time to hire standards 16. Proficiency in Microsoft Office applications This email sent by: Dahl Consulting www.dahlconsulting.com 1959 Sloan Place Saint Paul , MN 55116 USA If you wish to unsubscribe email address [EMAIL PROTECTED] please click on the following URL: http://www.relevanttools.com/eis-cgi-bin/u?c=3416,8315[EMAIL PROTECTED] This email powered by Relevant Tools at http://www.RelevantTools.com If you have any problems unsubscribing or wish to report an unsolicited email, please see: http://www.RelevantTools.com/contact_email.html
avogadro
Hi, this is Christine replying back. I think you were referred by a friend of the website. Are you new to dating housewives? They are some pretty hot girls in there but I'd like to show you what I'm about on my webcam first. I live in within your area code so maybe we could hook up after as well. Anyways, hope to hear from you soon... http://www.santac1aus.com/ora/enter.php Kisses, Christine :-)
Re: Word Of the Subgenius...
--- Steve Thompson [EMAIL PROTECTED] wrote: --- Tyler Durden [EMAIL PROTECTED] wrote: Bonus question: Who is the author of the origin question that inspired the copycats? Well, I remember May posting it but I don't think he was the ultimate author. I suspect whoever posted it recently in fact dug it out of the archives and re-posted it, a particularly lame maneuver if so. Wrong. The origin quote is Who is Socrates, now that we need him written by Richard Mitchell as the title of chapter one in The Gift of Fire. Mitchell may have cribbed the line from another source, but in this context it is the origin quote. Ms. Harsh is in posession of the original physical vector, having stolen it, but only the spooks will be unofficially aware of that facet of the context. On further reflection, I think it is necessary to go out on a limb and suggest a correction to my comment above. I verified the original quotation from a quick google search. That was probably not enough. My recollection suggests that the original quote should be where is Socrates now that we need him. I rather suspect that the people who 0wn the upstream pipe from my points of access are toying with their ability to interpose their data in place of quasi-authoritative texts. I cannot consult the physical document owing to the fact that its rarity is such that there are no copies available at either the Metro Central Reference Library, and I have no access to the stacks at the University of Toronto Robarts library. Someone who does may consult the book themselves with its call number: B72 .M55 1987. Further, Ms. Harsh may be said to posess the probable physical vector. I cannot say what level of participation she has had in this travesty owing to the fact that after she perjured herself in court in 2001, she has entirely avoided using her actual identity online. However, she could answer the question with her copy of the book in principle if there were any way to compel her testimony. It is possible that the quote is being used as a source by online spooks by virtue of the text's presence in their funky everything database. Any way you look at it, the phrase tax money well spent would seem to apply here. Regards, Steve __ Post your free ad now! http://personals.yahoo.ca
Kerik, Homeland Security Czar - Scathing article from The Register
The Register has a really friendly article about Kerik, Giuliani's buddy who's proposed for Homeland Security Czar. (El Reg is primarily an online technology newswire, but they do comment on other issues, especially if they have technical aspects - they especially rag on the UK's Home Secretary Blunkett's National ID Card proposals.) http://www.theregister.com/2004/12/06/kerik_homeland_security_secretary/ High-school drop-out to become Homeland Security Czar By Thomas C Greene Published Monday 6th December 2004 11:07 GMT President George W. Bush has nominated former New York City Police Commissioner Bernard Kerik to replace Tom Ridge as Homeland Security Secretary, marking a significant departure from his tendency to choose educated, Patrician types for his Cabinet. Kerik, a high-school drop-out abandoned at age four by his prostitute mother in the gritty town of Patterson, New Jersey, served as an Army MP in South Korea, and later worked in private international security rackets, most interestingly in Saudi Arabia. He joined the New York City Police Department in 1985. He followed that with a stint as Warden of the Passaic County Jail in New Jersey, and became the Training Officer and Commander of the Special Weapons and Operations Units. In 1998 he was named New York Corrections Commissioner, and established an ironclad, head-cracking discipline in the City's notorious detention facilities. A favorite of former New York Mayor Rudolph Giuliani, Kerik had the honor of seeing the Manhattan Detention Complex, known to locals as the Tombs, re-named the Bernard B. Kerik Complex by then-mayor Giuliani. Kerik left a minor cloud of corruption behind, with allegations that one of his lieutenants used correctional staff to work illegally in Republican campaigns. In 2000, Giuliani named Kerik Police Commissioner, to assist him in a vast anti-crime crackdown, where the chief tactic was for police to pounce aggressively on even the most chickenshit offences, such as spitting on the sidewalk. Upon his retirement from City politics, Giuliani decided to cash in on post-9/11 security hysteria by founding his own security outfit, Giuliani Partners LLC. Kerik has served as senior vice president at Giuliani Partners, and CEO of Giuliani-Kerik LLC, a vendor of law-enforcement performance systems. Meanwhile, Giuliani has founded several spin-offs, such as Giuliani Capital Advisors LLC, and the Rudolph W. Giuliani Advanced Security Centers (ASC), a cyber-security outfit formed in connection with Ernst Young. Recently, Kerik shipped out to Iraq to train the local policemen who are routinely blown to pieces by insurgents and terrorists. There, he enjoyed the snappy titles of Interim Minister of the Interior, and Senior Policy Advisor to the US Presidential Envoy to Iraq's Coalition Provisional Authority. Kerik lasted only four months, and the Iraqi police are still as incompetent, weak, and corrupt as when he arrived in country. Kerik began making his transition from local to national politics by campaigning for President Bush's re-election, alongside his political patron and business partner, Rudy Giuliani. Kerik has been a devoted booster of the so-called Patriot Act, having given several speeches in its support while campaigning for Bush. In anticipation of his rise to national office, Kerik recently sold his $5.8m in shares of Taser International, makers of absolutely safe police stun guns that are now routinely used against old women and children. He is expected to be confirmed by the Senate without difficulty. ®
