Re: Confiscation of Anti-War Video

2002-10-28 Thread Optimizzin Al-gorithym
At 10:08 AM 10/28/02 -0500, Tyler Durden wrote:
In antoher context I've wondered about the possibility of wireless,
near-real-time video upload. With 3G this will cetainly be easy, but
I'm
wondering if there are soft/hard gadgets that can auto-upload stuff.

Plenty of webcams come with software to auto upload (e.g., ftp).
They require a computer though.  You mean an embedded device?
A 2.5 G phone with a camera, and the 'feature' to autosend
periodically, would be a fine vidbug.

Reminds me of that LEO notice a while back that captors were
leaving their cell phones, and leaving them on, in the copcars.

...
BTW JY needs to learn the Tomlinson trick of switching his chips.
A wee bit of slight of hand.




research homeland insecurity

2002-09-08 Thread Optimizzin Al-gorithym

(sent to AAAS members)

Dear AAAS Member:

As the anniversary of September 11th approaches, AAAS continues to
be engaged in issues that relate to national security and the role of
science and technology.  One such issue is the safe and responsible
conduct of research involving biological agents and toxins.

AAAS was recently asked by the Centers for Disease Control (CDC) to
assist in alerting our members to the federal mandate (Public Law
107-188)
requiring all facilities and persons that possess, use, or transfer
agents
or toxins considered a threat to animals, plants, animal and plant
products
and/or public health (called select agents) to notify the CDC and the
U.S. Department of Agriculture.  Approximately 200,000 facilities were
sent a copy of the notification form by the CDC.

The deadline for submitting a completed form to the CDC is September 10,

2002.  All entities that receive a copy of the form must comply, even if

they do not possess a select agent or toxin.  If you are in possession
of
a select agent or toxin and did not receive a form, you should call
CDC's
toll-free number: 1-866-567-4232.

Further information on the select agent list, procedures for
notification,
and exemptions can be found at the following websites:

CDC: http://www.cdc.gov/od/ohs/lrsat.htm
USDA: http://www.aphis.usda.gov/vs/ncie

AAAS is initiating an effort to monitor the effects of new national
security initiatives on the research community.  In that regard, we'd be

pleased to hear about your experience, whether positive or negative,
in complying with this new federal mandate.  You can forward such
information to Dr. Mark Frankel, director of the AAAS Program on
Scientific Freedom, Responsibility and Law at [EMAIL PROTECTED]

Sincerely,

Alan I. Leshner
Chief Executive Officer




police video surveillance of public schools; facerecog too

2002-09-08 Thread Optimizzin Al-gorithym

http://www.latimes.com/news/local/la-fi-campus8sep08.story

SANTEE, Calif. -- As Mike Brooder pulls into the student parking lot
outside West Hills High School, wireless cameras record his face and
license plate--doing the same to every car that follows.

The cameras then track the 17-year-old senior as he walks up a concrete
path, studies his schedule, scratches his chin, waves to friends and
then wanders to class.

Nearly every move Brooder makes--and every move of his 2,300
classmates--is captured and stored in the campus' database.

Following last September's terrorist attacks and years of school
shootings, West Hills High sits on the cutting edge of the emerging
surveillance society.

Each bathroom door is monitored. Sensors that detect the smoke of a
single match send alerts to campus security.

By Christmas, four more cameras will be installed, and hall monitors
will carry wireless computers that can pull up a student's school
picture, class schedule and attendance record.

School officials are considering whether to expand the SkyWitness
surveillance system by adding facial recognition software that will
allow a computer to filter out who should--and who should not--be on
campus.

Technology, once viewed primarily as a learning tool, is building a wall
of electronic security on campus.

People are saying they expected this to happen after the shootings and
the terrorists last year, said Brooder, an honor student who plays on
the school baseball team. Still, it seems a little overwhelming and
extreme.

And perhaps likely to become far more common--not just in schools, but
everywhere.

Schools are among the first to embrace new technology, often because
companies view campuses as perfect testing grounds before rolling
products out to corporate America.

For instance, one of the companies behind West Hills' system,
PacketVideo Corp., predicts that demand for products like SkyWitness
will grow, as people are tracked at factories, office parks,
stadiums--even places such as the Third Street Promenade shopping
district in Santa Monica.

Companies like the fact that students enjoy fewer constitutional
protections than adults and have lower expectations of privacy than
their parents.

For many students, such surveillance is standard, with cameras at every
bank ATM and many fast-food drive-throughs.

But the desire to protect has led to an erosion of individual privacy,
civil liberties advocates argue.

Once privacy is gone, you can't get it back, said Dale Kelly Bankhead,
a spokeswoman for the ACLU of San Diego and Imperial counties. This is
not just about schools, but about a broader social attitude.

Relying on such high-tech systems is an unusual move for high schools,
but is expected to become a more popular trend in the post-Sept, 11
world, said Kenneth S. Trump, president and chief executive of National
School Safety and Security Services, a Cleveland-based consulting firm.

At Tewksbury Memorial High School, about an hour outside Boston, the
push for security has gone so far as to result in a video-surveillance
system that lets both educators--and local police--watch the hallways.

Cameras are everywhere someone wants to watch over, Trump said.

The technology at West Hills relies on advanced hardware, but basic,
off-the-shelf technology is already used by both parents and educators
to watch kids.

Software programs can take snapshots of every Web page they visit and
every e-mail they send.

Devices such as AutoWatch can be popped into an automobile and
programmed to record a car's speed, as well as times, dates and the
lengths of time it is driven. Cell-phone bills list the calls a student
makes and receives.

You might call it control, said Joe Schramm, head of security at West
Hills. We call it keeping the kids safe.

Tucked into the scrub-brush valley of Santee, West Hills High appears to
be nothing but safe.

The average SAT score is nearly 1100, and 70% of last year's seniors are
attending either a community college or a four-year institution this
fall. But West Hills High has not gone untouched by fear.

Less than three miles away, Charles Andy Williams went on a shooting
rampage last year, killing two students and wounding 13 others at
Santana High School.

The community was stunned when nearly two weeks later another student
launched a shooting spree at a different school in the Grossmont Union
High School District.

Jason Hoffman, 18, wounded five people at Granite Hills High School in
El Cajon.

Hoffman committed suicide while awaiting trial. Last month Williams was
sentenced to prison for 50 years to life.

Despite the violence, the school district was forced to cut its budget
across the board; the security group lost three of its 10 employees,
including two of the staff members who helped patrol the 76-acre West
Hills campus.

