Re: On the orthogonality of anonymity to current market demand

2005-11-01 Thread Peter Gutmann
Chris Palmer <[EMAIL PROTECTED]> writes:
>James A. Donald writes:
>
>> Further, genuinely secure systems are now becoming available, notably
>> Symbian.
>
>What does it mean for Symbian to be genuinely secure? How was this determined
>and achieved?

By executive fiat.

Peter.



Re: On the orthogonality of anonymity to current market demand

2005-10-31 Thread James A. Donald
James A. Donald writes:
> > Further, genuinely secure systems are now becoming available, notably
> > Symbian.

Chris Palmer <[EMAIL PROTECTED]>
> What does it mean for Symbian to be genuinely secure? How was this
> determined and achieved?

There is no official definition of "genuinely secure", and it is my 
judgment that Symbian is unlikely to suffer the worm, virus and 
trojan problems to the extent that has plagued other systems.





Re: On the orthogonality of anonymity to current market demand

2005-10-31 Thread Chris Palmer
James A. Donald writes:

> Further, genuinely secure systems are now becoming available, notably
> Symbian.

What does it mean for Symbian to be genuinely secure? How was this
determined and achieved?


-- 
http://www.eff.org/about/staff/#chris_palmer



signature.asc
Description: Digital signature


Re: On the orthogonality of anonymity to current market demand

2005-10-31 Thread R.A. Hettinga
At 10:22 AM -0500 10/31/05, [EMAIL PROTECTED] wrote:
>and doesn't history show that big corporations are only interested in
>revenue

One should hope so.

;-)

Cheers,
RAH

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: On the orthogonality of anonymity to current market demand

2005-10-31 Thread johns
hi

( 05.10.26 09:17 -0700 ) James A. Donald:
> While many people are rightly concerned that DRM will
> ultimately mean that the big corporation, and thus the
> state, has root access to their computers and the owner
> does not, it also means that trojans, viruses, and
> malware does not.

do you really think this is true?

doesn't microsoft windows prove that remote control of computers only
leads to compromise? [especially in our heavily networked world]

and doesn't history show that big corporations are only interested in
revenue- so that if they get revenue by forcing you to pay them fees for
'upkeep' of your digital credentials to keep your computer working they
are going to do that.

the problems 'solved' by DRM can also be solved by moving to an
operating system where you have control of it, instead of an operating
system filled with hooks so other people can control your computer.

and that operating system is freely available ...

-- 
\js oblique strategy: don't be frightened of cliches



[Clips] Security 2.0: FBI Tries Again To Upgrade Technology

2005-10-31 Thread R.A. Hettinga

--- begin forwarded text


 Delivered-To: [EMAIL PROTECTED]
 Date: Mon, 31 Oct 2005 07:29:37 -0500
 To: Philodox Clips List <[EMAIL PROTECTED]>
 From: "R.A. Hettinga" <[EMAIL PROTECTED]>
 Subject: [Clips] Security 2.0: FBI Tries Again To Upgrade Technology
 Reply-To: [EMAIL PROTECTED]
 Sender: [EMAIL PROTECTED]

 <http://online.wsj.com/article_print/SB113072498332683907.html>

 The Wall Street Journal

  October 31, 2005

 Security 2.0:
  FBI Tries Again
  To Upgrade Technology
 By ANNE MARIE SQUEO
 Staff Reporter of THE WALL STREET JOURNAL
 October 31, 2005; Page B1

 As the fifth chief information officer in as many years at the Federal
 Bureau of Investigation, Zalmai Azmi faces a mystery: How to create a
 high-tech system for wide sharing of information inside the agency, yet at
 the same time stop the next Robert Hanssen.

 Mr. Hanssen is the rogue FBI agent who was sentenced to life in prison for
 selling secret information to the Russians. His mug shot -- with the words
 "spy, traitor, deceiver" slashed across it -- is plastered on the walls of
 a room at FBI headquarters where two dozen analysts try to track security
 breaches.

 Mr. Hanssen's arrest in February 2001, and his ability to use the agency's
 archaic system to gather the information he sold, led FBI officials to want
 to "secure everything" in their effort to modernize the bureau, Mr. Azmi
 says. But then, investigations after the Sept. 11 terrorist attacks showed
 that FBI agents had information about suspected terrorists that hadn't been
 shared with other law-enforcement agencies. So then "we said, 'Let's share
 everything,'" Mr. Azmi says.

 Since then, the FBI spent heavily to upgrade its case-management system,
 from one that resembled early versions of personal computers -- green type
 on a black computer screen, requiring a return to the main menu for each
 task -- to a system called Virtual Case File, which was supposed to use
 high-speed Internet connections and simple point-and-click features to sort
 and analyze data quickly.

 But after four years and $170 million, the dueling missions tanked the
 project. FBI Director Robert Mueller in April pulled the plug on the much
 ballyhooed technology amid mounting criticism from Congress and feedback
 from within the bureau that the new system wasn't a useful upgrade of the
 old, rudimentary system. As a result, the FBI continues to use older
 computer systems and paper documents remain the official record of the FBI
 for the foreseeable future.

 Highlighting the agency's problems is the recent indictment of an FBI
 analyst, Leandro Aragoncillo, who is accused of passing secret information
 to individuals in the Philippines. After getting a tip that Mr. Aragoncillo
 was seeking to talk to someone he shouldn't have needed to contact, the FBI
 used its computer-alert system to see what information the analyst had
 accessed since his hiring in 2004, a person familiar with the probe said.
 The system didn't pick up Mr. Aragoncillo's use of the FBI case-management
 system as unusual because he didn't seek "top secret" information and
 because he had security clearances to access the information involved, this
 person said.

 The situation underscores the difficulties in giving analysts and FBI
 agents access to a broad spectrum of information, as required by the 9/11
 Commission, while trying to ensure rogue employees aren't abusing the
 system. It's up to Mr. Azmi to do all this -- without repeating the
 mistakes of Virtual Case File.

 Much is at stake: FBI agents and analysts are frustrated by the lack of
 technology -- the FBI finished connecting its agents to the Internet only
 last year -- and Mr. Mueller's legacy depends on the success of this
 effort. The FBI director rarely appears at congressional hearings or news
 conferences without his chief information officer close by these days.

 An Afghan immigrant, the 43-year-old Mr. Azmi fled his native country in
 the early 1980s after the Soviet invasion. After a brief stint as a car
 mechanic in the U.S., he enlisted in the Marines in 1984 and spent seven
 years mainly overseas. A facility for languages -- he speaks five -- helped
 him win an assignment in the Marines working with radio communications and
 emerging computer technologies.

 When he returned to the U.S., he joined the U.S. Patent and Trademark
 Office as a project manager developing software and hardware solutions for
 patent examiners. He attended college and graduate school at night,
 obtaining a bachelor's degree in information systems from American
 University and a master's degree in the same field from George Washington
 University, both in Washington, D.C. Afterward, he got a job at the Justice
 Department in which he helped upgrade technology for U.S. attorneys across
 the country.

 That is wher

Please confirm your request to join hersey-serbest

2005-10-31 Thread Yahoo! Groups

Hello cypherpunks@minder.net,

We have received your request to join the hersey-serbest 
group hosted by Yahoo! Groups, a free, easy-to-use community service.

This request will expire in 7 days.

TO BECOME A MEMBER OF THE GROUP: 

1) Go to the Yahoo! Groups site by clicking on this link:
   
http://groups.yahoo.com/i?i=4VElF71LeNJ5njsXdcV8fVL0qjE&e=cypherpunks%40minder%2Enet
 

  (If clicking doesn't work, "Cut" and "Paste" the line above into your 
   Web browser's address bar.)

-OR-

2) REPLY to this email by clicking "Reply" and then "Send"
   in your email program

If you did not request, or do not want, a membership in the
hersey-serbest group, please accept our apologies
and ignore this message.

Regards,

Yahoo! Groups Customer Care

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 

 








Re: [EMAIL PROTECTED]: [IP] more on U.S. passports to receive RFID implants start

2005-10-30 Thread Major Variola (ret)
At 01:31 AM 10/30/05 -0700, Bill Stewart wrote:
>They've said they'll fall back on the traditional
>"If we can't read the passport it's invalid and you'll need to
>replace it before we'll let you leave the country" technique,
>just as they often do with expired passports and sometimes

What is the procedure (or are they secret :-) for passports which
become damaged whilst travelling out of country?

With a drivers license, if the magstrip doesn't work, they type
in the numbers.  But the biometrics are not encoded, its just
a convenience.  With a passport, they're relying on the
chip or no?

(Mechanical damage to the chip should work as well as
RF or antenna damage.  You will have to find the chip
and crack it, mere flexing of the paper carrier doesn't work
by design.)








Re: [EMAIL PROTECTED]: [IP] more on U.S. passports to receive RFID implants start

2005-10-30 Thread Eugen Leitl
On Sat, Oct 29, 2005 at 08:42:35PM -0400, Tyler Durden wrote:
> One thing to think about with respect to the RFID passports...
> 
> Um, uh...surely once in a while the RFID tag is going to get corrupted or 
> something...right? I'd bet it ends up happening all the time. In those 
> cases they probably have to fall back upon the traditional passport usage 
> and inspection.

Actually, an RFID can be ridiculously reliable. It will also
depend on how much harassment a traveler will be exposed to, 
when travelling. Being barred from entry will definitely prove
sufficient deterrment.
 
> The only question is, what could (believably) damage the RFID?

Microwaving it will blow up the chip, and cause a scorched spot.
Severing the antenna would be enough for the chip to become mute.
Violetwanding or treating with a Tesla generator should destroy
all electronics quite reliably -- you always have to check, of
course.

Also, the ID is quite expensive, and a frequent traveller
will wind up with a considerable expense, and hassle.

-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: [EMAIL PROTECTED]: [IP] more on U.S. passports to receive RFID implants start

2005-10-30 Thread Bill Stewart

At 01:42 AM 10/30/2005, Roy M. Silvernail wrote:

Tyler Durden wrote:

> One thing to think about with respect to the RFID passports...
>
> Um, uh...surely once in a while the RFID tag is going to get corrupted
> or something...right? I'd bet it ends up happening all the time. In
> those cases they probably have to fall back upon the traditional
> passport usage and inspection.


They've said they'll fall back on the traditional
"If we can't read the passport it's invalid and you'll need to
replace it before we'll let you leave the country" technique,
just as they often do with expired passports and sometimes
do with just-about-to-expire passports if you're a
Suspicious-Acting Person like Dave del Torto.


> The only question is, what could (believably) damage the RFID?


If you want to damage the RFID of a passport you're playing with,
microwave ovens should do just fine.
I don't know if Rivest's RFID-blocker chips use the same
frequency or codespace as the passport RFIDs,
but you could also leave one of them in the back of your passport.


Now put that chip-cooker in a trash can right by the main entrance to an
airport and perform some public service.


I'd be surprised if you could put out enough energy to cook
the passport RFIDs of people walking by at normal speed
without also causing lots of other electrical problems.



Re: [EMAIL PROTECTED]: [IP] more on U.S. passports to receive RFID implants start

2005-10-30 Thread Roy M. Silvernail
Tyler Durden wrote:

> One thing to think about with respect to the RFID passports...
>
> Um, uh...surely once in a while the RFID tag is going to get corrupted
> or something...right? I'd bet it ends up happening all the time. In
> those cases they probably have to fall back upon the traditional
> passport usage and inspection.
>
> The only question is, what could (believably) damage the RFID?

EMP?  Could be tuned, even, since the RFID is resonant at a known
frequency.  There's a standard for excitation field strength, so all one
should need to do would be hit the chip with 50-100x the expected
input.  Unless the system is shunted with a zener or some such, you
should be able to fry it pretty easily.

Now put that chip-cooker in a trash can right by the main entrance to an
airport and perform some public service.

-- 
Roy M. Silvernail is [EMAIL PROTECTED], and you're not
"It's just this little chromium switch, here." - TFT
Dspam->pprocmail->/dev/null->bliss
http://www.rant-central.com



RE: [EMAIL PROTECTED]: [IP] more on U.S. passports to receive RFID implants start

2005-10-29 Thread Tyler Durden

One thing to think about with respect to the RFID passports...

Um, uh...surely once in a while the RFID tag is going to get corrupted or 
something...right? I'd bet it ends up happening all the time. In those cases 
they probably have to fall back upon the traditional passport usage and 
inspection.


The only question is, what could (believably) damage the RFID?

-TD


From: Eugen Leitl <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: [EMAIL PROTECTED]: [IP] more on U.S. passports to receive RFID  
implants starting in October 2006 [priv]]

Date: Sat, 29 Oct 2005 20:54:13 +0200

- Forwarded message from David Farber <[EMAIL PROTECTED]> -

From: David Farber <[EMAIL PROTECTED]>
Date: Fri, 28 Oct 2005 17:49:06 -0400
To: Ip Ip 
Subject: [IP] more on U.S. passports to receive RFID implants starting in
October 2006 [priv]
X-Mailer: Apple Mail (2.734)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: Edward Hasbrouck <[EMAIL PROTECTED]>
Date: October 28, 2005 11:07:28 AM EDT
To: [EMAIL PROTECTED]
Subject: Re: [IP] more on U.S. passports to receive RFID implants
starting in October 2006 [priv]


>From: "Lin, Herb" <[EMAIL PROTECTED]>
>
>*Front* cover?  Does that mean that if I hold the passport the wrong
>way, the skimmer will have a free ride?
>

FWIW:

(1) The sample RFID passports that Frank Moss passed around at CFP,
which
looked like <http://travel.state.gov/passport/eppt/eppt_2501.html>, had
the RFID chip (which was barely detectable by feel) in the *back* cover.
The visible data page was/is, as with current passports, in the *front*
cover.  This is not compliant with the ICAO specifications, which
recommend having the chip in the same page as the visible data, to
make it
more difficult to separate them.  I can only guess that it was hard to
laminate the visible data without damaging the chip, if it was in the
same
page.  But it's interesting in light of the importance supposedly being
placed on compliance with ICAO standards.

(2) Moss had 2 sample RFID passports, 1 with and 1 without the
shielding.
He cliamed it was a layer in the entire outer cover (front and back),
but
it wasn't detectable by feel.

I have more threat scenarios for the latest flavor of RFID passport at:

http://hasbrouck.org/blog/archives/000869.html



Edward Hasbrouck
<[EMAIL PROTECTED]>
<http://hasbrouck.org>
+1-415-824-0214




-----
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE

[demime 1.01d removed an attachment of type application/pgp-signature which 
had a name of signature.asc]





[EMAIL PROTECTED]: [IP] more on U.S. passports to receive RFID implants starting in October 2006 [priv]]

2005-10-29 Thread Eugen Leitl
- Forwarded message from David Farber <[EMAIL PROTECTED]> -

From: David Farber <[EMAIL PROTECTED]>
Date: Fri, 28 Oct 2005 17:49:06 -0400
To: Ip Ip 
Subject: [IP] more on U.S. passports to receive RFID implants starting in 
October 2006 [priv]
X-Mailer: Apple Mail (2.734)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: Edward Hasbrouck <[EMAIL PROTECTED]>
Date: October 28, 2005 11:07:28 AM EDT
To: [EMAIL PROTECTED]
Subject: Re: [IP] more on U.S. passports to receive RFID implants  
starting in October 2006 [priv]


>From: "Lin, Herb" <[EMAIL PROTECTED]>
>
>*Front* cover?  Does that mean that if I hold the passport the wrong
>way, the skimmer will have a free ride?
>

FWIW:

(1) The sample RFID passports that Frank Moss passed around at CFP,  
which
looked like <http://travel.state.gov/passport/eppt/eppt_2501.html>, had
the RFID chip (which was barely detectable by feel) in the *back* cover.
The visible data page was/is, as with current passports, in the *front*
cover.  This is not compliant with the ICAO specifications, which
recommend having the chip in the same page as the visible data, to  
make it
more difficult to separate them.  I can only guess that it was hard to
laminate the visible data without damaging the chip, if it was in the  
same
page.  But it's interesting in light of the importance supposedly being
placed on compliance with ICAO standards.