Groups Probe FBI Spying in 'War on Terror'
http://www.ipsnews.net/print.asp?idnews=26542 Inter Press Service News Agency POLITICS-U.S.: Groups Probe FBI Spying in 'War on Terror' William Fisher* U.S. civil rights groups have filed multiple freedom of information requests around the country to uncover evidence that the Federal Bureau of Investigation (FBI) and local police are spying on political, environmental and faith-based groups in the name of fighting terrorism. The Freedom of Information Act (FOIA) requests were filed in 10 states and the District of Columbia (DC) seeking details on the FBI's use of Joint Terrorism Task Forces (JTTFs) and local police to engage in political surveillance. JTTFs are legal partnerships between the FBI and local police, in which police officers are deputised as federal agents and work with the agency to identify and monitor individuals and groups. Filed by the American Civil Liberties Union (ACLU) and the American-Arab Anti-Discrimination Committee (ADC), the FOIAs seek FBI files of groups and individuals targeted for speaking out or practising their faith, as well as information on how the practices and funding structure of the JTTFs are encouraging rampant and unwarranted spying. Our goal in this is to learn to the greatest extent possible how much the FBI is using JTTFs and their guidelines to infiltrate these groups, ACLU attorney Ben Wizner told IPS. One of the FOIA requests names organisations such as anti-war group United for Peace and Justice, Greenpeace, Code Pink, a women-initiated peace and justice group, and the American-Arab Anti-Discrimination Committee, which might have been monitored by the task forces. According to Wizner, after the terrorist attacks of Sep. 11, 2001 sparked the Bush administration's war on terrorism, Attorney General John Ashcroft scrapped an FBI guideline -- enacted after the agency infiltrated numerous groups during the 1960s and 1970s civil rights movement -- that blocked its agents from spying on groups and individuals unless they were investigating a crime. By scrapping that policy Ashcroft was, essentially encouraging FBI agents to do fishing expeditions to spy in mosques, in anti-war meetings ... without any reasonable suspicion that a crime was being committed, added Wizner. ADC President Mary Rose Oakar said her group supports all efforts to keep our country safe and we want law enforcement to protect us from real terrorists and criminals. However, targeting Arabs and Muslims on the basis of national origin and religion, sending undercover agents to anti-war meetings, and infiltrating student groups is not making us any safer. The FBI should not be wasting its time and our tax dollars spying on groups that are critical of certain government actions, added the leader of the Washington, DC-based non-profit group, in a statement. Earlier this year reports emerged that JTTFs had visited activists around the country to ask about their plans for August's meeting of the Republican National Committee (RNC) in New York. The committee officially nominated President George W Bush to run in the Nov. 2 election. ''We hadn't even been following (news of the RNC); I didn't even know when it was going to happen, activist Sarah Bardwell told IPS after being visited by four FBI agents and two police officers at her Denver home. I think (the FBI is) basically just justifying violating people's first amendment rights (of freedom of religion, speech and assembly),'' she added. In a statement in August, FBI Assistant Director Cassandra M Chandler responded that the agency ''is not monitoring groups or interviewing individuals unless we receive intelligence that such individuals or groups may be planning violent and disruptive criminal activity or have knowledge of such activity.'' ''The F.B.I. conducted interviews, within the bounds of the U.S. Constitution, in order to determine the validity of the threat information,'' she added. Since the 9/11 attacks, the FBI -- part of the U.S. Department of Justice (DOJ) -- has vastly stepped up its monitoring and surveillance of individuals and groups it considers suspicious. It and other law enforcement agencies have also been given greatly increased authority under the USA Patriot Act, which was hurriedly enacted and signed into law soon after the attacks. The law permits agencies to conduct sneak and peak wiretaps and other forms of surveillance without immediate notification to the target. The JTTFs, however, existed prior to 9/11. Groups representing Arab and Muslim-Americans are confused by what appear to be conflicting signals from the Bush administration. The government claims to be making serious efforts to build bridges to the constituencies, but simultaneously continues to practise discrimination and harassment. The U.S. Civil Rights Commission, a bi-partisan government agency, recently reported widespread evidence of racial profiling against Arab and Muslim-Americans by the Department of Homeland
Certicom Extends Security Platform, Enabling Developers to Address Government Market
http://www.prnewswire.com/cgi-bin/stories.pl?ACCT=109STORY=/www/story/12-06-2004/0002584252EDATE= Certicom Extends Security Platform, Enabling Developers to Address Government Market Certicom Security Architecture for Government provides integrated suite of security toolkits that ensure critical FIPS 140-2 and ECC compliance MISSISSAUGA, ON, Dec. 6 /PRNewswire-FirstCall/ - Certicom Corp. (TSX: CIC), the authority for strong, efficient cryptography, has extended its Certicom Security Architecture(TM), enabling developers to embed a FIPS 140-2-validated cryptographic module into their products and be eligible for sale into the federal government market. The Certicom Security Architecture also provides developers with an efficient way to enhance new and existing applications with elliptic curve cryptography (ECC) and meet the field-of-use guidelines set out by the National Security Agency (NSA) to protect mission-critical national security information. The adoption of ECC within the U.S. federal government is proceeding rapidly, and Certicom is taking a leadership role in enabling agencies and government contractors to integrate the strongest security technology into their products. The comprehensive Certicom Security Architecture provides a bridge between legacy crypto systems and ECC, and gives developers the flexibility to standardize code among different security environments and platforms - maximizing code re-use and portability. This