Re: GPS Jammer Firm nearly ejected from Russian air show.

2005-09-22 Thread Nomen Nescio
 http://www.themoscowtimes.com/stories/2005/08/22/002.html
 
 Antonov denied that his company delivered any equipment directly to Saddam 
 Hussein but acknowledged it might have reached Iraq via arms dealers.
 
 Right before the war, there were a lot of people in Moscow with suitcases 
 full of money shopping for anything that could deter U.S. troops, Antonov 
 said.
 
 Aviakonversia now manufactures its gear outside Russia so as not to 
 irritate the authorities, he said, though he declined to specify where. He 
 also refused to identify his clients, saying only that they were foreign 
 governments that acquired the jammers through middlemen.

GPS frequencies are fixed, so they can be interfered with.  Only in
these days of general technological incompetence, where intangible
scientific principles have reverted to their ancient status as mystic,
is the concept of RF interference newsworthy.

L1 (1575.42MHz) [1]
L2 (1227.60MHz) [1]
L3 (1381.05MHz) [1]
L4 (1841.40MHz) [1]
L5 (1176.45MHz) [1]
WAAS/EGNOS/MSAS (same as L1) [2]
DGPS (283-325khz) [3,4]

[1] http://en.wikipedia.org/wiki/Gps
[2] http://gpsinformation.net/exe/waas.html
[3] http://gps.gov/ado/DgpsCompleteConfiguration.asp
[4] 
http://www.amsa.gov.au/Shipping_Safety/Navigation_Safety/Differential_Global_Postitioning_System/DGPS_Fact_Sheet.asp



RFID driver's licenses?

2005-09-11 Thread Nomen Nescio
A friend of mine is expressing concern over the recently passed REAL ID act
which will supposedly require RFID-readable driver's licenses (which it doesn't
say in the text of the bill which just makes a vague reference to
machine-readable technology.)

My questions are:

1. Have any states already implemented RFID-readable IDs/licenses?

2. If not, which states plan to?



RFID driver's licenses?

2005-09-10 Thread Nomen Nescio
A friend of mine is expressing concern over the recently passed REAL ID act
which will supposedly require RFID-readable driver's licenses (which it doesn't
say in the text of the bill which just makes a vague reference to
machine-readable technology.)

My questions are:

1. Have any states already implemented RFID-readable IDs/licenses?

2. If not, which states plan to?



Re: SIGINT and COMSEC Discussion Group

2005-01-03 Thread Nomen Nescio
On 2 Jan 2005 at 15:43, John Young wrote:

 A. writes:
 
 I have just launched a new discussion group related to hardware
 discussion for signal analysis and communications security systems:
 
 
 http://groups-beta.google.com/group/sigint/

Why would we use a groups beta at google's when there's a big and
proven yahoogroups that's been around for ages (under various names)?





Re: SIGINT and COMSEC Discussion Group

2005-01-02 Thread Nomen Nescio
On 2 Jan 2005 at 15:43, John Young wrote:

 A. writes:
 
 I have just launched a new discussion group related to hardware
 discussion for signal analysis and communications security systems:
 
 
 http://groups-beta.google.com/group/sigint/

Why would we use a groups beta at google's when there's a big and
proven yahoogroups that's been around for ages (under various names)?





Re: punkly current events

2004-12-14 Thread Nomen Nescio
-BEGIN TYPE III ANONYMOUS MESSAGE-
Message-type: plaintext

On Fri, 10 Dec 2004, J.A. Terranson wrote:
 Take away complexity, and Mix *could* flourish - in spite of the fedz.

What about mixminion? Setting up a node is about five minutes of work on
a somewhat current Linux system.

-END TYPE III ANONYMOUS MESSAGE-


Re: punkly current events

2004-12-13 Thread Nomen Nescio
-BEGIN TYPE III ANONYMOUS MESSAGE-
Message-type: plaintext

On Fri, 10 Dec 2004, J.A. Terranson wrote:
 Take away complexity, and Mix *could* flourish - in spite of the fedz.

What about mixminion? Setting up a node is about five minutes of work on
a somewhat current Linux system.

-END TYPE III ANONYMOUS MESSAGE-


Cypherpunks archives online

2004-12-11 Thread Nomen Nescio
There were some talk about archives here recently.

I found two here:
http://www.mail-archive.com/index.php?hunt=cypherpunks

And this does indeed seem to be an active archive of the list:
http://www.mail-archive.com/cypherpunks%40minder.net/






Cypherpunks archives online

2004-12-10 Thread Nomen Nescio
There were some talk about archives here recently.

I found two here:
http://www.mail-archive.com/index.php?hunt=cypherpunks

And this does indeed seem to be an active archive of the list:
http://www.mail-archive.com/cypherpunks%40minder.net/






loosing mail..

2004-12-08 Thread Nomen Nescio
I seem to have not received a few of the emails in the PROMIS thread.
What is the best approach if one really wants to receive all emails?

I'm currently only on minder and it seems from time to time mail
doesn't get through?

Should one simply subscribe to several nodes (and receive some
redundant traffic)?

I sent test messages (help command) to several of the listed mail
servers a whort while back but only these responded:

 [EMAIL PROTECTED]
 [EMAIL PROTECTED]
 [EMAIL PROTECTED]

I did not receive an answer at all from minder even though I'm
receiving my list mail through minder, so it cannot be all dead.

Is there (still) an online archive somewhere being saved of the
cypherpunks messages?


Comments?





loosing mail..

2004-12-08 Thread Nomen Nescio
I seem to have not received a few of the emails in the PROMIS thread.
What is the best approach if one really wants to receive all emails?

I'm currently only on minder and it seems from time to time mail
doesn't get through?

Should one simply subscribe to several nodes (and receive some
redundant traffic)?

I sent test messages (help command) to several of the listed mail
servers a whort while back but only these responded:

 [EMAIL PROTECTED]
 [EMAIL PROTECTED]
 [EMAIL PROTECTED]

I did not receive an answer at all from minder even though I'm
receiving my list mail through minder, so it cannot be all dead.

Is there (still) an online archive somewhere being saved of the
cypherpunks messages?


Comments?





Re: Word Of the Subgenius...

2004-12-07 Thread Nomen Nescio
Steve Furlong:

 Random racist ranting is also required. There are some racist
 assholes currently posting on cpunks, but none have quite the May
 flavor.

LOL

You can say that again. Here are a few examples of what this once
renowned cypherpunk usually writes nowadays.


First five quick quotes from Tim May, more further down.

 No wonder the white person wants the brown person sent up the
 chimneys, along with their Jew facillitators.


 I'm chortling. The burn-off of one hundred million useless eaters
 is going to be glorious.


 Me, I spend my years devoloping tools to fight the Zionist Entity,
 including the popular anonymous remailers and steganography to
 allow freedom fighters to fight Amerika and ZOG without detection, 
 to send the last evil Jew to the ovens.


 I cheered when this nigger was shot, in 1968, a very
 good year.


 We need to find ways to help Al Qaeda nuke Washington, D.C. Killing
 a quarter of a million government employee leeches and three
 quarters of a million negro welfare leeches sounds like a good
 deal.





Q: What do you call the death of a billion people from AIDS?
A: A good start.

Negroes in Africa believe that having sex with women and children
expells the virus from their body. (No, I did not just make this up.
Read the interviews with aid (no pun intended) workers.)

Basically, between AIDS, cannibalism, butchering of other tribes, bad
economic practices, corrupt liberal governments, the Dark Continent
is
burning off its negroes. The non-negro areas, in the extreme south
and
extreme north, are doing OK.

In 30 years the negro regions will have been cleansed, naturally, and
whites can colonize and make the entire continent prosperous.

--Tim May






Bush finally has admittted to mistakes in the planning of the war.
And now the search is on for which Jewish spy for ZOG bore the most
blame.

It's been clear for more than 16 months that ZOG viewed the war with
Iraq with delight, a chance to bloody one of their enemies without
themselves having to go to war. Feeding the DOD false information was
part of this disinformation campaign. And as the war with Iraq was
seen
to be winding down (though it has not, of course, as freedom fighters
in Iraq continue to kill Americans working for the ZOG state), the
Zionist Entity floated stories that _Syria_ was the _REAL_ enemy, or
maybe _Iran_, as the Ultimate Enemy.

We need to cut off funds to the ZOG state and let three million
ZOGster
figure out how to swim the Mediterranean, REAL FAST. The burn-off of
3
million ZOGsters would be glorious to behold.

The implicated ZOG spies should be given fair trials, and, if found
guilty, executed. None of the kid glove treatment that the ZOG spy
Pollard has been receiving.

Then we need to look very seriously at the Jews in our own midst.
Many
are not ZOGster, just Jews who fled oppressive regimes (which many of
their fellow Jews helped create, by the way, as the history of Lenin
and Marx and the early Jewish role in the formation of the Soviet
shows). But the many ZOGsters now feeding information to the ZOG
state
need to be rounded up, given fair trials, and liquidated. Entire
departments in the Pentagon will be decimated when this happens. Good
riddance.

As for the war in Iraq, we need to withdraw immediately, in 30 days.
This was ZOG's war, not ours. Let Ari Fleischer and Dov Zackheim and
Paul Wolfowith and Doug Feight become soldiers in the ZOG Army if
they
wish, and if they are not hung as spies, but get these united states
out of the business of fighting ZOG's wars.

--Tim May





You'll get the Trifecta with John Kerry: a Communist, a Jew (recently
acknowledged), and a Papist.  

Me, I'd rather we find the ZOG-employed traitors in the Pentagon, try
them, hang them, and then pull out of all such foreign adventures
or
entanglements, which our first and most honest President warned us
about.

Let the Shiites and Sunnis fight it out in Iraq, let three million
ZOG
invaders swim for their lives, and let the entire Dark Continent deal
with its own savagery, AIDS, cannibalism, killings of Hutus, killings
of Tutsis, HIV, malaria, child rape, and voodoo in its own way. In 30
years the Dark Continent should be ready for white people, the last
Jew
in the ZOG state will have been nailed to a cross, and the world can
get on with things without U.S. Big Brother interference.


--Tim May





I retired more than 18 years ago, in 1986.

Near the beach, too. 

However, I don't believe active minds actually retire. Rather, they
do what is important to them, whether or not K-Mart or Lockheed or
Apple or Intel is employing them.

Me, I spend my years devoloping tools to fight the Zionist Entity,
including the popular anonymous remailers and steganography to allow
freedom fighters to fight Amerika and ZOG without detection,  to send
the last evil Jew to the ovens.

And category theory, topos theory, Haskell, functional programmng,
and
crypto, so long as no Zionist criminals need to be dealt with.



RE: Word Of the Subgenius...

2004-12-07 Thread Nomen Nescio
Peter Trei:

  Where is Tim May when when you need him? :-)
  
 Try scruz.general.

or misc.survivalism






RE: Word Of the Subgenius...

2004-12-07 Thread Nomen Nescio
Peter Trei:

  Where is Tim May when when you need him? :-)
  
 Try scruz.general.

or misc.survivalism






Re: Word Of the Subgenius...

2004-12-07 Thread Nomen Nescio
Steve Furlong:

 Random racist ranting is also required. There are some racist
 assholes currently posting on cpunks, but none have quite the May
 flavor.

LOL

You can say that again. Here are a few examples of what this once
renowned cypherpunk usually writes nowadays.


First five quick quotes from Tim May, more further down.

 No wonder the white person wants the brown person sent up the
 chimneys, along with their Jew facillitators.


 I'm chortling. The burn-off of one hundred million useless eaters
 is going to be glorious.


 Me, I spend my years devoloping tools to fight the Zionist Entity,
 including the popular anonymous remailers and steganography to
 allow freedom fighters to fight Amerika and ZOG without detection, 
 to send the last evil Jew to the ovens.


 I cheered when this nigger was shot, in 1968, a very
 good year.


 We need to find ways to help Al Qaeda nuke Washington, D.C. Killing
 a quarter of a million government employee leeches and three
 quarters of a million negro welfare leeches sounds like a good
 deal.





Q: What do you call the death of a billion people from AIDS?
A: A good start.

Negroes in Africa believe that having sex with women and children
expells the virus from their body. (No, I did not just make this up.
Read the interviews with aid (no pun intended) workers.)

Basically, between AIDS, cannibalism, butchering of other tribes, bad
economic practices, corrupt liberal governments, the Dark Continent
is
burning off its negroes. The non-negro areas, in the extreme south
and
extreme north, are doing OK.

In 30 years the negro regions will have been cleansed, naturally, and
whites can colonize and make the entire continent prosperous.

--Tim May






Bush finally has admittted to mistakes in the planning of the war.
And now the search is on for which Jewish spy for ZOG bore the most
blame.

It's been clear for more than 16 months that ZOG viewed the war with
Iraq with delight, a chance to bloody one of their enemies without
themselves having to go to war. Feeding the DOD false information was
part of this disinformation campaign. And as the war with Iraq was
seen
to be winding down (though it has not, of course, as freedom fighters
in Iraq continue to kill Americans working for the ZOG state), the
Zionist Entity floated stories that _Syria_ was the _REAL_ enemy, or
maybe _Iran_, as the Ultimate Enemy.

We need to cut off funds to the ZOG state and let three million
ZOGster
figure out how to swim the Mediterranean, REAL FAST. The burn-off of
3
million ZOGsters would be glorious to behold.

The implicated ZOG spies should be given fair trials, and, if found
guilty, executed. None of the kid glove treatment that the ZOG spy
Pollard has been receiving.

Then we need to look very seriously at the Jews in our own midst.
Many
are not ZOGster, just Jews who fled oppressive regimes (which many of
their fellow Jews helped create, by the way, as the history of Lenin
and Marx and the early Jewish role in the formation of the Soviet
shows). But the many ZOGsters now feeding information to the ZOG
state
need to be rounded up, given fair trials, and liquidated. Entire
departments in the Pentagon will be decimated when this happens. Good
riddance.

As for the war in Iraq, we need to withdraw immediately, in 30 days.
This was ZOG's war, not ours. Let Ari Fleischer and Dov Zackheim and
Paul Wolfowith and Doug Feight become soldiers in the ZOG Army if
they
wish, and if they are not hung as spies, but get these united states
out of the business of fighting ZOG's wars.

--Tim May





You'll get the Trifecta with John Kerry: a Communist, a Jew (recently
acknowledged), and a Papist.  

Me, I'd rather we find the ZOG-employed traitors in the Pentagon, try
them, hang them, and then pull out of all such foreign adventures
or
entanglements, which our first and most honest President warned us
about.

Let the Shiites and Sunnis fight it out in Iraq, let three million
ZOG
invaders swim for their lives, and let the entire Dark Continent deal
with its own savagery, AIDS, cannibalism, killings of Hutus, killings
of Tutsis, HIV, malaria, child rape, and voodoo in its own way. In 30
years the Dark Continent should be ready for white people, the last
Jew
in the ZOG state will have been nailed to a cross, and the world can
get on with things without U.S. Big Brother interference.


--Tim May





I retired more than 18 years ago, in 1986.

Near the beach, too. 

However, I don't believe active minds actually retire. Rather, they
do what is important to them, whether or not K-Mart or Lockheed or
Apple or Intel is employing them.