(2) Moss had 2 sample RFID passports, 1 with and 1 without the  
shielding.
He cliamed it was a layer in the entire outer cover (front and back),  
but
it wasn't detectable by feel.

I have more threat scenarios for the latest flavor of RFID passport at:

http://hasbrouck.org/blog/archives/000869.html



Edward Hasbrouck
<[EMAIL PROTECTED]>
<http://hasbrouck.org>
+1-415-824-0214




---------
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


[EMAIL PROTECTED]: [IP] EFF: Court Issues Surveillance Smack-Down to Justice Department]

2005-10-27 Thread Eugen Leitl
- Forwarded message from David Farber <[EMAIL PROTECTED]> -

From: David Farber <[EMAIL PROTECTED]>
Date: Wed, 26 Oct 2005 19:28:46 -0400
To: Ip Ip 
Subject: [IP] EFF: Court Issues Surveillance Smack-Down to Justice Department
X-Mailer: Apple Mail (2.734)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: EFF Press <[EMAIL PROTECTED]>
Date: October 26, 2005 7:00:22 PM EDT
To: [EMAIL PROTECTED]
Subject: [E-B] EFF: Court Issues Surveillance Smack-Down to Justice  
Department
Reply-To: [EMAIL PROTECTED]


Electronic Frontier Foundation Media Release

For Immediate Release: Wednesday, October 26, 2005

Contact:

Kevin Bankston
   Staff Attorney
   Electronic Frontier Foundation
   [EMAIL PROTECTED]
   +1 415 436-9333 x126

Kurt Opsahl
   Staff Attorney
   Electronic Frontier Foundation
   [EMAIL PROTECTED]
   +1 415 436 9333 x106

Court Issues Surveillance Smack-Down to Justice Department

No Cell Phone Location Tracking Without Probable Cause

New York - Agreeing with a brief submitted by EFF, a
federal judge forcefully rejected the government's request
to track the location of a mobile phone user without a
warrant.

Strongly reaffirming an earlier decision, Federal
Magistrate James Orenstein in New York comprehensively
smacked down every argument made by the government in an
extensive, fifty-seven page opinion issued this week.
Judge Orenstein decided, as EFF has urged, that tracking
cell phone users in real time required a showing of
probable cause that a crime was being committed.Judge
Orenstein's opinion was decisive, and referred to
government arguments variously as "unsupported,"
"misleading," "contrived," and a "Hail Mary."

"This is a true victory for privacy in the digital age,
where nearly any mobile communications device you use might
be converted into a tracking device," said EFF Staff
Attorney Kevin Bankston. "Combined with a similar decision
this month from a federal court in Texas, I think we're
seeing a trend--judges are starting to realize that when it
comes to surveillance issues, the DOJ has been pulling the
wool over their eyes for far too long."

Earlier this month, a magistrate judge in Texas, following
the lead of Orenstein's original decision, published his
own decision denying a government application for a cell
phone tracking order.  That ruling, along with Judge
Orenstein's two decisions, revealed that the DOJ has
routinely been securing court orders for real-time cell
phone tracking without probable cause and without any law
authorizing the surveillance.

"The Justice Department's abuse of the law here is probably
just the tip of the iceberg," said EFF Staff Attorney Kurt
Opsahl.  "The routine transformation of your mobile phone
into a tracking device, without any legal authority, raises
an obvious and very troubling question:  what other new
surveillance powers has the government been creating out of
whole cloth and how long have they been getting away with
it?"

The government is expected to appeal both decisions and EFF
intends to participate as a friend of the court in each
case.

You can read the full text of Judge Orenstein's new
opinion, and the similar Texas opinion, at
www.eff.org/legal/cases/USA_v_PenRegister.

For this release:
http://www.eff.org/news/archives/2005_10.php#004090

About EFF

The Electronic Frontier Foundation is the leading civil
liberties organization working to protect rights in the
digital world. Founded in 1990, EFF actively encourages and
challenges industry and government to support free
expression and privacy online. EFF is a member-supported
organization and maintains one of the most linked-to
websites in the world at http://www.eff.org/


 -end-

___
presslist mailing list
https://falcon.eff.org/mailman/listinfo/presslist


-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Please confirm your request to join hersey-serbest

2005-10-27 Thread Yahoo! Groups

Hello cypherpunks@minder.net,

We have received your request to join the hersey-serbest 
group hosted by Yahoo! Groups, a free, easy-to-use community service.

This request will expire in 7 days.

TO BECOME A MEMBER OF THE GROUP: 

1) Go to the Yahoo! Groups site by clicking on this link:
   
http://groups.yahoo.com/i?i=dmjcf8BvLOkiFmjEaxMBnb5PbEM&e=cypherpunks%40minder%2Enet
 

  (If clicking doesn't work, "Cut" and "Paste" the line above into your 
   Web browser's address bar.)

-OR-

2) REPLY to this email by clicking "Reply" and then "Send"
   in your email program

If you did not request, or do not want, a membership in the
hersey-serbest group, please accept our apologies
and ignore this message.

Regards,

Yahoo! Groups Customer Care

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 

 







Re: On the orthogonality of anonymity to current market demand

2005-10-26 Thread James A. Donald
--
John Kelsey
> What's with the heat-death nonsense?  Physical bearer
> instruments imply stout locks and vaults and alarm
> systems and armed guards and all the rest, all the way
> down to infrastructure like police forces and armies
> (private or public) to avoid having the biggest gang
> end up owning all the gold.  Electronic bearer
> instruments imply the same kinds of things, and the
> infrastructure for that isn't in place.  It's like
> telling people to store their net worth in their
> homes, in gold. That can work, but you probably can't
> leave the cheapest lock sold at Home Depot on your
> front door and stick the gold coins in the same drawer
> where you used to keep your checkbook.

Some of us get spyware more than others.

Further, genuinely secure systems are now becoming
available, notably Symbian.

While many people are rightly concerned that DRM will
ultimately mean that the big corporation, and thus the
state, has root access to their computers and the owner
does not, it also means that trojans, viruses, and
malware does not. DRM enables secure signing of
transactions, and secure storage of blinded valuable
secrets, since DRM binds the data to the software, and
provides a secure channel to the user.   So secrets
representing ID, and secrets representing value, can
only be manipulated by the software that is supposed to
be manipulating it. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 3CepcQ59MYKAZTizEycP1vkZBbexwbyiobaC/bXS
 44hfxMF4PBKXmc5uavnegOFFCMtNwDmpIMxLBcyI3



Re: On the orthogonality of anonymity to current market demand

2005-10-26 Thread John Kelsey
>From: "R.A. Hettinga" <[EMAIL PROTECTED]>
>Sent: Oct 25, 2005 8:34 AM
>To: cryptography@metzdowd.com, [EMAIL PROTECTED]
>Subject: On the orthogonality of anonymity to current market demand

...
>That is to say, your analysis conflicts with the whole trend towards
>T-0 trading, execution, clearing and settlement in the capital
>markets, and, frankly, with all payment in general as it gets
>increasingly granular and automated in nature. The faster you can
>trade or transact business with the surety that the asset in question
>is now irrevocably yours, the more trades and transactions you can
>do, which benefits not only the individual trader but markets as a
>whole.

The prerequisite for all this is that when the asset changes hands,
it's very nearly certain that this was the intention of the asset's
previous owner.  My point isn't to express my love for book-entry
payment systems.  There's plenty to hate about them.  But if the
alternative is an anonymous, irreversible payment system whose control
lies in software running alongside three pieces of spyware on my
Windows box, they probably still win for most people.  Even bad
payment systems are better than ones that let you have everything in
your wallet stolen by a single attack.  

...
>However "anonymous" irrevocability might offend one's senses and
>cause one to imagine the imminent heat-death of the financial
>universe (see Gibbon, below... :-)), I think that technology will
>instead step up to the challenge and become more secure as a
>result. 

What's with the heat-death nonsense?  Physical bearer instruments
imply stout locks and vaults and alarm systems and armed guards and
all the rest, all the way down to infrastructure like police forces
and armies (private or public) to avoid having the biggest gang end up
owning all the gold.  Electronic bearer instruments imply the same
kinds of things, and the infrastructure for that isn't in place.  It's
like telling people to store their net worth in their homes, in gold.
That can work, but you probably can't leave the cheapest lock sold at
Home Depot on your front door and stick the gold coins in the same
drawer where you used to keep your checkbook.

>And, since internet bearer transactions are, by their very
>design, more secure on public networks than book-entry transactions
>are in encrypted tunnels on private networks, they could even be said
>to be secure *in spite* of the fact that they're anonymous; that --
>as it ever was in cryptography -- business can be transacted between
>two parties even though they don't know, or trust, each other.

Why do you say internet bearer transactions are more secure?  I can
see more efficient, but why more secure?  It looks to me like both
kinds of payment system are susceptible to the same broad classes of
attacks (bank misbehavior (for a short time), someone finding a
software bug, someone breaking a crypto algorithm or protocol).  What
makes one more secure than the other?  

...
>Cheers,
>RAH

--John Kelsey



[EMAIL PROTECTED]: [Politech] U.S. passports to receive RFID implants starting in October 2006 [priv]]

2005-10-25 Thread Eugen Leitl
- Forwarded message from Declan McCullagh  -

From: Declan McCullagh 
Date: Tue, 25 Oct 2005 13:23:23 -0700
To: politech@politechbot.com
Subject: [Politech] U.S. passports to receive RFID implants starting in
 October 2006 [priv]
User-Agent: Mozilla Thunderbird 1.0.6 (Macintosh/20050716)

Text of regulations:
http://edocket.access.gpo.gov/2005/05-21284.htm

---

http://news.com.com/Passports+to+get+RFID+chip+implants/2100-7348_3-5913644.html?tag=nefd.top

Passports to get RFID chip implants
October 25, 2005, 12:12 PM PDT

All U.S. passports will be implanted with remotely-readable computer 
chips starting in October 2006, the Bush administration has announced.

Sweeping new State Department regulations issued Tuesday say that 
passports issued after that time will have tiny radio frequency ID 
(RFID) chips that can transmit personal information including the name, 
nationality, sex, date of birth, place of birth and digitized photograph 
of the passport holder. Eventually, the government contemplates adding 
additional digitized data such as "fingerprints or iris scans."

Over the last year, opposition to the idea of implanting RFID chips in 
passports has grown amidst worries that identity thieves could snatch 
personal information out of the air simply by aiming a high-powered 
antenna at a person or a vehicle carrying a passport. Out of the 2,335 
comments on the plan that were received by the State Department this 
year, 98.5 percent were negative. The objections mostly focused on 
security and privacy concerns.

[...remainder snipped...]
___
Politech mailing list
Archived at http://www.politechbot.com/
Moderated by Declan McCullagh (http://www.mccullagh.org/)

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


On the orthogonality of anonymity to current market demand

2005-10-25 Thread R.A. Hettinga
-BEGIN PGP SIGNED MESSAGE-

At 3:57 PM -0400 10/24/05, John Kelsey wrote:
>More to the point, an irreversible payment system raises big practical
>problems in a world full of very hard-to-secure PCs running the
>relevant software.  One exploitable software bug, properly used, can
>steal an enormous amount of money in an irreversible way.  And if your
>goal is to sow chaos, you don't even need to put most of the stolen
>money in your own account--just randomly move it around in
>irreversible, untraceable ways, making sure that your accounts are
>among the ones that benefit from the random generosity of the attack.
>The payment system operators will surely be sued for this, because
>they're the only ones who will be reachable.  They will go broke, and
>the users will be out their money, and nobody will be silly enough to
>make their mistake again.

Though I agree with the notion that anonymity is orthogonal to market
demand at the moment, I think you lost me at the word "account", above.
:-).


That is to say, your analysis conflicts with the whole trend towards T-0
trading, execution, clearing and settlement in the capital markets, and,
frankly, with all payment in general as it gets increasingly granular and
automated in nature. The faster you can trade or transact business with the
surety that the asset in question is now irrevocably yours, the more trades
and transactions you can do, which benefits not only the individual trader
but markets as a whole.

The whole foundation of modern finance, and several -- almost posthumous,
so pervasive was the homeopathic socialism that we now call Keynesianism --
Nobel prizes in economics are based on that premise, and it has been proven
empirically now for many decades: The entire history of the currency
futures markets would be a good example, though now that I think of it, any
derivative market, since the time of Thales himself, would prove the point.


However "anonymous" irrevocability might offend one's senses and cause one
to imagine the imminent heat-death of the financial universe (see Gibbon,
below... :-)), I think that technology will instead step up to the
challenge and become more secure as a result. And, since internet bearer
transactions are, by their very design, more secure on public networks than
book-entry transactions are in encrypted tunnels on private networks, they
could even be said to be secure *in spite* of the fact that they're
anonymous; that -- as it ever was in cryptography -- business can be
transacted between two parties even though they don't know, or trust, each
other.


For instance, another "problem" with internet bearer transactions, besides
their prima facie "anonymity" (they're only prima facie because, while the
protocols don't *require* is-a-person and-then-you-go-to-jail identity,
traffic analysis is still quite trivial for the time being, onion routers
notwithstanding) is that the client is responsible not only for most of the
computation, but also for the storage of notes or coins, instead of a
central database in a clearinghouse or bank somewhere "storing" various
offsetting book-entries in, as you noted above, "accounts". :-).

Of course, simply backing up one's data off-site, much easier with internet
bearer certificates than with whole databases, solves this problem, and, as
we all know here, the safest way to do *that* is to use some kind of m-of-n
hash,  stored, someday, for even smaller bits of cash :-), in many places
on the net at once. Obviously, we don't need small cash to store big
assets, any more than we need big servers to distribute big files in
BitTorrent, but it will only accelerate, if not complete, the process, when
we get there.


As I have said, too many times :-), about these things, transaction cost is
always going to be the critical factor in any change from book-entries to
chaumian-esque internet bearer transactions. And I believe that,
hand-in-hand with increased security, reduced transaction cost is more a
function of the collapsing cost and the ubiquity of distributed processing
power and network access than anything else.

So, anonymity is, in fact, orthogonal to market demand, primarily because
it's an *effect*, and not a cause, of that demand. As we all do now with
the current proctological state of book-entry finance, the anonymity of a
proposed internet bearer transaction infrastructure will just be a "cost"
that the market would have to bear. :-).