flexibility also means developers will not need to redesign their solutions to meet future government crypto requirements. Hardware and software developers are increasingly realizing that compliance with regulatory requirements for security is a pressing concern, said Dr. Jerry Krasner, vice president and chief analyst at Embedded Market Forecasters (http://www.embeddedforecast.com ), the premier market intelligence and advisory firm in the embedded technology industry. A cost-effective approach is to use a tool that ensures compliance with FIPS 140-2 requirements and eliminates the potentially costly step of third-party FIPS validation of a device or application. Strong security is a key requirement across all networked applications and devices. The Certicom Security Architecture allows developers who may have little security expertise to add FIPS 140-2 validated security to their solutions while avoiding the time and expense of the FIPS 140-2 validation process. A common application programming interface (API) unifies Certicom's proven developer toolkits to create a plug-and-play security architecture that includes higher level protocol functionality that can operate in FIPS mode, such as SSL and PKI. Certicom Security Architecture for Government makes it easy for OEMs, ISVs and integrators to sell products into the government sector that meet strict government security requirements, including FIPS 140-2 and ECC, said Roy Pereira, vice-president, marketing and product management at Certicom. The National Security Agency is committed to making elliptic curve cryptography the most widely used public-key cryptosystem for securing U.S. government information. Certicom is committed to providing the technology and tools to make that possible. The Security Builder developer toolkits integrated into the Certicom Security Architecture for Government include: - Security Builder(R) GSE(TM), a FIPS 140-2-validated cryptographic toolkit; - Security Builder(R) NSE(TM), a cryptographic toolkit for national security information; - Security Builder(R) Crypto(TM), a cross-platform cryptographic toolkit; - Security Builder(R) PKI(TM), a digital certificate management toolkit; - Security Builder(R) SSL(TM), a complete Secure Sockets Layer toolkit; and - Security Builder(R) IPSec(TM), a client-side virtual private network toolkit. Certicom Security Architecture for Government is available immediately, except for Security Builder NSE which is available in Q1 2005. For more information, visit http://www.certicom.com/gov . About Certicom Certicom Corp. (TSX:CIC) is the authority for strong, efficient cryptography required by software vendors and device manufacturers to embed security into their products. Adopted by the U.S. government's National Security Agency (NSA), Certicom technologies for Elliptic Curve Cryptography (ECC) provide the most security per bit of any known public-key scheme, making it ideal for resource-constrained environments. Certicom products and services are currently licensed to more than 300 customers including Motorola, Oracle, Research In Motion, Terayon, Texas Instruments and Unisys. Founded in 1985, Certicom is headquartered in Mississauga, ON, Canada, with offices in Ottawa, ON; Reston, VA; San Mateo, CA; and London, England. Visit http://www.certicom.com . Certicom, Certicom Security Architecture, Certicom CodeSign,
Re: Word Of the Subgenius...
At 3:34 PM -0500 12/6/04, Steve Thompson wrote: I rather suspect that the people who 0wn the upstream pipe from my points of access are toying with their ability to interpose their data in place of quasi-authoritative texts. Oh, *my*... Where is Detweiller, now that we need him? ;-) Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
we are opening a call center this month, we need:
Can you help us find: 1. Sales Lists for a National Card program. (All 50 States) 2. Telemarketing Software or Predictive Dialer 3. Long Distance service for 50 stations 4. We are also in need a call center or 2 that would work for $25.00 per hour per station. Outbound Only If you can refer us to another company for any of these requirements we have, we will pay you for every referral that works out. Guaranteed We await your response David Superior Marketing [EMAIL PROTECTED]
Need a job? Get a card - arresting ID pitch to business
http://www.theregister.co.uk/2004/12/03/business_immigrant_checks/print.html The Register Biting the hand that feeds IT The Register » Internet and Law » Digital Rights/Digital Wrongs » Original URL: http://www.theregister.co.uk/2004/12/03/business_immigrant_checks/ Need a job? Get a card - arresting ID pitch to business By John Lettice (john.lettice at theregister.co.uk) Published Friday 3rd December 2004 16:11 GMT Analysis It might not be your Big Brother's Database, but the UK ID scheme has certainly mastered doublespeak. Take, for example, the way it will force businesses to joyfully embrace ID card checks - or else. The Bill's Regulatory Impact Statement tells us that the bill has no provisions which allow the Government to require business, charities or voluntary bodies to make identity checks using the identity cards scheme. And indeed it doesn't. But David Blunkett gave us a taste of what this really means in his speech to the IPPR last month. Referring to the provisions of the 1996 Asylum and Immigration Act which require employers to check that potential employees are eligible for employment (i.e. not illegal immigrants), he noted that clause 8 has been very difficult to implement because employers quite rightly say that they are not an immigration service and they can't easily ascertain whether someone is legally in the country without great difficulty.? Under the Act it is a criminal offence for an employer to fail to make an adequate check, but this particular provision is a difficult one to bring in and to enforce, because employers and their organisations could reasonably protest about cost and about not being an immigration service, and because if the Home Office did prosecute then they'd most likely fail to get a conviction because the employer could claim to have seen a document that looked genuine, and how the blazes were they to know? Well, hello employers, now you are an immigration service. Blunkett continued: The verification process under ID cards would remove that excuse completely and people would know who was entitled to be here and open to pay taxes and NI. So once the scheme exists there's no reason for the Home Office not to enforce clause 8, and employers are going to find using the ID scheme pretty compelling - or else. The Impact Statement suggests the card will be beneficial to employers