Me, I spend my years devoloping tools to fight the Zionist Entity,
including the popular anonymous remailers and steganography to allow
freedom fighters to fight Amerika and ZOG without detection,  to send
the last evil Jew to the ovens.

And category theory, topos theory, Haskell, functional programmng,
and
crypto, so long as no Zionist criminals need to be dealt with.



Re: Michael Riconosciuto, PROMIS

2004-12-06 Thread Nomen Nescio
Bill Stewart shrieb:

 There are several different issues related to PROMIS

Thanks for your comments.

But what about the person Michael Riconosciuto? I did some searches
online and I got the feeling that a lot people see him as an
extremely intelligent person, a one-in-a-million type of person,
being involved and on the front line with such diverse areas as human
intelligence, weapons, electronics, computers, cryptography,
bio-warfare etc.

It's stated online that he has warned US about several terrorist
attacks before they ocurred, including but not limited to the
al-qaeda attacks. Is this somewhat related to him being jailed? Can
he verify that US didn't act on alerts in ways so sensitive that the
government simply cannot afford to let him speak up? Does he know
things relating to US wanting some wars that the public simply cannot
be told?

I think I read somewhere that people from NSA or CIA thought of him
as simply put a genius. Is it likely that he as such a genius is
simply too dangerous for his own good when he decided to speak the
truth and that the government is actively trying to shut him down and
indirectly speed up his death by denying him medical care for his
illness?

Why did he come clean and sign the affidavit? He himself stated
that he though he risked being killed or harmed in various ways if he
went through with it. And indeed, just a week or two afterwards he
got arrested!

Smells like a government retaliation, set-up and cover-up if I ever
saw one!

This is almost to good for even Hollywood!

There are many interesting questions here. Keep in mind that not all
of us were around and active with intelligence/computers/cryptography
10-20 years ago.


John Young: Does Cryptome hold any interesting documents involving
this case?





Re: Michael Riconosciuto, PROMIS

2004-12-06 Thread Nomen Nescio
Bill Stewart shrieb:

 There are several different issues related to PROMIS

Thanks for your comments.

But what about the person Michael Riconosciuto? I did some searches
online and I got the feeling that a lot people see him as an
extremely intelligent person, a one-in-a-million type of person,
being involved and on the front line with such diverse areas as human
intelligence, weapons, electronics, computers, cryptography,
bio-warfare etc.

It's stated online that he has warned US about several terrorist
attacks before they ocurred, including but not limited to the
al-qaeda attacks. Is this somewhat related to him being jailed? Can
he verify that US didn't act on alerts in ways so sensitive that the
government simply cannot afford to let him speak up? Does he know
things relating to US wanting some wars that the public simply cannot
be told?

I think I read somewhere that people from NSA or CIA thought of him
as simply put a genius. Is it likely that he as such a genius is
simply too dangerous for his own good when he decided to speak the
truth and that the government is actively trying to shut him down and
indirectly speed up his death by denying him medical care for his
illness?

Why did he come clean and sign the affidavit? He himself stated
that he though he risked being killed or harmed in various ways if he
went through with it. And indeed, just a week or two afterwards he
got arrested!

Smells like a government retaliation, set-up and cover-up if I ever
saw one!

This is almost to good for even Hollywood!

There are many interesting questions here. Keep in mind that not all
of us were around and active with intelligence/computers/cryptography
10-20 years ago.


John Young: Does Cryptome hold any interesting documents involving
this case?





Michael Riconosciuto, PROMIS

2004-12-05 Thread Nomen Nescio
I read a few old email messages I had and stumbled over some
interesting material relating to NSA, CIA and one Michael
Riconosciuto among other things.

I followed up on the info and did some surfing on the subject and got
quite interested. I also did some searches in my cypherpunk mail
folder and got no hits. Surely this must have been up in the list?
Can someone give me some links please? There were also some talk
about some PROMIS software somewhere and modifications being made to
illegally obtained copies of proprietary software. This software was
then sold by the US gov to be able to spy on Canadian authoritites.
Is this also true?

I found the below text saved here locally, if I'm correctly informed
Mr. Michael Riconosciuto went to jail for this affidavit. Can someone
verify if this really is true. (It sounds bizarre but maybe this can
happen in Amerika?)

I am told that Michael Riconosciuto has been diagnosed with prostate
cancer and many delays in diagnosis and treatment have occurred and
people say it's becaus the US gov wants him dead because he knows too
much.

It's also rumoured that he never received a fair trial and that two
of his lawyers were murdered. Because the US government does not
admit anything about PROMIS he has been relegated as a nut and
serious efforts to isolate him have been going on for more than a
decade.


A friend of mine sent me this info on the case:

 Michael Riconosciuto was asked by Bill Hamilton, the proprietor of
 Promis, to sign an affidavit about his alterations to the
 software. A week before he signed, Michael was threatened. There
 had already been deaths around him and Michael informed his family
 that he was about to be murdered or jailed and that whatever the
 family was going to be told about him, it wasn't true, he was being
 framed for telling the truth. A week after signing the affidavit,
 Michael ended up in jail on fraudulent charges of running a drug
 lab.  


Can someone give me some more info on this?


Thank you 






AFFIDAVIT OF MICHAEL J. RICONOSCIUTO
The INSLAW CASE: AFFIDAVIT OF MICHAEL J. RICONOSCIUTO

UNITED STATES BANKRUPTCY COURT
FOR THE DISTRICT OF COLUMBIA

In Re:
INSLAW, INC., Debtor.
CASE NO. 85-00070
(Chapter 11)

INSLAW, INC., Plaintiff
v.
UNITED STATES OF AMERICA and the UNITED STATES DEPARTMENT OF JUSTICE,
Defendants.
CASE NO. 85-00070
Adversary Proceeding
NO. 86-0069

AFFIDAVIT OF MICHAEL J. RICONOSCIUTO

STATE OF WASHINGTON)   

I, MICHAEL J. RICONOSCIUTO, being duly sworn, do hereby state as
follows:

1. During the early 1980's, I served as the Director of Research for
a joint venture between the Wackenhut Corporation of Coral Gables,
Florida, and the Cabazon Band of Indians in Indio, California. The
joint venture was located on the Cabazon reservation.

2. The Wackenhut-Cabazon joint venture sought to develop and/or
manufacture certain materials that are used in military and national
security operations, including night vision goggles, machine guns,
fuel-air explosives, and biological and chemical warfare weapons.

EXHIBIT 1

3. The Cabazon Band of Indians are a sovereign nation. The sovereign
immunity that is accorded the Cabazons as a consequence of this fact
made it feasible to pursue on the reservation the development and/or
manufacture of materials whose development or manufacture would be
subject to stringent controls off the reservation. As a minority
group, the Cabazon Indians also provided the Wackenhut Corporation
with an enhanced ability to obtain federal contracts through the 8A
Set Aside Program, and in connection with Government-owned
contractor-operated (GOCO) facilities.

4. The Wackenhut-Cabazon joint venture was intended to support the
needs of a number of foreign governments and forces, including forces
and governments in Central America and the Middle East. The Contras
in Nicaragua represented one of the most important priorities for the
joint venture.

5. The Wackenhut-Cabazon joint venture maintained close liaison with
certain elements of the United States Government, including
representatives of intelligence, military and law enforcement
agencies.

6. Among the frequent visitors to the Wackenhut-Cabazon joint venture
were Peter Videnieks of the U.S. Department of Justice in Washington,
D.C., and a close associate of Videnieks by the name of Earl W.
Brian. Brian is a private businessman who lives in Maryland and who
has maintained close business ties with the U.S. intelligence
community for many years.

7. In connection with my work for Wackenhut, I engaged in some
software development and modification work in 1983 and 1984 on the
proprietary PROMIS computer software product. The copy of PROMIS on
which I worked came from the Department of Justice. Earl W. Brian
made it available to me through Wackenhut after acquiring it from
Peter Videnieks, who was then a Department of Justice contracting
official with responsibility for 

Michael Riconosciuto, PROMIS

2004-12-05 Thread Nomen Nescio
I read a few old email messages I had and stumbled over some
interesting material relating to NSA, CIA and one Michael
Riconosciuto among other things.

I followed up on the info and did some surfing on the subject and got
quite interested. I also did some searches in my cypherpunk mail
folder and got no hits. Surely this must have been up in the list?
Can someone give me some links please? There were also some talk
about some PROMIS software somewhere and modifications being made to
illegally obtained copies of proprietary software. This software was
then sold by the US gov to be able to spy on Canadian authoritites.
Is this also true?

I found the below text saved here locally, if I'm correctly informed
Mr. Michael Riconosciuto went to jail for this affidavit. Can someone
verify if this really is true. (It sounds bizarre but maybe this can
happen in Amerika?)

I am told that Michael Riconosciuto has been diagnosed with prostate
cancer and many delays in diagnosis and treatment have occurred and
people say it's becaus the US gov wants him dead because he knows too
much.

It's also rumoured that he never received a fair trial and that two
of his lawyers were murdered. Because the US government does not
admit anything about PROMIS he has been relegated as a nut and
serious efforts to isolate him have been going on for more than a
decade.


A friend of mine sent me this info on the case:

 Michael Riconosciuto was asked by Bill Hamilton, the proprietor of
 Promis, to sign an affidavit about his alterations to the
 software. A week before he signed, Michael was threatened. There
 had already been deaths around him and Michael informed his family
 that he was about to be murdered or jailed and that whatever the
 family was going to be told about him, it wasn't true, he was being
 framed for telling the truth. A week after signing the affidavit,
 Michael ended up in jail on fraudulent charges of running a drug
 lab.  


Can someone give me some more info on this?


Thank you 






AFFIDAVIT OF MICHAEL J. RICONOSCIUTO
The INSLAW CASE: AFFIDAVIT OF MICHAEL J. RICONOSCIUTO

UNITED STATES BANKRUPTCY COURT
FOR THE DISTRICT OF COLUMBIA

In Re:
INSLAW, INC., Debtor.
CASE NO. 85-00070
(Chapter 11)

INSLAW, INC., Plaintiff
v.
UNITED STATES OF AMERICA and the UNITED STATES DEPARTMENT OF JUSTICE,
Defendants.
CASE NO. 85-00070
Adversary Proceeding
NO. 86-0069

AFFIDAVIT OF MICHAEL J. RICONOSCIUTO

STATE OF WASHINGTON)   

I, MICHAEL J. RICONOSCIUTO, being duly sworn, do hereby state as
follows:

1. During the early 1980's, I served as the Director of Research for
a joint venture between the Wackenhut Corporation of Coral Gables,
Florida, and the Cabazon Band of Indians in Indio, California. The
joint venture was located on the Cabazon reservation.

2. The Wackenhut-Cabazon joint venture sought to develop and/or
manufacture certain materials that are used in military and national
security operations, including night vision goggles, machine guns,
fuel-air explosives, and biological and chemical warfare weapons.

EXHIBIT 1

3. The Cabazon Band of Indians are a sovereign nation. The sovereign
immunity that is accorded the Cabazons as a consequence of this fact
made it feasible to pursue on the reservation the development and/or
manufacture of materials whose development or manufacture would be
subject to stringent controls off the reservation. As a minority
group, the Cabazon Indians also provided the Wackenhut Corporation
with an enhanced ability to obtain federal contracts through the 8A
Set Aside Program, and in connection with Government-owned
contractor-operated (GOCO) facilities.

4. The Wackenhut-Cabazon joint venture was intended to support the
needs of a number of foreign governments and forces, including forces
and governments in Central America and the Middle East. The Contras
in Nicaragua represented one of the most important priorities for the
joint venture.

5. The Wackenhut-Cabazon joint venture maintained close liaison with
certain elements of the United States Government, including
representatives of intelligence, military and law enforcement
agencies.

6. Among the frequent visitors to the Wackenhut-Cabazon joint venture
were Peter Videnieks of the U.S. Department of Justice in Washington,
D.C., and a close associate of Videnieks by the name of Earl W.
Brian. Brian is a private businessman who lives in Maryland and who
has maintained close business ties with the U.S. intelligence
community for many years.

7. In connection with my work for Wackenhut, I engaged in some
software development and modification work in 1983 and 1984 on the
proprietary PROMIS computer software product. The copy of PROMIS on
which I worked came from the Department of Justice. Earl W. Brian
made it available to me through Wackenhut after acquiring it from
Peter Videnieks, who was then a Department of Justice contracting
official with responsibility for 

Swedish military feared linked to Estonia ferry disaster

2004-12-01 Thread Nomen Nescio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

For those interested in intelligence, munitions smuggling by
authorities and so on - a few words concerning military smuggling of
munitions on the Estonia, feared to have played a part in the sinking
and killings of 852 people on Sept 28, 1994, when the ferry M/S
Estonia sinked during a journey from Estonia to Sweden. It has been
rumoured for a long time that there were some kind of smuggling of
sensitive material taking place on Estonia and that Russian
authorities did not like this, needless to say. The very stressed and
hasty investigation performed by the involved nations also raised
suspicions amongst a lot of people. On top of all this the Swedish
social democratic government did all they could to hinder future
investigations of the wreckage by trying to cover it with stones and
concrete.

First some other related info.

The reader should know that the Swedish social democratic party is
notorious for acting in undemocratic and deceitful manners against
the Swedish people. Two of the most infamous affairs being the IB
affair and the Catalina affair.

In the IB affair it was shown that the social democratic party had
founded a secret and unlawful military intelligence bureau as the
party's own private spy organization to spy on other politcal
adversaries, a Swedish version of Watergate if you will, but it went
far beyond that. Hundreds of thousands of people were targeted during
a number of years. Even Olof Palme himself knew about break-ins that
the intelligence officers performed in other countries embassies in
Stockholm, one of them was Egypt's embassy. One major characteristic
is that the Swedish way of doing things means sweeping things under
the carpet and not letting the public know the truths, this is shown
in every affair known in resent years, including the Estonia
disaster. In all of these affairs it's the social democrats that has
been the most responsible party and the party almost in constant
power in Sweden historically speaking.

The magazine breaking the news in 1973 today has a web site about the
affair, http://www.fib.se/IB/

In the Catalina affair it was very recently shown actually, after the
planes was discovered east of the island Gotland in the Baltic Sea,
that they were both indeed gunned down, as had been suspected for
decades. On June 13 1952 the DC3 plane Hugin disappeared and the only
thing found was a trashed rescue raft. Three days later the rescure
plane of type Catalina was also gunned down and forced to emergency
landing. It's today also known however that the Swedish (social
democratic) governments have all been maliciously and intentionally
lying all along about the Hugin's purpose to both the Swedish people
as well as the families.

Hugin was in fact gathering intelligence very close (some say on the
wrong side even) of the Russian border and was relaying all this
signal intelligence directly to the Americans. USA was amongst other
things interested in Russias capacity to fight the B-47. This was
well known for the Russians and this was the direct cause of the
attacks in 1952. It is believed that the Swedish FRA, standing for
Försvarets RadioAnstalt, translating to The Defence's Radio
Institution, which is Swedens NSA, signed secret treaties with the
US some three years prior to the assult on these planes. The FRA had
5 employees on the Hugin when it was gunned down. It wasn't until
1991 that the families knew what happened, that was when the Russians
admitted a Mig-15 gunned them down.