To channel Schopenhauer a bit, like the emergence of industrialism and the
abolition of slavery was before it, once anonymity becomes a "feature" of
our transaction infrastructure, people will eventually declare it to be not
only self-evident all along, but a moral *prerequisite* of any transaction
as well.

To put it another way, it's a pity for acrophobics that 

You are invited to participate

2005-10-24 Thread KMSI
Title: You are invited to participate

		



	



 You are invited to participate  The Elimination of User Fees - eLearning Made Available To Everyone  Dear list member,We cordially invite you to participate in the first of a four part online seminar series titled “Elearning – making the MOST of your Investment”.  This session is of particular value for those involved with eLearning and Training for the US Government and associated organizations.  There will be valuable insights, strategies and recent offering for this group made available.  An eLearning expert and  thought leader from the NTIS will share important and timely changes.  Others, outside of the US Government will also find this session interesting, valuable and thought provoking.  Please join your industry peers as they participate in this timely and exciting topic.

Anyone who has been involved in eLearning projects understands the problems and issues.  In this series we will examine four of the main issues that plaque eLearning projects and that eliminate (or nearly eliminate) any ROI.  These are;
•	User Fees!  The practice of charging you more for each person who can now take eLearning on you platform
•	Installations of eLearning platforms that take months and months, all charged to you at a high T&M rate
•	Poor Scalability that has you either eliminating some potential users, or adding “box after box” to accommodate users
•	Poor stability, leaving your users frustrated, high call volume to the call center and certain distain for eLearning in general

This seminar series examines each topic, exposes the fallacies generally used by vendors to explain each, and gives you as an eLearning professional insights and arms you with knowledge.  Then as you speak with others, negotiate with vendors, or simply attempt to do you job to your maximum potential you will have the power to do the best possible.  Oh and the best part, these are FREE!!  The schedule of these seminar are as follows; (replays will be available on request, but also FREE!!)

The Elimination of User Fees - eLearning Made Available To Everyone;Presented Nov 1 @ 2 PM eastern
Rapid Installation of an eLearning Platform - I don’t have time to wait;Presented Dec 6  @ 2 PM eastern
Scalability - Why That is Important to Determine Before You Buy ;  Presented Jan. 10, ’06  @ 2 PM eastern
Stability - I Need the Platform Available for My People to Use;Presented Feb 7 ’06,  @ 2 PM eastern

During this first session, Mr. Case and our SME (Subject Matter Expert) from NTIS (National Technical Information Service) will share some statistics on how expensive User Fees can be.  Also they will present how some companies have dealt with User Fees and how they have modified their exposure to their eLearning participants so they can meet their budgets.  Additionally they will go over some innovative things that have been accomplished by organizations that have the luxury of platforms with out User Fees. Finally they will be asking for you participation in adding your own ideas about User Fees and what you would use a platform for that does not have User Fees.  Just Imagine for a moment…what kind of eLearning Return on Investment would you realize if there were no User Fees!

With no User Fees, No upload Fees, no maintenance Fees, no upgrade Fees, in fact no other fees than the license fee, it is now possible to accomplish Great Things for a very large audience.  Yes, with no user fees, you can invite ALL of your customers to take eLearning, Yes you can invite prospective customers to take eLearning.  Yes before you even ask, YES, you could invite the entire world to take eLearning

If you are involved with any aspect of developing and fielding effective eLearning, we encourage you to attend these valuable seminars as we presents fresh ideas that will serve as a thought-provoking basis for decision-makers to map a sensible eLearning vision going forward.  The session will be approximately one hour in duration and there is no charge to participate in the event.  Finally, you will have the opportunity to ask questions of the speaker and online experts via chat room. For additional information or to register for this free event, please visit http://www.kmsi.us/series.htm or call us toll-free at (866) 501-5674.  

Sincerely,
Jack E. Lee

President
Knowledge Management Solutions, Inc
 Elearning: Making the MOST of your Investment-Part 1  Click here for registration 
		
	 Knowledge Management Solutions, Inc.
  839 Elkridge Landing Road 
Suite 205
Linthicum, MD 21090 
  Phone: (866) 501-5674 

  Fax: (410) 859-3414 

  Web site: http://www.kmsi.us
  
  E-mail: [EMAIL PROTE

[EMAIL PROTECTED]: [IP] more on Colleges protest netwoprk upgrades to allow easier surveillance]

2005-10-22 Thread Eugen Leitl
- Forwarded message from David Farber <[EMAIL PROTECTED]> -

From: David Farber <[EMAIL PROTECTED]>
Date: Sat, 22 Oct 2005 16:36:43 -0400
To: Ip Ip 
Subject: [IP] more on  Colleges protest netwoprk upgrades to allow easier 
surveillance
X-Mailer: Apple Mail (2.734)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: finin <[EMAIL PROTECTED]>
Date: October 22, 2005 3:22:57 PM EDT
To: Dave Farber <[EMAIL PROTECTED]>
Subject: Colleges protest netwoprk upgrades to allow easier surveillance


According to this story, the only complaint from colleges is
the cost.  In addition to ultimate concerns about privacy,
are there also technical issues that might come up, like
adding to latency or congestion?  Many universities are
engaged in building and testing innovative high speed
computation and communication applications and testbeds that
span the Internet.  Would a required re-architecting of
campus networks cause problems for this kind of research?
I'm not expert enough in these areas to have a well informed
opinion. Tim

--

Colleges Protest Call to Upgrade Online Systems
By Sam Dillon and Stephen Labaton, NYT, October 23, 2005
http://www.nytimes.com/2005/10/23/technology/23college.html? 
pagewanted=all

The federal government, vastly extending the reach of an
11-year-old law, is requiring hundreds of universities,
online communications companies and cities to overhaul their
Internet computer networks to make it easier for law
enforcement authorities to monitor e-mail and other online
communications.

The action, which the government says is intended to help
catch terrorists and other criminals, has unleashed protests
and the threat of lawsuits from universities, which argue
that it will cost them at least $7 billion while doing
little to apprehend lawbreakers. Because the government
would have to win court orders before undertaking
surveillance, the universities are not raising civil
liberties issues.

The order, issued by the Federal Communications Commission
in August and first published in the Federal Register last
week, extends the provisions of a 1994 wiretap law not only
to universities, but also to libraries, airports providing
wireless service and commercial Internet access providers.

It also applies to municipalities that provide Internet
access to residents, be they rural towns or cities like
Philadelphia and San Francisco, which have plans to build
their own Net access networks.  So far, however,
universities have been most vocal in their opposition.
...
The universities do not question the government's right to
use wiretaps to monitor terrorism or criminal suspects on
college campuses, Mr. Hartle said, only the order's rapid
timetable for compliance and extraordinary cost.
...
But the federal law would apply a high-tech approach,
enabling law enforcement to monitor communications at
campuses from remote locations at the turn of a switch.  It
would require universities to re-engineer their networks so
that every Net access point would send all communications
not directly onto the Internet, but first to a network
operations center where the data packets could be stitched
together into a single package for delivery to law
enforcement, university officials said.
...
Law enforcement has only infrequently requested to monitor
Internet communications anywhere, much less on university
campuses or libraries, according to the Center for Democracy
and Technology. In 2003, only 12 of the 1,442 state and
federal wiretap orders were issued for computer
communications, and the F.B.I. never argued that it had
difficulty executing any of those 12 wiretaps, the center
said.

"We keep asking the F.B.I., What is the problem you're
trying to solve?" Mr. Dempsey said. "And they have never
showed any problem with any university or any for-profit
Internet access provider. The F.B.I. must demonstrate
precisely why it wants to impose such an enormously
disruptive and expensive burden."
...

-- 
 Tim Finin, Computer Science & Electrical Engineering, Univ of Maryland
 Baltimore County, 1000 Hilltop Cir, Baltimore MD 21250. [EMAIL PROTECTED]
 http://ebiquity.umbc.edu 410-455-3522 fax:-3969 http://umbc.edu/~finin



-----
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Please confirm your request to join sari-larcivert

2005-10-20 Thread Yahoo! Groups

Hello cypherpunks@minder.net,

We have received your request to join the sari-larcivert 
group hosted by Yahoo! Groups, a free, easy-to-use community service.

This request will expire in 7 days.

TO BECOME A MEMBER OF THE GROUP: 

1) Go to the Yahoo! Groups site by clicking on this link:
   
http://groups.yahoo.com/i?i=MjNVSoJ7qxkVPHJolXVTBo2c4zQ&e=cypherpunks%40minder%2Enet
 

  (If clicking doesn't work, "Cut" and "Paste" the line above into your 
   Web browser's address bar.)

-OR-

2) REPLY to this email by clicking "Reply" and then "Send"
   in your email program

If you did not request, or do not want, a membership in the
sari-larcivert group, please accept our apologies
and ignore this message.

Regards,

Yahoo! Groups Customer Care

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 

 






[Clips] FDIC: Putting an End to Account-Hijacking Identity Theft Study Supplement

2005-10-19 Thread R.A. Hettinga

--- begin forwarded text


 Delivered-To: [EMAIL PROTECTED]
 Date: Thu, 20 Oct 2005 00:39:23 -0400
 To: Philodox Clips List <[EMAIL PROTECTED]>
 From: "R.A. Hettinga" <[EMAIL PROTECTED]>
 Subject: [Clips] FDIC: Putting an End to Account-Hijacking Identity Theft
  Study Supplement
 Reply-To: [EMAIL PROTECTED]
 Sender: [EMAIL PROTECTED]

 <http://www.fdic.gov/consumers/consumer/idtheftstudysupp/index.html>

  ?
 Home > Consumer Protection > Consumer Resources > Putting an End to
 Account-Hijacking Identity Theft Study Supplement

 Putting an End to Account-Hijacking Identity Theft Study Supplement

 Federal Deposit Insurance Corporation  Division of Supervision and Consumer
 Protection  Technology Supervision Branch June 17, 2005

 This publication supplements the FDIC's study Putting an End to
 Account-Hijacking Identity Theft published on December 14, 2004.

 Printable Version - PDF 105k (PDF Help)

 Table of Contents

 Executive Summary and Findings

 Focus of Supplement
  Identity theft in general and account hijacking in particular continue to
 be significant problems for the financial services industry and consumers.
 Recent studies indicate that identity theft is evolving in more complicated
 ways that make it more difficult for consumers to protect themselves.
 Recent studies also indicate that consumers are concerned about online
 security and may be receptive to using two-factor authentication if they
 perceive it as offering improved safety and convenience.

 This Supplement discusses seven additional technologies that were not
 discussed in the Study. These technologies, as well as those considered in
 the Study, have the potential to substantially reduce the level of account
 hijacking (and other forms of identity theft) currently being experienced.

 Findings
  Different financial institutions may choose different solutions, or a
 variety of solutions, based on the complexity of the institution and the
 nature and scope of its activities. The FDIC does not intend to propose one
 solution for all, but the evidence examined here and in the Study indicates
 that more can and should be done to protect the security and
 confidentiality of sensitive customer information in order to prevent
 account hijacking.

 Thus, the FDIC presents the following updated findings:
1   The information security risk assessment that financial
 institutions are currently required to perform should include an analysis
 to determine (a) whether the institution needs to implement more secure
 customer authentication methods and, if it does, (b) what method or methods
 make most sense in view of the nature of the institution's business and
 customer base.
2   If an institution offers retail customers remote access to
 Internet banking or any similar product that allows access to sensitive
 customer information, the institution has a responsibility to secure that
 delivery channel. More specifically, the widespread use of user ID and
 password for remote authentication should be supplemented with a reliable
 form of multifactor authentication or other layered security so that the
 security and confidentiality of customer accounts and sensitive customer
 information are adequately protected.



 Last Updated 6/27/2005
   [EMAIL PROTECTED] HomeContact
 UsSearchHelpSiteMapForms
 Freedom of Information ActWebsite PoliciesFirstGov.gov



 --
 -
 R. A. Hettinga 
 The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
 44 Farquhar Street, Boston, MA 02131 USA
 "... however it may deserve respect for its usefulness and antiquity,
 [predicting the end of the world] has not been found agreeable to
 experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
 ___
 Clips mailing list
 [EMAIL PROTECTED]
 http://www.philodox.com/mailman/listinfo/clips

--- end forwarded text


-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: [Politech] More on Barney lawyer yearning to hack copyright infringers' sites [ip]

2005-10-19 Thread Justin
On 2005-10-19T10:37:55-0700, Declan McCullagh wrote:
> Previous Politech message:
> http://www.politechbot.com/2005/10/17/barney-lawyer-recommends/

> Responses:
> http://www.politechbot.com/2005/10/19/more-on-barney/

Some of the first-round responses mentioned the iniquities involved in
attacking hosted sites, but what if the site that appears to be involved
in copyright infringement isn't?  There is no assurance that the suspect
IP address isn't forwarding illegal (outgoing) traffic from some other
machine, or that it doesn't forward incoming traffic to some other
machine.

Suppose someone has a wireless firewall appliance set up to forward a
number of common ports to an interior server.  Attacking a suspect IP
results in an attack on an uninvolved interior server.  The copyright
violation might be some unauthorized person connecting through a
wireless gateway, so the owner of the interior server might not be in
any way connected to the copyright violation.

Suppose someone is running a web proxy.  An attack on a suspect IP
address results in an attack on the machine running the web proxy.  An
open web proxy, while it may violate an ISP contract, is not illegal,
and by itself the proxy is not connected to any illegal activity (except
maybe in China, etc.).

Suppose someone is involved in copyright infringement, but forwards all
incoming connections on certain ports [while dropping traffic to the
rest...] to an IP address associated with the Chinese Embassy.  Is it
clear who's responsible when a copyright holder ends up attacking a
Chinese computer?  Even if the person who set up the port forwarding is
responsible for _connections_ to the Chinese Embassy made as a result,
does that make him responsible for willful attacks conducted by
copyright holders?

If copyright hackers get immunity as long as they attack the public IP
address that appears to be distributing copyrighted material, the
consequences will be much worse than those of DMCA take-down provisions.
ISPs everywhere would police their own networks with a vengeance to
mitigate the risk that some copyright holder would find something first,
attack the ISP, and cause major damage (not to mention subsequent loss
of customers).  At least with the DMCA, ISPs get notified and have a
chance to act before something bad happens, which generally means low
levels of in-house policing.



Failed to clean virus file Bill.zip

2005-10-19 Thread postmaster
The file you have sent was infected with a virus but InterScan E-Mail VirusWall
could not clean it.



Imaging gels or microarrays? Look to PerkinElmer.

2005-10-18 Thread PerkinElmer Imaging Team





 

   



  
   
 
  


  
		

		
	 		 
	  			 
  
 
  

 
  

 
   
   
 
If you’re planning an imaging system purchase in 2005, 
be sure to
demo the best performing imaging systems on the market—PerkinElmer.
You’ll receive a free Apple iPod with a qualifying purchase 
of any
microarray or gel imaging system—even if it’s 
not one of ours!
  



 
  
  Why 
  should you consider a PerkinElmer imaging system? 
  Superior performance, reliability, and support.
   