Hoping to offset the pain of the staff cuts, the district started to
look at technology it already had in place on its campuses and explore
how the tools could 

Re: seeking information for Tired News article

2002-09-08 Thread Optimizzin Al-gorithym

At 02:33 PM 9/7/02 -0500, J.A. Terranson wrote:

 What kinds of people are involved?

Doctors, Lawyers, Mathematecians, Felons, Druggies, Anti-druggies,
Anarchists, Libertarians, Right-Wing-Fanatics, Left-Wing-Fanatics,
Teachers, Housewives, Househusbands, students, cops, criminals...

We're all just voices in TM's head..

 Who (socially, i mean, not names!) exactly are the members of the
group?

Agains, there IS NO GROUP.  I'm not trying to be cute here - THERE IS
NO GROUP.  The whole concept of group is flawed in this context.

Dogthinker seeks Alpha Cat.

 WN has had a very familiar relationship with the cypherpunks - has it
been
 viewed as a positive thing?

Which?  WN is widely considered lame ('tired' to you) esp. since Declan
left.
On the other hand, publicity can attract contentful participants.  Also
trolling feds and folks looking for help with homework.


 With whom else are the cypherpunks  allied?

[I actually had to take a moment to wipe the tears of laughter from
the question]

Nobody.

Well a few authors have gotten free plane trips  bed  board at the
Feds'
expense.. some even came back after it was over.

Any such alliance would require a Group Consensus -
something which is just patently impossible.  If you ever find two
CP's who can agree on enough to come to a broad Consensus, you let me
know so I can mark it on my calendar.

True 'nuff.  Now ask us about protocols which let you determine a
consensus...
well, that's tasty.


 Thanks for your time. I am hoping to get the story done before the
end of
 next week (i.e. before the actual party.) Of course, I would never
publish
 the location of the party or any other information that you don't
feel
 comfortable about.

And 'we' should 'trust' you *why* ??  (Ho-ho, list relevence!
Explain/define the
scare-quotes!  For extra credit, explain how protocols might avoid
spoofing.)




opsec hint: don't give classified into to Moussaoui

2002-09-08 Thread Optimizzin Al-gorithym

US accidentally gave Moussaoui classified information on
  al-Qaeda: report

  September 07, 2002, 11:09 PM

WASHINGTON (AFP) - The US government accidentally gave
Zacarias Moussaoui, the only person charged in
connection with the
September 11 attacks, classified information about
al-Qaeda, ABC
News reported.

The documents and computer disks were mistakenly handed
over to
Moussaoui along with materials the government is
required to
furnish for his legal defense, several legal sources,
including one at
  the Justice Department, told the network Friday. Moussaoui is serving
as his own
  counsel.

snip
http://www.arabia.com/afp/news/int/article/english/0,10846,283377,00.html




Re: modified consoles as disposable nodes

2002-08-02 Thread Optimizzin Al-gorithym

At 12:19 PM 8/2/02 +0200, Eugen Leitl wrote:
While useful, they note that the other platforms lack at least one of
the
Dreamcast's virtues. It's innocuous. It looks like a toy, said Davis.

If you bring it into a company, they're going to go, 'Wow, look at the

toy!'

Damn, first they came for my Furby.  Then they came for my Dreamcast.
Wait until the Dreamcasters get into stealth casemods..




warchalking on the Beeb

2002-07-24 Thread Optimizzin Al-gorithym

Well, its official.  Warchalking (802.11x domain marking) appeared on
the US edition of the BBC News.  No hype re: anonymity  t*rr*r*sm 
tigers
 bears; a mention though of service-contract violations, and the gift
community concept.
Thank you Mr. Beeb.

(And all your privacy-invading TV IF locating white vans)




Re: Are the Feds Wimps or What?

2002-07-22 Thread Optimizzin Al-gorithym

At 11:15 AM 7/22/02 -0400, Duncan Frissell wrote:
So far the massive crackdown by the Feds that has stripped me of my
civil
liberties hasn't managed to do much. They have to work a bit harder.

I'm back to not showing ID to get into work just like before the war.


Well, you showed it to them enough times, they believe you now :-)




Re: Are the Feds Wimps or What?

2002-07-22 Thread Optimizzin Al-gorithym

At 11:15 AM 7/22/02 -0400, Duncan Frissell wrote:
So far the massive crackdown by the Feds that has stripped me of my
civil
liberties hasn't managed to do much. They have to work a bit harder.

I'm back to not showing ID to get into work just like before the war.


Well, you showed it to them enough times, they believe you now :-)




Re: Atmospheric noise fair coin flipping

2002-07-14 Thread Optimizzin Al-gorithym

At 05:45 AM 7/14/02 -0700, gfgs pedo wrote:
it is said that atmospheric noise is random but how
can we say for sure.

Physics, chaos, the growth of initial uncertainty as systems evolve,
energy/time required to make measurements to arbitrary precision.


what if the parameters giverning atmospheric noise
vary frm time 2 time.

The rules of physics are those that don't change from time to time, or
place to place.
Certainly the e.g., wind speed does.

so can we say atmospheric noise is random or a coin
flipping is random-only because it passes die hard
test or other randomness tests-which is an indicator
of randomness with the current defenition of
parameters in determing randomness?

No, since 'anything through a whitener passes' these tests.
The integers (0, 1, 2..) fed into DES will pass.
(Equivalently) A low-entropy source fed into a hash will pass.

[Historical note: this is why Intel should make its raw RNG
data available in chips with whitened-output RNG functions]

To have a true RNG, You *must* have a physical understanding of the
source
of entropy whence you distill the pure bits (whether or not
you feed it into a whitener after distillation).  Precisely
because a 'black box' may be a deterministic (if you know
the secret) PRNG.  By 'distill' I mean reduce N bits to M,
N  M, in such a way as to increase the entropy of the
resultant M bits.


is there truly random or that we can say with certain
degre of confidence that they are nearly random as all
current evidence poits so.

'Random' should be taken to mean 'ignorant of'.  It suffices
that we (and our adversary) are ignorant of the detailed conditions
inside a noise diode, unstable atomic nucleus, atmospheric
(or FM radio) noise receiver, etc.  Philosophical discussions about
'true
randomness' (Is there a deeper/smaller level of description in
which apparently-random events are based or emerge from?)
are beyond the scope of this rant.




Re: Which universe are we in? (tossing tennis balls into spinning props)

2002-07-14 Thread Optimizzin Al-gorithym

At 03:21 PM 7/14/02 +0100, Ben Laurie wrote:
Eric Cordian wrote:
 Still, Nature abhors overcomplexification, and plain old quantum
mechanics
 works just fine for predicting the results of experiments.