When the recon plane was found in June 2004 it was situated far east
of the earlier officially declared crash site which further fules the
speculation that Hugin was indeed flying where it shouldn't have
been, conducting its sigint operations and that the Swedish
governments knew this all along. The Hugin was found June 10, 2003.


I'm not sure how much of these affairs is known outside Sweden, but
it's interesting read that's for sure and I just may get back to
these things and others like them later on.


Back to other things now.

This was published today in Sweden, along with a tv show of one hour:

INRIKES Publicerad 30 november
 
   Krigsmateriel fraktades på Estonia   
 
 
   Estonia hade veckorna före förlisning- 
   en vid två tillfällen krigsmateriel
   från Baltikum i lasten. Enligt kväll-  
   ens Uppdrag granskning i SVT rörde 
   det sig om rysk elektronik som svenska 
   försvaret tog in för att studera.  
 
   Lars Borgnäs som gjort programmet  
   säger att avslöjandet belyser hur  
   svenska myndigheter hanterat kata- 
   strofen. -Man har t.ex. inte undersökt 
   bildäck, säger han till SVT Text.  
 
   Den pensionerade tullintendenten   
   Lennart Henriksson uppger att han fått 
   order om att släppa igenom bilarna på  
   begäran av försvarsmakten. 
Läs mer på svt.se/nyheter  



Which translates into something like this:

DOMESTIC Published 

Jewish wholy words..

2004-12-01 Thread Nomen Nescio
Is it true that the jews have these texts in their scriptures?


#1. Sanhedrin 59a:
Murdering Goyim (Gentiles) is like killing a wild animal.

#2. Aboda Sarah 37a:
A Gentile girl who is three years old can be violated.

#3. Yebamoth 11b:
Sexual intercourse with a little girl is permitted if she is three
years of age.

#4. Abodah Zara 26b:
Even the best of the Gentiles should be killed.

#5. Yebamoth 98a:
All gentile children are animals.

#6. Schulchan Aruch, Johre Deah, 122:
A Jew is forbidden to drink from a glass of wine which a Gentile has
touched, because the touch has made the wine unclean.

#7. Baba Necia 114, 6:
The Jews are human beings, but the nations of the world are not
human beings but beasts.






Jewish wholy words..

2004-12-01 Thread Nomen Nescio
Is it true that the jews have these texts in their scriptures?


#1. Sanhedrin 59a:
Murdering Goyim (Gentiles) is like killing a wild animal.

#2. Aboda Sarah 37a:
A Gentile girl who is three years old can be violated.

#3. Yebamoth 11b:
Sexual intercourse with a little girl is permitted if she is three
years of age.

#4. Abodah Zara 26b:
Even the best of the Gentiles should be killed.

#5. Yebamoth 98a:
All gentile children are animals.

#6. Schulchan Aruch, Johre Deah, 122:
A Jew is forbidden to drink from a glass of wine which a Gentile has
touched, because the touch has made the wine unclean.

#7. Baba Necia 114, 6:
The Jews are human beings, but the nations of the world are not
human beings but beasts.






Swedish military feared linked to Estonia ferry disaster

2004-12-01 Thread Nomen Nescio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

For those interested in intelligence, munitions smuggling by
authorities and so on - a few words concerning military smuggling of
munitions on the Estonia, feared to have played a part in the sinking
and killings of 852 people on Sept 28, 1994, when the ferry M/S
Estonia sinked during a journey from Estonia to Sweden. It has been
rumoured for a long time that there were some kind of smuggling of
sensitive material taking place on Estonia and that Russian
authorities did not like this, needless to say. The very stressed and
hasty investigation performed by the involved nations also raised
suspicions amongst a lot of people. On top of all this the Swedish
social democratic government did all they could to hinder future
investigations of the wreckage by trying to cover it with stones and
concrete.

First some other related info.

The reader should know that the Swedish social democratic party is
notorious for acting in undemocratic and deceitful manners against
the Swedish people. Two of the most infamous affairs being the IB
affair and the Catalina affair.

In the IB affair it was shown that the social democratic party had
founded a secret and unlawful military intelligence bureau as the
party's own private spy organization to spy on other politcal
adversaries, a Swedish version of Watergate if you will, but it went
far beyond that. Hundreds of thousands of people were targeted during
a number of years. Even Olof Palme himself knew about break-ins that
the intelligence officers performed in other countries embassies in
Stockholm, one of them was Egypt's embassy. One major characteristic
is that the Swedish way of doing things means sweeping things under
the carpet and not letting the public know the truths, this is shown
in every affair known in resent years, including the Estonia
disaster. In all of these affairs it's the social democrats that has
been the most responsible party and the party almost in constant
power in Sweden historically speaking.

The magazine breaking the news in 1973 today has a web site about the
affair, http://www.fib.se/IB/

In the Catalina affair it was very recently shown actually, after the
planes was discovered east of the island Gotland in the Baltic Sea,
that they were both indeed gunned down, as had been suspected for
decades. On June 13 1952 the DC3 plane Hugin disappeared and the only
thing found was a trashed rescue raft. Three days later the rescure
plane of type Catalina was also gunned down and forced to emergency
landing. It's today also known however that the Swedish (social
democratic) governments have all been maliciously and intentionally
lying all along about the Hugin's purpose to both the Swedish people
as well as the families.

Hugin was in fact gathering intelligence very close (some say on the
wrong side even) of the Russian border and was relaying all this
signal intelligence directly to the Americans. USA was amongst other
things interested in Russias capacity to fight the B-47. This was
well known for the Russians and this was the direct cause of the
attacks in 1952. It is believed that the Swedish FRA, standing for
Försvarets RadioAnstalt, translating to The Defence's Radio
Institution, which is Swedens NSA, signed secret treaties with the
US some three years prior to the assult on these planes. The FRA had
5 employees on the Hugin when it was gunned down. It wasn't until
1991 that the families knew what happened, that was when the Russians
admitted a Mig-15 gunned them down.

When the recon plane was found in June 2004 it was situated far east
of the earlier officially declared crash site which further fules the
speculation that Hugin was indeed flying where it shouldn't have
been, conducting its sigint operations and that the Swedish
governments knew this all along. The Hugin was found June 10, 2003.


I'm not sure how much of these affairs is known outside Sweden, but
it's interesting read that's for sure and I just may get back to
these things and others like them later on.


Back to other things now.

This was published today in Sweden, along with a tv show of one hour:

INRIKES Publicerad 30 november
 
   Krigsmateriel fraktades på Estonia   
 
 
   Estonia hade veckorna före förlisning- 
   en vid två tillfällen krigsmateriel
   från Baltikum i lasten. Enligt kväll-  
   ens Uppdrag granskning i SVT rörde 
   det sig om rysk elektronik som svenska 
   försvaret tog in för att studera.  
 
   Lars Borgnäs som gjort programmet  
   säger att avslöjandet belyser hur  
   svenska myndigheter hanterat kata- 
   strofen. -Man har t.ex. inte undersökt 
   bildäck, säger han till SVT Text.  
 
   Den pensionerade tullintendenten   
   Lennart Henriksson uppger att han fått 
   order om att släppa igenom bilarna på  
   begäran av försvarsmakten. 
Läs mer på svt.se/nyheter  



Which translates into something like this:

DOMESTIC Published 

Re: Why Americans Hate Dissenters

2004-11-19 Thread Nomen Nescio
John Young:

 On CJ (Carl Johnson) and Jim Bell:

Hi John

Thanks for the info! Several times in the past I've seen concrete
relevant questions asked on the list without anyone taking their time
to answer them. The stories of these cypherpunks are indeed
interesting and relevant for the list.

I guess the story of Jim and CJ is the reason why one of the
cypherpunks nodes used to have this text on the page:

It is known this list is under surveillence by US and foreign law
enforcement and intelligence agencies, consider using anonymous
remailers and cryptography

Regards





Re: The Values-Vote Myth

2004-11-08 Thread Nomen Nescio
J.A. Terranson schrieb:

 This election *proves* that at least half the electorate, about 60
 million people, are just Useless Eaters, who should be eagerly
 awaiting their Trip Up The Chimneys.

Wow! A Tim May copycat!
(Both the 'useless eaters' and the 'chimney'!)






Re: The Values-Vote Myth

2004-11-08 Thread Nomen Nescio
J.A. Terranson schrieb:

 This election *proves* that at least half the electorate, about 60
 million people, are just Useless Eaters, who should be eagerly
 awaiting their Trip Up The Chimneys.

Wow! A Tim May copycat!
(Both the 'useless eaters' and the 'chimney'!)






Re: Why Americans Hate Democrats-A Dialogue

2004-11-06 Thread Nomen Nescio
John Young:

 Tyler,
 
 Commie is the term used here like is nazi used elsewhere
 as the most fearsome if thoughtless epithet. Nazi here is a 
 term of endearment, and also admirable role model by some.
 
 Calling someone both is not allowed, check the FAQ under impurity.
 
 Tim May, praise Allah, always claimed cypherpunks was a fair and
 balanced forum thanks to the one person of the left here who 
 was fingered affectionately like a house rodent, an easy target for
 errant shooters.
 
 CJ is not to be recalled, ever.
 
 Jim Bell still sends very important legal papers, the latest
 yesterday, which describe the way things should be understood. But
 who can believe an MIT chemist political prisoner.
 
 CJ and Jim jailed by the Democratic freedom-fighters.


CJ is CJ Parker, who posted a few emails to this list back in
early 2003? I guess I haven't been around long enough to know all
famous cpunks who have been posting to the list. Maybe someone could
tell in short who those were, I guess there are one or two on the
list who weren't around and would appreciate the stories.

I think I remember having read about Bell, something about him having
threatened FBI agents or something?

Does Jim Bell post emails somewhere today?





Re: Why Americans Hate Democrats-A Dialogue

2004-11-06 Thread Nomen Nescio
John Young:

 Tyler,
 
 Commie is the term used here like is nazi used elsewhere
 as the most fearsome if thoughtless epithet. Nazi here is a 
 term of endearment, and also admirable role model by some.
 
 Calling someone both is not allowed, check the FAQ under impurity.
 
 Tim May, praise Allah, always claimed cypherpunks was a fair and
 balanced forum thanks to the one person of the left here who 
 was fingered affectionately like a house rodent, an easy target for
 errant shooters.
 
 CJ is not to be recalled, ever.
 
 Jim Bell still sends very important legal papers, the latest
 yesterday, which describe the way things should be understood. But
 who can believe an MIT chemist political prisoner.
 
 CJ and Jim jailed by the Democratic freedom-fighters.


CJ is CJ Parker, who posted a few emails to this list back in
early 2003? I guess I haven't been around long enough to know all
famous cpunks who have been posting to the list. Maybe someone could
tell in short who those were, I guess there are one or two on the
list who weren't around and would appreciate the stories.

I think I remember having read about Bell, something about him having
threatened FBI agents or something?

Does Jim Bell post emails somewhere today?





Re: This Memorable Day

2004-11-04 Thread Nomen Nescio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

James A. Donald:

 You are quite right, it is unjust that people like Bin Laden are so
 immensely rich with oil wealth.  To remedy this problem, Bush
 should confiscate the Middle Eastern oil reserves.
 
 You are using stale old communist rhetoric - but today's terrorists
 no longer not even pretend to fight on behalf of the poor and
 oppressed.  

This was quite lame and doesn't really deserve a response. 

To label any argument that points out the obvious circumstance
that injustice feeds hatred as communist propaganda, is really only
ridiculous, even if it's also dangerously incompetent and as such no
real laughing matter.

Why do you mention Bin Laden anyway? There are thousands of
bigger and smaller groups around the world (they exists in every
country more or less) that we'd label as terrorists in the western
part of the world. You think every one of these hundreds of thousands
or perhaps millions of recruits and followers are millionaires?
Fantastically lame comment to a real and important issue.

Should we take you seriously when you write these childish rants?

I don't know what to fear the most, the dangerous ignorance of
those of your kind or what dictatorial rulers may accomplish using
your ignorant kind as followers who do not question the truths from
the authorities. Hitler did it in the 30's election where some 37%
voted for the nazis, in a democratic multi-party election I might
add. Some of the ingrediences present then in Hitler's rhetoric are
also present today in Bush's rhetoric, even though I don't mean to
make the comparison .

We just cannot afford to be this naive.

I can't help thinking about the fact that we usually portray
Americans as a religious and church going people. Perhaps some 25%
attend church on a somewhat regular basis. To make matters worse
those people seem to vote for Bush(?). One can't help wonder if
they're literate and if they actually read the bible and it's message
of love, understanding, forgiveness and compassion for their fellow
man.

May god bless the world, we may need it.


Johnny Doelittle


Men willingly believe what they wish.
(Julius Caesar)

There is nothing worse than aggressive stupidity.
(von Goethe)


-BEGIN PGP SIGNATURE-
Version: Tom Ridge Special v1.01

iQA/AwUBQYoO4jVaKWz2Ji/mEQKzWACfTEUN6ENT9/kbzMEOQVuvM4txtpIAnRI2
pU5RbBMeBggUCWf2ZW4rBQYG
=EiIW
-END PGP SIGNATURE-




Re: This Memorable Day

2004-11-04 Thread Nomen Nescio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

R.A. Hettinga:

 Are you high, junior? Or is it just your politics that sound so...
 sophomoric?

 Communism, Fuck Yeah!!! States are People Too



Talk sense to a fool and he calls you foolish.
(Euripides)


You too. Sad it is.

Howcome the Americans became so egocentrical and cynical that
anyone who dares to speak up and support compassion for his fellow
man automatically is a communist?

It's a sincere question, no doubt in my mind that we won't get a
sincere answer though.

Reading your email actually reminds me of those of Tim May, he
also seemed to be full of bigotry and hatred and deeply disliked
anyone who were unfortunate enough to be poor.


 Our culture -- yours, too, bunky, since I bet you don't shit into a
 hole in the floor and pray 5 times a day for, as Hanson
 appropriately  

No I don't shit into a hole, but I can still try to be unbiased
and extend a though or two to other people who are not so fortunate
as we are to be born in the rich part of the world.


 Ah. That's right. I'm not nuanced enough. It's too *complicated*
 for anyone who didn't take your sophomore (cryptomarxist) History
 Studies class, or whatever. Please.

To me it's enough to at least try to understand and try live by
the spirit of the Bible.

It's also quite ironical that all those right wing voters
actually read communist propaganda in church, since that is the
logical conclusion of your arguments made here.


 There we go. Wisdom from a thug. How about this thug, instead, kid,
 quoted just about as much out of context as you have yours:
 
 When the hares made speeches in the assembly and demanded that all
 should have equality, the lions replied, Where are your claws and
 teeth? -- attributed to Antisthenes in Aristotle, 'Politics',
 3.7.2  
 
 Oh. That's right. One shouldn't read Aristotle. He was a White Male
 Oppressor...

You like quotes, ok here I have a small collection for you, maybe
one or two of them qualifies as white oppressors too, I don't know.


Insanity in individuals is something rare - but in groups,
parties, nations and epochs, it is the rule.
(Nietzsche)

An honest man can feel no pleasure in the 
exercise of power over his fellow citizens.
(Thomas Jefferson)

I am a firm believer in the people. If given the truth, they can be
depended upon to meet any national crises. The great point is to
bring them the real facts.  
(Abraham Lincoln)

It is forbidden to kill; therefore all murderers are punished unless
they kill in large numbers and to the sound of trumpets.  
(Voltaire)

What difference does it make to the dead, the orphans and the
homeless, whether the mad destruction is wrought under the name of
totalitarianism or the holy name of liberty or democracy?  
(Mahatma Gandhi)

Injustice anywhere is a threat to justice everywhere.
(Martin Luther King)



 Sheesh. When will September ever end?