because it will reduce the cost of compliance with the 1996 Act, and therefore it can be expected that employers will want to use the scheme even in advance of any explicit requirement to use the scheme. Which does rather sound like 'we're not making you use it in the Act, but just not yet.' Note that the extra costs (large) that employers will be saving by using the ID scheme are costs that have been imposed by the Government in turning them into an immigration service under the 1996 Act. As an aside you should also note that recent regulation of employment agencies has imposed a broader requirement for them to check the identities of job applicants - so they're a census bureau as well as an immigration service. Employers don't have to check via the ID scheme, and under the Act it will actually be illegal to insist on such a check prior to cards becoming compulsory, but the scheme would help to enforce the law against unscrupulous employers who would no longer have a defence in claiming they examined an unfamiliar document which appeared genuine to them. And: ...the Government expects that legitimate employers would want to encourage their employees to provide verifiable proof of identity when taking up a job... The scheme allows for records of on-line verification checks to be held, so establishing whether an employer has complied with the law will be more straightforward. Now, that one's very cute indeed. The Home Office is determined that the ID scheme operates via checks to the National Identity Register, rather than simply as a photo ID upgrade that can be checked locally, the main reason for this being that widespread online checking will generate a nationwide network of ID checks that track back to the Home Office. Here it is pointing out that using an online check will protect the employer because the NIR will have an audit trail proving that the check was made, whereas if the employer just looked at the card, we'd only have their word for that, wouldn't we? So we'll just rub it in: Only an on-line check would give an employer the assurance that a record of the check would be held on the National Identity Register and would therefore provide a defence against prosecution. Clearly it's going to be a lot safer to embrace the ID scheme sooner rather than later, but there's one snag here. It will, as the Act specifies, be illegal for an employer to insist on an ID card as proof of identity, so if the applicant insists on using something else then the employer would have to accept it, right? But as not using the ID card would be more expensive and riskier for the
my fiancé is on business trip
Hi, this is Alyssa replying back. You were referred by a friend of the website. Are you new to dating housewives? They'are some pretty hot girls in there but I'd like to show you what I'm about on my webcam first. I live in your area so we could hook up after as well. Anyways, hope to hear from you soon... Kisses, Alyssa:) ps. I have pics available unlike some of the girls. I have nothing to hide ;) www.lonelyworld.biz/spi/date.php
Calendar Creator 9.0 -PayOnly SH!
Calendar Creator
Re: Word Of the Subgenius...
R.A. Hettinga wrote: At 3:34 PM -0500 12/6/04, Steve Thompson wrote: I rather suspect that the people who 0wn the upstream pipe from my points of access are toying with their ability to interpose their data in place of quasi-authoritative texts. Oh, *my*... Where is Detweiller, now that we need him? Huh? I thought that *was* Detweiller! -- Roy M. Silvernail is [EMAIL PROTECTED], and you're not It's just this little chromium switch, here. - TFT SpamAssassin-procmail-/dev/null-bliss http://www.rant-central.com
Re: Retinal Scans, DNA Samples to Return to Fallujah
http://www.boston.com/news/world/articles/2004/12/05/returning_fallujans_will_face_clampdown?mode=PF The Boston Globe US Marines rode in a convoy through Fallujah on Friday. The US military is continuing missions to secure the city. (AFP Photo / Mehdi Fedouach) Returning Fallujans will face clampdown By Anne Barnard, Globe Staff | December 5, 2004 FALLUJAH, Iraq -- The US military is drawing up plans to keep insurgents from regaining control of this battle-scarred city, but returning residents may find that the measures make Fallujah look more like a police state than the democracy they have been promised. Under the plans, troops would funnel Fallujans to so-called citizen processing centers on the outskirts of the city to compile a database of their identities through DNA testing and retina scans. Residents would receive badges displaying their home addresses that they must wear at all times. Buses would ferry them into the city, where cars, the deadliest tool of suicide bombers, would be banned. tcm More useless eaters, in the guise of U.S. soldiers, begging to be be sent up the chimneys by the displaced, denigrated Fallujans. /tcm
Re: Word Of the Subgenius...
On Mon, 2004-12-06 at 17:00, R.A. Hettinga wrote: At 3:34 PM -0500 12/6/04, Steve Thompson wrote: I rather suspect that the people who 0wn the upstream pipe from my points of access are toying with their ability to interpose their data in place of quasi-authoritative texts. Oh, *my*... Where is Detweiller, now that we need him? That was bad enough, but for a real oh my moment, see elsewhere in Thompson's missive: Any way you look at it, the phrase tax money well spent would seem to apply here. I can't think of any way to use that phrase non-sarcastically.
Re: Word Of the Subgenius...
At 8:59 PM -0500 12/6/04, Steve Furlong wrote: Any way you look at it, the phrase tax money well spent would seem to apply here. I can't think of any way to use that phrase non-sarcastically. I can't even parse the *sentence*... :-) Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ...if a person can't communicate, the very least he can do is to shut up. -- Tom Lehrer
MIT Newsletter : system c0mpar1s0n
Time Digital : Results Micr0s0ft,adobe,macromedia and many more! Check out these amazing offers: Micros0ft 0ffice XP Pro 2002 .60 Corel Draw Graphics Suite 11 . 60 Windows XP PrOfessional 2002 .. 50 Adobe Ph0tosh0p 7.0 . 60 full information: http://hyphen.bestsoftshop.biz/ your paypal account Ronnie Painter Saltboiler Eppendorf AG, 22339 Hamburg, Germany Phone: 214-757-1734 Mobile: 371-696-2751 Email: [EMAIL PROTECTED] THIS IS AN AUTO-GENERATED MESSAGE - PLEASE DO NOT REPLY TO THIS MESSAGE This freeware is a 25 minute usage software NOTES: The contents of this e-mail is for usage and should not be scaup ultimate Additional information: http://www.hotbar.com Training Services: http://www.hotbar.com/home adulterate dagger suffix Time: Tue, 07 Dec 2004 05:06:52 +0200
Re: Word Of the Subgenius...