Oh yeah? So predict when this radioactive isotope will decay, if you
please.

You mean this particular *atom* will decay.

And while QM can't help you with a particular atom, it also doesn't say
that its impossible that knowledge of internal states of the atom
wouldn't help you predict its fragmentation.

Think about tossing tennis balls through spinning propellers.  You might
think you could
only characterize the translucent prop-disk by a certain probability
that the ball would get through
vs. get shredded.  (Propeller mechanics)

But if you could see the phase of the prop as it spun, you could time
your tosses and predict which would get shredded.  But without that
high-speed strobe, you just think there's a disk where there's really a
spinning blade.




Re: Which universe are we in? (tossing tennis balls into spinning props)

2002-07-14 Thread Optimizzin Al-gorithym

At 03:21 PM 7/14/02 +0100, Ben Laurie wrote:
Eric Cordian wrote:
 Still, Nature abhors overcomplexification, and plain old quantum
mechanics
 works just fine for predicting the results of experiments.

Oh yeah? So predict when this radioactive isotope will decay, if you
please.

You mean this particular *atom* will decay.

And while QM can't help you with a particular atom, it also doesn't say
that its impossible that knowledge of internal states of the atom
wouldn't help you predict its fragmentation.

Think about tossing tennis balls through spinning propellers.  You might
think you could
only characterize the translucent prop-disk by a certain probability
that the ball would get through
vs. get shredded.  (Propeller mechanics)

But if you could see the phase of the prop as it spun, you could time
your tosses and predict which would get shredded.  But without that
high-speed strobe, you just think there's a disk where there's really a
spinning blade.




Re: TPM cost constraint [was: RE: Revenge of the WAVEoid]

2002-07-07 Thread Optimizzin Al-gorithym

At 07:05 PM 7/6/02 -0700, Lucky Green wrote:,
Adding the cost of an EMBASSY or SEE environment to the,purchase of
every new PC is more than the market for bare-bones or even,mid-range
PC's will bear.,,--Lucky,

Too bad PCMCIA cardreaders aren't widespread, then a bank could give
away smartcards
which would be arguably more secure than browserware.




biometric containment (privacy, fingerprints, dead utah blondes)

2002-07-01 Thread Optimizzin Al-gorithym

So the neighbors of that dead blonde Utah jailbait volunteered their
fingerprints, presumably for discounting them, though possibly not.
In any case: how could a neighbor-friendly cypherpunk give
prints which were *not* entered into the Fed Oracle?

Only way I can think of is to physically control your deadtree print
sheet
and require the Feebs to manually enter the dozen topo-feature-locations

of your print from a memoryless measuring device, (eg, a glass lens and
reticle) in front of you, then take the print sheet with you.  How you
verify
that the imaging system is memoryless is up to you.

Comments?




Justice is more powerful than therapy -ex Scientologist

2002-05-21 Thread Optimizzin Al-gorithym

Lawrence Wollersheim was awarded millions of dollars, but he plans to
keep living as a nomad in a solar-powered RV, connected to the world by
a cellular phone with a secret number.

The ex-Scientologist came by his money in a unique fashion too: He won a
grueling 22-year court battle against the Church of Scientology of
California that went to the U.S. Supreme Court.

Wollersheim said the church pushed him to the brink of suicide, brought
on bipolar disorder and drove his business into bankruptcy. A Los
Angeles jury agreed. On May 9, the church deposited $8.67 million with
the Los Angeles Superior Court, marking the only time in two decades,
church officials say, that Scientology has lost a lawsuit and been
forced to pay a former member, or as church officials call him, an
apostate.

Now, Wollersheim said, he won't have to worry about having a job ever
again.

But the 53-year-old, who has spent his entire adult life in Scientology
or fighting it, said he is not going to relax in his newfound security.

He'd like nothing better, he said. It's just that his quest for justice
may compel him to wage more battles and file more lawsuits. He is
encouraging other ex-members to file their own suits and plans to stay
involved in Factnet, the anti-Scientology, anti-cult Web site he
co-founded.

Justice is more powerful than therapy, Wollersheim said. If it takes
another 22 years, I'll stay with it. I'm standing up straight and tall
and looking them in the eye, and they're not pushing me anymore.

snip
http://www.latimes.com/editions/orange/la-35921may21.story?coll=la%2Deditions%2Dorange


(access using joecypherpunk2/writecode if necessary)




Re: Got carried away...

2002-04-30 Thread Optimizzin Al-gorithym

At 09:02 AM 4/30/02 -0400, Steve Furlong wrote:
Ken Brown wrote:

 ... An even
 if cars were like little tanks why not open them with ordinary
 physical keys, like real tanks?

US tanks don't have built-in locks as in private autos. They have heavy

wire loops or bars and are locked with ordinary (if rather heavy-duty)
padlocks.

Of course, no security is impenatrable, and a few years ago some
(possibly
unbalanced :-) yahoo stole a tank IIRC from a SoCal National Guard and
demonstrated
that the Jersey barriers on the 5 were not up to the task.  Eventually a
cop
climbed it and shot the guy in the tank.  Remember to lock that door.

An inspiring bit of surrealtv, that was.




Re: Got carried away...

2002-04-30 Thread Optimizzin Al-gorithym

At 09:02 AM 4/30/02 -0400, Steve Furlong wrote:
Ken Brown wrote:

 ... An even
 if cars were like little tanks why not open them with ordinary
 physical keys, like real tanks?

US tanks don't have built-in locks as in private autos. They have heavy

wire loops or bars and are locked with ordinary (if rather heavy-duty)
padlocks.

Of course, no security is impenatrable, and a few years ago some
(possibly
unbalanced :-) yahoo stole a tank IIRC from a SoCal National Guard and
demonstrated
that the Jersey barriers on the 5 were not up to the task.  Eventually a
cop
climbed it and shot the guy in the tank.  Remember to lock that door.

An inspiring bit of surrealtv, that was.




Re: Two ideas for random number generation

2002-04-24 Thread Optimizzin Al-gorithym

At 11:55 AM 4/24/02 +0300, Sampo Syreeni wrote:
On Tue, 23 Apr 2002, Riad S. Wahby wrote:

This may take more voltage than you want to use in your process, but
you
can engineer the base-emitter junction if you've got a friend in
process
engineering.

You can also use common guard structures to isolate the HV part of the

chip, without dicking with the Delicate Recipes (process) which you
Don't
Want To Do And Probably Wouldn't Be Allowed To Anyway.  Also helps
keep digital switching noise out of the source.