In my calendar it's November already, I don't know about yours.


Johnny Doelittle


-BEGIN PGP SIGNATURE-
Version: Tom Ridge Special v1.01

iQA/AwUBQYoOvDVaKWz2Ji/mEQLUvgCfZJiR4Nmtvpe00RHmsfJujf1opfYAn289
PIgwc3xyE+/RolLAFBqAc6Ks
=cwYX
-END PGP SIGNATURE-




Re: This Memorable Day

2004-11-04 Thread Nomen Nescio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

R.A. Hettinga:

 Are you high, junior? Or is it just your politics that sound so...
 sophomoric?

 Communism, Fuck Yeah!!! States are People Too



Talk sense to a fool and he calls you foolish.
(Euripides)


You too. Sad it is.

Howcome the Americans became so egocentrical and cynical that
anyone who dares to speak up and support compassion for his fellow
man automatically is a communist?

It's a sincere question, no doubt in my mind that we won't get a
sincere answer though.

Reading your email actually reminds me of those of Tim May, he
also seemed to be full of bigotry and hatred and deeply disliked
anyone who were unfortunate enough to be poor.


 Our culture -- yours, too, bunky, since I bet you don't shit into a
 hole in the floor and pray 5 times a day for, as Hanson
 appropriately  

No I don't shit into a hole, but I can still try to be unbiased
and extend a though or two to other people who are not so fortunate
as we are to be born in the rich part of the world.


 Ah. That's right. I'm not nuanced enough. It's too *complicated*
 for anyone who didn't take your sophomore (cryptomarxist) History
 Studies class, or whatever. Please.

To me it's enough to at least try to understand and try live by
the spirit of the Bible.

It's also quite ironical that all those right wing voters
actually read communist propaganda in church, since that is the
logical conclusion of your arguments made here.


 There we go. Wisdom from a thug. How about this thug, instead, kid,
 quoted just about as much out of context as you have yours:
 
 When the hares made speeches in the assembly and demanded that all
 should have equality, the lions replied, Where are your claws and
 teeth? -- attributed to Antisthenes in Aristotle, 'Politics',
 3.7.2  
 
 Oh. That's right. One shouldn't read Aristotle. He was a White Male
 Oppressor...

You like quotes, ok here I have a small collection for you, maybe
one or two of them qualifies as white oppressors too, I don't know.


Insanity in individuals is something rare - but in groups,
parties, nations and epochs, it is the rule.
(Nietzsche)

An honest man can feel no pleasure in the 
exercise of power over his fellow citizens.
(Thomas Jefferson)

I am a firm believer in the people. If given the truth, they can be
depended upon to meet any national crises. The great point is to
bring them the real facts.  
(Abraham Lincoln)

It is forbidden to kill; therefore all murderers are punished unless
they kill in large numbers and to the sound of trumpets.  
(Voltaire)

What difference does it make to the dead, the orphans and the
homeless, whether the mad destruction is wrought under the name of
totalitarianism or the holy name of liberty or democracy?  
(Mahatma Gandhi)

Injustice anywhere is a threat to justice everywhere.
(Martin Luther King)



 Sheesh. When will September ever end?

In my calendar it's November already, I don't know about yours.


Johnny Doelittle


-BEGIN PGP SIGNATURE-
Version: Tom Ridge Special v1.01

iQA/AwUBQYoOvDVaKWz2Ji/mEQLUvgCfZJiR4Nmtvpe00RHmsfJujf1opfYAn289
PIgwc3xyE+/RolLAFBqAc6Ks
=cwYX
-END PGP SIGNATURE-




Re: This Memorable Day

2004-11-04 Thread Nomen Nescio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

James A. Donald:

 You are quite right, it is unjust that people like Bin Laden are so
 immensely rich with oil wealth.  To remedy this problem, Bush
 should confiscate the Middle Eastern oil reserves.
 
 You are using stale old communist rhetoric - but today's terrorists
 no longer not even pretend to fight on behalf of the poor and
 oppressed.  

This was quite lame and doesn't really deserve a response. 

To label any argument that points out the obvious circumstance
that injustice feeds hatred as communist propaganda, is really only
ridiculous, even if it's also dangerously incompetent and as such no
real laughing matter.

Why do you mention Bin Laden anyway? There are thousands of
bigger and smaller groups around the world (they exists in every
country more or less) that we'd label as terrorists in the western
part of the world. You think every one of these hundreds of thousands
or perhaps millions of recruits and followers are millionaires?
Fantastically lame comment to a real and important issue.

Should we take you seriously when you write these childish rants?

I don't know what to fear the most, the dangerous ignorance of
those of your kind or what dictatorial rulers may accomplish using
your ignorant kind as followers who do not question the truths from
the authorities. Hitler did it in the 30's election where some 37%
voted for the nazis, in a democratic multi-party election I might
add. Some of the ingrediences present then in Hitler's rhetoric are
also present today in Bush's rhetoric, even though I don't mean to
make the comparison .

We just cannot afford to be this naive.

I can't help thinking about the fact that we usually portray
Americans as a religious and church going people. Perhaps some 25%
attend church on a somewhat regular basis. To make matters worse
those people seem to vote for Bush(?). One can't help wonder if
they're literate and if they actually read the bible and it's message
of love, understanding, forgiveness and compassion for their fellow
man.

May god bless the world, we may need it.


Johnny Doelittle


Men willingly believe what they wish.
(Julius Caesar)

There is nothing worse than aggressive stupidity.
(von Goethe)


-BEGIN PGP SIGNATURE-
Version: Tom Ridge Special v1.01

iQA/AwUBQYoO4jVaKWz2Ji/mEQKzWACfTEUN6ENT9/kbzMEOQVuvM4txtpIAnRI2
pU5RbBMeBggUCWf2ZW4rBQYG
=EiIW
-END PGP SIGNATURE-




Re: This Memorable Day

2004-11-03 Thread Nomen Nescio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

R.A. Hettinga:

 You're gonna love this one: You can't have terrorism without
 state sponsors.

Nonsense! Are you in junior high?


 We take out (by whatever means at hand...) state sponsors of
 terrorism, and, hey, presto, no terrorism. Iraq. Syria. Iran.
 Libya. Doesn't look so hard to me. Oh. That's right. Libya rolled
 over.
 
 Americans -- actually westerners in general -- may win ugly, Peter,
 but, so far, they win.

This post gave me a big laugh. So naive. There are a few basic
forces feeding extremism and terrorism around the world and those are
inequalities and injustice anywhere. As long as the most powerful
nations of the world continues to exploit the earth's resources
without taking appropriate considerations to other nations the wrath
and dismay of people elsewhere will always persist. Not understanding
this or simply neglecting it will further add to the negative
feelings and opinions and fuel extremism.

The only way to move towards a more friendly world is to make
people feel they are able to share the wealth and prosperity of the
world. As long as there is one single person anywhere in the world
hungering to death there is still a basis for fundamentalism and all
the problem that leads to.

Continuing being arrogant and policing the world without
listening to the oppressed people in the middle east and elsewhere
will never ever eradicate terrorism. You may may or may not be able
to reasonable confidently hinder most terror deeds (but only after
having turned also the western civilization into police states) but
you cannot stop the oppressed man from growing the hatred i his mind.

If you do not understand this you are not only unintelligent
IMNSHO but also part of the problem itself.



You're not to be so blind with patriotism that you can't face
reality.
Wrong is wrong, no matter who does it or says it.
 (Malcolm X)


Johnny Doelittle


-BEGIN PGP SIGNATURE-
Version: Tom Ridge Special v1.01

iQA/AwUBQYicHzVaKWz2Ji/mEQJ/KgCeJaL0A7KEtXrdg6DmER5yGHwhJWEAoNA/
96lJo2JRLf4zWoOTjELrPQB4
=Uq+t
-END PGP SIGNATURE-






Re: This Memorable Day

2004-11-03 Thread Nomen Nescio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

R.A. Hettinga:

 You're gonna love this one: You can't have terrorism without
 state sponsors.

Nonsense! Are you in junior high?


 We take out (by whatever means at hand...) state sponsors of
 terrorism, and, hey, presto, no terrorism. Iraq. Syria. Iran.
 Libya. Doesn't look so hard to me. Oh. That's right. Libya rolled
 over.
 
 Americans -- actually westerners in general -- may win ugly, Peter,
 but, so far, they win.

This post gave me a big laugh. So naive. There are a few basic
forces feeding extremism and terrorism around the world and those are
inequalities and injustice anywhere. As long as the most powerful
nations of the world continues to exploit the earth's resources
without taking appropriate considerations to other nations the wrath
and dismay of people elsewhere will always persist. Not understanding
this or simply neglecting it will further add to the negative
feelings and opinions and fuel extremism.

The only way to move towards a more friendly world is to make
people feel they are able to share the wealth and prosperity of the
world. As long as there is one single person anywhere in the world
hungering to death there is still a basis for fundamentalism and all
the problem that leads to.

Continuing being arrogant and policing the world without
listening to the oppressed people in the middle east and elsewhere
will never ever eradicate terrorism. You may may or may not be able
to reasonable confidently hinder most terror deeds (but only after
having turned also the western civilization into police states) but
you cannot stop the oppressed man from growing the hatred i his mind.

If you do not understand this you are not only unintelligent
IMNSHO but also part of the problem itself.



You're not to be so blind with patriotism that you can't face
reality.
Wrong is wrong, no matter who does it or says it.
 (Malcolm X)


Johnny Doelittle


-BEGIN PGP SIGNATURE-
Version: Tom Ridge Special v1.01

iQA/AwUBQYicHzVaKWz2Ji/mEQJ/KgCeJaL0A7KEtXrdg6DmER5yGHwhJWEAoNA/
96lJo2JRLf4zWoOTjELrPQB4
=Uq+t
-END PGP SIGNATURE-






Poor privacy protection in the states

2004-10-13 Thread Nomen Nescio
Why don't Americans honour security and privacy higher?

Look at this page
http://www.ci.stpaul.mn.us/depts/police/prostitution_photos_current.ht
ml

Which is from a police department!
http://www.ci.stpaul.mn.us/depts/police/


If we look at the spirit of this quote I don't see how it is ok to
behave in this abusive manner by the authorities.

The right of the people to be secure in their persons, houses,
papers and effects, against unreasonable searches and seizures, shall
not be violated... 

(from the fourth amendment, US constitution)

It is one thing if we're talking about very dangerous individuals who
are being sought after by the police and who the public needs to be
aware of but here we have a completely different situation.

Why is the integrity and security of the simple man on the street not
honoured in the US society today? It's a big difference between the
protection of personal privacy in Europe and in the US and all
Americans should really ask themselves why this has to be.






Poor privacy protection in the states

2004-10-13 Thread Nomen Nescio
Why don't Americans honour security and privacy higher?

Look at this page
http://www.ci.stpaul.mn.us/depts/police/prostitution_photos_current.ht
ml

Which is from a police department!
http://www.ci.stpaul.mn.us/depts/police/


If we look at the spirit of this quote I don't see how it is ok to
behave in this abusive manner by the authorities.

The right of the people to be secure in their persons, houses,
papers and effects, against unreasonable searches and seizures, shall
not be violated... 

(from the fourth amendment, US constitution)

It is one thing if we're talking about very dangerous individuals who
are being sought after by the police and who the public needs to be
aware of but here we have a completely different situation.

Why is the integrity and security of the simple man on the street not
honoured in the US society today? It's a big difference between the
protection of personal privacy in Europe and in the US and all
Americans should really ask themselves why this has to be.






Money Laundering for the Nazis by President Bush's family

2004-10-11 Thread Nomen Nescio
The subject says it all. Read more here:
http://www.debatecomics.org/BushFamilyFortune/

We must retire this criminal from office now!

Link to the full 89 MB pdf below

http://www.debatecomics.org/assets/Sources/US_Fascism/
A-2%20FascistFriendly%20Power%20Brokers/
Roaming%20Ghost%20Case/Whole/full.pdf

(Concat above rows to one URL)





Money Laundering for the Nazis by President Bush's family

2004-10-11 Thread Nomen Nescio
The subject says it all. Read more here:
http://www.debatecomics.org/BushFamilyFortune/

We must retire this criminal from office now!

Link to the full 89 MB pdf below

http://www.debatecomics.org/assets/Sources/US_Fascism/
A-2%20FascistFriendly%20Power%20Brokers/
Roaming%20Ghost%20Case/Whole/full.pdf

(Concat above rows to one URL)





Implant replaces ID cards for access to restricted areas.

2004-10-07 Thread Nomen Nescio
Mexican Attorney General, Staff Get Chip Implants

Implant replaces ID cards for access to restricted areas.

The Attorney General of Mexico, Rafael Macedo de la Concha, recently 
announced at the opening of Mexico's National Information Center that
he
and some of his staff had been implanted with VeriChips to replace
their
ID 
tags for access to restricted areas, and to access the country's
crime 
database.

http://www.govtech.net/magazine/channel_story.php?channel=24id=90885






Implant replaces ID cards for access to restricted areas.

2004-10-07 Thread Nomen Nescio
Mexican Attorney General, Staff Get Chip Implants

Implant replaces ID cards for access to restricted areas.

The Attorney General of Mexico, Rafael Macedo de la Concha, recently 
announced at the opening of Mexico's National Information Center that
he
and some of his staff had been implanted with VeriChips to replace
their
ID 
tags for access to restricted areas, and to access the country's
crime 
database.

http://www.govtech.net/magazine/channel_story.php?channel=24id=90885






Re: BrinCity 2.0: Mayor outlines elaborate camera network for city

2004-09-11 Thread Nomen Nescio
-BEGIN TYPE III ANONYMOUS MESSAGE-
Message-type: plaintext

R. A. Hettinga ([EMAIL PROTECTED]) wrote on 2004-09-10:
  Critics say the cameras ought not be regarded as a panacea in crime
 fighting. They say the more there are, the greater the potential for abuse.

So, since this is titled BrinCity, it surely means that the image
streams will be available from a web site and that we the people get
cameras in the emergency response center and the mayor's office?

-END TYPE III ANONYMOUS MESSAGE-



Re: BrinCity 2.0: Mayor outlines elaborate camera network for city

2004-09-11 Thread Nomen Nescio
-BEGIN TYPE III ANONYMOUS MESSAGE-
Message-type: plaintext

R. A. Hettinga ([EMAIL PROTECTED]) wrote on 2004-09-10:
  Critics say the cameras ought not be regarded as a panacea in crime
 fighting. They say the more there are, the greater the potential for abuse.

So, since this is titled BrinCity, it surely means that the image
streams will be available from a web site and that we the people get
cameras in the emergency response center and the mayor's office?

-END TYPE III ANONYMOUS MESSAGE-



Re: Remailers an unsolveable paradox?

2004-09-04 Thread Nomen Nescio
 We want to be able to provide the means for whistleblowers and
 others to communicate in a secure and anonymous fashion. Yet we need
 to make sure we're not abused too much since sooner or later laws
 will catch up with the remailers should abuse sky-rocket.