--- R.A. Hettinga [EMAIL PROTECTED] wrote: At 3:34 PM -0500 12/6/04, Steve Thompson wrote: I rather suspect that the people who 0wn the upstream pipe from my points of access are toying with their ability to interpose their data in place of quasi-authoritative texts. Oh, *my*... Come on, tell us what you really think. Anyhow, when I used to post to usenet via google, I experienced a number of incidents in which there were minor changes to the text of articles I wrote and posted. I also regularly noticed people posting messages that were being exempted from the normal posting delay. Articles that arrived at google were subject to a delay of a few hours before their index entries propogated across to the entirety of the index search cluster. Some individuals evidently had acces to the google database such that they were able to put their (suitably Date:ed) articles at the head of the posting queues. The apparent 0wn3rs of the continential US 1nt3rn3t are clearly making sure they have capabilities that they may use to appear as if they are super-3l33t. Why, it wouldn't suprise me if I were to find that some of them are busy playing 'alien' to unsuspecting unsophisticates at this very moment. Actually, it's a little more likely that they are playing you are trapped in the Matrix on the gullible, isn't it. Where is Detweiller, now that we need him? Probably off somewhere consulting in the industry, having tired of the noise and wearied by the futility of hitting on Tim May. I think that I have better taste, personally, and am waiting for the chance to make a pass at Condi. Perhaps after the current presidential term she'll have some time for me. ;-) Is that a sincere emoticon? Regards, Steve __ Post your free ad now! http://personals.yahoo.ca
Re: Word Of the Subgenius...
--- Roy M. Silvernail [EMAIL PROTECTED] wrote: R.A. Hettinga wrote: Oh, *my*... Where is Detweiller, now that we need him? Huh? I thought that *was* Detweiller! Detwellier had an oral fixation, and while I may like a good argument as much as anyone, mere talk about sex never really did it for me. But I confess that I like to watch sometimes. At any rate, Detweiller is another person entirely. But I cannot prove it. Regards, Steve __ Post your free ad now! http://personals.yahoo.ca
Re: Word Of the Subgenius...
At 10:12 PM -0500 12/6/04, Steve Thompson wrote: But I cannot prove it. Tee hee... Plonk! Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: Word Of the Subgenius...
--- R.A. Hettinga [EMAIL PROTECTED] wrote: At 10:12 PM -0500 12/6/04, Steve Thompson wrote: But I cannot prove it. Tee hee... Plonk! This from the guy who took over where Choate left off. Although at least you include the article text instead of simply posting links. I'm not here to be nice and make friends. Regards, Steve __ Post your free ad now! http://personals.yahoo.ca
Cia .-- Lis softtabs without embarrassment List/ID[726813]
Title: solution Check our secure s to .re here Up to 8o% of .f "V .*-iox .-x", "Cia .-- Lis", Generic Vi .- /* agra, X. AN-.- AX, and many more! Fast delivery! with whole s.-al e "p. r-ic *+es! -What you waitin for? get yours now! N. o" C on -.sulta ti -on -No Pr .i .-or Pre .-script i .- on Need .-ed -Hu-. ge Sav in .-gs! See why our "cus-. t o. me .rs" re.--or de r" more than any competitor 0r .- der from us today "Va .-- Liu-¨um" Follow the directions for using this "me -d." provided by your dc. If you do not remember until later, skip the missed "do se" and go back to your regular "do s .ing" schedule. Do not take 2 "do .ses" at once. "Cia .-- Lis" This is taken by mouth as needed 20 minutes before "se x. ual" activity. Take only as directed, usually once each 3 days as needed. "Cia -.* lis" works along with "se .xu- *-a"l stimulation to help achieve an "e -. rec ti .on". The usual dose for most people is 10mg "V .*-iox .-x" is a "non. -ster .-oidal" "anti.- -in ..flam ma t ory" known as a "C O .- X-2" inhibitor used to relie .ve the "s.-. ympt -. oms" of "osteoa .- r thritis" and to treat pa. in and mens tru al discomfort. Generic Vi .- /* agra! This is a pre .script i -on d *- . rug that works by increa.- sing blood flow to the pen .--* is. Once you take it, it can work in as quickly as 30 minutes. It works for 4 hours so you can set your own pace. And, in most patients, it can be taken as often as once a day X. AN-.- AX It is used to treat an .x i *-ety and p .--* anic dis. *order. It may also be used to treat other conditions as determined by your dc. You have si .gn -.ed up to re c .e ive e. m -. ails about our p-. har -m a pro .-du .-ctsfrom this email, request was sub m .it te d from this ip address: 180.71.144.244 To opt out from our mai li .-ng list, please follow this l i-. n-k . QFPYQOEWRHAZSZUCJ
Re: Word Of the Subgenius...