Aren't there dedicated avalanche diodes available with low breakdown
voltages, precisely for this reason? I think they're used in
applications
where zeners could be, except for higher breakdown current.

One other potential problem is long-term reliability, but that's a
subject for another email.

Actually, we're interested...


Shouldn't be a problem, if you limit the breakdown current. If you're
after entropy, you'd likely want to use a constant current source
anyway.

And constant-current sources are *sooo* tough to make out of transistors
:-)

My small point is confirming that junction/avalanche RNG sources are
very compatible with standard CMOS fabrication.  (I've actually probed
test
structures on production wafers in a stuffy metal room examining this...

man, you don't want to have had too much coffee trying to land the
probes..
..looking at analogue measurements with spectral analyzers and sampled
data with
statistical tools)

The junction structures are louder than resistors --they produce more
entropy per watt.
Intel may have had other, valid reasons for using resistive sources in
its real RNG.




RE: mil disinfo on cryptome (and sec clearance games)

2002-04-07 Thread Optimizzin Al-gorithym

At 09:22 PM 4/6/02 -0800, John Young wrote:
Kahn's right, and admirably so, for once you get access
to classified material you  are doomed to be distrusted
outside the secret world.

Another reason: once you get a clearance, you can't speak
freely.  The latest _Tech Review_ interviews an MIT Prof Postol,
who has been pointing out the lies behind Raytheon's Patriot
missile and the anti-ballistic missile sham.  Reportedly,
some friendly DoD folks came to him and asked him to read
a classified report that would put some of his technical worries at
ease.
Postol refused, knowing that this is a scheme used to silence
folks --having been exposed to classified info, you have to
watch what you say.  If you figure it out from open data +
general science, you can speak your mind.

(BTW The basic deception is, if our gizmo can't discriminate this kind
of decoy, well, don't use that kind of decoy in the tests..)




How many virgins for Mike Spann?

2002-04-07 Thread Optimizzin Al-gorithym

At 06:08 PM 4/6/02 -0800, Bill Stewart wrote:
What kind of payback does the USG pay to families of deceased
soldiers?

A flag, and occasionally a cemetary plot in Virginia if they want one,
and a lot of hype about how they were a heroic martyr for their
country,
back when hype about being a heroic martyr was supposed to be positive.

1. Is it a Chinese-made flag?

2. How many virgins do they get?  (Round to the nearest dozen)  Do
homosexual soldiers get to tell and get nubile young lads?




Re: Julia Child was a Spook

2002-04-07 Thread Optimizzin Al-gorithym

At 01:31 PM 4/7/02 +0800, F. Marc de Piolenc wrote:
I'm sorry you've bought the terrorist line that it's all about US
support for Israel.

RTFM.  Or the Al-Quaeda declarations, at least.

 I know better.

So *you* claim.  Chuckle.

We could withdraw from the Middle
East tomorrow, and all that would change would be the excuse.

Why would Al Q. care about the US if the US were not in their backyard?
Its not like they care about US colonialism in the Americas, or Europe.

They learned (via CCCP, Lebanon, etc.) how to evict intruders from their

homeland, and now they are implementing it.  They're acting rationally,
and as a wanna-be analyst you should be able to understand that.
In dropping the Towers, they were trying to wake up US taxpayers to
the actions of their 'leaders'.  Unfortunate that Americans are so hard
to wake up (vaporizing some jar-heads on the other side of the planet
does not truly impress), even harder to get to think, but that's the
situation.




How many virgins for Mike Spann?

2002-04-07 Thread Optimizzin Al-gorithym

At 06:08 PM 4/6/02 -0800, Bill Stewart wrote:
What kind of payback does the USG pay to families of deceased
soldiers?

A flag, and occasionally a cemetary plot in Virginia if they want one,
and a lot of hype about how they were a heroic martyr for their
country,
back when hype about being a heroic martyr was supposed to be positive.

1. Is it a Chinese-made flag?

2. How many virgins do they get?  (Round to the nearest dozen)  Do
homosexual soldiers get to tell and get nubile young lads?




Re: Small Arms Failure in Afghan (caliberpunks)

2002-04-06 Thread Optimizzin Al-gorithym

At 08:38 PM 4/5/02 -0800, [EMAIL PROTECTED] wrote:
--
James A. Donald:
  Military weapons are generally not designed to kill quickly.
  A badly wounded man who takes a long time dying is a much
  bigger drain on your enemy's resources.

Major Variola
 True for snipers, but if you're being shot at and have
 inadequate cover,

A badly wounded man will instantly lose interest in his mission.

A badly wounded *Christian* draftee/unemployable but not wannabe
*Martyr*
volunteer.

Instant deterrence is in many ways better for military purposes
than instant kill.  Instant kill only matters in close quarters
one on one combat.  (And is much overrated even in that
situation.)

Indeed ---US domestic police shoot to kill, not 'wound', because
they shoot when someone's life is in imminent danger.

The only use for instant kill weapon in warfare would be for an
officer to shoot mutineers.

Or vice-versa.




RE: Small Arms Failure in Afghan (caliberpunks) (pharmpunks)

2002-04-06 Thread Optimizzin Al-gorithym

At 07:40 AM 4/6/02 +0200, Eugen Leitl wrote:

You don't even need to open a book on pharmacology to realize why this
is
a dumb idea. ... some people will get
a lot more exposure than others due to statistical fluctuations...when
you're approaching LD50 country, a mg/kg body weight dosage at which
50%
of people die) is narrow.

Taken together, this means that you're walking a *very* narrow line
between no effect at all, and a lot of dead bodies littering the
landscape. Both are probably not what you wanted.

Yep.

1. Yes it has been researched; .ZA did some documented work on
(supposedly)
using psychotropics as riot-control agents.  See also BZ, an
atropine-like[1] deleriant
investigated by the US.

2. Some psychotropics have very wide ED:LD50 ratios (e.g., lsd), several
orders of magnitude
larger than even the safer drugs (which might have an ED:LD of 100; cf
Tylenol, a few
times the ED will toast your liver).  But they may not have the
immediacy of effect you desire.
The DMT-class drugs act faster, and ethyl- and longer substitutions last
longer, but pain and
vomiting drugs seem to be favored.  Hallucinogens might only encourage
the religious martyrs.

3. *Any* chemwar, e.g., CS and capsaicin, used by the US police on its
citizens, can kill,
e.g., the elderly, young, asthmatics, etc.  Any drug will kill some
fraction: vaccines kill
a few people a year, but save zillions.