The ratio of remailer use to abuse is painfully low because there's no way
to actually communicate. You can broadcast but not recieve, because no
system exists to receive mail psuedononymously. This is not communication.

Remailer use is restricted to when senders don't care about listener,
which means rants, death threats, and the abuse of spam. The only systems
for receiving mail are at best some college student's unimplemented thesis.

Let's take our shining example of truth and freedom, the whistle-blower.
When they send out mail to the media or whomever, one of two things happens:
they see the story published or they don't. If not, there's no idea why: was
it received? Did the media want more information? Did they need more
support? Do they want to verify it? Do they want to help the whistle-blower?
Even if the story is published, whistle-blowing is kneecapped: it can't be
supported, or expanded on, or debated in any but the most rudimentary
fashion.

It doesn't matter if remailers disappear, they've already failed.




Re: Remailers an unsolveable paradox?

2004-09-04 Thread Nomen Nescio
 We want to be able to provide the means for whistleblowers and
 others to communicate in a secure and anonymous fashion. Yet we need
 to make sure we're not abused too much since sooner or later laws
 will catch up with the remailers should abuse sky-rocket.

The ratio of remailer use to abuse is painfully low because there's no way
to actually communicate. You can broadcast but not recieve, because no
system exists to receive mail psuedononymously. This is not communication.

Remailer use is restricted to when senders don't care about listener,
which means rants, death threats, and the abuse of spam. The only systems
for receiving mail are at best some college student's unimplemented thesis.

Let's take our shining example of truth and freedom, the whistle-blower.
When they send out mail to the media or whomever, one of two things happens:
they see the story published or they don't. If not, there's no idea why: was
it received? Did the media want more information? Did they need more
support? Do they want to verify it? Do they want to help the whistle-blower?
Even if the story is published, whistle-blowing is kneecapped: it can't be
supported, or expanded on, or debated in any but the most rudimentary
fashion.

It doesn't matter if remailers disappear, they've already failed.




Remailers an unsolveable paradox?

2004-09-01 Thread Nomen Nescio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Are remailers an unsolveable paradox?

We want to be able to provide the means for whistleblowers and
others to communicate in a secure and anonymous fashion. Yet we need
to make sure we're not abused too much since sooner or later laws
will catch up with the remailers should abuse sky-rocket.

Once upon a time all email servers were open relays. This was a
friendly time and spam wasn't invented. As time changed the focus
turned on securing the relaying procedures and has continued until
this day. Yet as we know the flow of spam (most of it coming directly
or indirectly from US) continued to increase, despite even existing
legislation today.

What are the possible solutions for the remailers? Make all
remailers middleman only and adding the ability to opt-in for
delivery outside the network? Having a network of middleman remailers
and some nymservers that only delivers to other nymserver or opted-in
servers will at least provide some means for people to communicate
between themselves. It would in practise destroy the ability to
contact anyone outside the network though, making the network an
isolated place for a few. Using techniques like Hashcash should be
more or less mandatory even today to make it harder to mailbomb or
send large amounts spam? Why is it not?

Regardless of what any hardcore cypherpunk or old-timers in the
remailer community may think about any ideas imposing restrains on
the useability of remailers something just have to be made about the
abuse of the system. I also predict that the abuse will increase so
time is ticking in a sense.

Making sure we have robust remailing services in one shape or
another and at the same time have some kind of at least indirect
acceptance from legislators and also a low degree of spam flowing
through are essential goals.

The average naive and ignorant redneck will never ever understand
the principal arguments for free speech that makes remailers useful.
The average american do not think and analyze what is told to him.
You will probably today find millions of americans who believe that
Saddam and Al-Qaeda did business just because Bush and the
administration lied about that initially, even though it's more or
less confirmed today that those links were not there.

The rednecks also vote however (to some extent) and that's why it
will be a piece of cake to strike against the remailers if the
politicians would like to. And they will, if and when serious abuse
were to happen more often utilizing remailers. What would happen if
it was found (or simply suspected or claimed) that some terror deed
was planned using remailers? How long time would it take for us to
see new laws being proposed? Not long. And don't forget that anyone
(like Tom Ridge himself) could send bogues messages through the
system trying to 

Since providing a true non-censoring remailing service and at the
same time safeguard against spam and abuse are therotically
incompatible I guess remailers are indeed a paradox waiting to be
shut down sooner or later by politicians if we're not open to at
least discuss some aspects of how these services are operated.


Johnny Doelittle


-BEGIN PGP SIGNATURE-
Version: Tom Ridge Special v1.01

iQA/AwUBQTWdszVaKWz2Ji/mEQJlUwCfT/jWnw/p2ydTJTKMYKA5/hs+Dm8AoNoE
r9bl2EtJ3CQpZPgfkSPfGBWB
=B8dt
-END PGP SIGNATURE-




 Effective today, Lemuria will be going middlemen.
 
 Sometime around the middle of the month, Lemuria will go away.
 
 This is final.
 
 
 The main reasons are that I've lost my faith in the usefulness of
 the remailer network. I have indications that the remailer network
 is
 being massively abused, on the scale where the legitimate mails are
 a tiny fraction that would be better served using other means.
 
 There are two main reasons for my thoughts. One is I have looked at
 the bounces I receive, and compared their numbers to my statistics.
 According to that data, without having run a statistically
 significant analysis, the major traffic coming through Lemuria is
 Spam, with
 threats and harrassment a second. I realize that in the no-bounces,
 the fraction of legitimate mails will be higher, but even assuming
 a factor of 10, it is still a negligable part.
 
 Second, I've the mail attached below yesterday. In case you can't
 read german, it is essentially spam advertising the mixmaster
 software and some book and/or software I haven't tested, might be a
 mixmaster
 client, might be a trojan. This is a sign for me that the anonymous
 remailer network is being used systematically for abuse, on a large
 scale. I don't want to be a part of that.
 
 As mixmaster has no features whatsoever to prevent this crap, and
 the encrypted only switch doesn't do what it should do, and
 legitimate traffic is close to zero anyways, I'll be taking Lemuria
 down and
 leaving the remailer community.
 
 It was an interesting time, and between frog, the SciTol fanatics
 

Re: JYA in NYT

2004-08-29 Thread Nomen Nescio
http://nytimes.com/2004/08/29/nyregion/29pipeline.html

August 29, 2004
Mapping Natural Gas Lines: Advise the Public, Tip Off the Terrorists
By IAN URBINA

John Young says he is an agent for change, hoping to point out places
where the government needs to bolster national security. Since 1996,
he has been posting documents on his Web site, ranging from detailed
maps of nuclear storage facilities in New Mexico to aerial
photographs of police preparations for the Republican National
Convention. He has never attracted much attention from the
authorities, and what he does is fully legal.

But last month, Mr. Young, a 68-year-old architect originally from
Odessa, Tex., began publishing maps and pictures of natural gas
pipelines in New York City on his site (www.cryptome.org). One
photograph was of a large sign in Midtown Manhattan warning about the
presence of a major gas main, a sign that had been meant to prevent
deadly accidents. Within a week, the company that owns the pipeline
took the sign down.

They posted the signs because they thought someone might
accidentally blow the pipeline up,'' Mr. Young said. Now, they're
taking them down because they think someone might intentionally blow
it up.''

For Mr. Young - and for a range of experts across the country - the
strange and unnoticed little episode in Manhattan underscores one of
the great tensions of the post-9/11 world: how to balance the desire
for secrecy with decisions on what is best for public safety.

Few issues highlight that tension better than the topic of natural
gas.

Private industry and local governments have spent much of the last
several decades trying to make natural gas pipelines safer by
publicizing where they are. Natural gas, highly explosive and
transported in pipes underneath unknowing residents or uncharted
along waterways, has been the cause of scores of lethal accidents -
fiery explosions caused by misdirected backhoes or wayward boat
anchors.

But recent concerns have pushed in the opposite direction.
Increasingly, gas companies have been clearing their Web sites of
pipeline maps previously used by contractors before excavating.
Almost all nautical charts once indicated where gas pipes run. Fewer
do now.

Federal regulations require companies to make these lines as obvious
as possible and educate the public about where they are,'' said Kelly
Swan, a spokesman for Williams, the company that owns the pipe
supplying Manhattan. But local laws indicate that we were allowed to
get rid of that particular sign, and after the recent publicity about
it, we did.''

Edward M. Stroz, a retired F.B.I. agent who runs his own consulting
firm on security issues, said many infrastructure companies found
themselves caught between old risks and new threats.

The challenge is to make this infrastructure not so obvious that
it's almost inviting to terrorists,'' he said, while also not
pulling so much information out of public reach that accidents
occur.''

Natural gas arrives in New York City through six so-called city
gates, reached after traveling thousands of miles in pipes running
from deposits deep beneath southeastern Texas and Sable Island, off
the east coast of Nova Scotia. Here it enters a local grid of smaller
pipes owned by Consolidated Edison in Manhattan, the Bronx and
portions of Queens, and owned by Keyspan in the rest of the city. The
gas is used for heating, cooking, and increasingly for fuel in city
power plants.

But natural gas is also at risk of sabotage.

This tactic actually comes from our own playbook,'' said Thomas C.
Reed, the former secretary of the Air Force under President Gerald R.
Ford and the author of At the Abyss: An Insider's History of the
Cold War.'' In 1982, the C.I.A. hacked into the software that
controlled Soviet natural gas pipelines, causing vital pumps,
turbines and valves to go haywire, he explained. The result, Mr. Reed
said, was the largest nonnuclear explosion and fire ever seen from
space and a major blow to Soviet sales of natural gas to Western
Europe.

The tactic was a stroke of genius,'' he said.

Jose Padilla, the former Chicago gang member who grew up in Brooklyn,
and who was accused of becoming an operative for Al Qaeda, intended
to use natural gas to blow up three tall buildings, the authorities
say. According to government documents, Mr. Padilla intended to rent
apartments in three high-rise buildings that used natural gas, fill
each apartment with fumes and detonate the three buildings
simultaneously using timers.

Security experts have repeatedly pointed to the natural gas pipeline
system as a dangerous Achilles' heel in the domestic infrastructure.
A report by the Council on Foreign Relations in 2002 said that city
gates and compressor stations, which keep the gas moving through the
pipelines, were most vulnerable. These critical nodes, the report
explained, are usually above ground and sometimes protected only by
chain-link fences and padlocks. If even one or two of these locations
were 

EFGA?

2004-08-29 Thread Nomen Nescio
What happened to Electronic Frontiers Georgia (efga.org)? Are they
gone for good? They did operate the cracker remailer did they not?
And they did have a newsletter on privacy issues? Anyone knows?





CDR nodes listing

2004-08-28 Thread Nomen Nescio
Can someone post a listing of all active CDR nodes please?

Information from pages like this one lists some inactive nodes I'm
sure
http://www.al-qaeda.net/cpunk/





CDR nodes listing

2004-08-28 Thread Nomen Nescio
Can someone post a listing of all active CDR nodes please?

Information from pages like this one lists some inactive nodes I'm
sure
http://www.al-qaeda.net/cpunk/





Michael Moore in Cambridge (download speech)

2004-08-09 Thread Nomen Nescio
Very interesting speech by Michael Moore in Cambridge July 27, 10 MB

http://hem.bredband.net/b114631/tillf/Michael_Moore_in_Cambridge_04072
7.rm

The file will be available for download a short period of time.

Michael shows us what the upcoming election is all about.






Type III Anonymous message

2004-06-28 Thread Nomen Nescio
-BEGIN TYPE III ANONYMOUS MESSAGE-
Message-type: plaintext

From: a.melon@
To: Major Variola (ret) [EMAIL PROTECTED]
Cc: 
Bcc: 
Subject: Re: For Liars and Loafers, Cellphones Offer an Alibi
Reply-To: 
In-Reply-To: [EMAIL PROTECTED]

Hi,
Major Variola (ret) ([EMAIL PROTECTED]) wrote on 2004-06-27:
 At 11:53 PM 6/26/04 -0500, J.A. Terranson wrote:
 not to overpower the wanted signals on something like this.  Even if this
 is doable, it is out of reach of Jane Citizen.
 
 Any signal you put out is trackable to you geographically, whether its
 a cell or GPS frequency.

A GPS receiver doesn't broadcast its location. GPS works purely by
analyzing the signals received from satellites. This is probably a design
goal for military use, as well as a consequence of power requirements.

There is no such thing as a GPS frequency. It seems that for CDMA or
WCDMA phones the location service is defined in terms of messages on the
normal network layer, see a Google search for position determination service
order.
-END TYPE III ANONYMOUS MESSAGE-



Re: [Politech] John Gilmore on the homeless, RFID tags, and kittens

2004-04-02 Thread Nomen Nescio
At 05:39 PM 4/1/04 -0500, Steve Furlong wrote:
On Thu, 2004-04-01 at 16:21, R. A. Hettinga wrote:

 Tastes just like chicken?

Can we change the subject? My girlfriend is Chinese,

Does she have a chip implant?

I've already eaten
things that I wouldn't have considered to be food

Ask her to shower first

 she doesn't like my
cat

Get a new girlfriend



Re: [Politech] John Gilmore on the homeless, RFID tags, and kittens

2004-04-01 Thread Nomen Nescio
At 05:39 PM 4/1/04 -0500, Steve Furlong wrote:
On Thu, 2004-04-01 at 16:21, R. A. Hettinga wrote:

 Tastes just like chicken?

Can we change the subject? My girlfriend is Chinese,

Does she have a chip implant?

I've already eaten
things that I wouldn't have considered to be food

Ask her to shower first

 she doesn't like my
cat

Get a new girlfriend



Re: Gentlemen reading mail part II (opsec review)

2004-03-01 Thread Nomen Nescio
Justin says:

 If they know you're trying to shake them, that alerts them and
 eliminates any opportunity you might have otherwise had to feed them
 misinformation in the future.


  That's when you strap on the C-4 vest.

Zombie Monger



Re: Gentlemen reading mail part II (opsec review)

2004-03-01 Thread Nomen Nescio
Justin says:

 If they know you're trying to shake them, that alerts them and
 eliminates any opportunity you might have otherwise had to feed them
 misinformation in the future.


  That's when you strap on the C-4 vest.

Zombie Monger



the Kuwait issue is not associated with America

2003-12-20 Thread Nomen Nescio
Thanks Steve, I don't think I have heard this before. I googled on the text you quoted 
and found this url

http://wais.stanford.edu/Iraq/iraq_andambassaprilglaspie22303.html

and a few more

http://www.whatreallyhappened.com/ARTICLE5/april.html
http://www.chss.montclair.edu/english/furr/glaspie.html

I don't know what to say. This makes me sick to my stomach.

I guess one way of lookin at this is that U.S. played dirty and deceiving.
U.S. is more or less the reason Iraq invaded Kuwait.

I guess this is not told on Fox news.



the Kuwait issue is not associated with America

2003-12-20 Thread Nomen Nescio
Thanks Steve, I don't think I have heard this before. I googled on the text you quoted 
and found this url

http://wais.stanford.edu/Iraq/iraq_andambassaprilglaspie22303.html

and a few more

http://www.whatreallyhappened.com/ARTICLE5/april.html
http://www.chss.montclair.edu/english/furr/glaspie.html

I don't know what to say. This makes me sick to my stomach.