--- Neil Johnson [EMAIL PROTECTED] wrote: On Sun, 2004-12-05 at 08:46 -0500, R.W. (Bob) Erickson wrote: To be bobbed is never the goal, but bobless fear steers the undifferentiated bob along conventional paths, to the abattoir Where is Tim May when when you need him? :-) Tuning the output stage of his useless eater welfare-mutant oven, in all probability. I think he wants to avoid criticisms from the environmentalists by way of making sure his machinery conforms to Kyoto Protocol expectations. Bonus question: Who is the author of the origin question that inspired the copycats? Regards, Steve __ Post your free ad now! http://personals.yahoo.ca
Re: Michael Riconosciuto, PROMIS
On Sun, 2004-12-05 at 20:58 -0500, Steve Thompson wrote: I've only read vague hints and rumours concerning its implicit design philosophy and architecture from the rare instances where it is mentioned at all. Yes, he code is probably classified (blah, blah, blah), but its actual use must reveal its purpose and function to some degree. And sure, we know that feds and other ne'er-do-wells have a bug up their ass about revealing sources and methods (unlike the public, who have no practical option in that regard) so any information that does leak is bound to be sketchy, but surely there must be _some_ accurate data available concerning its nature, especially considering the fact that it has been under development for two or three decades. Yes, I have found that puzzling too. Articles I have read refer to the original version being in the public domain. You'd think the source code would be out there somewhere. The least Tin Foil Hat (TM) version of the story I found is at Wired http://www.wired.com/wired/archive/1.01/inslaw.html Which gives this description: Designed as case-management software for federal prosecutors, PROMIS has the ability to combine disparate databases, and to track people by their involvement with the legal system. Hamilton and others now claim that the DOJ has modified PROMIS to monitor intelligence operations, agents and targets, instead of legal cases. I find the claims made about this software (it's ability to reconcile data from many different sources automagically ) pretty vague and frankly, a little far fetched, based on what I know about software, databases, etc. (And that's not even including the modifications supposedly made to install a TEMPEST back door in later versions). -Neil
Re: Michael Riconosciuto, PROMIS
On Sun, 5 Dec 2004, Steve Thompson wrote: Does anyone here have a good idea of what the PROMIS code actuall does; what its characteristics and capabilities are in terms of its function as an aid to intellegence analysts, logistics technicians, or consultants? At 07:16 PM 12/5/2004, J.A. Terranson wrote: We had a PROMIS system on our 370 something (168?) back in '81 - ran under SPF/TSO [MVS] IIRC? I always assumed the two were loosely related - I believe it was an early and crude relational DB implementation. But who the hell really knows? There are several different issues related to PROMIS 0 - What size tinfoil hat do you need? (It's probably still worth being paranoid about Echelon, but PROMIS is old hat...) 1 - Feds or somebody basically pirated their copy of the software, back when most mainframe software was expensive, and drove the company into bankruptcy rather than pay up, and they spent a lot of effort covering up their ripoff, possibly including the murder of a journalist. 2 - What are the basic capabilities of the software? I think Alif's got it about right, and remember that back in the early 80s, Codd Date had written some really cool theory about how relational databases could and should work, but most computers didn't have the horsepower for them and the early implementations were mostly either crude or bloated. Also, mainframe software tended to be very customized, particularly if it had to interconnect with other mainframe software like somebody else's non-relational database with a different schema. 3 - What sets of data were the various spooks, feds, and staties _keeping_ in their databases, and how much of it did they share with each other or get from various other sources? If you worked with databases back in the early 80s, remember that a gigabyte of disk used to be pretty big, rather than wristwatch-sized, and a megabyte of RAM was big and cost non-trivial amounts of money, and magnetic tapes held less than 200MB and took tens of minutes to read, and big database projects typically required departments of dozens or hundreds of workers to spend months of budgeting and planning to design schemas and processes that could take months to run, instead of being ad-hoc queries any random employee can run on their desktop over lunchtime if they feel like it, and might be able to run on their pocket computer when riding home on the subway. My department's ~1983 VAX had a 1 MIPS CPU, a gig of removable disk, 4MB RAM, and two tape drives, and cost about $400K. It wasn't big iron - that was typically an order of magnitude bigger. These days, $400 will get you a 3000 MIPS CPU, a gig of RAM, and 100-200GB disk, and database software is free. It's about a million times more cost-effective, depending on whether you care more about CPU, disk, or RAM, and there's an Internet hanging out the back side that will let you use Google's farm of ~100K computers for free.
RE: Word Of the Subgenius...
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Neil Johnson Sent: Sunday, December 05, 2004 9:06 AM To: R.W. (Bob) Erickson Cc: Steve Furlong; [EMAIL PROTECTED] Subject: Re: Word Of the Subgenius... On Sun, 2004-12-05 at 08:46 -0500, R.W. (Bob) Erickson wrote: To be bobbed is never the goal, but bobless fear steers the undifferentiated bob along conventional paths, to the abattoir Where is Tim May when when you need him? :-) Try scruz.general. Peter
Re: Michael Riconosciuto, PROMIS
At 6:20 PM +0100 12/5/04, Nomen Nescio wrote: PROMIS Beat that horse, scraped it off the floor, sent it to the glue factory. Seven or Eight times. Musta had kin. However, all you have to do is drop that acronym around here, and, sooner or later, like buzzards to a shitwagon, all the usual suspects will come home to roost. To beat a metaphor like a, heh, dead horse... Cheers, RAH Who goes to Eliot Richardson's old church. When he ran for governor on the republican ticket, the boys from Southie made up a bumpersticker that said Vote for Eliot, he's better than you. :-) -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: Michael Riconosciuto, PROMIS
On Sun, 5 Dec 2004, Steve Thompson wrote: Does anyone here have a good idea of what the PROMIS code actuall does; what its characteristics and capabilities are in terms of its function as an aid to intellegence analysts, logistics technicians, or consultants? We had a PROMIS system on our 370 something (168?) back in '81 - ran under SPF/TSO [MVS] IIRC? I always assumed the two were loosely related - I believe it was an early and crude relational DB implementation. But who the hell really knows? -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95BF Civilization is in a tailspin - everything is backwards, everything is upside down- doctors destroy health, psychiatrists destroy minds, lawyers destroy justice, the major media destroy information, governments destroy freedom and religions destroy spirituality - yet it is claimed to be healthy, just, informed, free and spiritual. We live in a social system whose community, wealth, love and life is derived from alienation, poverty, self-hate and medical murder - yet we tell ourselves that it is biologically and ecologically sustainable. The Bush plan to screen whole US population for mental illness clearly indicates that mental illness starts at the top. Rev Dr Michael Ellner
Word play bobs the literal minded
John Kelsey wrote: From: Tyler Durden [EMAIL PROTECTED] Sent: Dec 4, 2004 8:33 PM To: [EMAIL PROTECTED] Subject: Word Of the Subgenius... I thought JR Bob Dobbs got beamed up to that comet with those LA Koolaid kooks... No, but I do believe the comet kooks engaged in bobbitization (or perhaps, merely bobbing). -TD --John Word Play is disrespectful to the literal minded who dont appreciate having their self-bobbing exposed. Unauthorized decryption of motives and intentions must be outlawed. The right to privacy and ignorance is paramount.