[1] The British military, fighting the american revolutionary Jihad,
inadvertently consumed
a Datura species as they scrounged for food in the Virginia woods.
Datura sp. contain atropine.
They ended up howling naked at the moon.  As they were near Jamestown,
the species became known as Jimsonweed.




Re: Julia Child was a Spook

2002-04-06 Thread Optimizzin Al-gorithym

At 02:59 PM 4/6/02 +0800, F. Marc de Piolenc wrote:
Nonsense. If you can't see any difference between terrorists and
risistants you are either wilfully ignorant or confused.

Terrorist is what the bigger side of an asymmetrical conflict
call the smaller side.  Also crazy, and other intended-derogatory
labels.

When the American Revolutionary Jihad did not line up, or wear
uniforms, like proper British soldiers, but sniped from camoflaged
concealed
positions, they were regarded as terrorists by the colonialists.
The more things change..

If you were on the weaker side, you wouldn't play fair, ie,
according to the rules written by those who gain from the rules.
Or you would be a dead fool, and your survivors would be slaves.




CNET article on dream email client includes PGP

2002-04-06 Thread Optimizzin Al-gorithym

5. Integrated PGP encryption
 We can't stress e-mail security enough, and we think your
 e-mail client should stress it more. Many apps make weak
 attempts at encryption, but we demand integrated PGP, the
 encryption gold standard, in every e-mailer. Users could
 create a decryption key the first time they use the app, then
 choose whether to autoencrypt every message or just click a
 button to encrypt single pieces of outgoing mail. A similar
 preference or button would autodecrypt on command.

http://home.cnet.com/software/0--8-9161160-1.html




Where are my turnips? Hidden in your kid's closet

2002-03-23 Thread Optimizzin Al-gorithym

At 01:37 AM 3/23/02 -0500, dmolnar wrote:
(See, the information-only goods don't count. they're not REAL ENOUGH.

What we need is FedEx crossed with _Bladerunner_ or _The Postman_
somehow interstitial to the meatspace mafia (govt).  The difficulties
with
the meat:info interface has been well discussed here.

Recently we saw this question echoed by Morlock Elloi -- are there
compelling reasons to ask for privacy and anonymity, besides the fact
that
a bunch of (unemployed) cypherpunks are True Believers?

High schoolers who get busted for private sites might be teaching, by
example, their
peers about the value of anonymity.

hell, is the temporary autonomous zone still what cypherpunks is
about?

Even if restricted only to Brittney/Stealth plans, its a *part* of it.

But lets remember the *triumphs* of the last decade, which were not
brought up last time
this was discussed:

* I use VPN to connect to work, daily
* Every book I've bought for the last several years, and a good deal of
ammo, has been via SSL
* Regular use of PGP, between radically different platforms, with more
paranoid colleages
* Stego -but if I told you, I'd have to kill you
* I've not gone into a physical bank in years, but my ATM uses crypto

With the possible exception of PGP, you don't have to understand these
to use them.

* Every middle-rate university now has crypto courses and there are
crypto libraries for
every language/platform out there

Things look real good for the *next generation*, folks -the ones who
think the (100) million bytes/MIPS/pixels
machine belongs in the Smithsonian, along with its phone modem...  call
'em generation Napster
or the generation Broadband, whatever... kids have many more secrets
than adults, since kids have
parents and police Panopticonning them...




Psychological analysis of anonymous benefactors

2002-03-23 Thread Optimizzin Al-gorithym

At 03:08 PM 3/23/02 -0800, Tim May wrote:
There are other examples of one man projects with limited expectations

of financial gain, whether anonymity was an issue or not. Stallman
comes to mind.

What Tim writes is correct, but he ignores personal motivational
psychology.

Stallman felt burnt when his community of friends could no longer share
code because they got real jobs.  He continues to work out his anger.

Ditto for a lot of the early Unix tools, even entire
languages.

These folks were largely building reps in their litle communities.
Much like open source teenagers.

Many people are motivated by ideology more than a desire for (often
meager) financial benefits. Sure, most people want some recognition, or

some compensation. But they often do things even when there's no
prospect at all for recognition. Anonymous benefactors, for example.

Benefactors feel empathy with the community they help.  Individual
altruists (e.g., anon remailer developers and maintainers) are doing
same,
and working out hostility to censors, fascists, etc.

There is hope, so long as there are folks who still have a bit of fire
inside, and can
channel it.




Israeli spy ring in US, and ongoing coverup

2002-03-09 Thread Optimizzin Al-gorithym

http://www.ahram.org.eg/weekly/2002/576/in00.htm

Israeli spy-ring uncovered in US

 Revelations of a secret US government report lead investigators to
question whether Israeli intelligence had prior
 knowledge of the 11 September events. Iason Athanasiadis reports


 The US Federal Bureau of Investigations (FBI) announced on Tuesday
5 March that it has yet to level charges
 against any of the Israeli suspects it has detained in what is
being described as the greatest revelation of an Israeli
 spying operation since the 1986 John Pollard case.

 Le Monde and Intelligence Online, a French online magazine, claim
they have obtained a draft version of a secret
 US government report issued by the Justice Department which proves
that an active Israeli intelligence network
 has been detected within America. It adds that there is proof that
members of the network may have trailed
 suspected Al-Qa'eda operatives in the United States without
informing federal authorities, leading to speculation
 over whether the Israeli government might have had prior knowledge
of the events of 11 September.

 Intelligence Online was first to report that the investigation,
which has been ongoing since April 2001, has led to
 120 Israelis being detained or deported on immigration charges.
According to the report it has obtained, which is
 dated June 2001, the ring was active in the states of Arkansas,
California, Florida and Texas, and consisted of
 around 20 cells of between four and eight members, aged between 22
and 30 who had recently completed Israeli
 military service in an army intelligence division.

 According to the Justice Department report, the students
represented themselves as art students and made efforts
 to gain access to sensitive federal office buildings and the homes
of government employees, U.S. officials said. A
 draft report from the Drug Enforcement Administration q which first
characterized the activities as suspicious q
 said the youths' actions may well be an organized
intelligence-gathering activity.

 Immigration officials deported them for visa violations; no
criminal

 espionage charges were filed. The arrests, made in an unspecified
number of major US cities from California to
 Florida, came amid public warnings from US intelligence agencies
about suspicious behavior by people posing as
 Israeli art students and attempting to bypass facility security
and enter federal buildings.

 In Washington, however, U.S. law enforcement officials discounted
the report, with one calling the assertion of a
 spy ring a bogus story.