I guess one way of lookin at this is that U.S. played dirty and deceiving.
U.S. is more or less the reason Iraq invaded Kuwait.

I guess this is not told on Fox news.



Re: U.S. in violation of Geneva convention?

2003-12-19 Thread Nomen Nescio
Ken, Eh what?

Yes I've heard a lot of the Soviet union, however I don't see what you meant by that 
comment here.

What I was referring to was the winning powers' treatment of the Nazi war criminals 
after WWII, Nurnburg trials and so on. (Note the word trials here)

I don't think I've ever heard that the Nazi prisoners where drugged, abused or 
otherwice tortured or mistreated and humiliated. Feel free to enlighten me on this.



President of Flies

2003-12-19 Thread Nomen Nescio
US is currently run by thugs supported by the cheering consumer crowds that have been 
bred and conditioned to be infantile.

So the situation is best evaluated in the Lord of Flies context. As long as masters 
are winning and have stronger army than anyone else, nothing will change. You will 
notice that they never engage army unless they have several orders of magnitude 
strength advantage.

Which means that only small countries are in danger.

There are two consequences of this:

(a) there is no likely grouping of bigger entities to strike back - and that is the 
only response that will change US behavior. Until US is beaten and have suffered 
occupation and complete military defeat nothing much will change. This will eventually 
happen as history demonstrates that empires are not capable of sustained supremacy 
(due to the negative selection within among other factors - incidentally, the brain 
drain in the last 3-4 years have changed direction - this is the most significant 
metric.) But not any time soon.

(b) smaller countries will strive to arm themselves with effective weaponry. The 
window for this is closing and in few years there will be two clearly defined clubs: 
untouchables and fair game. It looks that most of the arab world is heading for the 
fair game status and they are understandably unhappy with it.

The main question is - will the income from newly and soon to be acquired colonies be 
sufficient to prevent confrontation between US and the rest of developed and armed 
world? 



Re: U.S. in violation of Geneva convention?

2003-12-19 Thread Nomen Nescio
After WWI the winners humiliated the loosers badly. This is one of the main reasons 
Hitler came to power and got support from the Germans for the aggressions that started 
the war. He managed to use these feelings of being treated as dogs and paying to heavy 
for the first war. Also they were very humiliated by the fact that France then 
occupied part of western Germany.

After WWII the winners had learned their lesson from WWI pretty well. Now they did 
not humilate the people of Germany like after the first war. We got the Marshal plan 
and so on.

Let's face it: not even the Nazi war criminals were treated in the way Saddam has been 
treated.

Is this something U.S. should feel comfortable with then? Some people on this list 
seem to have these disturbing thoughts.

It will backfire sooner or later I'm afraid. And then it may be our kids who pay the 
price.



Re: U.S. in violation of Geneva convention?

2003-12-19 Thread Nomen Nescio
Ken, Eh what?

Yes I've heard a lot of the Soviet union, however I don't see what you meant by that 
comment here.

What I was referring to was the winning powers' treatment of the Nazi war criminals 
after WWII, Nurnburg trials and so on. (Note the word trials here)

I don't think I've ever heard that the Nazi prisoners where drugged, abused or 
otherwice tortured or mistreated and humiliated. Feel free to enlighten me on this.



President of Flies

2003-12-19 Thread Nomen Nescio
US is currently run by thugs supported by the cheering consumer crowds that have been 
bred and conditioned to be infantile.

So the situation is best evaluated in the Lord of Flies context. As long as masters 
are winning and have stronger army than anyone else, nothing will change. You will 
notice that they never engage army unless they have several orders of magnitude 
strength advantage.

Which means that only small countries are in danger.

There are two consequences of this:

(a) there is no likely grouping of bigger entities to strike back - and that is the 
only response that will change US behavior. Until US is beaten and have suffered 
occupation and complete military defeat nothing much will change. This will eventually 
happen as history demonstrates that empires are not capable of sustained supremacy 
(due to the negative selection within among other factors - incidentally, the brain 
drain in the last 3-4 years have changed direction - this is the most significant 
metric.) But not any time soon.

(b) smaller countries will strive to arm themselves with effective weaponry. The 
window for this is closing and in few years there will be two clearly defined clubs: 
untouchables and fair game. It looks that most of the arab world is heading for the 
fair game status and they are understandably unhappy with it.

The main question is - will the income from newly and soon to be acquired colonies be 
sufficient to prevent confrontation between US and the rest of developed and armed 
world? 



Re: U.S. in violation of Geneva convention?

2003-12-17 Thread Nomen Nescio
Tim, sorry it was unclear from my post whom I was referring to. It was James A. 
Donald. I did put his message id in a reply-to header.

Jim Dixon wrote:
 Hitler, you mean?  Or did you have Milosevic in mind?

No what I meant was what IF somehow Bush or Blaire or some other high ranking 
coalition politician were captured by Iraq during the war and was treated in the same 
way. I can only presume you would support Saddam's soldiers checking Bush for lice 
then. You are also utterly missing the point and you are one pretty good example of 
how the mob are thinking. EVERYONE, including Saddam, Pol Pot or whattever should be 
treated in accordance with the laws by us who call ourselves the free democratic part 
of the world. Then they shall stand trial. A fair trial and being represented by 
lawyers.

What would be more satisfying for the critics of U.S. than to see U.S. not being able 
to get its act together and instead conducting itself in a manner inconsistent with 
international law during this rather criticl phase of the Iraqi campaign. Mark my 
words, U.S. will be in regret later.

Jim Dixon, you also wrote some half trouths on the subject of Palestinians and the 
support they received.

You should read up on this subject. Saddam also has a history of building up 
edicational institutions and so on. He recived awards by U.N. earlier on for his 
wellfare programs and the development Iraq was gaining. Anyone can check this up, just 
call U.N. in NY and you'll receive a few references I'm sure. What I mean by this is 
not to defend him in any way but I feel that this rewriting of history and propaganda 
is serving noone in the long run. If you believe that 100% of the arab world in their 
harts and minds hate Saddam you're wring. Very wrong.

Steve Schear: thanks for your interesting post! Some people need to learn more of that.

I also noticed on the news that CIA was conducting the questioning of Saddam. (Did 
anyone expect anything else?!) I guess this also means that U.S. now will join all 
dicatators and awful beasts in performing various forms of abuse and torture on him. 
Iraq formally removed the death penalty just a few weeks ago. Regardless of what you 
feel about that in general, I think it's embarrasing once again to see U.S. almost 
lobbying against the Iraqis to have them not honouring their own laws to satisfy 
Bush on this specific issue! Remember there's only one reason for Bush wanting to see 
Saddam dead and that he does. And that is the fact that Saddam tried to kill my papa 
as Bush put it, I've seen it in interviews myself.

Jim Dixon, going through your post again I see yet another half trough, you write
 The people on this list are less.. public humiliation and hanging of Americans..

And you seem to forget that U.S. was in bed with Saddam during the Iran-Iraq war era 
and that there was a friendly tone then. U.S. officials met with Iraqi, I think that 
Tareq Azis met with Reagan even? 

Your whole post is based on the feeling that we're gonna do what they did to us. In 
doing so you have manifested what has been written here about gasing into the abyss 
and so on. You have become what you hunt. Be ware.

It is my opinion that we shall distinguish ourselves from these bastards by not 
committing their deeds ourselves. You seem not to agree on that. And that is a major 
mistake.



Re: U.S. in violation of Geneva convention?

2003-12-17 Thread Nomen Nescio
Tim, sorry it was unclear from my post whom I was referring to. It was James A. 
Donald. I did put his message id in a reply-to header.

Jim Dixon wrote:
 Hitler, you mean?  Or did you have Milosevic in mind?

No what I meant was what IF somehow Bush or Blaire or some other high ranking 
coalition politician were captured by Iraq during the war and was treated in the same 
way. I can only presume you would support Saddam's soldiers checking Bush for lice 
then. You are also utterly missing the point and you are one pretty good example of 
how the mob are thinking. EVERYONE, including Saddam, Pol Pot or whattever should be 
treated in accordance with the laws by us who call ourselves the free democratic part 
of the world. Then they shall stand trial. A fair trial and being represented by 
lawyers.

What would be more satisfying for the critics of U.S. than to see U.S. not being able 
to get its act together and instead conducting itself in a manner inconsistent with 
international law during this rather criticl phase of the Iraqi campaign. Mark my 
words, U.S. will be in regret later.

Jim Dixon, you also wrote some half trouths on the subject of Palestinians and the 
support they received.

You should read up on this subject. Saddam also has a history of building up 
edicational institutions and so on. He recived awards by U.N. earlier on for his 
wellfare programs and the development Iraq was gaining. Anyone can check this up, just 
call U.N. in NY and you'll receive a few references I'm sure. What I mean by this is 
not to defend him in any way but I feel that this rewriting of history and propaganda 
is serving noone in the long run. If you believe that 100% of the arab world in their 
harts and minds hate Saddam you're wring. Very wrong.

Steve Schear: thanks for your interesting post! Some people need to learn more of that.

I also noticed on the news that CIA was conducting the questioning of Saddam. (Did 
anyone expect anything else?!) I guess this also means that U.S. now will join all 
dicatators and awful beasts in performing various forms of abuse and torture on him. 
Iraq formally removed the death penalty just a few weeks ago. Regardless of what you 
feel about that in general, I think it's embarrasing once again to see U.S. almost 
lobbying against the Iraqis to have them not honouring their own laws to satisfy 
Bush on this specific issue! Remember there's only one reason for Bush wanting to see 
Saddam dead and that he does. And that is the fact that Saddam tried to kill my papa 
as Bush put it, I've seen it in interviews myself.

Jim Dixon, going through your post again I see yet another half trough, you write
 The people on this list are less.. public humiliation and hanging of Americans..

And you seem to forget that U.S. was in bed with Saddam during the Iran-Iraq war era 
and that there was a friendly tone then. U.S. officials met with Iraqi, I think that 
Tareq Azis met with Reagan even? 

Your whole post is based on the feeling that we're gonna do what they did to us. In 
doing so you have manifested what has been written here about gasing into the abyss 
and so on. You have become what you hunt. Be ware.

It is my opinion that we shall distinguish ourselves from these bastards by not 
committing their deeds ourselves. You seem not to agree on that. And that is a major 
mistake.



Remailers and TLAs

2003-12-16 Thread Nomen Nescio
Even though I agree this issue is important I wouldn't be surprised if NONE were run 
by TLAs today and NONE has ever been run by TLAs. We will never get any such answer 
and therefore these speculations will continue. Personally I think it sounds really 
stupid when I read comments like you can only trust remailers from pre 9/11 (these 
kinds of silly/stupid/dumb-paranoid comments are often seen on A.P.A-S). The reason 
being really that I think they are too stupid and perhaps doesn't really understand 
what good it would do them to actually operate a few. I may be wrong I guess. When 
thinking of these things I also remeber having read several comments by remops that 
actually have been visited by police. Both in U.S. and abroad. The feeling I got from 
reading their comments is that the police (in case of U.S. I think it was FBI who was 
inviolved) actually didn't even know what a remailer was. If (and this is a bif if) 
that is true in general amongst FBI agents I don't think th
 ere's a major risk of beeing flooded by TLA operated remailers any time soon. But who 
knows.



Remailers and TLAs

2003-12-16 Thread Nomen Nescio
Even though I agree this issue is important I wouldn't be surprised if NONE were run 
by TLAs today and NONE has ever been run by TLAs. We will never get any such answer 
and therefore these speculations will continue. Personally I think it sounds really 
stupid when I read comments like you can only trust remailers from pre 9/11 (these 
kinds of silly/stupid/dumb-paranoid comments are often seen on A.P.A-S). The reason 
being really that I think they are too stupid and perhaps doesn't really understand 
what good it would do them to actually operate a few. I may be wrong I guess. When 
thinking of these things I also remeber having read several comments by remops that 
actually have been visited by police. Both in U.S. and abroad. The feeling I got from 
reading their comments is that the police (in case of U.S. I think it was FBI who was 
inviolved) actually didn't even know what a remailer was. If (and this is a bif if) 
that is true in general amongst FBI agents I don't think th
 ere's a major risk of beeing flooded by TLA operated remailers any time soon. But who 
knows.



Re: U.S. in violaton of Geneva convention?

2003-12-16 Thread Nomen Nescio
This makes me a bit curious. Tell me, is your opinion then that the U.S. has done 
nothing questionable here? You don't feel that treating a former head of state 
(regardless of what you happen to think of that person) in this manner and 
videorecording it AND transmitting it to the entire globe violates the spirit of the 
convention? You feel this was the right thing to do? You would have no problem seing a 
U.S. or European leader being treated the same way? 

I think we do have to take into consideration too that a lot of people (I'm not saying 
it's the majority or anything but still a lot of people) in some arab countries like 
Jordan, Egypt, Syria and Saudi Arabia do have some sympathy with Saddam. This has 
nothing to do with supporting his crimes like the chemical warfare but more general 
the fact that he was a leader in the region who stood up against U.S. and Israel. Also 
the Palestinians received a lot of finansial help from Saddam.

I don't know, but I have this feeling that just maybe this wasn't the most appropriate 
way to behave all things considered. This is a tense and volatile region as it is. I 
think we all should exercise caution and careful considerations and try to not 
humiliate the pride of the people in this region. Remember that in many cases this is 
almost all they have left.

Just my 2c.



self adjusting dummy traffic generation?

2003-12-15 Thread Nomen Nescio
Would it be possible to have a self adjusting dummy traffic generator feature 
in remailers? Operator decides that he wants to process x number of incoming and y 
number of outgoing messages each time period t. Then the software adjusts the number 
of dummy messages to this value using some statistical calculations of past t2 hours. 
If incoming traffic increases then the amount of dummy messages are decreasing and so 
on. Does this feature exist today?



self adjusting dummy traffic generation?

2003-12-15 Thread Nomen Nescio
Would it be possible to have a self adjusting dummy traffic generator feature 
in remailers? Operator decides that he wants to process x number of incoming and y 
number of outgoing messages each time period t. Then the software adjusts the number 
of dummy messages to this value using some statistical calculations of past t2 hours. 
If incoming traffic increases then the amount of dummy messages are decreasing and so 
on. Does this feature exist today?



Fuck em to death

2003-12-13 Thread Nomen Nescio
Death to the Oinks!



Fuck Them All Dead

2003-12-13 Thread Nomen Nescio
Off All the Pigs!



Fuck Them Dead

2003-12-13 Thread Nomen Nescio
Off the Pigs!



Fuck Them All Dead

2003-12-13 Thread Nomen Nescio
Off All the Pigs!



Fuck em to death

2003-12-13 Thread Nomen Nescio
Death to the Oinks!



Re: Zombie Patriots and other musings

2003-12-12 Thread Nomen Nescio
Another excellent group of potential recruits are prisoners.
Especially if you can create a new religious movement teaching
them to stop the interracial, intergang fighting and concentrate
on their true enemy, the Man. Teach that killing cops, soldiers,
any type of government agent, is a holy act. Robbing banks is 
a holy act. Killing the guards in the prisons, killing the 
excutives of polluting industries -- all holy acts. 
Leaflets could be dropped from radio controlled balloons 
during yard time preaching the Word. 