  Labs that try PerkinElmer imaging systems buy them. We’re 
  so confident you’ll find our systems’ performance superior 
  to any others that if you purchase a PerkinElmer ProScanArray® 
  Microarray Analysis System or ProXPRESS™ 
  2D Proteomic Imaging System or  any comparable 
  imaging system by December 20, 2005, we’ll give you an iPod 
  mini with JBL speakers for your lab.* 

 
  

 
   
  *It's easy to demo our imaging systems. 
  Visit www.perkinelmer.com/imagingdemo2 
  for complete rules and to register for a free demo. You'll see a 
  system whose performance and reliability you can trust, so you can 
  purchase it with confidence.

 
  

 
   
ProScanArray® 
  Microarray Analysis System
  
  Our super sensitive microarray scanner maximizes discrimination 
  in signal and readily detects differences between spots.
  Learn 
  more.
  
  ProXPRESS™ 2D Proteomic Imaging System
  
  Our multi-color fluorescence 2D and 1D gel imager has the best image 
  quality, speed and resolution on the market. Learn 
  more.


 
  

 
   
   
©2005 
  PerkinElmer, Inc. All rights reserved. The PerkinElmer logo 
  and design and ProScanArray are registered trademarks and ProXPRESS 
  is a trademark of PerkinElmer, Inc. iPod is a registered trademark 
  of Apple Computer, Inc. PerkinElmer reserves the right to change 
  this document at any time without notice and disclaims liability 
  for editorial, pictorial or typographical errors. 
  
  007436_02

  


  
		
		
		

	


  
		

	

   			Copyright© 2005 PerkinElmer, Inc. All rights reserved.
To unsubscribe,
CLICK Here
or if the email address is not clickable, simply copy the text to the right of the 'mailto:'
   		[EMAIL PROTECTED]
command and paste it into your email application and hit send.  You will be taken off the list immediately. Thank you!
PerkinElmer Life & Analytical Sciences710 Bridgeport AvenueShelton, CT 06484(203)402-6892
   		
   	









[EMAIL PROTECTED]: cost to install surveillance cameras in public places]

2005-10-17 Thread Eugen Leitl
- Forwarded message from [EMAIL PROTECTED] -

From: [EMAIL PROTECTED]
Date: Thu, 13 Oct 2005 03:37:01 -0400 (EDT)
To: kragen-tol@canonical.org
Subject: cost to install surveillance cameras in public places

Suppose you wanted to plant a hidden camera for some long period of
time and capture photos of all that went past.  You'd like to never
again have to enter the place where it's hidden, and only visit it
rarely; you'd like it to be small; and you'd like it to last a long
time.  For example, the book "The Social Life of Small Urban Spaces"
was based on a few years of research in this vein using Super 8
cameras for time-lapse photography.  It appears to me that this
equipment should now be incredibly cheap.

USB "webcams" that capture 100-kB 640x480 JPEGs are on the order of
$10.  I think 4-port USB hubs (again, on the order of $10) contain all
the hardware necessary to act as USB host controllers; one could
imagine integrating the USB hub hardware with a small single-board
computer with SD/MMC and Bluetooth interfaces, for a total cost on the
order of $50 plus up to 4 cameras and their USB cables, and an MMC
card ($50-$110).

This device would presently be limited in smallness only by the size
of its power supply, USB ports, and multi-chip integration, so it
could be concealed in many places.  You could probably run it on 200mW
when running (for less than a second) and <1mW when idle.

You could drop by periodically with an inconspicuous Bluetooth device,
such as a cellphone or laptop, to download the pictures (say, 4
cameras * 100kB/shot/camera * 4 shots / minute * 60 minutes/hour * 24
hours/day = 2.3GB/day; but one shot per minute is only 144MB/day).
Anyone snooping over Bluetooth at the time could tell that a lot of
data was being sent over Bluetooth (1megabit/sec? not sure; but at
that speed you'd have to spend 2300 seconds in the vicinity.)

Alternatively, you could use a directional antenna from hundreds of
meters away (the "Bluesniper" folks managed to do 1km.)

An adaptive surveillance algorithm could shoot four times per minute
until the data card was full, followed by twice a minute (replacing
every other old shot, starting with the oldest) until the data card
was all full at twice a minute, then once per minute (thinning out old
shots to once a minute) until it was full again, etc.

Supposing that USB 12Mbps transfers were the limiting factor, you'd
need about 67ms of "on time" per shot, or (according to my 200mW
estimate above) 13.4 mJ.  My laptop's Li-ion battery supposedly holds
around 46Wh, or 165kJ (abridged info below):

$ cat /proc/acpi/battery/BAT1/state 
present rate:1227 mA
remaining capacity:  2579 mAh
present voltage: 11300 mV
$ cat /proc/acpi/battery/BAT1/info
design capacity: 4500 mAh
last full capacity:  4067 mAh
design voltage:  10800 mV
model number:XM2018P02   
battery type:Li-ION  

11.3V * 4.067Ah = 46Wh.

On that basis, my laptop's battery could power 12 000 000 invasions of
privacy by this system --- saving that many camera shots to an MMC
card.  It might only be able to power 4 000 000 invasions of privacy
if it had to transmit them all over Bluetooth.  Still, that's nearly
six months in the four-shots-with-four-cameras-per-minute maxi
configuration described above, where you'd have to come download up
your photos at least once a day, and at one camera shooting once per
minute, it would last 8 years.

(I'm assuming that the webcams power up instantly.  This may be
unreasonable.)

Obviously you could do a similar job with audio surveillance, but
ironically, this may consume more storage and power; minimally
comprehensible speech is 10kbps under the best of conditions, so you'd
need at least 108MB/day, and probably several times that to get
anything useful.  You'd need some very-low-power constantly-on device
to buffer the audio so you wouldn't have to run the CPU all the time.

A similar system, but without the cameras or other transducers, could
serve as a maildrop or backup server (for data with high value per
byte, obviously).

We can anticipate that the power and monetary cost of data storage and
transmission will decrease considerably more before Moore's Law runs
out.

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Mail delivery failed: returning message to sender

2005-10-11 Thread Mail Delivery System
|- Failed addresses follow: -|
 <[EMAIL PROTECTED]>
   unknown user / Teilnehmer existiert nicht
|--- Message text follows: (body too large, truncated) --|
Received: from minder.net ([81.117.138.91]) by mailin12.sul.t-online.de
with esmtp id 1EPEwD-1n0G3M0; Tue, 11 Oct 2005 09:52:41 +0200
From: cypherpunks@minder.net
To: [EMAIL PROTECTED]
Subject: Mail System Error - Returned Mail
Date: Tue, 11 Oct 2005 09:41:11 +0200
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary="=_NextPart_000_0008_9EC27161.61A4B283"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.
X-MIMEOLE: Produced By Microsoft MimeOLE V6



[EMAIL PROTECTED]: [p2p-hackers] Workshop on Dependable and Sustainable Peer-to-Peer Systems]

2005-10-10 Thread Eugen Leitl
- Forwarded message from Sam Joseph <[EMAIL PROTECTED]> -

From: Sam Joseph <[EMAIL PROTECTED]>
Date: Tue, 11 Oct 2005 03:53:51 +0900
To: "Peer-to-peer development." <[EMAIL PROTECTED]>,
[EMAIL PROTECTED]
Subject: [p2p-hackers] Workshop on Dependable and Sustainable Peer-to-Peer
Systems
Organization: NeuroGrid http://www.neurogrid.net/
User-Agent: Mozilla Thunderbird 1.0.2 (Windows/20050317)
Reply-To: [EMAIL PROTECTED],
"Peer-to-peer development." <[EMAIL PROTECTED]>

[CALL FOR PAPERS]

The First International Workshop on Dependable and Sustainable Peer-to-Peer
Systems (DAS-P2P 2006) is the first workshop which focuses on dependability
and sustainability of P2P systems, with respect to their designs,
operations,
applications and social impacts.

Peer-to-Peer (P2P) can be a promising technology on which we can depend
lives
of ours and our children, upon which we can build sustainable societies.
Designs of P2P systems are characterized by their usage of overlay networks
such that there is symmetry in the roles among participants. This implies
distribution of authorities, not only preventing introduction of single
points
of failure, but also assuring a level of autonomy which allows many of
us to
spontaneously start, maintain, or recover from failures of, such systems.

Although difficulties exist, such as uncertainty in the trust among
participants, one needs to be aware that such difficulties are, in many
parts,
due to our own human nature; depending on P2P is, in fact and literally,
depending on ourselves and our friends, which seem to be the only ones
we can
trust anyway, when it comes to our own survival.

The goal of this workshop is to share experiences, insights and new
ideas, and
set forth research agendas and suggestive future directions by
collaborations
among researchers with different disciplines and with similar interests
toward
dependability and sustainability.

The following is a non-exhaustive list of relevant topics:

** Designs and operations of dependable and sustainable P2P systems
- Self-organization and emergence
- Attack-resistance
- Fault tolerance
- Sustainable operations
- Sustainable mutual trust
- Sustainable reciprocal relationships

** Applications and social impacts of dependable and sustainable P2P
systems
- Sustainable economy
- Sustainable governance
- Sustainable lifestyles
- Rescue activities
- Post-catastrophic recovery
- Tackling environmental problems

The program of the workshop will be a combination of invited talks, paper
presentations and discussions.

[SUBMISSION INSTRUCTIONS]

The workshop invites your contributions of previously unpublished
papers, which
will be selected based on their originality, technical merit and topical
relevance. Papers will also be selected by the likelihood that they will
lead
to interesting and fruitful discussions at the workshop.

Your contributions should be formatted acoording to the IEEE Computer
Society
Press Proceedings Author Guidelines: 10-point Times, single-spaced,
two-column
format (see http://www.tinmith.net/tabletop2006/IEEE/Format/instruct.htm
for
detail). Each of your contributions should not exceed 8 pages.

See the workshop web site (http://das-p2p.wide.ad.jp/) for the submission
procedure.

[PUBLICATION]

Proceedings of the workshop will be published by IEEE Computer Society
Press.

[IMPORTANT DATES]

Paper submission due: December 4th, 2005
Notification of acceptance: January 15th, 2006
Camera-ready copies due: February 1st, 2006
Author registration due: February 1st, 2006
Workshop: April 20th-22nd, 2006 (exact date is to be decided)

[REGISTRATION]

Workshop registration will be handled by the ARES 2006 organization along
with the main conference registration.

[ORGANIZING COMMITTEE]

Program co-chairs:

Yusuke Doi
Communication Platform Laboratory, Corporate R&D Center,
TOSHIBA Corporation
1 Komukai-Toshiba-Cho, Saiwai-Ku, Kawasaki
Kanagawa 212-8582 Japan

Youki Kadobayashi
Graduate School of Information Science
Nara Institute of Science and Technology
Takayama 8916-5, Ikoma
Nara 630-0192 Japan

Kenji Saito (main contact)
Graduate School of Media and Governance
Keio University
5322 Endo, Fujisawa
Kanagawa 252-8520 Japan
[EMAIL PROTECTED]

[PROGRAM COMMITTEE]

See the workshop web site (http://das-p2p.wide.ad.jp/).
-


___
p2p-hackers mailing list
[EMAIL PROTECTED]
http://zgp.org/mailman/listinfo/p2p-hackers
___
Here is a web page listing P2P Conferences:
http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


/. [You Need Not Be Paranoid To Fear RFID]

2005-10-10 Thread Eugen Leitl

Link: http://slashdot.org/article.pl?sid=05/10/10/0643235
Posted by: Zonk, on 2005-10-10 10:32:00

   An anonymous reader writes "A story at the Boston Globe [1]covers
   extensive privacy abuses involving RFID." From the article: "Why is
   this so scary? Because so many of us pay for our purchases with credit
   or debit cards, which contain our names, addresses, and other
   sensitive information. Now imagine a store with RFID chips embedded in
   every product. At checkout time, the digital code in each item is
   associated with our credit card data. From now on, that particular
   pair of shoes or carton of cigarettes is associated with you. Even if
   you throw them away, the RFID chips will survive. Indeed, Albrecht and
   McIntyre learned that the phone company BellSouth Corp. had applied
   for a patent on a system for scanning RFID tags in trash, and using
   the data to study the shopping patterns of individual consumers." I
   think they may be going a little overboard with their stance, but it's
   always interesting to talk about.

References

   1. 
http://www.boston.com/business/globe/articles/2005/10/10/you_need_not_be_paranoid_to_fear_rfid?mode=PF

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Revision to Your Amazon.com Information

2005-10-09 Thread Amazon


Revision to Your Amazon.com Information

2005-10-06 Thread Amazon




	

	



At the last reviewing at your amazon account we discovered that your information is inaccurate. We apologize for this but because most frauds are possible because we don't have enough information about our clients, we require this verification. Please login and reenter  your personal information. 

Please follow this link to update your personal information: 


 http://www.amazon.com/exec/obidos/sign-in.html 
(To complete the verification process you must fill in all the required fields) 



Please note: If you don't update your information within next 48 hours , we will be forced to suspend your account untill you have the time to contact us by phone. 

We apreciate your support and understanding, as we work together to keep amazon market a safe place to trade. Thank you for your attention on this serious matter and we apologize. 




This message was generated automatically, please do not reply to it. Amazon treats your personal information with the utmost care, and our Privacy Policy is designed to protect you and your information. 





Re: Just to make your life more paranoid:) Re: Surreptitious Tor Messages?

2005-10-04 Thread Tyler Durden

Steve Furlong wrote...


The noisy protocol has the added benefit of causing the network cable
to emit lots of radiation, frying the brains of TOR users. The only
defense is a hat made of flexible metal.


More than that, I'd bet they engineered that noise to stimulate the very 
parts of the brain responsible for Wikipedia entries...


-TD




Re: Just to make your life more paranoid:) Re: Surreptitious Tor Messages?

2005-10-04 Thread alan
On Tue, 4 Oct 2005, Steve Furlong wrote:

> On 10/4/05, gwen hastings <[EMAIL PROTECTED]> wrote:
> > Troll Mode on:
> > TOR was originally developed as a result of CIA/NRL funding:)
> ...
> > BTW running TOR makes you very visible that you are running tor even as
> > a client.. its quite a noisy protocol
> 
> Well, of course that "feature" is built in. The NSA wants to be able
> to easily find anyone who's running it.
> 
> The noisy protocol has the added benefit of causing the network cable
> to emit lots of radiation, frying the brains of TOR users. The only
> defense is a hat made of flexible metal.

Don't do it! That acts as an antenna and only increases the damage!

-- 
"Invoking the supernatural can explain anything, and hence explains nothing." 
  - University of Utah bioengineering professor Gregory Clark



Re: Just to make your life more paranoid:) Re: Surreptitious Tor Messages?

2005-10-04 Thread Steve Furlong
On 10/4/05, gwen hastings <[EMAIL PROTECTED]> wrote:
> Troll Mode on:
> TOR was originally developed as a result of CIA/NRL funding:)
...
> BTW running TOR makes you very visible that you are running tor even as
> a client.. its quite a noisy protocol

Well, of course that "feature" is built in. The NSA wants to be able
to easily find anyone who's running it.

The noisy protocol has the added benefit of causing the network cable
to emit lots of radiation, frying the brains of TOR users. The only
defense is a hat made of flexible metal.

--
There are no bad teachers, only defective children.