 In Washington on Tuesday, U.S. Justice Department spokeswoman Susan
Dryden said of the Le Monde report,
 At this time, we have no information to support this. US
officials said that some Israeli students had been sent
 out of the country for immigration violations, not for spying. In
Israel, Israeli Foreign Ministry spokeswoman Yaffa
 Ben-Ari said it was nonsense that the students were spying on the
United States. Another Foreign Ministry
 spokeswoman, Irit Stopper, confirmed that a few Israelis posing as
art students were expelled from the United
 States for working without permits. However they were not accused
of espionage, she said. She did not say how
 many Israelis were expelled and did not give any additional
details.

 According to the editor of Intelligence Online, Guillaume Dasquieh,
the US government report issued by the
 Justice Department on March last year, reveals that the
investigation has been ongoing since April 2001 and that
 the ring was active in the states of Arkansas, California, Florida
and Texas, and consisted of around 20 cells of
 between four and eight members who were aged between 22 and 30 and
had recently completed Israeli military
 service in an army intelligence division.

 Le Monde said more than one third of the suspected Israeli spies
had lived in Florida, from January up until June
 last year, when the report was published, where at least 10 of the
19 Arabs involved in the September 11 airplane
 attacks on New York's World Trade Center and the Pentagon were also
based.

 The newspaper also said that it had learned that six suspected
spies had used portable telephones bought by a
 former Israeli vice consul in the United States.

 The Drug Enforcement Agency (DEA) report said a majority of the
young people questioned by US investigators
 acknowledged having served in military intelligence, electronic
signals interception or explosive ordnance units in
 the Israeli military. The DEA said one person questioned was the
son of a two-star Israeli general, one had served
 as the bodyguard to the head of the Israeli Army and another served
in a Patriot missile unit.

 At least five of the Israelis had resided in Hollywood, Florida,
the same town in which alleged hijacker
  

P2P Psyops DOS

2002-03-03 Thread Optimizzin Al-gorithym

Steve Griffin
StreamCast/Morpheus CEO
Continued

http://wwwmusiccitycom/

It appears that the attacks included an encrypted message
being repeatedly sent directly to your computers that
changed registry settings in your computer Later, it appears
our ad servers were attacked resulting in messages being
sent to other sites without our knowledge, which threatened
our most basic revenue model We believe some of these
attacks continue as Morpheus users attempt to connect to
the old Morpheus User Network This was why it is important
to quickly deploy our new software product

This unprovoked attack is being carefully investigated, as it
appears that federal laws may have been violated We are still
attempting to discover who would want to eliminate the
community of millions of consumers who are using the
Morpheus software product to connect with other users
around the world

These attacks have forced us to more quickly deploy our new
software product in order to allow you to bring the largest
p2p community back together Since it appears that the attack
on your computers came from the closed proprietary
FastTrack-Kazaa software, we have opted not to continue
with this p2p kernel We believe it to have the ability to
access your computer at will and change registry settings In
addition, we remain committed to NOT bundling any spy
ware with our product

We are pleased to migrate to an open Protocol product with
the release of Morpheus Preview Edition, which is based on
the very large network of Gnutella users The new software
will provide you with the ability for faster searches, the
display of more search results, and many more new and
exciting features KEEP IN MIND that this is only our preview
edition Any time change occurs, many object and think the
old version was better Our objective is to create a new and
exciting software product Since our company and your p2p
network are being attacked, we would appreciate your
constructive comments for improvement, not simply
criticisms With you help and input, we will continue to
provide the pre-eminent p2p software product in the world

Lastly, we want to address some of the misinformation we've
seen recently There have been many comments that we
caused these problems intentionally Let me assure you that
we would NEVER treat the Morpheus users in this fashion
Others have said we would re-launch with a paid subscription
model, again, not true Our commitment is to always provide
you a free version of the Morpheus software product
Thanks again for making Morpheus the most widely
downloaded p2p product in the world We are hard at work to
provide you with the products you have come to expect from
our company From our perspective p2p means people to
people

Our goal is to create the software that lets you create the
network Thanks again for your support




P2P gnutella sees hyperexponential growth as Morpheus users switch

2002-03-03 Thread Optimizzin Al-gorithym

http://wwwlimewirecom/indexjsp/size
look at the bottom graph




Don't panic the New Yorker sheeple, glowing soon

2002-03-03 Thread Optimizzin Al-gorithym

UPI: Report: Al Qaida has 'dirty bomb'
Drudge (TIME): NYC nukes kept secret from proles
AP: yet another cross-border smuggling tunnel, 1000 ft long, with rails
and power

You do the math.

Oh, and don't forget the Columbian submarines..

http://www.upi.com/view.cfm?StoryID=03032002-122721-3640r
http://www.drudgereport.com/flash.htm
http://story.news.yahoo.com/news?tmpl=storyu=/ap/20020228/ap_on_re_us/drug_tunnel_1





X DRUDGE REPORT X SUN MARCH 03, 2002 09:22:37 ET X

OCTOBER BULLETIN SAID TERRORISTS THOUGHT TO HAVE 10 KILOTON NUCLEAR
WEAPON TO BE SMUGGLED INTO NEW YORK CITY
Sun Mar 03 2002 10:40:24 ET

New York -- In October, an intelligence alert went out to a small number
of government
agencies, including the Energy Department's top-secret Nuclear Emergency
Search Team, based in
Nevada. The report said that terrorists were thought to have obtained a
10-kiloton nuclear
weapon from the Russian arsenal, and planned to smuggle it into New York
City, a special TIME
magazine investigation reveals.

The source: a mercurial agent code-named DRAGONFIRE, who intelligence
officials believed was of
undetermined reliability, TIME reports. But DRAGONFIRE'S claim tracked
with a report from a
Russian general who believed his forces were missing a 10-kiloton
device.

That made the DRAGONFIRE report alarming. So did this: detonated in
lower Manhattan, a
10-kiloton bomb would kill some 100,000 civilians and irradiate 700,000
more, flattening
everything in a half-mile diameter.

Counterterrorist investigators went on their highest state of alert,
TIME reports. It was
brutal, a U.S. official told TIME.

It was also highly classified and closely guarded.

Under the aegis of the White Houses Counterterrorism Security Group,
part of the National
Security Council, the suspected nuke was kept secret so as not to panic
the people of New York.
Senior FBI officials were not in the loop. Former mayor Rudolph Giuliani
says he was never told
about the threat. In the end, the investigators found nothing, and
concluded that DRAGONFIRE'S
information was false. But few of them slept better.