Re: Michael Riconosciuto, PROMIS
--- Nomen Nescio [EMAIL PROTECTED] wrote: I read a few old email messages I had and stumbled over some interesting material relating to NSA, CIA and one Michael Riconosciuto among other things. [PROMIS] Does anyone here have a good idea of what the PROMIS code actuall does; what its characteristics and capabilities are in terms of its function as an aid to intellegence analysts, logistics technicians, or consultants? I've only read vague hints and rumours concerning its implicit design philosophy and architecture from the rare instances where it is mentioned at all. Yes, he code is probably classified (blah, blah, blah), but its actual use must reveal its purpose and function to some degree. And sure, we know that feds and other ne'er-do-wells have a bug up their ass about revealing sources and methods (unlike the public, who have no practical option in that regard) so any information that does leak is bound to be sketchy, but surely there must be _some_ accurate data available concerning its nature, especially considering the fact that it has been under development for two or three decades. Regards, Steve __ Post your free ad now! http://personals.yahoo.ca
Re: Michael Riconosciuto, PROMIS
Bill Stewart shrieb: There are several different issues related to PROMIS Thanks for your comments. But what about the person Michael Riconosciuto? I did some searches online and I got the feeling that a lot people see him as an extremely intelligent person, a one-in-a-million type of person, being involved and on the front line with such diverse areas as human intelligence, weapons, electronics, computers, cryptography, bio-warfare etc. It's stated online that he has warned US about several terrorist attacks before they ocurred, including but not limited to the al-qaeda attacks. Is this somewhat related to him being jailed? Can he verify that US didn't act on alerts in ways so sensitive that the government simply cannot afford to let him speak up? Does he know things relating to US wanting some wars that the public simply cannot be told? I think I read somewhere that people from NSA or CIA thought of him as simply put a genius. Is it likely that he as such a genius is simply too dangerous for his own good when he decided to speak the truth and that the government is actively trying to shut him down and indirectly speed up his death by denying him medical care for his illness? Why did he come clean and sign the affidavit? He himself stated that he though he risked being killed or harmed in various ways if he went through with it. And indeed, just a week or two afterwards he got arrested! Smells like a government retaliation, set-up and cover-up if I ever saw one! This is almost to good for even Hollywood! There are many interesting questions here. Keep in mind that not all of us were around and active with intelligence/computers/cryptography 10-20 years ago. John Young: Does Cryptome hold any interesting documents involving this case?
Re: Word Of the Subgenius...
From: Tyler Durden [EMAIL PROTECTED] Sent: Dec 4, 2004 8:33 PM To: [EMAIL PROTECTED] Subject: Word Of the Subgenius... I thought JR Bob Dobbs got beamed up to that comet with those LA Koolaid kooks... No, but I do believe the comet kooks engaged in bobbitization (or perhaps, merely bobbing). -TD --John
Re: Michael Riconosciuto, PROMIS
At 9:57 PM -0600 12/5/04, Neil Johnson wrote: is that with a staggering 570,000 lines of computer code, Oh, please... Try googling the line-count of any major piece of software, particularly in an age of object-oriented code... Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: Michael Riconosciuto, PROMIS
One the claims I have problems with (from the WIRED article): But the real power of PROMIS, according to Hamilton, is that with a staggering 570,000 lines of computer code, PROMIS can integrate innumerable databases without requiring any reprogramming. If this were true, I can guarantee that there would lots of companies clamoring for it. -Neil
Re: Michael Riconosciuto, PROMIS
On Sun, 5 Dec 2004, R.A. Hettinga wrote: At 9:57 PM -0600 12/5/04, Neil Johnson wrote: is that with a staggering 570,000 lines of computer code, Oh, please... Try googling the line-count of any major piece of software, particularly in an age of object-oriented code... OOP is a fairly recent phenomena when we are talking about code from the '70s you know ;-) In 1980, a half million lines of code was pretty hefty. Cheers, RAH -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95BF Civilization is in a tailspin - everything is backwards, everything is upside down- doctors destroy health, psychiatrists destroy minds, lawyers destroy justice, the major media destroy information, governments destroy freedom and religions destroy spirituality - yet it is claimed to be healthy, just, informed, free and spiritual. We live in a social system whose community, wealth, love and life is derived from alienation, poverty, self-hate and medical murder - yet we tell ourselves that it is biologically and ecologically sustainable. The Bush plan to screen whole US population for mental illness clearly indicates that mental illness starts at the top. Rev Dr Michael Ellner
Re: Word Of the Subgenius...
Bonus question: Who is the author of the origin question that inspired the copycats? Well, I remember May posting it but I don't think he was the ultimate author. I suspect whoever posted it recently in fact dug it out of the archives and re-posted it, a particularly lame maneuver if so. OR...perhaps ole' May is gettin' a little lonely out there! -TD
Re: Michael Riconosciuto, PROMIS
--- Neil Johnson [EMAIL PROTECTED] wrote: On Sun, 2004-12-05 at 20:58 -0500, Steve Thompson wrote: [PROMIS] Yes, I have found that puzzling too. Articles I have read refer to the original version being in the public domain. You'd think the source code would be out there somewhere. If that's true, then the government couldn't have stolen it. However, I suspect that mainfraim code of any sophistication is rarely released into the public domain. I imagine the author would be able to clear that up, assuming he has no financial reason to falsify its history. The least Tin Foil Hat (TM) version of the story I found is at Wired http://www.wired.com/wired/archive/1.01/inslaw.html Which gives this description: Designed as case-management software for federal prosecutors, PROMIS has the ability to combine disparate databases, and to track people by their involvement with the legal system. Hamilton and others now claim that the DOJ has modified PROMIS to monitor intelligence operations, agents and targets, instead of legal cases. Interesting. I find the claims made about this software (it's ability to reconcile data from many different sources automagically ) pretty vague and frankly, a little far fetched, based on what I know about software, databases, etc. No kidding. Databases are _hard_ to write efficiently, let alone to arbitrarily integrate. (And that's not even including the modifications supposedly made to install a TEMPEST back door in later versions). Perhaps I am stupid. I don't know how one would go about modifying application software to include a 'back door' that would presumably enhance its suceptibility to TEMPEST attacks. Isn't tempest all about EM spectrum signal detection and capture? Regards, Steve __ Post your free ad now! http://personals.yahoo.ca
Re: Word Of the Subgenius...