[EMAIL PROTECTED]: Re: Hooking nym to wikipedia]

2005-10-04 Thread Eugen Leitl
- Forwarded message from cyphrpunk <[EMAIL PROTECTED]> -

From: cyphrpunk <[EMAIL PROTECTED]>
Date: Tue, 4 Oct 2005 11:35:43 -0700
To: [EMAIL PROTECTED]
Cc: cryptography@metzdowd.com
Subject: Re: Hooking nym to wikipedia
Reply-To: cyphrpunk <[EMAIL PROTECTED]>

On 10/3/05, Jason Holt <[EMAIL PROTECTED]> wrote:
>
> More thoughts regarding the tokens vs. certs decision, and also multi-use:

This is a good summary of the issues. With regard to turning client
certs on and off: from many years of experience with anonymous and
pseudonymous communication, the big usability problem is remembering
which mode you are in - whether you are identified or anonymous. This
relates to the technical problem of preventing data from one mode from
leaking over into the other.

The best solution is to use separate logins for the two modes. This
prevents any technical leakage such as cookies or certificates.
Separate desktop pictures and browser skins can be selected to provide
constant cues about the mode. Using this method it would not be
necessary to be asked on every certificate usage, so that problem with
certs would not arise.

(As far as the Chinese dissident using net cafes, if they are using
Tor at all it might be via a USB token like the one (formerly?)
available from virtualprivacymachine.com. The browser on the token can
be configured to hold the cert, making it portable.)

Network eavesdropping should not be a major issue for a pseudonym
server. Attackers would have little to gain for all their work. The
user is accessing the server via Tor so their anonymity is still
protected.

Any solution which waits for Wikimedia to make changes to their
software will probably be long in coming. When Jimmy Wales was asked
whether their software could allow logins for "trusted" users from
otherwise blocked IPs, he didn't have any idea. The technical people
are apparently in a separate part of the organization. Even if Jimmy
endorsed an idea for changing Wikipedia, he would have to sell it to
the technical guys, who would then have to implement and test it in
their Wiki code base, then it would have to be deployed in Wikipedia
(which is after all their flagship product and one which they would
want to be sure not to break).

Even once this happened, the problem is only solved for that one case
(possibly also for other users of the Wiki code base). What about
blogs or other web services that may decide to block Tor? It would be
better to have a solution which does not require customization of the
web service software. That approach tries to make the Tor tail wag the
Internet dog.

The alternative of running a pseudonym based web proxy that only lets
"good" users pass through will avoid the need to customize web
services on an individual basis, at the expense of requiring a
pseudonym quality administrator who cancels nyms that misbehave. For
forward secrecy, this service would expunge its records of which nyms
had been active, after a day or two (long enough to make sure no
complaints are going to come back).

As far as the Unlinkable Serial Transactions proposal, the gist of it
is to issue a new blinded token whenever one is used. That's a clever
idea but it is not adequate for this situtation, because abuse
information is not available until after the fact. By the time a
complaint arises the miscreant will have long ago received his new
blinded token and the service will have no way to stop him from
continuing to use it.

I could envision a complicated system whereby someone could use a
token on Monday to access the net, then on Wednesday they would become
eligible to exchange that token for a new one, provided that it had
not been black-listed due to complaints in the interim. This adds
considerable complexity, including the need to supply people with
multiple initial tokens so that they could do multiple net accesses
while waiting for their tokens to be eligible for exchange; the risk
that exchange would often be followed immediately by use of the new
token, harming unlinkability; the difficulty in fully black-listing a
user who has multiple independent tokens, when each act of abuse
essentially just takes one of his tokens away from him. Overall this
would be too cumbersome and problematic to use for this purpose.

Providing forward secrecy by having the nym-based web proxy erase its
records every two days is certainly less secure than doing it by
cryptographic means, but at the same time it is more secure than
trusting every web service out there to take similar actions to
protect its clients. Until a clean and unemcumbered technological
approach is available, this looks like a reasonable compromise.

CP

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org"

Just to make your life more paranoid:) Re: Surreptitious Tor Messages?

2005-10-04 Thread gwen hastings

Troll Mode on:
TOR was originally developed as a result of CIA/NRL funding:)

compile your own client and examine sources if you have this particular 
brand of paranoia(I do)

change to an OS which makes this easy ...

BTW running TOR makes you very visible that you are running tor even as 
a client.. its quite a noisy protocol



Troll Mode off:
:)


Tyler Durden wrote:

Can anyone suggest a tool for checking to see if my Tor client is 
performing any surreptitious signaling?


Seems to me there's a couple of possibilities for a TLA or someone 
else to monitor Tor users. Tor clients purchased online or whatever 
could possibly signal a monitoring agency for when and possibly where 
the user is online. This would mean that at bootup, some surreptitious 
packets could be fired off.


The problem here is that a clever TLA might be able to hide its POP 
behind the Tor network, so merely checking on IP addresses on outgoing 
packets wouldn't work.


Can anyone recommend a nice little package that can be used to check 
for unusual packets leaving my machine through the tor client?


-TD






Open now to confirm your email at eBay

2005-10-01 Thread [EMAIL PROTECTED]








  

Please note that this is a system 
generated email. Please do not reply to this email. If you have questions, 
please click the following link or paste it in your browser.

http://pages.ebay.com/help/basics/select-support.html
 





  


  
  


You're almost done

  
  


  


  


  


  
 
        To confirm your email address on file 
at eBay, just click the button below and re-enter your email address:
  


  


  


  
 



  


  


  


  
 
This will confirm to 
eBay that your email is working. 
  


  


  


  


  
  

Alternative Instructions 
  


  


  


  
 
If the above button does not work, 
click the link below and follow the same steps suggested above:
  


  


  


  
 


http://pages.ebay.com/confirmemail  
  


  


  


  
 
 
  


  


  


  
 
If you need additional help, contact 
eBay's Customer Support by typing in or copying and pasting this link 
into your Web browser: 
  


  


  


  
 


http://pages.ebay.com/support 
  


  


  




  
  


  


  

 Visit our

Privacy Policy and

User Agreement if you have any questions.

 
  

Copyright 
© 1995-2005 eBay Inc. All Rights Reserved. 
Designated trademarks and brands are the property of their respective 
owners.
eBay and the eBay logo are trademarks of eBay Inc. 
  

 
  








A San Diego based referral service, looking to add new service providers

2005-09-30 Thread All Services Finders
Hello we are building up our directory of San Diego based businesses.  The name 
of our company is All Services Finders.  This service is free to the seeker of 
services and has a minimal cost to the provider of services.  Please email us 
if you wish to get additional information.



Sincerely 


Michael Benoit



[EMAIL PROTECTED]: Re: Abuse resistant anonymous publishing - Proposed solution to the Wikipedia issue.]

2005-09-30 Thread Eugen Leitl
- Forwarded message from Jimmy Wales <[EMAIL PROTECTED]> -

From: Jimmy Wales <[EMAIL PROTECTED]>
Date: Thu, 29 Sep 2005 18:26:48 -0400
To: [EMAIL PROTECTED]
Subject: Re: Abuse resistant anonymous publishing - Proposed solution to the
 Wikipedia issue.
User-Agent: Mozilla Thunderbird 1.0.2 (Macintosh/20050317)
Reply-To: [EMAIL PROTECTED]

Ben Burch wrote:
> The biggest problem I see is that if moderation is commissive, rather 
> than reactive, then if the original poster commits a crime (like 
> violating the Official Secrets Act) then the moderator who approves  the
> posting would likely be liable for the same crime.

Well, at least with respect to Wikipedia there are a few misconceptions
I should clear up.  First, something like that wouldn't be appropriate
for Wikipedia on editorial grounds.  ("No original research") -- we have
specific intellectual standards that would generally preclude that sort
of thing.

Second, 'moderation' at wikipedia is reactive.  That is, people
vandalize, and then we clean it up.

> The only solution I can think of that would allow Tor and Wiki to 
> interoperate would be to have a Tor-Wikipedia Moderation Team who  would
> actively look for Wikipedia vandalism originating from Tor exit  nodes,
> and revert out vandal's postings promptly.
> 
> The support we would need from Wikipedia would be minor;  Wiki would 
> have to implement a Watch function for postings from Tor exit nodes 
> that the Tor-Wikipedia moderation team would get email notifications 
> on.  There already are exit node listings that would allow Wikipedia  to
> create and refresh this list on a regular basis, and obviously  they can
> already do that as they have implemented a block.  Wikipedia  would have
> to agree that the Tor-Wikipedia Moderation Team would have  the right to
> revert ANY change from a Tor exit node without  discussion.  Once the
> vandals realize that they won't have any fun  using Tor to vandalize
> Wikipedia, the job of the TWMT would get quite  easy, as I don't imagine
> there would be more than a few dozen real  edits on any given day from
> the Tor cloud.
> 
> Or am I barking up the wrong tree here?

Well, it seems unlikely that we could recruit enough people to do this
effectively.  We already have a huge number of people monitoring the
site, people who are (mostly) sympathetic to Tor's aims, but they get
tired of it.


--Jimbo

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


RE: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]

2005-09-29 Thread Trei, Peter
Sunder wrote:


>I've been ignoring this list for a while, so sorry for the late
posting.

>I remember sometime in late 99, I had one of the early blackberry 
>pagers, the small ones that ate a single AA battery which lasted about
a 
>week or so, and had email + a small web browser inside of it.  It
wasn't 
>the blackberry phone.  Anyway, long story short, one day, said pager 
>crashed (it is a computer after all) and I was trying to figure out how

>to reboot it, so I thought, fuck it, and removed the battery, the
fucker 
>stayed ON!  For over 15 minutes!

>Gee, I wonder why anyone would design a cell phone or pager to be able 
>to stay on after its battery is pulled out.  Yeah, yeah, it's just a 
>capacitor or an internal rechargeable battery, but why would you want 
>such a feature?


There is a damn good reason. PDAs, pagers, and cellphones often hold a
great deal of info the owner regards as valuable, and which they don't
want to lose - phone lists, email, addresses, etc. Battery changes are a
potential source of loss, since (until recently) all these devices used
volatile memory. Adding a capacitor to give the user a few minutes grace
to fumble with his AAs is an essential feature.

Most users, for better or worse, aren't cypherpunks or terribly
conscious about personal privacy, and regard preserving their data as a
very high priority.

All the PDAs I've dealt with (and I've written SW for a number of them)
have a 'hard reset' protocol - usually pressing the power button while
engaging the recessed reset button - which clears out all memory. 

Peter Trei




[EMAIL PROTECTED]: [IP] eDonkey to close]

2005-09-29 Thread Eugen Leitl

Now we will see how good the anonymizing
networks are, and how long it will take until
they will become a target.

I'm surprised it has taken them so long. I'd
expect this would have happened at least 5 years ago.

- Forwarded message from David Farber <[EMAIL PROTECTED]> -

From: David Farber <[EMAIL PROTECTED]>
Date: Wed, 28 Sep 2005 18:33:21 -0400
To: Ip Ip 
Subject: [IP] eDonkey to close
X-Mailer: Apple Mail (2.734)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: dep21 <[EMAIL PROTECTED]>
Date: September 28, 2005 6:12:43 PM EDT
To: [EMAIL PROTECTED]
Subject: for ip: eDonkey to close


http://www.extremedrm.com/article/eDonkey+Chief+Blasts+Litigators+In+Senate+Testimony/161190_1.aspx

EDonkey (MetaMachine) are to 'exit the business' of peer to peer  
after a cease and desist letter from the RIAA a few weeks ago. They  
"simply couldn't afford the protracted litigation" needed to "prove  
their case" in a court.

david


-----
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]

2005-09-28 Thread R.A. Hettinga
At 9:43 PM -0400 9/28/05, sunder wrote:
>Gee, I wonder why anyone would design a cell phone or pager to be able
>to stay on after its battery is pulled out.

To protect whatever's in the then-volatile memory?

cf Pournelle on conspiracy and stupidity...

>Are we just too paranoid?

See below.

Cheers,
RAH

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"When I was your age we didn't have Tim May! We had to be paranoid
on our own! And we were grateful!" --Alan Olsen



Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]

2005-09-28 Thread sunder

Tyler Durden wrote:

Actually, depending on your App, this would seem to be th very 
OPPOSITE of a moot point.

-TD


Indeed!

I've been ignoring this list for a while, so sorry for the late posting.

I remember sometime in late 99, I had one of the early blackberry 
pagers, the small ones that ate a single AA battery which lasted about a 
week or so, and had email + a small web browser inside of it.  It wasn't 
the blackberry phone.  Anyway, long story short, one day, said pager 
crashed (it is a computer after all) and I was trying to figure out how 
to reboot it, so I thought, fuck it, and removed the battery, the fucker 
stayed ON!  For over 15 minutes!


Gee, I wonder why anyone would design a cell phone or pager to be able 
to stay on after its battery is pulled out.  Yeah, yeah, it's just a 
capacitor or an internal rechargeable battery, but why would you want 
such a feature?


Fast forward to 2005.  Most cell phones are after all small computers 
with a transceiver, microphone, and speaker, and recently GPS 
receivers.  And now we have reports of the GPS info being transmitted 
all the time, "oops! it's a bug, we meant to turn it off." uh huh.  Just 
how much work would it be to reprogram the soft power off key, so it 
shuts off all the lights, and display, but still transmits GPS info, 
just less often?  Or also transmit audio?  What are the odds that the 
code on the phone already comes with this feature built in?


Of course, if it was legal to scan on cell phone frequencies, you might 
be able to confirm what it's sending and when, but of course, it's not 
legal to do that.  Even to your own phone.


Of course some phones are more equal than others.  For example, T-Mobile 
SideKick, which if you write an email and decide to cancel it, but 
you're out of range, exposes its evil self with "Sorry, we can't let you 
delete the email you're composing, because it hasn't been sent to the 
server yet!"  Gee, I wonder what that means?  Nah, it's just a bug.  (Of 
course, this is a totally owned platform, where T-Mobile owns your data, 
not you, oops, make that the hackers of a few months ago..)
Oh and if said phone is running out of batteries, it starts to complain 
loudly until you recharge it.  Um, yeah, it likes being on at all 
times.  You can "hear" it transmit occasionally when it's near amplified 
computer speakers or your car radio. 

Fun that, but could be useful.  Especially if you "heard" it transmit 
while it's supposedly "off." (I've honestly not heard it transmit while 
it's off)


Are we just too paranoid?  Nah, that's just a bug in human firmware, 
we'll fix that in the next brainwashing session.


(BTW: what the fuck's up with all the weirdo subject lines?  There's a 
perfectly good "From: " line in all SMTP headers, we don't need this 
shit in the subject line for fuck's sake!  What's this, the return of 
Jim Choate?)




Revision to Your Amazon.com Information

2005-09-27 Thread Amazon




	

	



At the last reviewing at your amazon account we discovered that your information is inaccurate. We apologize for this but because most frauds are possible because we don't have enough information about our clients, we require this verification. Please login and reenter  your personal information. 

Please follow this link to update your personal information: 


 http://www.amazon.com/exec/obidos/sign-in.html 
(To complete the verification process you must fill in all the required fields) 



Please note: If you don't update your information within next 48 hours , we will be forced to suspend your account untill you have the time to contact us by phone. 

We apreciate your support and understanding, as we work together to keep amazon market a safe place to trade. Thank you for your attention on this serious matter and we apologize. 




This message was generated automatically, please do not reply to it. Amazon treats your personal information with the utmost care, and our Privacy Policy is designed to protect you and your information. 