Report: Al Qaida has 'dirty bomb'

Published 3/3/2002 1:51 AM

WASHINGTON, March 3 (UPI) -- The consensus view within
the U.S. government is that the al Qaida
terrorist group has acquired lower-level radioactive
substances that ordinary explosives could spread as
contaminants, The Washington Post reported Sunday.

Although such a so-called dirty bomb could cause a more
modest number of deaths than an actual nuclear
weapon, it could have a considerable impact as a weapon
of psychological terror, an unidentified senior
government specialist told the newspaper.

President Bush, after a briefing by the CIA, ordered his
national security team to give nuclear terrorism
priority over every other threat to the United States,
the newspaper reported.

As a consequence, the report said, the Bush
administration has installed hundreds of sophisticated
radioactivity detectors at U.S. border inspection points
and around the nation's capital. National laboratories
have been ordered to develop even more sensitive
detectors, according to the report.

The elite commando unit, the Delta Force, has been
placed on standby alert to seize any nuclear materials
that are detected, the Post said.

The heightened fears of the use of nuclear materials
along with reported threats of a terrorist attack bigger
than Sept. 11 explain the decision to maintain a cadre
of senior federal managers on standby outside of
Washington, the Post said of its initial disclosure of
the precautions on Friday.

The CIA told Bush at one point of not only the published
arrests by Pakistan of two former nuclear
scientists who visited reputed terrorist mastermind
Osama bin Laden, but of a third Pakistani scientist who,
the newspaper said, tried to sell a nuclear bomb to
Libya.

The likeliest source for terrorists of nuclear
materials, the paper said, was the crumbling nuclear industry
infrastructure in the former Soviet Union, despite the
insistence of Russian officials that all such materials
are accounted for.

Theft of nuclear byproducts have been reported
frequently, the Post said, noting that in 1995 Chechen
rebels placed a functional dirty bomb in a Moscow park
but did not detonate it. Al Qaida has its own
contacts with Chechen rebels, the paper said.


Now we have to wear lead underwear *and* tinfoil hats?
At least the galvanic reaction makes us feel all tingly...




Re: P2P Psyops DOS

2002-03-03 Thread Optimizzin Al-gorithym

At 10:34 AM 3/3/02 -0800, [EMAIL PROTECTED] wrote:
In a related issue, slashdot reports that MusicCity is
apparently violating their licence from gnucleus by not
releasing the source for their client.  Seems to me that
releasing this would be a good idea anyway, as it would go a
long way toward assuring users that the client is ok.

George

There was a source code download on musiccity.com this AM, though  I
haven't
read it.  More interesting than that will be how the protocol scales,
and how the
*AA scum react.

Cheers




DoD on Disinfo, Cretinism, Liars, Godel

2002-02-24 Thread Optimizzin Al-gorithym

At 08:08 AM 2/24/02 -0600, Agent Farr wrote:
Do you suppose the Pentagon foresaw the inevitable backlash?

24 Feb (Routers News)
The Department of Defense announced today that, in the words of General
Godel,
All Cretins are Liars and that furthermore, We have reason to believe
that we are
Cretins.  This statement was later formally retracted, with White House
spokesman
Airie Fluscher instead offering the summary, This statement is false.
Homeland Insecurity
czar Tom Thumb was unavailable for comment, mumbling only that in his
heightened state
of awareness he couldn't speak coherently.




Re: 911 attackers awarded a 10 for effectiveness

2002-02-20 Thread Optimizzin Al-gorithym

At 11:15 PM 2/19/02 -0800, Tim May wrote:

 911 attackers awarded a 10 for effectiveness

But if the Quebecois terrorists complain about unfairness, do we have to
give them a 10 too?

--
Never underestimate the stupidity of some of the people we have to deal

with, William A. Reinsch, Under Secretary of Commerce for the Bureau of

Export Administration, said while being grilled about whether terrorists

and criminals would be naove enough to use the technology being pushed
by
the Administration.




Whether Cops Can Monitor E-Mail Without Warrant

2002-02-20 Thread Optimizzin Al-gorithym

[An interesting line ---Any reasonably intelligent person, savvy enough
 to be using the Internet ... would be aware that messages are received
  in a recorded format, by their very nature, and can be downloaded or
  printed, said the court, --- might be read by (completely different)
courts thinking about copyright  digital rights technologies.]


Court to Decide Whether Cops Can Monitor E-Mail Without Warrant
   By Michael RubinkamAssociated Press Writer
 Published: Feb 20, 2002
PHILADELPHIA (AP) - The Pennsylvania Supreme Court has agreed to decide
whether police may look at a suspect's e-mail and instant messages
without first obtaining a court order.

The case involves a former Lehigh County police officer, Robert Proetto,
who used the Internet to solicit sex from a 15-year-old girl. Proetto is
appealing his conviction.

It's the first time any state supreme court has agreed to review
government access to private Internet communications, said Proetto's
attorney, Tommaso Lonardo.

It's a relatively novel question, said David Sobel, general counsel
for the Electronic Privacy Information Center.

After meeting the girl in an Internet chat room, Proetto e-mailed her a
nude photograph of himself. He also asked for a nude videotape of the
girl, according to court documents.

Proetto and the girl chatted often for about a week and Proetto
repeatedly ask her to have sex, documents say.

The girl reported Proetto to the Bristol Borough Police Department in
Bucks County. Proetto was arrested when he made sexually explicit online
comments to a detective posing as another 15-year-old girl.

Proetto was convicted of criminal solicitation and related offenses and
served six months of house arrest. His probation ends this month.

At issue is whether Proetto's e-mail and instant messages to the girl
should have been suppressed at trial. Proetto claims police violated the
state's wiretapping law by looking at the messages without first
obtaining a warrant. Proetto also claims his Fourth Amendment privacy
rights were violated.

Though federal law only requires the consent of one person before a
telephone call or Internet communication can be recorded, Pennsylvania
and 11 other states require the consent of all parties.

I think most people would feel more comfortable knowing the other
participant in a communication does not have the unilateral ability to
bring the government into that conversation without court approval,
Sobel said.

Pennsylvania's Superior Court took a different view, ruling that Proetto
had consented to the recording by the very act of sending e-mail and
instant messages.

Any reasonably intelligent person, savvy enough to be using the
Internet ... would be aware that messages are received in a recorded
format, by their very nature, and can be downloaded or printed, said
the court, likening an e-mail message to a message left on a telephone
answering machine.

The court also said the wiretapping law did not apply because police did
not intercept Proetto's messages as he was sending them, but after the
fact.