--- Steve Thompson [EMAIL PROTECTED] wrote: --- Tyler Durden [EMAIL PROTECTED] wrote: Bonus question: Who is the author of the origin question that inspired the copycats? Well, I remember May posting it but I don't think he was the ultimate author. I suspect whoever posted it recently in fact dug it out of the archives and re-posted it, a particularly lame maneuver if so. Wrong. The origin quote is Who is Socrates, now that we need him written by Richard Mitchell as the title of chapter one in The Gift of Fire. Mitchell may have cribbed the line from another source, but in this context it is the origin quote. Ms. Harsh is in posession of the original physical vector, having stolen it, but only the spooks will be unofficially aware of that facet of the context. On further reflection, I think it is necessary to go out on a limb and suggest a correction to my comment above. I verified the original quotation from a quick google search. That was probably not enough. My recollection suggests that the original quote should be where is Socrates now that we need him. I rather suspect that the people who 0wn the upstream pipe from my points of access are toying with their ability to interpose their data in place of quasi-authoritative texts. I cannot consult the physical document owing to the fact that its rarity is such that there are no copies available at either the Metro Central Reference Library, and I have no access to the stacks at the University of Toronto Robarts library. Someone who does may consult the book themselves with its call number: B72 .M55 1987. Further, Ms. Harsh may be said to posess the probable physical vector. I cannot say what level of participation she has had in this travesty owing to the fact that after she perjured herself in court in 2001, she has entirely avoided using her actual identity online. However, she could answer the question with her copy of the book in principle if there were any way to compel her testimony. It is possible that the quote is being used as a source by online spooks by virtue of the text's presence in their funky everything database. Any way you look at it, the phrase tax money well spent would seem to apply here. Regards, Steve __ Post your free ad now! http://personals.yahoo.ca
Kerik, Homeland Security Czar - Scathing article from The Register
The Register has a really friendly article about Kerik, Giuliani's buddy who's proposed for Homeland Security Czar. (El Reg is primarily an online technology newswire, but they do comment on other issues, especially if they have technical aspects - they especially rag on the UK's Home Secretary Blunkett's National ID Card proposals.) http://www.theregister.com/2004/12/06/kerik_homeland_security_secretary/ High-school drop-out to become Homeland Security Czar By Thomas C Greene Published Monday 6th December 2004 11:07 GMT President George W. Bush has nominated former New York City Police Commissioner Bernard Kerik to replace Tom Ridge as Homeland Security Secretary, marking a significant departure from his tendency to choose educated, Patrician types for his Cabinet. Kerik, a high-school drop-out abandoned at age four by his prostitute mother in the gritty town of Patterson, New Jersey, served as an Army MP in South Korea, and later worked in private international security rackets, most interestingly in Saudi Arabia. He joined the New York City Police Department in 1985. He followed that with a stint as Warden of the Passaic County Jail in New Jersey, and became the Training Officer and Commander of the Special Weapons and Operations Units. In 1998 he was named New York Corrections Commissioner, and established an ironclad, head-cracking discipline in the City's notorious detention facilities. A favorite of former New York Mayor Rudolph Giuliani, Kerik had the honor of seeing the Manhattan Detention Complex, known to locals as the Tombs, re-named the Bernard B. Kerik Complex by then-mayor Giuliani. Kerik left a minor cloud of corruption behind, with allegations that one of his lieutenants used correctional staff to work illegally in Republican campaigns. In 2000, Giuliani named Kerik Police Commissioner, to assist him in a vast anti-crime crackdown, where the chief tactic was for police to pounce aggressively on even the most chickenshit offences, such as spitting on the sidewalk. Upon his retirement from City politics, Giuliani decided to cash in on post-9/11 security hysteria by founding his own security outfit, Giuliani Partners LLC. Kerik has served as senior vice president at Giuliani Partners, and CEO of Giuliani-Kerik LLC, a vendor of law-enforcement performance systems. Meanwhile, Giuliani has founded several spin-offs, such as Giuliani Capital Advisors LLC, and the Rudolph W. Giuliani Advanced Security Centers (ASC), a cyber-security outfit formed in connection with Ernst Young. Recently, Kerik shipped out to Iraq to train the local policemen who are routinely blown to pieces by insurgents and terrorists. There, he enjoyed the snappy titles of Interim Minister of the Interior, and Senior Policy Advisor to the US Presidential Envoy to Iraq's Coalition Provisional Authority. Kerik lasted only four months, and the Iraqi police are still as incompetent, weak, and corrupt as when he arrived in country. Kerik began making his transition from local to national politics by campaigning for President Bush's re-election, alongside his political patron and business partner, Rudy Giuliani. Kerik has been a devoted booster of the so-called Patriot Act, having given several speeches in its support while campaigning for Bush. In anticipation of his rise to national office, Kerik recently sold his $5.8m in shares of Taser International, makers of absolutely safe police stun guns that are now routinely used against old women and children. He is expected to be confirmed by the Senate without difficulty. ®