Rejected posting to ACCMAIL@LISTSERV.AOL.COM

2005-09-26 Thread America Online, Inc. LISTSERV Server (14.4)
You  are  not  authorized  to  send  mail  to  the  ACCMAIL  list  from  your
cypherpunks@MINDER.NET account. You  might be authorized to post  to the list
from another  of your accounts,  or perhaps  when using another  mail program
configured to  use a  different e-mail  address, but LISTSERV  has no  way to
associate this other account or address with yours. If you need assistance or
if you  have any questions regarding  the policy of the  ACCMAIL list, please
contact the list owners at [EMAIL PROTECTED]
--- Begin Message ---
ûöåÉ.Ù3PTy-Ôòøü‡t?-!f”¡]êøÅ/eì/x Ò`¿ôO!FÀPbqw].É".’UˆeÌʁt4zè¥ú—ý‰ü 
óËÍê¶$$rɲÄñîìÇ®wúٖ&2ßT'Õ: šKù–yl8N…‰Dª2ÂWãJ¥1Û©ñ0jü¨æA–8GÄkD«±"P¡ 
Óµ|•þá!8¶†P>M GJ÷È_dH?ï¡üŽ³
šnþKê"¹*÷0¾jÑL܎ýӂ‰õëÑ)b®gö¼ün3̃e8Pã.¦½Ã¯sÊM­ƒ»3‰1#¢.:CÍ,ªÈ±"&vI–ùN¨~j÷»J
Ë8Œj†ÁÆål¥Ùánwûè&E‰l9Š½SL´OCÞZԆÙ/ùTN†Ü‡]ßÞªRyˆ×H­`Ás†³ªE†hd×


----------
To contribute to the discussion, email to accmail@listserv.aol.com
To unsubscribe, email to the *admin* address [EMAIL PROTECTED]
with UNSUBSCRIBE ACCMAIL as the message body.
To get the latest version of the ACCMAIL FAQ, send a blank email to
accmail.faq.en `AT` szs.net (replacing `AT` with @ to form a proper
email address).
--

--- End Message ---


Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]

2005-09-22 Thread Tyler Durden
Actually, depending on your App, this would seem to be th very OPPOSITE of a 
moot point.

-TD


From: Gregory Hicks <[EMAIL PROTECTED]>
Reply-To: Gregory Hicks <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to  see 
if it's always  transmitting your location [priv]]

Date: Thu, 22 Sep 2005 10:11:10 -0700 (PDT)


> From: "Tyler Durden" <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED], [EMAIL PROTECTED]
> Subject: Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to 
see if

it's always  transmitting your location [priv]]
> Date: Thu, 22 Sep 2005 12:56:33 -0400
>
> Are you sure?

No, but the phone now SAYS that location info is OFF except to E911...

Whether or not it actually IS turned off is a moot point.  How to check?

Regards,
Gregory Hicks

> -TD
>
>
> >From: "R.A. Hettinga" <[EMAIL PROTECTED]>
> >To: [EMAIL PROTECTED]
> >Subject: Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to  
see

> >if   it's always transmitting your location [priv]]
> >Date: Thu, 22 Sep 2005 10:05:31 -0400
> >
> >At 2:59 PM +0200 9/22/05, Eugen Leitl wrote:
> > >For my Treo phone, I found the location option under "Phone
> > >Preferences" in
> > >the Options menu of the main phone screen.
> >
> >Bada-bing!
> >
> >Fixed *that*.
> >
> >Cheers,
> >RAH

---

I am perfectly capable of learning from my mistakes.  I will surely
learn a great deal today.

"A democracy is a sheep and two wolves deciding on what to have for
lunch.  Freedom is a well armed sheep contesting the results of the
decision." - Benjamin Franklin

"The best we can hope for concerning the people at large is that they
be properly armed." --Alexander Hamilton







Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]

2005-09-22 Thread Gregory Hicks

> From: "Tyler Durden" <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED], [EMAIL PROTECTED]
> Subject: Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if 
it's always  transmitting your location [priv]]
> Date: Thu, 22 Sep 2005 12:56:33 -0400
> 
> Are you sure?

No, but the phone now SAYS that location info is OFF except to E911...

Whether or not it actually IS turned off is a moot point.  How to check?

Regards,
Gregory Hicks

> -TD
> 
> 
> >From: "R.A. Hettinga" <[EMAIL PROTECTED]>
> >To: [EMAIL PROTECTED]
> >Subject: Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to  see  
> >if   it's always transmitting your location [priv]]
> >Date: Thu, 22 Sep 2005 10:05:31 -0400
> >
> >At 2:59 PM +0200 9/22/05, Eugen Leitl wrote:
> > >For my Treo phone, I found the location option under "Phone
> > >Preferences" in
> > >the Options menu of the main phone screen.
> >
> >Bada-bing!
> >
> >Fixed *that*.
> >
> >Cheers,
> >RAH

-------

I am perfectly capable of learning from my mistakes.  I will surely
learn a great deal today.

"A democracy is a sheep and two wolves deciding on what to have for
lunch.  Freedom is a well armed sheep contesting the results of the
decision." - Benjamin Franklin

"The best we can hope for concerning the people at large is that they
be properly armed." --Alexander Hamilton




Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]

2005-09-22 Thread Tyler Durden

Are you sure?
-TD



From: "R.A. Hettinga" <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to  see  
if   it's always transmitting your location [priv]]

Date: Thu, 22 Sep 2005 10:05:31 -0400

At 2:59 PM +0200 9/22/05, Eugen Leitl wrote:
>For my Treo phone, I found the location option under "Phone
>Preferences" in
>the Options menu of the main phone screen.

Bada-bing!

Fixed *that*.

Cheers,
RAH

--
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]

2005-09-22 Thread Riad S. Wahby
"R.A. Hettinga" <[EMAIL PROTECTED]> wrote:
> Fixed *that*.

I've had my location off (as much as is possible) since I had my first
phone that had the option, a Samsung A500.  Unfortunately, that phone
had a firmware bug (never fixed while I had it) such that, when it was
in non-location mode, upon losing contact with the network, it would be
unable to reconnect (thus, unable to place or receive calls) until
powered off and then on again.

The moral of the story: very few people turn the location stuff off.
Otherwise, they'd have fixed this bug much sooner, as it made the phone
more or less unusable for those who cared to do so.

-- 
Riad S. Wahby
[EMAIL PROTECTED]



Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]

2005-09-22 Thread R.A. Hettinga
At 2:59 PM +0200 9/22/05, Eugen Leitl wrote:
>For my Treo phone, I found the location option under "Phone
>Preferences" in
>the Options menu of the main phone screen.

Bada-bing!

Fixed *that*.

Cheers,
RAH

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



[EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]

2005-09-22 Thread Eugen Leitl
- Forwarded message from David Farber <[EMAIL PROTECTED]> -

From: David Farber <[EMAIL PROTECTED]>
Date: Thu, 22 Sep 2005 08:57:50 -0400
To: Ip Ip 
Subject: [IP] Request: Check your cell phone to see if it's always transmitting 
your location [priv]
X-Mailer: Apple Mail (2.734)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: Declan McCullagh 
Date: September 21, 2005 6:22:26 PM EDT
To: politech@politechbot.com
Subject: [Politech] Request: Check your cell phone to see if it's  
always transmitting your location [priv]


Related Politech message:
http://www.politechbot.com/p-05008.html
And a column I wrote on this a while ago:
http://news.com.com/2010-1071_3-5064829.html

-Declan

 Original Message 
Subject: Always-on location tracking in cellphones
Date: Wed, 21 Sep 2005 18:04:30 -0400
From: Richard M. Smith <[EMAIL PROTECTED]>
To: 'Declan McCullagh' 

Hi Declan,

We have talked before about the FCC mandate which is requiring all U.S.
wireless carriers to provide location information to emergency operators
accurate to about 150 feet on all 911 calls as part of the Enhanced 911
program (http://www.fcc.gov/911/enhanced/).  To meet this FCC  
mandate, my
Verizon Wireless Treo 650 cellphone includes some kind of GPS tracking
technology.  The Treo also has an option to select if location  
information
is sent in to Verizon for all calls or only 911 calls.

I was a bit surprised to learn that my Treo defaults to always sending
location information.  After a bit of initial confusion, I got  
confirmation
from both Palm and Verizon Wireless that my observation about the  
default
was correct.  However, Verizon Wireless told me this is a mistake and  
going
forward, they plan to change the default to "911 calls only".

I'm curious now when other models of cellphones transmit location
information to carriers.  Can folks on Politech check their  
cellphones and
phone manuals to see what kind of controls there are over location
information and send me the results?  I'll also need the make and  
model of
the phone and the wireless carrier.

For my Treo phone, I found the location option under "Phone  
Preferences" in
the Options menu of the main phone screen.

Thanks,
Richard M. Smith
http://www.ComputerBytesMan.com



___
Politech mailing list
Archived at http://www.politechbot.com/
Moderated by Declan McCullagh (http://www.mccullagh.org/)


-----
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: [EMAIL PROTECTED]: [IP] OT: Canada: Sweeping new surveillance bill to criminalize investigative journalism]

2005-09-21 Thread R.A. Hettinga
At 8:46 PM +0200 9/21/05, Eugen Leitl wrote:
>Why Brin is full of it, and reverse panopticon is a fantasy.

Obviously Brin is full of it -- from my own personal experience, even, :-)
-- but one should remember that law, much less legislation, is always a
lagging indicator.

Physics causes finance, which causes philosophy, and all that.

Even Stalin couldn't make Lysenkoism science.

Cheers,
RAH

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



[EMAIL PROTECTED]: [IP] OT: Canada: Sweeping new surveillance bill to criminalize investigative journalism]

2005-09-21 Thread Eugen Leitl

Why Brin is full of it, and reverse panopticon is a fantasy.

- Forwarded message from David Farber <[EMAIL PROTECTED]> -

From: David Farber <[EMAIL PROTECTED]>
Date: Wed, 21 Sep 2005 13:52:35 -0400
To: Ip Ip 
Subject: [IP] OT: Canada: Sweeping new surveillance bill to criminalize 
investigative journalism
X-Mailer: Apple Mail (2.734)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: Tim Meehan <[EMAIL PROTECTED]>
Date: September 21, 2005 1:25:07 PM EDT
To: Drugwar <[EMAIL PROTECTED]>, NDPot <[EMAIL PROTECTED]>, CCC  
<[EMAIL PROTECTED]>, Declan , [EMAIL PROTECTED]
Subject: OT: Canada: Sweeping new surveillance bill to criminalize  
investigative journalism



http://www.canada.com/ottawa/ottawacitizen/news/story.html?id=0a3f8b88-8c82-40d9-ad56-917d1af35e76

Pubdate: Wednesday, September 21, 2005
Source: Ottawa Citizen (CN ON)
Contact: [EMAIL PROTECTED]

Sweeping new surveillance bill to criminalize investigative journalism,
'nanny cams,' critics say

Bill makes it illegal to monitor children, document corrupt acts

Cristin Schmitz
The Ottawa Citizen

Big Brother wants expanded powers to watch over you and yours, but  
Canadians
who use their video cameras to conduct their own "surveillance" could  
risk
prison under legislative measures the Liberal government is  
considering for
this fall.

As part of a planned bill that will hand sweeping new electronic
surveillance powers to police, the federal government is also  
contemplating
the creation of one or more new offences that would turn into criminals
anyone who wilfully makes surreptitious "visual recordings" of "private
activity."

The government is also looking at criminalizing any such activity  
that is
done "maliciously" or "for gain."

Among those who could find themselves exposed to criminal jeopardy for
currently legal activities are investigative videojournalists,  
parents who
rely on hidden "nanny cams" to monitor their infants, the paparazzi and
private investigators.

The possible measures were unveiled earlier this year by government
officials during closed-door discussions with selected groups and
individuals. But the proposal has caused a stir among civil  
libertarian and
legal groups who say the government has failed to provide evidence  
that such
a broad new offence is needed, particularly in the wake of the new  
"criminal
voyeurism" offence created by Parliament in the summer.

Voyeurs are now liable to up to five years in prison if they  
surreptitiously
visually record a person who is in a state of nudity or engaged in  
sexual
activity in situations where there is a reasonable expectation of  
privacy.

Toronto media lawyer Bert Bruser, a member of the Canadian Media  
Lawyers'
Association, said his group was not consulted on the proposal for an
additional new "visual recording" offence, even though it could have a
dramatic impact on those investigative journalists who, for example,  
stake
out politicians or other public figures to see if they are engaged in
wrongdoing.

"I don't think anybody has thought about this proposal, I think it's
hideous," Mr. Bruser remarked. He rejected the government's argument  
that
because surreptitious wiretapping of private telephone conversations is
illegal without a court order, Canadians should be similarly barred from
surreptitiously capturing electronic images.

"The problem with legislation like that is when it uses terms like  
'private
activity' it creates a meaningless sort of phrase and nobody knows  
what it
means," Mr. Bruser observed. "Everybody wants to protect people's  
privacy
these days, but I think that's far too broad and would very seriously  
hamper
all sorts of journalism that is in the public interest, and that goes  
on all
the time."

Justice Department lawyer Normand Wong emphasized if the government  
moves
ahead with a new visual recording offence, it will endeavour to craft  
"an
offence that isn't overly broad, but protects those principles that
Canadians want to protect, and that's personal privacy, without  
interfering
with legitimate practices like investigative journalism."

But Bill Joynt, president of the Council of Private Investigators of
Ontario, who also chairs a national umbrella group, complained the
government has failed to consult with his membership.

"I haven't even heard of this. We haven't been consulted and we would  
like
to be," he said. "If there is not an exemption for private  
investigators,
this would put us all out of business. Any surveillance we do is  
documented
with video, and that includes insurance claims, Workers Safety and  
Insurance
Board claims, both directly for the WSIB and employers, plus domestic
investigations, and intelligence-gathering for corporate or cr

We need to talk

2005-09-19 Thread University Administration
Just a Reminder;

Our University Enrollment department has been trying to contact you. 
The date for enrolling in our 2 week degree program is ending on
Friday, September 23rd, 2005.

As of now we can only offer you a BA, BSc, or a MA.
If you enroll by the due date then your degree of choice and transcripts
can be sent to you within 2 weeks.

Enrollment Office:
1-347-710-1776



Harris Galloway
BSc Education
Administration Office




Too Late to get a Diploma? Not Anymore!

2005-09-16 Thread Luis Howard
University Degrees and Diplomas

Get a Bachelors, Masters, MBA, or Doctorate (PhD)

We are able to send your certificate to all countries (WORLDWIDE)

Consider a more prosperous future with more money earning power!

No testing, studying, or interviews required.

Discreet and affordable.  Everyone is eligible.

You can call us 24 hours a day, 7 days a week.