The Pennsylvania Supreme Court, which announced last month it would
consider the case, will decide whether the evidence should have been
excluded.

At the time of his conviction, Proetto, who is in his early 30s, was
working as a police officer for the Colonial Regional Police Department
in Lehigh County. He was fired and now sells appliances, Lonardo said.

Mike Godwin, a policy fellow at the Center for Democracy and Technology,
said Proetto's case illustrates the difficulty of applying old laws to a
relatively new technology.

States have the freedom to raise the floor of protection for
intercepted communications, he said. It becomes a question of whether
Internet messages count.

http://ap.tbo.com/ap/breaking/MGACY31BXXC.html




WHY DO YOU NEED 20 TEDDY BEARS?

2002-02-18 Thread Optimizzin Al-gorithym

Upload will become more and more expensive and in some
juristictions subject to licensing (WHY DO YOU NEED 20 TEDDY BEARS?)

Because I like to keep one next to every firearm :-)




proxies and supernodes

2002-02-18 Thread Optimizzin Al-gorithym

At 02:37 PM 2/18/02 +0200, Sampo Syreeni wrote:
On Mon, 18 Feb 2002, Adam Back wrote:

and when someone wants to connect to it and can't they connect to the
super-node and the super-node tells the unreachable node over the
already open connection to connect back to the connecting machine.

Thanks for the explanation Adam.


Of course, that approach could be extended do the point where there is
no
essential difference between a proxy (here, the supernode) and a usual
client.

SS: every Morpheus app is both client, server, and supernode, by
default.
The latter two can be turned off, and the upload bandwidth can be
limited
as well.

Amazingly good download engine.




EZ-Jackster, Assasination Politics, Michael Eisner, Disney: propoganda for impressionable minds

2002-02-18 Thread Optimizzin Al-gorithym

Just caught the very tail of the Disney (TM) cartoon wherein a
prepubescent nigga
loses a prepubescent negress's sugah because he uses EZ Jackster, an
obvious
Napster metaphor.

This was, we think, once mentioned herein.  However this is our personal
first exposure.
Our reaction follows.

We propose that the next generation of invisible, deniable, distributed
P2P apps be named Jackster, or Eisner,
and they they include a Bid-on-Michael-Eisner's-Death-TimeMethod
feature.  Or members
of his family.  This feature should be named APDisney.

Be seeing you

-
Propoganda outlets are military targets ---NATO

-
For research use only.  Not for use in humans.




physics of spy satellites

2002-02-16 Thread Optimizzin Al-gorithym

At 07:51 AM 2/11/02 -0600, XXX wrote:
  If the governing requirements are to provide longer dwell and=20
  synoptic imagery for battlefield use, then physics allows two=20
  possible solutions:  multiply the number of satellites in low orbit
  or maintain a constellation of a few vehicles but raise their
orbits=20
  significantly.


Just an addendum:
The problem with fewer-birds-higher-up is that the optics need to be
bigger.  Optics are limited by what you can loft in your launch
vehicles.
E.g., The hubble telescope (which faces away from earth :-) mirror
was limited by the space shuttles' cargo bay.  Perhaps there are clever
(unfolding?) designs
which would increase resolution by using mirror segments separated
by long struts, but light-gathering ability depends on
mirror area.  Maybe that's not important for terrestrial targets.
Folding designs might require active stabilization of
the mirror-segments.  That is not impossible.




more walmart domestic surveillance

2002-02-14 Thread Optimizzin Al-gorithym

http://www.cnn.com/2002/US/02/13/inv.teddy.bear.terrorist/index.html

Alert issued for potential teddy
  bear bombs

LOS ANGELES, California (CNN)
-- The FBI has issued an alert to 350
law enforcement agencies in the
southwest and Salt Lake City for
potential Valentine teddy bear
bombs after a suspicious transaction
at a Wal-Mart last month.

   Law enforcement sources
said
   authorities also were on
the alert at
   airports in case the
suspected
   bear-bombs might be
carried onto
   airplanes on Valentine's
Day.

   The FBI said a
clean-shaven male,
   possibly of Middle
Eastern descent,
   purchased nine Valentine
teddy bears,
   20 inches tall, and 14
canisters of
  propane, 9 inches tall, small enough to fit inside the
teddy bears. The man also
  bought 12 packets of BBs -- small, round projectiles
usually fired from air
  guns.

  He paid in cash on January 15 at the Wal-Mart in
Stevenson Ranch,
  California, about 25 miles north of Los Angeles. He
left in a white GMC or
  Chevrolet delivery truck.

  After September 11, that purchase warrants that we
take a closer look, FBI
  spokesman Matthew McLaughlin said. Authorities were
notified February 4,
  McLaughlin said.

  Authorities emphasized that the man has committed no
crime, but the purchase
  has raised suspicions and authorities want to question
him about it.

  At the same time, authorities want Americans to be on
the lookout for
  suspicious packages on Valentine's Day due to the
level of concern over the
  purchase.

  The man was captured on surveillance tape and his
picture was included in the
  alert to law enforcement agencies.

[Propane, and propane accessories?]




stalking requires intent to create fear

2002-02-13 Thread Optimizzin Al-gorithym

[re Kirkland, Jim Bell, etc.]

http://latimes.com/news/local/la-11272feb13.story?coll=la%2Dheadlines%2Dcalifornia

Stalking Law Called Too Narrow for Meg Ryan Fan
   Crime: Officials must prove he meant to cause
fear when he broke into a Malibu home he
 thought was actress'.

 By ANNA GORMAN, TIMES STAFF WRITER

 John Michael Hughes gave a simple, if incredible,
explanation to
 sheriff's deputies for why he broke into a Malibu
house last month. His
 fiancee forgot to leave a key under the mat, so he
had to smash the
 bedroom window to climb inside.

 The woman Hughes calls his fiancee is actress Meg
Ryan, who says
 she has never met the 30-year-old former real
estate agent from
 Florida.

Hughes, who
was
also
convicted
last year of

attempting
to
enter
President
Bush's Texas

ranch with
firearms,
reacted
with
disbelief
when a
detective
told him he
was
not engaged
to
Ryan. Hughes

said that no

matter where
in
the world
Ryan
 was, he would find her. Though Hughes might seem
like an ideal candidate for charges under
 California's anti-stalking law, prosecutors say he
doesn't fit the narrow legal definition of a stalker
 because they cannot prove that he intended to cause
fear in the actress--no matter how fearful she
 now is. Although the state has made great strides
in the last decade in cracking down on stalkers,
 prosecutors say, the Hughes case highlights
weaknesses that remain.
snip