Re: Zombie Patriots and other musings

2003-12-12 Thread Nomen Nescio
Nomen Nescio spake:

 Another excellent group of potential recruits are prisoners.
 Especially if you can create a new religious movement teaching
 them to stop the interracial, intergang fighting and concentrate
 on their true enemy, the Man. Teach that killing cops, soldiers,
 any type of government agent, is a holy act. Robbing banks is 
 a holy act. Killing the guards in the prisons, killing the 
 excutives of polluting industries -- all holy acts. 

Why robbing banks?  Aside from allowing the
government to regulate them, what have they
done to deserve being robbed?



Re: Zombie Patriots and other musings

2003-12-12 Thread Nomen Nescio
Another excellent group of potential recruits are prisoners.
Especially if you can create a new religious movement teaching
them to stop the interracial, intergang fighting and concentrate
on their true enemy, the Man. Teach that killing cops, soldiers,
any type of government agent, is a holy act. Robbing banks is 
a holy act. Killing the guards in the prisons, killing the 
excutives of polluting industries -- all holy acts. 
Leaflets could be dropped from radio controlled balloons 
during yard time preaching the Word. 



Re: Zombie Patriots and other musings

2003-12-12 Thread Nomen Nescio
Anonymous wrote:

 Nomen pondered:
 
  Why robbing banks?  Aside from allowing the
  government to regulate them, what have they
  done to deserve being robbed
 
Why not? Revolutionaries need money, and the financial sector has 
 always been asshole buddies with the police, politicians, and other pigs.

Retarded.  Someone trying to frame Mr. Seaver by adopting his
three-space paragraph lead-ins.



Re: cypherpunks discussions

2003-12-09 Thread Nomen Nescio
I find it strange that some people here so often wants to intimidate those that dares 
to ask some questions. Eric put it very well in his post about dicksizewar. Very true 
indeed.

I find it very *l*a*m*e* to all the time tell people to RTFM when something comes up 
that happened to be have been dealt with like five years ago.



Re: cypherpunks discussions

2003-12-09 Thread Nomen Nescio
I find it strange that some people here so often wants to intimidate those that dares 
to ask some questions. Eric put it very well in his post about dicksizewar. Very true 
indeed.

I find it very *l*a*m*e* to all the time tell people to RTFM when something comes up 
that happened to be have been dealt with like five years ago.



Re: e voting (receipts, votebuying, brinworld)

2003-11-26 Thread Nomen Nescio
Cameras in the voting booth?  Jesus Christ, you guys are morons.  If you
want to sell your vote, just vote absentee.  The ward guy will even stamp
and mail it for you.  Happens every election.



Re: e voting (receipts, votebuying, brinworld)

2003-11-26 Thread Nomen Nescio
Cameras in the voting booth?  Jesus Christ, you guys are morons.  If you
want to sell your vote, just vote absentee.  The ward guy will even stamp
and mail it for you.  Happens every election.



polygonal sequences

2003-11-25 Thread Nomen Nescio
Hello

 I was trying to find some old references I used to have concerning an idea men tioned 
in sci.crypt way back.

 It was Phil Zimmermann I think who mentioned something about a possibly new idea for 
a new public key scheme. He called it The cryptographic uses of polygonal sequences 
and is found here I think: 
http://groups.google.com/groups?selm=12044%40ncar.ucar.eduoe=UTF-8output=gplain

thanks



Re: EFF Report on Trusted Computing

2003-10-13 Thread Nomen Nescio
Just thought someone should take the trouble to rebut the anonymous
pro-treacherous-computing rantings...

I have heavily trimmed our anonymous ranters verbose writing style to
keep just the bits I'm responding to (inline...)

 The EFF tries to distinguish between good and bad aspects of TC,
 but it does not draw the line in quite the right place, even given
 its somewhat questionable assumptions.  

Unsubstantiated claim: what incorrect assumptions did Schoen make?  I
did not see any.

 It fails to sufficiently emphasize the many positive uses of the
 full version of TC (and hence the costs of blocking its
 implementation),

Schoen points out that TC can be broken out into desirable and
undesirable features.  If you omit the undesirable features, as he
describes, you get the remaining desirable features.

There is no loss from blocking the undesirable features.

 And the recommended fix to TC is not clearly described and as
 written appears to be somewhat contradictory.

I see no contradition.  More unsubstantiated claims.

 But let us begin with some positive elements of the EFF report.  This is
 perhaps the first public, critical analysis of TC which fails to include
 two of the worst lies about the technology, lies promulgated primarily
 by Ross Anderson and Lucky Green: that only authorized programs can run
 trusted, and that unauthorized or illegal programs and data will be
 deleted from computers or prevented from running.  

They are not lying and you do your credibility no favors by making
such unsubstantiated claims.

You are just misconstruing the obvious meaning of their warnings: the
features they describe (and plenty more and worse) are technically
feasible with the TC hardware enforcement, and given microsoft's
history of repeated dirty tricks campaigns in the areas of document
format wars, reporting private information back home to microsoft,
browser wars, interface wars, restrictive business practices regarding
licensing it would be fool hardy in the extreme to not expect more of
the same in the area of platform control based on Palladium.

Of course _you_ are not wishing to admit or emphasize these points,
but you can hardly get away with impugning the integrity of high
reputation individuals like Prof Ross Anderson with such paltry
mischaracterisation.

Your arguments are crass and of the form: but the current microsoft
PR documents don't admit that it could do that, nor of course that
microsoft are planning to do that, so it's not fair for you to point
that out and caution people about the kinds of things microsoft may be
planning.  Technology is criticized and discussed based on the
potential and most likely inferred directions given microsoft's
history and prior demonstration of interest to control various aspects
of the software platform.

 The report also forthrightly rejects the claim that TC technology is
 some kind of trick to defeat Linux or lock-in computers to Microsoft
 operating systems, 

It's far from obvious that TC will have no part to play in the next
few decades of open warfare against linux from microsoft.  There are
any number of ways to extend the existing dirty tricks regarding
formats, protocols, licensing etc using the TC hardware enforcement.

 The EFF attempts to distinguish one feature of TC, remote
 attestation, as a source of problems.  This is the ability of a
 computer user to convince other systems about what software he is
 running.  The EFF is convinced that this feature will cause users to
 be compelled to use software not of their choice; harm
 interoperability and encourage lock-in; and support DRM and various
 restrictive kinds of licensing.

Yes indeed and they are quite right.  That is exactly the problem with
remote attestation.

 But when we break these down in detail, many of the problems either
 go away or are not due to attestation.

More unsubstantiated claims.  This statement is both false and not
backed up by any of your following text.

 Software choice limitation may occur if a remote system provides
 some service conditional on the software being used to access it.
 But that's not really a limitation of choice, because the user could
 always elect not to receive the offered service.

This is really strange logic: you have a choice not to use a client
because you don't have to use the service?!!?  

Of course it detracts from choice.  Absent remote attestation things
would be as they are today and users could modify existing clients,
write their own clients, or obtain third party clients for any
service.  Removing _that_ choice is the problem.  And it is a big and
significant detraction from the current open nature of the internet.
One that favors large companies such as microsoft with an interest to
stifle innovation and competition.

 The implicit assumption here seems to be that if TC did not exist,
 the service would be offered without any limitations.  

Yes it would.  It either wouldn't be offered or it would be offered
without 

Re: EFF Report on Trusted Computing

2003-10-12 Thread Nomen Nescio
Just thought someone should take the trouble to rebut the anonymous
pro-treacherous-computing rantings...

I have heavily trimmed our anonymous ranters verbose writing style to
keep just the bits I'm responding to (inline...)

 The EFF tries to distinguish between good and bad aspects of TC,
 but it does not draw the line in quite the right place, even given
 its somewhat questionable assumptions.  

Unsubstantiated claim: what incorrect assumptions did Schoen make?  I
did not see any.

 It fails to sufficiently emphasize the many positive uses of the
 full version of TC (and hence the costs of blocking its
 implementation),

Schoen points out that TC can be broken out into desirable and
undesirable features.  If you omit the undesirable features, as he
describes, you get the remaining desirable features.

There is no loss from blocking the undesirable features.

 And the recommended fix to TC is not clearly described and as
 written appears to be somewhat contradictory.

I see no contradition.  More unsubstantiated claims.

 But let us begin with some positive elements of the EFF report.  This is
 perhaps the first public, critical analysis of TC which fails to include
 two of the worst lies about the technology, lies promulgated primarily
 by Ross Anderson and Lucky Green: that only authorized programs can run
 trusted, and that unauthorized or illegal programs and data will be
 deleted from computers or prevented from running.  

They are not lying and you do your credibility no favors by making
such unsubstantiated claims.

You are just misconstruing the obvious meaning of their warnings: the
features they describe (and plenty more and worse) are technically
feasible with the TC hardware enforcement, and given microsoft's
history of repeated dirty tricks campaigns in the areas of document
format wars, reporting private information back home to microsoft,
browser wars, interface wars, restrictive business practices regarding
licensing it would be fool hardy in the extreme to not expect more of
the same in the area of platform control based on Palladium.

Of course _you_ are not wishing to admit or emphasize these points,
but you can hardly get away with impugning the integrity of high
reputation individuals like Prof Ross Anderson with such paltry
mischaracterisation.

Your arguments are crass and of the form: but the current microsoft
PR documents don't admit that it could do that, nor of course that
microsoft are planning to do that, so it's not fair for you to point
that out and caution people about the kinds of things microsoft may be
planning.  Technology is criticized and discussed based on the
potential and most likely inferred directions given microsoft's
history and prior demonstration of interest to control various aspects
of the software platform.

 The report also forthrightly rejects the claim that TC technology is
 some kind of trick to defeat Linux or lock-in computers to Microsoft
 operating systems, 

It's far from obvious that TC will have no part to play in the next
few decades of open warfare against linux from microsoft.  There are
any number of ways to extend the existing dirty tricks regarding
formats, protocols, licensing etc using the TC hardware enforcement.

 The EFF attempts to distinguish one feature of TC, remote
 attestation, as a source of problems.  This is the ability of a
 computer user to convince other systems about what software he is
 running.  The EFF is convinced that this feature will cause users to
 be compelled to use software not of their choice; harm
 interoperability and encourage lock-in; and support DRM and various
 restrictive kinds of licensing.

Yes indeed and they are quite right.  That is exactly the problem with
remote attestation.

 But when we break these down in detail, many of the problems either
 go away or are not due to attestation.

More unsubstantiated claims.  This statement is both false and not
backed up by any of your following text.

 Software choice limitation may occur if a remote system provides
 some service conditional on the software being used to access it.
 But that's not really a limitation of choice, because the user could
 always elect not to receive the offered service.

This is really strange logic: you have a choice not to use a client
because you don't have to use the service?!!?  

Of course it detracts from choice.  Absent remote attestation things
would be as they are today and users could modify existing clients,
write their own clients, or obtain third party clients for any
service.  Removing _that_ choice is the problem.  And it is a big and
significant detraction from the current open nature of the internet.
One that favors large companies such as microsoft with an interest to
stifle innovation and competition.

 The implicit assumption here seems to be that if TC did not exist,
 the service would be offered without any limitations.  

Yes it would.  It either wouldn't be offered or it would be offered
without 

Re: Dan Geer Fired (was re: Technology Firm With Ties to Microsoft Fir

2003-10-01 Thread Nomen Nescio
The company I work for forbids its employees to discuss crypto issues
in public forums like this one.  That's why I only post anonymously.

They have several concerns.  One is the still-existent crypto export
regulations which could be construed to forbid technical discussions
of cryptography in public forums accessible to foreigners.  Another is
the danger that the employee might say something which could embarrass
the company, such as admitting problems in the company's products.
Employees may also find themselves talking to customers of the company
and say things different from what the sales representatives are telling
them, which leads to huge problems.

There are actually many valid reasons to keep employees from talking
publicly about technical issues in any field related to their employment.
Add to this the many political and legal issues that are specific to
cryptography and it is unsurprising that so many companies restrict what
their employees can say, as a condition of employment.

One thing I haven't heard in the Geer case is whether his employment
contract did have such limitations.  If not, he might conceivably have
grounds for a wrongful termination suit, although even then the company
could make a pretty good case that bad-mouthing one of the company's
biggest customers is valid grounds for dismissal.

It's also interesting that Geer claims in an interview [1] that he
approached nine differrent academic researchers who refused to sign on
to the report even though they agreed with its recommendations, because
they were afraid of losing funding.  I find this somewhat hard to believe,
first because I don't agree with the conclusions of the report (although
my analysis has been censored), and second because I don't think that
Microsoft controls that much academic research funding.  It's possible
that Geer is exaggerating or that the researchers were not completely
honest about the reasons for their lack of interest.

[1] http://www.eweek.com/article2/0,4149,1304620,00.asp



Re: Dan Geer Fired (was re: Technology Firm With Ties to Microsoft Fir

2003-10-01 Thread Nomen Nescio
The company I work for forbids its employees to discuss crypto issues
in public forums like this one.  That's why I only post anonymously.

They have several concerns.  One is the still-existent crypto export
regulations which could be construed to forbid technical discussions
of cryptography in public forums accessible to foreigners.  Another is
the danger that the employee might say something which could embarrass
the company, such as admitting problems in the company's products.
Employees may also find themselves talking to customers of the company
and say things different from what the sales representatives are telling
them, which leads to huge problems.

There are actually many valid reasons to keep employees from talking
publicly about technical issues in any field related to their employment.
Add to this the many political and legal issues that are specific to
cryptography and it is unsurprising that so many companies restrict what
their employees can say, as a condition of employment.

One thing I haven't heard in the Geer case is whether his employment
contract did have such limitations.  If not, he might conceivably have
grounds for a wrongful termination suit, although even then the company
could make a pretty good case that bad-mouthing one of the company's
biggest customers is valid grounds for dismissal.

It's also interesting that Geer claims in an interview [1] that he
approached nine differrent academic researchers who refused to sign on
to the report even though they agreed with its recommendations, because
they were afraid of losing funding.  I find this somewhat hard to believe,
first because I don't agree with the conclusions of the report (although
my analysis has been censored), and second because I don't think that
Microsoft controls that much academic research funding.  It's possible
that Geer is exaggerating or that the researchers were not completely
honest about the reasons for their lack of interest.

[1] http://www.eweek.com/article2/0,4149,1304620,00.asp



Cryptome: Torch Concepts threatening Cypherpunks

2003-09-21 Thread Nomen Nescio
http://cryptome.org/jetblue-spy.htm

The attorney for Torch Concepts has sent cease and desist letters to Bill Scannell and 
Len Sassaman for offering the Torch Concepts file, the smoking gun in the Jet Blue 
privacy violation scandal.

The file is currently still available on Len Sassaman's website, as well as Cryptome.



Cryptome: Torch Concepts threatening Cypherpunks

2003-09-20 Thread Nomen Nescio
http://cryptome.org/jetblue-spy.htm

The attorney for Torch Concepts has sent cease and desist letters to Bill Scannell and 
Len Sassaman for offering the Torch Concepts file, the smoking gun in the Jet Blue 
privacy violation scandal.

The file is currently still available on Len Sassaman's website, as well as Cryptome.