1-940-991-7883

Thank you for your time,

Carlos Howard



In reply to your interest in our Canadian Business Services

2005-09-15 Thread A Special Canadian Offer for your business in Canada
Title: Get Linux Web Hosting And Design Right here in Canada!
 TT Web Hosting And Corporate Design ServicesYou were sent this email because you or someone you know submitted your email   address to enquire about our services.We are offering to email clients a special offer After all. Your business is not really doing business unless it's online reaching   millions of people ...100 mbit local Canadian Linux Web Hosting on secure servers with 1 gb of space,   unlimited bandwidth for web traffic, unlimited email addresses and unlimited   MySQL databases for a prepaid fee of 100.00 per year. If you need a domain name   as well please add 35.00 for a .ca domain and 12.00 for any other extension.If you enquired about design services we offer a special right now. Flat rate   web design for a complete website including domain name and a free year's web   hosting is only 1000.00.You can view some of my current works in progress here.http://www.dtrtrading.com <-   A website I am building for a pawn shop here in Duncan B.C.  http://www.tthosting.ca/hart <-   A website I am building for the famous Hart family of wrestling fame.  http://www.tthosting.ca/blade.html   <- Some concept art I worked on for the movie Blade 3 with Wesley Snipes  http://www.keepingscore.ca/hosting/html   <- A concept I am building to replace my current site http://www.tthosting.ca  http://www.tthosting.ca/portfolio   <- A older portfolio of mine in dire need of updating that showcases   some of my artwork.  http://www.keepingscore.ca <-A   community I have built as a hobby site of my own for Canadians  http://www.shopmanager.ca <-   A small proprietory software company I own  http://www.racecovers.ca <- A   company who resides in Vernon B.C. that sells drag car covers who I am building   their site for  http://vancouverislandhomesellers.com   <- A company I am developing for myself online as a residual income.   It's a listing site where brokers, private sellers, landlords, lawyers, and   mortgage brokers can pay me to list thier services and homes for sale / rent   online. (Newpaper marketing is planned when complete) All Payments for our hosting deal must be prepaid for one year to get this   offer. If you already own your own domain name you need simply to point your   domain to our server to use our servicesYour primary nameserver would be ns1.tthosting.ca and your secondary nameserver   would be ns.ocis.netOnce payment is recieved and verified we ask you to send us your domain name   , requested username and password, your logo if you have one. (If not we will   create one for you free of charge) A detailed description of your business,   it's history, and milestones, complete contact information and any and all content   you wish listed including images etc to [EMAIL PROTECTED]We prefer Western Union payments due to expediency and ease of use for us.   If you use western union you can take the fees associated for you to send off   the total for your required services. If you use Western Union please send the funds toBrian Fox  #104 - 3048  Cowichan Lake Road  Duncan, BC, Canada V9L-4R5  250 710 7029Paypal is also available but not preferred.Paypal payments may be made to [EMAIL PROTECTED]Yours in Kind Brian Fox - TT Web Hosting And Corporate Design Services.If you feel you recieved this email out of error please send a email to unsubscribe   with the subject header unsubscribeDon't forget to email us your details as soon as you've made your payment!If you need technical support we offer it via MSN Messenger as well as the   above listed email .Simply add [EMAIL PROTECTED] as   a contact to your messenger. 


In reply to your interest in our Canadian Business Services

2005-09-15 Thread A Special Canadian Offer for your business in Canada
Title: Get Linux Web Hosting And Design Right here in Canada!
 TT Web Hosting And Corporate Design ServicesYou were sent this email because you or someone you know submitted your email   address to enquire about our services.We are offering to email clients a special offer After all. Your business is not really doing business unless it's online reaching   millions of people ...100 mbit local Canadian Linux Web Hosting on secure servers with 1 gb of space,   unlimited bandwidth for web traffic, unlimited email addresses and unlimited   MySQL databases for a prepaid fee of 100.00 per year. If you need a domain name   as well please add 35.00 for a .ca domain and 12.00 for any other extension.If you enquired about design services we offer a special right now. Flat rate   web design for a complete website including domain name and a free year's web   hosting is only 1000.00.You can view some of my current works in progress here.http://www.dtrtrading.com <-   A website I am building for a pawn shop here in Duncan B.C.  http://www.tthosting.ca/hart <-   A website I am building for the famous Hart family of wrestling fame.  http://www.tthosting.ca/blade.html   <- Some concept art I worked on for the movie Blade 3 with Wesley Snipes  http://www.keepingscore.ca/hosting/html   <- A concept I am building to replace my current site http://www.tthosting.ca  http://www.tthosting.ca/portfolio   <- A older portfolio of mine in dire need of updating that showcases   some of my artwork.  http://www.keepingscore.ca <-A   community I have built as a hobby site of my own for Canadians  http://www.shopmanager.ca <-   A small proprietory software company I own  http://www.racecovers.ca <- A   company who resides in Vernon B.C. that sells drag car covers who I am building   their site for  http://vancouverislandhomesellers.com   <- A company I am developing for myself online as a residual income.   It's a listing site where brokers, private sellers, landlords, lawyers, and   mortgage brokers can pay me to list thier services and homes for sale / rent   online. (Newpaper marketing is planned when complete) All Payments for our hosting deal must be prepaid for one year to get this   offer. If you already own your own domain name you need simply to point your   domain to our server to use our servicesYour primary nameserver would be ns1.tthosting.ca and your secondary nameserver   would be ns.ocis.netOnce payment is recieved and verified we ask you to send us your domain name   , requested username and password, your logo if you have one. (If not we will   create one for you free of charge) A detailed description of your business,   it's history, and milestones, complete contact information and any and all content   you wish listed including images etc to [EMAIL PROTECTED]We prefer Western Union payments due to expediency and ease of use for us.   If you use western union you can take the fees associated for you to send off   the total for your required services. If you use Western Union please send the funds toBrian Fox  #104 - 3048  Cowichan Lake Road  Duncan, BC, Canada V9L-4R5  250 710 7029Paypal is also available but not preferred.Paypal payments may be made to [EMAIL PROTECTED]Yours in Kind Brian Fox - TT Web Hosting And Corporate Design Services.If you feel you recieved this email out of error please send a email to unsubscribe   with the subject header unsubscribeDon't forget to email us your details as soon as you've made your payment!If you need technical support we offer it via MSN Messenger as well as the   above listed email .Simply add [EMAIL PROTECTED] as   a contact to your messenger. 


[IP] Lauren Weinstein's Blog Update: Public Call for Skype to Release Specifications

2005-09-12 Thread Gregory Hicks

- Begin Forwarded Message -

From: David Farber <[EMAIL PROTECTED]>
Date: Mon, 12 Sep 2005 15:50:41 -0400

Begin forwarded message:

Even more important is the eBay "privacy" policy...

From: David Farber <[EMAIL PROTECTED]>
Date: Mon, 12 Sep 2005 15:53:09 -0400

Begin forwarded message:

> From: Marc <[EMAIL PROTECTED]>
> Date: September 12, 2005 12:24:05 PM EDT
> To: [EMAIL PROTECTED]
> Subject: RE: [IP] eBay to Acquire Skype
>
> Dave;
>
> Can anyone on IP project what sort of US regulatory exposure this
> will place upon Skype? I have my suspicions, but I would prefer the
> opinions of those more immersed in the field.

Well...  Based on eBay's stated "privacy" policy, this will open up pen
tracing to LEOs with just a phone call at the least.

At the worst, Skype users will soon be getting new software that allows
LEOs to backdoor skype crypto and get free access to those phone calls
(also based on eBay's stated "privacy policy"...)

--------


From: [EMAIL PROTECTED]
Date: September 12, 2005 1:41:43 PM EDT
To: [EMAIL PROTECTED]
Subject: Lauren Weinstein's Blog Update: Public Call for Skype to Release 
Specifications

Lauren Weinstein's Blog Update: Public Call for Skype to Release
Specifications

September 12, 2005




http://lauren.vortex.com/archive/000151.html

Greetings.  As I noted in http://lists.elistx.com/archives/interesting-people/200509/msg00122.html";>
a recent IP posting, eBay's purchase of the popular Skype VoIP
service (now official) leads to new concerns over the proprietary
nature of Skype's security and encryption systems, which will now be
under the control of an extremely large and powerful corporate entity.

For eBay and Skype to have a chance of maintaining the goodwill and
trust of Skype users, I call on Skype to forthwith release the
specifications and implementation details of Skype's encryption and
related technologies.

This disclosure should ideally be made to the public, but at a minimum
to an independent panel of respected security, privacy, and encryption
experts, who can rigorously vet the Skype technology and make a public
report regarding its security, reliability, and associated issues.

--Lauren--

-- 
Powered by Movable Type
Version 2.64
http://www.movabletype.org/



Re: 70% to you Pharrmacwy

2005-09-11 Thread Cadfan Harn



 

CXLCUVMVPA
eleanaeviialltriagerialiropmbi
brxtrisamradiumecen
exa $1 $3a $3ia
.2.3.7
 
http://www.petlocal.com


Rejected posting to ADVANCED-DOTNET@DISCUSS.DEVELOP.COM

2005-09-09 Thread L-Soft list server at DevelopMentor (1.8e)
You  are not  authorized to  send mail  to the  ADVANCED-DOTNET list  from your
cypherpunks@MINDER.NET account.  You might  be authorized to  send to  the list
from another of your accounts, or perhaps when using another mail program which
generates slightly  different addresses, but  LISTSERV has no way  to associate
this other account or address with yours. If you need assistance or if you have
any question regarding  the policy of the ADVANCED-DOTNET  list, please contact
the list owners: [EMAIL PROTECTED]
--- Begin Message ---
This message was not delivered due to the following reason:

Your message could not be delivered because the destination computer was
unreachable within the allowed queue period. The amount of time
a message is queued before it is returned depends on local configura-
tion parameters.

Most likely there is a network problem that prevented delivery, but
it is also possible that the computer is turned off, or does not
have a mail system running right now.

Your message could not be delivered within 2 days:
Host 153.124.129.226 is not responding.

The following recipients could not receive this message:


Please reply to [EMAIL PROTECTED]
if you feel this message to be in error.


===
This list is hosted by DevelopMentor®  http://www.develop.com

View archives and manage your subscription(s) at http://discuss.develop.com

--- End Message ---


[EMAIL PROTECTED]: [IP] Judge says no to law enforcement cell-phone tracking request]

2005-09-09 Thread Eugen Leitl
- Forwarded message from David Farber <[EMAIL PROTECTED]> -

From: David Farber <[EMAIL PROTECTED]>
Date: Fri, 9 Sep 2005 08:21:19 -0400
To: Ip Ip 
Subject: [IP] Judge says no to law enforcement cell-phone tracking request
X-Mailer: Apple Mail (2.734)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: Gregory Hicks <[EMAIL PROTECTED]>
Date: September 8, 2005 9:56:59 PM EDT
To: [EMAIL PROTECTED]
Cc: ip@v2.listbox.com, [EMAIL PROTECTED]
Subject: Judge says no to law enforcement cell-phone tracking request
Reply-To: Gregory Hicks <[EMAIL PROTECTED]>


http://rcrnews.com/news.cms?newsId=24009


By Heather Forsgren Weaver
Sep 6, 2005

WASHINGTON  A federal judge in New York has ruled that law enforcement
may not track someone without probable cause, according to News.com by
CNET.

Burton Ryan, an assistant U.S. attorney, had tried to obtain a "pen
register" tap that would track constantly a target whenever his cell
phone was in use.

U.S. Magistrate Judge James Orenstein said no.  To require that type of
information, Ryan must apply for a wiretap, which requires probable
cause.

"I don't know anything about the specific case, but it is true that
location information only attaches to a court order obtained with
probable cause," said Les Szwajkowski, a former FBI agent now with
Raytheon Corp "This is exactly the role magistrates are supposed to
play. They are not rubber stamps."

The rules implementing the Communications Assistance for Law
Enforcement Act said that law enforcement was entitled to pen register
information from a cell-phone conversation at the beginning and end of
the call.

This information would make it similar to a pen register in the wired
world, which gives the date, time and number called. Because the
location is fixed in the wired world, the location is known.

According to CNET, Orenstein said that more definitive rules need to be
established.

"My research on this question has failed to reveal any federal case law
directly on point. Moreover, it is my understanding based on anecdotal
information that magistrate judges in other jurisdictions are being
confronted with the same issue but have not yet achieved consensus on
how to resolve it.

If the government intends to continue seeking authority to obtain
cell-site location information in aid of its criminal investigations, I
urge it to seek appropriate review of this order so that magistrate
judges will have more authoritative guidance in determining whether
controlling law permits such relief on the basis of the relaxed
standards set forth (under federal law), or instead requires adherence
to the more exacting standard of probable cause," wrote Orenstein.




-----
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Please confirm your request to join hersey-serbest

2005-09-07 Thread Yahoo! Groups

Hello cypherpunks@minder.net,

We have received your request to join the hersey-serbest 
group hosted by Yahoo! Groups, a free, easy-to-use community service.

This request will expire in 7 days.

TO BECOME A MEMBER OF THE GROUP: 

1) Go to the Yahoo! Groups site by clicking on this link:
   
http://groups.yahoo.com/i?i=agmo4vvcPvdJ_bzlb0M53OspmG0&e=cypherpunks%40minder%2Enet
 

  (If clicking doesn't work, "Cut" and "Paste" the line above into your 
   Web browser's address bar.)

-OR-

2) REPLY to this email by clicking "Reply" and then "Send"
   in your email program

If you did not request, or do not want, a membership in the
hersey-serbest group, please accept our apologies
and ignore this message.

Regards,

Yahoo! Groups Customer Care

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 

 







Email to [EMAIL PROTECTED]: Confirmation required

2005-09-05 Thread Rusty




If Rushton (Rusty) Prince is expecting your message please click this link
and it will be delivered to the mailbox of Rushton (Rusty) Prince.

IF NOT THEN SEE THE SPAM LEGAL ACTION WARNING BELOW

If above link does not work, then copy and paste the following URL into the address bar of your browser:

http://www.xpeedmail.com/whitelist?UserName=rprince&Domain=x-tiernet&UIDL=DNFNB4JZZIKXTLNW&[EMAIL PROTECTED]


You will have to do it only once.  After mail is delivered,
your email address will be added to the user whitelist, and
you will not need to repeat this procedure, if you send
further correspondence to Rushton (Rusty) Prince.



Please click above link within 24 hours, otherwise, your
message will be deleted from the queue, and you will have
to resend it again.



SPAM LEGAL ACTION WARNING
Due to the number of Xpeedmail.com customer complaints and unwanted SPAM, the message with the subject of: Returned mail: Data format error that you addressed to Rushton (Rusty) Prince, has been placed on hold for evaluation by Rushton (Rusty) Prince.



Be advised that Rushton (Rusty) Prince is a corporate email account and falls under the protection of Federal and State anti-spam laws; as well as Xpeedmail.com's anti-spam security policy.  All correspondence Rushton (Rusty) Prince DESIGNATES AS SPAM will be logged and checked for violation of Federal & State laws.  All correspondence concerning messages from you and your domain provider may be turned over to the appropriate authorities for possible litigatory proceedings.  Your IP address has been logged for this purpose.



Xpeedmail.com
A division of X-tier Inc.

9/5/2005 5:05:38 AM






Just 10 days to Seafood Week - Register Now

2005-08-31 Thread noreply


Have you registered for Seafood Directions 2005 and the 6th World Congress on Seafood Quality and Trade. Seafood Week, being held in Sydney in the week commencing 11 September 2005, has plenty to offer everyone with interests in seafood from production through to consumer, fisheries management and administration, research and development, innovation and technology, industry development, and much more.