Re: Colored people and cripples

2003-08-06 Thread Nomen Nescio
On Wed, 6 Aug 2003 12:23:23 -0700, Cardenas [EMAIL PROTECTED] wrote:

once again, we can count on Tim May to contribute the least productive
comment to this thread.

Until you opened your trap of course.



Re: A 'Funky A.T.M.' Lets You Pay for Purchases Made Online

2003-07-25 Thread Nomen Nescio
One point being overlooked here is digital versus physical anonymity.

The funky ATM (what, does it smell or something?) will allow you to
(among other things) stick in some cash and let someone else withdraw it
using a password which you have sent him out of band (according to the
patent - which I've actually read, more than anyone else here can say).
This will allow for digital anonymity in the sense that there is no
account information associated with the transaction.

Now, it's true that ATMs take pictures of people, so you don't have
full physical anonymity.  But given the limited reliability of facial
recognition systems, especially if you take simple precautions like
wearing a hat and tilting your head down, you can have de facto very
strong anonymity putting money into or taking it out of an ATM.  The mere
fact that it takes your picture doesn't mean that much.

It's also true that the amount of cash that could be practically
transfered in this way is limited to a few thousand dollars at most, given
that the machines will probably only accept and dispense twenty dollar
bills or equivalent.  Nevertheless such payments would be a good start.
The ability to pay or receive a few thousand dollars, untraceably, would
enable a number of interesting applications involving freedom of speech
and action.  Writing custom software or providing sensitive information
could be funded at these levels.

The point which has been mostly overlooked is that this article was
nothing but vapor, based on the issuance of a patent.  There's a huge
barrier between the idea and the implementation.  A cash-transfer ATM
would be a true boon to cypherpunk goals, but it is doubtful whether
such a system will be allowed to exist in today's world.



FREENET 0.5.2!! DRUGS!! GUNS!! PORNOGRAFY!!! YANKEE GO HOME!!

2003-07-19 Thread Nomen Nescio
DRUGS !! GUNS !! PORNOGRAFY !! YANKEE GO HOME !! HANDS OFF Saddam Hussein !

if you want drugs, guns, alcohol, pornografy lolitas, bukkake schoolgirl,
you can find this here - http://www.freenetproject.org !!


WARNING!!! only on the Freenet you may find this illegal things!!!

http://www.freenetproject.org

All of Terrorism on the railroad track !!!
if you want join the Alkaida organization you need to go this link
http://www.freenetproject.org !!

WHOLE ANTI JEFF GORDON / ROBB LONDON THEME ON THIS ADDRESS
http://www.freenetproject.org
!

HURRY UP !!! This Address Can Soon Close!!
http://www.freenetproject.org
http://www.freenetproject.org
http://www.freenetproject.org



Re: Idea: The ultimate CD/DVD auditing tool

2003-07-08 Thread Nomen Nescio
Tyler Durden leaves the fight club and writes:
 Do you have a reference? I don't remember reading that SACD was encrypted. 
 What I DO remember is that the reason there's no standard SACD or DVD-A 
 digital interface is because the Industry wants that digital interface to be 
 encrypted.

The detailed technical specs are apparently secret, but an overview
of the multi-layered SACD copy protection is at
http://www.sacd.philips.com/b2b/downloads/content_protection.pdf.  If
you don't like PDFs, most of the same information is at
http://www.disctronics.co.uk/technology/dvdaudio/dvdaud_sacd.htm.

Alan Clueless writes:

 Furthermore, people have come to expect that they should be able to play 
 whatever disc shaped media in their computer.  At some point there will 
 need to be a software based player.

Both of the documents above specifically deny that software based players
will be allowed.  I get the impression that the decryption will always be
done in hardware, and if a PC is ever able to play one of these gadgets,
it will be a Palladium system or something similar that can be locked
down.

Steve Shear writes:

 If you believe the article Myths and Misconceptions about Hardware 
 Hacking, 
 http://www.cptwg.org/Assets/Presentations/ARDG/ARDGHardware_hack05-28-03.pdf 
 , recently posted to the Content Protection Technical Working Group, access 
 to affordable commercial technology for reverse engineering has given 
 hardware hackers the upper hand.

That's mostly about how hardware hackers can use modern chips and custom
PC boards without spending more than a few hundred dollars.  Fine,
but it's a long way from that to being able to pull an algorithm and/or
device key out of a chip which has been designed to make that difficult.



anon news

2003-06-15 Thread Nomen Nescio
   Is there some way to read usenet anon, not with google, but with a linux 
news reader like tin? I'm sure I can use google with JAP fairly securely, 
but google's pretty slow.  


Re: An attack on paypal -- secure UI for browsers

2003-06-12 Thread Nomen Nescio
Joe Ashwood writes:
 From: Anonymous nobody_at_cryptofortress.com 
  You clearly know virtually nothing about Palladium. 

 I still stand by, Arbitrarily trusting anyone to write a secure program 
 simply doesn't work regardless of how many times MS says trust us any 
 substantially educated person should as well be prepared to either trust a 
 preponderance of evidence, or perform their own examination, neither of 
 these options is available.

Apparently you neglected to read
http://www.microsoft.com/resources/ngscb/NGSCB_Overview.mspx, where
Microsoft says (as they have repeated many times) Customers and partners
need reliable ways to ensure the quality of technology that addresses
the critical needs met by NGSCB. That's why Microsoft will make available
for public review the source code of the core piece of enabling software
in NGSCB, called the 'nexus,' so it can be evaluated and validated by
third parties for both security and privacy considerations.

Therefore some educated person (obviously not you, at least not yet)
will in fact be able to perform their own examination of the trusted part
of the OS, since it will have its source code published for exactly this
sort of review.


 The information available does not cover the 
 technical information, in fact their Technical FAQ about it actually has 
 the following: 

 Q: Does this technology require an online connection to be used? 

 A: No.  

 That is just so enlightening, and is about as far from a useful answer 
 as possible. 

Very few of the Technical FAQ answers are so brief.  In this case, it is
a stupid question and deserves a trivial answer.  The only reason it is
in there is because of the lies spread by Lucky Green and Ross Anderson,
all about how Palladium will connect to a central server and refuse to
let you work with your own documents, or delete files that Microsoft or
the U.S. Government don't like.


  NCAs do not have 
  complete access to private information.  Quite the opposite.  Rather, 
  NCAs have the power to protect private information such that no other 
  software on the machine can access it.  They do so by using the Palladium 
  software and hardware to encrypt the private data.  The encryption is 
  done in such a way that it is sealed to the particular NCA, and no other 
  software is allowed to use the Palladium crypto hardware to decrypt it. 

 This applies only under the condition that the software in Palladium is 
 perfectly secure. Again I point to the issues with ActiveX, where a wide 
 variety of hoels have been found, I point to the newest MS operating system 
 which has it even been out a month yet? and already has a security patch 
 available, in spite of their secure by default process. Again I don't 
 believe this is because MS is inherently bad, it is because writing secure 
 programs is extremely difficult, MS just has the most feature bloat so they 
 have the most problems.

Microsoft's legacy software is all extremely complex.  Palladium is
taking a different approach, aiming at simplicity and transparency.
The Nexus, which is the micro-kernel for the trusted components (NCAs),
will be published for review.  Its tasks are relatively few and well
defined, nothing like the massive Windows OS.  That is what Microsoft has
gained by architecting Palladium as they did, with the new trusted
CPU mode, which allows side-by-side operating systems to run.  On the
left hand side (LHS) we find the legacy Windows OS and applications.
On the right hand side (RHS) we find the Nexus acting as the OS, and
the NCAs acting as the applications.

The brilliance of Palladium is that the LHS can't touch the RHS,
because of hardware protection.  At one stroke, the new trusted mode is
insulated from bugs in the Windows OS, device drivers and applications.
It in effect allows the designers to start with a clean piece of paper
and produce a simple micro-kernel (the Nexus) whose only job is to
service the NCAs.  This is a manageable task and, in conjunction with
public review, there is good reason to hope and expect that the Nexus
will be secure.  If so then NCAs will indeed run in a mode where they
are protected from other software components (including other NCAs).


 If the Palladium software is actually secure 
 (unlikely), then there is the issue of how the (foolishly trusted) NCAs are 
 determined to be the same, this is an easy problem to solve if no one ever 
 added features, but a hard one to solve where the program evolves, once MS 
 shows the solution for this, I will point to the same information and show 
 you a security hole. 

Read the documents!  Actually you claim you already read them, but
obviously you are lying or you would know that this question has been
answered.  I wrote a long posting about this last month explaining how
it worked.  The mechanism is called a Manifest and is described in section
9 of http://www.microsoft.com/resources/ngscb/documents/ngscb_tcb.doc.
You can either use a hash of the NCA 

Re: An attack on paypal -- secure UI for browsers

2003-06-10 Thread Nomen Nescio
Adam Lydick writes:

 I'd guess that no applications (besides the secure nexus) would
 have access to your list of doggie names, just the ability to display
 it. The list just indicates that you are seeing a window from one of
 your partitioned and verified applications. I would also assume the
 window would get decorated with the name of the trusted application (not
 just your secret list). Thus you only need a single secret list to
 handle all of your authorized applications.

That makes sense.  However it puts the burden onto the user to closely
inspect his window frames in order to make sure that he is talking
to the program (or NCA in Palladium) that he thinks he is talking to.
It also introduces the problem of program-name spoofing; you might be
given a dialog to enter your password for Paypa1 or E-Go1d.

If users were that careful, we wouldn't have these kinds of problems in
the first place.



Re: An attack on paypal -- secure UI for browsers

2003-06-09 Thread Nomen Nescio
Tim Dierks wrote:
  - Get browser makers to design better ways to communicate to users that 
 UI elements can be trusted. For example, a proposal I saw recently which 
 would have the OS decorate the borders of trusted windows with facts or 
 images that an attacker wouldn't be able to predict: the name of your 
 dog, or whatever. (Sorry, can't locate a link right now, but I'd 
 appreciate one.)

It was none other than Microsoft's NGSCB, nee Palladium.  See
http://news.com.com/2100-1012_3-1000584.html?tag=fd_top:

   NEW ORLEANS--Microsoft is trying to make security obvious.

   The software giant plans to visually alter document or application
   windows that contain private information that's secured through
   Microsoft's Next-Generation Secure Computing Base (NGSCB), formerly
   known as Palladium. Secure windows will look different than regular,
   unsecured windows in order to remind users that they are looking
   at confidential material, Peter Biddle, product unit manager for
   Microsoft, said Thursday at the Windows Hardware Engineering Conference
   (WinHEC) here.
   ...
   The border of a secured page may contain information--such as the
   names of all the dogs that someone has ever owned--to make the data
   instantly recognizable as sound to the individual owner, as well as
   difficult to replicate. A hacker can create a spoof page with dogs'
   names running along the border but, in all likelihood, not one reading
   Buffy, Skip and Jack Daniels--and in that order, Biddle said.
   ...
   Information on secured windows will vanish if another window is placed
   on top of it or shifted to the background. Erasing the information
   will prevent certain types of attacks and remind people that they're
   dealing with confidential material, Biddle said.

   When the secure window returns to the top of the stack, the information
   will reappear, he said.

I don't see how this is going to work.  The concept seems to assume
that there is a distinction between trusted and untrusted programs.
But in the NGSCB architecture, Nexus Computing Agents (NCAs) can be
written by anyone.  If you've loaded a Trojan application onto your
machine, it can create an NCA, which would presumably be eligible to
put up a trusted window.

So either you have to configure a different list of doggie names for
every NCA (one for your banking program, one for Media Player, one for
each online game you play, etc.), or else each NCA gets access to your
Secret Master List of Doggie Names.  The first possibility is unmanageable
and the second means that the trustedness of the window is meaningless.

So what good is this?  What problem does it solve?



Re: Orwell's Victory goods come home

2003-03-17 Thread Nomen Nescio
On Sat, 15 Mar 2003 18:12:19 -0600, you wrote:

 On Saturday 15 March 2003 12:55 pm, Anonymous via the Cypherpunks Tonga
 Remailer wrote:
  On Sat, 15 Mar 2003 14:25:51 +, you wrote:
   So which American on the list is going to write to Congress to demand
   that the Statue of Liberty be sent back to France?
  
   Ken
 
  It really should go back to France, as the US seems to care less
  about liberty than when it received that gift, and France now
  has quite a profile of opposing foreign domination (from the US)
  over its policies and interests.
 
  So far as I can tell tell, the US approach to other nations is
  essentially shut up and do what we tell you to do if you love
  freedom.

 Americans tend to also forget that the French provided a lot of support for
 the colonies during the American Revolution.

Without the fleet of Admiral Comte de Grasse at Yorktown, and 
the assistance of the Marquis de Lafayette, the revolution would 
have surely been lost and Washington, Jefferson, Franklin, 
Adams, Madison and the rest would have hanged at London Tower. 
Maybe we would be more accurate to consider our role for the 
French in WW1 and 2 to be in compensation for our freedom from 
the British.



Re: Revealed: US dirty tricks to win vote on Iraq war

2003-03-02 Thread Nomen Nescio
 http://www.observer.co.uk/international/story/0,6903,905899,00.html


 Revealed: US dirty tricks to win vote on Iraq war

 Secret document details American plan to bug phones and emails of key Security 
 Council members

 Read the memo
 http://www.observer.co.uk/iraq/story/0,12239,905954,00.html

 The memo is directed at senior NSA officials and advises them that the agency is 
 'mounting a surge' aimed at gleaning information not only on how delegations on the 
 Security Council will vote on any second resolution on Iraq, but also 'policies', 
 'negotiating positions', 'alliances' and 'dependencies' - the 'whole gamut of 
 information that could give US policymakers an edge in obtaining results favourable 
 to US goals or to head off surprises'.

 Dated 31 January 2003, the memo was circulated four days after the UN's chief 
 weapons inspector Hans Blix produced his interim report on Iraqi compliance with UN 
 resolution 1441.

 It was sent by Frank Koza, chief of staff in the 'Regional Targets' section of the 
 NSA, which spies on countries that are viewed as strategically important for United 
 States interests.

Do you think Mr. Koza would answer questions about it? The pre-
Total Information Awareness system seems to indicate he can be 
reached at 410-964-3814 in Columbia, MD, a 25 minute drive from 
Fort Meade. If he's encouraging tapping people's home phones, 
surely he can't object to a phone call simply asking for 
information. Learning more about this is clearly in the public 
interest. He should be given an opportunity to explain this 
disturbing news.

 Koza specifies that the information will be used for the US's 'QRC' - Quick Response 
 Capability - 'against' the key delegations.



Re: From Bush's radio address

2003-03-02 Thread Nomen Nescio
On Fri, 28 Feb 2003 17:20:47 -0500, you wrote:

 on Saturday...

 It will be difficult to help freedom take hold in a country that has known
 three decades of dictatorship, secret police, internal divisions, and war.

 I *think* he's talking about Iraq.

Maybe Kuwait? How is democracy and freedom faring there more 
than a decade after the first Iraq war? Can women vote there? 
No? Has there been an election, or it is still a hereditary 
dictatorship? Oh, the latter. I see... Maybe it wasn't about 
freedom and democracy? Maybe something else? The troops are 
generally too stupid and ill informed to notice this 
incongruity. They will just go and kill people on command, while 
getting teared up over the land of the free and the home of the 
brave.


 -Declan



  1   2   3   >