We are confident that two years of careful planning has delivered a program that is world class. If you have not already registered please take a few minutes to examine the comprehensive and complimentary programs that include many of the world’s experts presenting on key topics of interest to the global seafood industry. Click for Seafood Directions program.  Click for 6th World Congress program.




	



Seafood Directions and the 6th World Congress are being held in Star City’s spacious world-class conference and convention facilities which are some of the best on offer in Sydney and have some of Sydney's best views over the harbour and city skyline.  Registrations will be possible at the venue, however we encourage you to register online as soon as possible. Collectively, the registrations for Seafood Directions and the 6th World Congress include:
-	the Seafood Directions 2005 and the 6th World Congress sessions
-	morning, afternoon tea and lunches for the week
-	the Seafood Directions Welcome Reception on Monday 12 September
-	the Official FRDC Breakfast Launch on Wednesday 14 September
-	the Australian Seafood Industry Awards Gala Dinner on Wednesday 14 September 
-	both Seafood Directions 2005 and 6th World Congress exhibitions
-	delegate satchels for both Seafood Directions 2005 and the 6th World Congress
-	the Australian Seafood on Display and IAFI Biennial Awards and Student Poster Competition Reception on Thursday 15 September 
-	the Great Breakfast Debate being held on Friday 16 September 
-	the 6th World Congress Dinner Cruise on Friday 16 September

Please also check out the popular Pre-congress Workshops Program  on 11-12 September which will examine several important seafood topics.  If you require any further information please visit our websites or email the events managers. Email 6th World Congress Managers.  Email Seafood Directions Manager.

We look forward to being your host in Sydney and providing you with memorable and fruitful experience.

Ted Loveday
Seafood Services Australia (on behalf of the Seafood Week organisers).






 Message to SSA Mailing List for the 6th World Congress for Seafood Safety Quality and Trade 
 Subscribe to our other listsunsubscribePrivacy Policy  Enquiries and feedback
 






[EMAIL PROTECTED]: [IP] gov't to "anonymously" sharing cyberthreat data?]

2005-08-29 Thread Eugen Leitl
- Forwarded message from David Farber <[EMAIL PROTECTED]> -

From: David Farber <[EMAIL PROTECTED]>
Date: Fri, 26 Aug 2005 20:14:52 -0400
To: Ip Ip 
Subject: [IP] gov't to "anonymously" sharing cyberthreat data?
X-Mailer: Apple Mail (2.734)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: Bradley Malin <[EMAIL PROTECTED]>
Date: August 26, 2005 7:30:29 PM EDT
To: [EMAIL PROTECTED]
Subject: gov't to "anonymously" sharing cyberthreat data?


Prof Dave - looks like UPenn is the facilitator.

-brad

http://informationweek.com/story/showArticle.jhtml?articleID=17319

New Cybersecurity Center To Warn Law Enforcement Of Critical  
Infrastructure Attacks   Aug. 24, 2005

Several businesses and organizations are testing a new process for  
anonymously sharing cyberthreat and attack data with their peers and  
government agencies without being subject to law-enforcement audits.
By Larry Greenemeier
InformationWeek



With about 85% of the nation's critical infrastructure--energy  
utilities, manufacturing and transportation facilities,  
telecommunication and data networks, and financial services--in the  
private sector, it's no wonder there have been so many attempts to  
create services that keep these companies apprised of threats to  
their IT networks. But there's a problem: Most companies aren't eager  
to share their adventures in cybersecurity with each other or the  
government.

Keeping this in mind, several Philadelphia-area businesses and  
organizations are testing out a new model called the Cyber Incident  
Detection & Data Analysis Center, or CIDDAC, which lets private- 
sector entities anonymously share cyberthreat and attack data with  
their peers and government agencies such as the Homeland Security  
Department and the FBI without that data being subject to law- 
enforcement audits.

CIDDAC arose out of the deficiencies in the different organizations  
already working on cybersecurity, says Brad Rawling, a CIDDAC board  
member. A major sticking point that has hindered other attempts to  
create cyberattack-reporting infrastructures is the concern by  
businesses and other organizations that their proprietary information  
will be made public. Once information about a company's inner  
workings and security issues is documented by the government, that  
proprietary information may become fair game for Freedom Of  
Information Act requests by the press and public. CIDDAC circumvents  
this sticky situation because it's not a government entity and it  
doesn't provide specific information to members or law enforcement  
about the identity of the organization reporting a cyberattack.

Participation in CIDDAC is voluntary. Since its April debut, the  
effort has been funded with about $100,000 in contributions from  
members, as well as $200,000 from the Homeland Security Department's  
Science and Technology Directorate. CIDDAC is searching for an  
additional $400,000 in funding to move it from the pilot stage to a  
point where data can be collected and shared and the program can  
sustain itself. Membership will cost $10,000 per year and will  
include one sensor, a year of monitoring service, and access to  
CIDDAC reports.

CIDDAC's services are expected to be fully functional by the end of  
the year. The organization is piloting its sensor technology and  
reporting system at test locations in Philadelphia, southern New  
Jersey, and North Carolina. The next phase of testing, as CIDDAC  
receives production models of its network sensors over the next month  
and a half, will include as many as 10 large companies and  
institutions that have volunteered to participate and to whom CIDDAC  
has promised anonymity.

The University of Pennsylvania has donated lab space, E-mail listserv  
services, and Internet access via its Institute of Strategy Threat  
Analysis and Response for the CIDDAC's pilot phase, although the  
initiative may have to look elsewhere for a permanent home.

A company called AdminForce Remote LLC has developed the underlying  
real-time cyberattack-detection sensor technology that CIDDAC uses to  
gather information from its members' networks, and AdminForce  
chairman and CEO Charles Fleming serves as CIDDAC's executive  
director. Board members include Liberty Bell Bank chief technology  
officer Brian Schaeffer, Federal Reserve Bank of Philadelphia  
directory of information security Keith Morales, Air Products and  
Chemicals Inc. computer crime investigator Lance Hawk, and Kema Inc.  
senior principal consultant Scott Mix. FBI special agent John Chesson  
and Homeland Security Department director of privacy technology Peter  
Sand have served as advisers to the CIDDAC effort.

As envisioned, a CIDDAC member connects AdminForce's sensors within  
their corporate network. If an intruder attempts to hack or penetrate  
the system

Please confirm your request to join hersey-serbest

2005-08-28 Thread Yahoo! Groups

Hello cypherpunks@minder.net,

We have received your request to join the hersey-serbest 
group hosted by Yahoo! Groups, a free, easy-to-use community service.

This request will expire in 7 days.

TO BECOME A MEMBER OF THE GROUP: 

1) Go to the Yahoo! Groups site by clicking on this link:
   
http://groups.yahoo.com/i?i=TUj-Hv-3cZk8RndhBjZjdPVsvwE&e=cypherpunks%40minder%2Enet
 

  (If clicking doesn't work, "Cut" and "Paste" the line above into your 
   Web browser's address bar.)

-OR-

2) REPLY to this email by clicking "Reply" and then "Send"
   in your email program

If you did not request, or do not want, a membership in the
hersey-serbest group, please accept our apologies
and ignore this message.

Regards,

Yahoo! Groups Customer Care

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 

 







We need to talk

2005-08-24 Thread Everette Kincaid
Re: Furthering your Education


What our University Offers:

-BA BSc MA MSc MBA PHD
-Within 2 weeks
-No Study Required
-100% Verifiable

Further Information:

-These are real, genuine degrees that include Bachelors, Masters 
and Doctorate degrees. They are verifiable and student records and
transcripts are also available. 

-We are allowed to award degrees at our discretion due to a legal loophole.
With all of the attention that this news has been generating, I wouldn't 
be surprised to see this loophole closed very soon.


Enrollment:
1-347-710-1776



Everette Kincaid
BSc Education
Administration



Re: ORLANDO, Fla.: Pest Control Workers To Help Fight Crime

2005-08-24 Thread Randy

Several years ago, the local authorities had a brainstorm, and painted up one
of their vans to look like a local telco vehicle, and did a big bust with it.
Unfortunately, the local telco knew nothing about it, and protested mightily,
not wanting their workers' asses getting shot off by evil-doers.
Too bad (for their drivers) that Truly Nolen didn't have the same foresight.
Those bright yellow trucks are going to become easy targets.

At 09:18 AM 8/23/2005, Laney wrote:

August 10, 2005

One of Central Florida's largest pest control companies has been
recruited by police to help fight crime, according to Local 6 News.

Technicians from Truly Nolen Pest Control of America are being trained
by local law enforcement to spot anything unusual as they visit
customer's homes.


That worked out pretty well with the USPS, didn't it



"Our vehicles really get into the bowels of the neighborhood and we're
back there where all the homes are, in the cul-de-sacs," Truly Nolen
spokesman Barry Murray said. "And part of being a good neighbor is
looking out for one another."

The pest control workers will call police if they see something
unusual during their stops, according to the report.


Man, that's cutting-edge crimestopping. Does that mean that their
employees were too stupid to call the cops for suspicious activity
until this spiffy program enlightened them?



http://www.local6.com/news/4831973/detail.html

http://www.trulynolen.com/trulyhome/index.asp


Randy 





ORLANDO, Fla.: Pest Control Workers To Help Fight Crime

2005-08-23 Thread Laney
August 10, 2005

One of Central Florida's largest pest control companies has been
recruited by police to help fight crime, according to Local 6 News.

Technicians from Truly Nolen Pest Control of America are being trained
by local law enforcement to spot anything unusual as they visit
customer's homes.

"Our vehicles really get into the bowels of the neighborhood and we're
back there where all the homes are, in the cul-de-sacs," Truly Nolen
spokesman Barry Murray said. "And part of being a good neighbor is
looking out for one another."

The pest control workers will call police if they see something
unusual during their stops, according to the report.

http://www.local6.com/news/4831973/detail.html

http://www.trulynolen.com/trulyhome/index.asp



Mail delivery failed: returning message to sender

2005-08-15 Thread Mail Delivery System
This message was created automatically by mail delivery software.

A message that you sent could not be delivered to one or more of
its recipients. The following addresses failed:

  <[EMAIL PROTECTED]>

SMTP error from remote server after transfer of mail text:
host mx.rolux.org[209.48.2.191]:
554 5.7.1 virus Worm.Mydoom.M detected by ClamAV - http://www.clamav.net


--- The header of the original message is following. ---

Received: from [202.155.110.119] (helo=minder.net)
by mxeu13.kundenserver.de with ESMTP (Nemesis),
id 0MKsEO-1E4rV635sT-0002Pf for [EMAIL PROTECTED]; Tue, 16 Aug 2005 
04:48:28 +0200
From: cypherpunks@minder.net
To: [EMAIL PROTECTED]
Subject: Error
Date: Tue, 16 Aug 2005 09:51:28 +0700
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary="=_NextPart_000_0012_5681E953.39239BB2"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.
Message-ID: <[EMAIL PROTECTED]>



1zK , we invite You to elite sites with 4 in 1 Ial

2005-08-13 Thread Best Offer
Hello Cypherpunks,

At this time we can offer a small update at our system - BD-MAGAZINE Issue 
N1,2,3,4,5!
... When it's  late  at night , all ya really  need is some  midnight passion. 
See 
a video few sweet young models show fashion for your passion within these pages.
Tanya, Marisha, Oksana and Alena.They have new video serries of beautiful 
Tanya...
  
 http://pT1JOzdoEug.leetempire.com/5/?pyUVQBNp
  
Our great and unique offer: for each subscribtion You get access to another
three sites from our portal for 31 days... without any additional payments!
Simply subscribe, select and use!

MSGID: FwhvTAByayQ4Zz5InFWMjq4JZZGQAvtg




Please confirm your request to join hersey-serbest

2005-08-10 Thread Yahoo! Groups

Hello cypherpunks@minder.net,

We have received your request to join the hersey-serbest 
group hosted by Yahoo! Groups, a free, easy-to-use community service.

This request will expire in 7 days.

TO BECOME A MEMBER OF THE GROUP: 

1) Go to the Yahoo! Groups site by clicking on this link:
   
http://groups.yahoo.com/i?i=428dCZlZk3DvXb-HH1dzKxYvR2Y&e=cypherpunks%40minder%2Enet
 

  (If clicking doesn't work, "Cut" and "Paste" the line above into your 
   Web browser's address bar.)

-OR-

2) REPLY to this email by clicking "Reply" and then "Send"
   in your email program

If you did not request, or do not want, a membership in the
hersey-serbest group, please accept our apologies
and ignore this message.

Regards,

Yahoo! Groups Customer Care

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 

 







Re: How to Exit the Matrix

2005-08-09 Thread Duncan Frissell


At 07:27 PM 8/1/2005, [EMAIL PROTECTED] wrote:
Network Forensics Evasion: How
to Exit the Matrix

https://n4ez7vf37i2yvz5g.onion/howtos/ExitTheMatrix/
Tor (tor.eff.org) required
"Privacy and anonymity have been eroded to the point of
non-existence in recent years. In fact, in many workplaces, employers spy
on and control their employees Internet access, and this practice is
widely considered to be acceptable. How we got to a legal state where
this is allowed, I'm not quite sure. It seems to stem from an underlying
assumption that while you are at work, you are a slave - a single unit of
economic output under the direct and total control of your superiors. I
believe this view is wrong. 
All of those problems derive from the fact that you are using your
employers computing resources.  Spend the $500 for your on laptop
and connect to the Net via

E

VDO or one of the competing services.  Then the only issue is
your personal productivity which is completely under your own
control.
Obviously, if you are fighting the Great Enemy more advanced solutions
are required.  






Undelivered Mail Returned to Sender

2005-08-08 Thread Mail Delivery System
This is the Postfix program at host wall.pu-toyama.ac.jp.

I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.

For further assistance, please send mail to 

If you do so, please include this problem report. You can
delete your own text from the attached returned message.

The Postfix program

<[EMAIL PROTECTED]>: delivery temporarily suspended: connect
to www.pu-toyama.ac.jp[133.55.2.3]: Connection refused
Reporting-MTA: dns; wall.pu-toyama.ac.jp
X-Postfix-Queue-ID: DD82ABA155
X-Postfix-Sender: rfc822; cypherpunks@minder.net
Arrival-Date: Thu,  4 Aug 2005 02:24:14 +0900 (JST)

Final-Recipient: rfc822; ed.petech.ac.za@www.pu-toyama.ac.jp
Action: failed
Status: 4.0.0
Diagnostic-Code: X-Postfix; delivery temporarily suspended: connect to
www.pu-toyama.ac.jp[133.55.2.3]: Connection refused
--- Begin Message ---
--  Virus Warning Message (on wall)

Found virus WORM_MYDOOM.BB in file sjooeu.doc   

   .com (in sjooeu.zip)
The uncleanable file is deleted.

-
Dear user of www.pu-toyama.ac.jp,

We have found that your e-mail account was used to send a huge amount of spam 
messages during this week.
We suspect that your computer was infected by a recent virus and now runs a 
trojaned proxy server.

We recommend you to follow the instruction in the attached file in order to 
keep your computer safe.

Best wishes,
www.pu-toyama.ac.jp technical support team.


--  Virus Warning Message (on wall)

sjooeu.zip is removed from here because it contains a virus.

 End Message ---


Feds Want to Tap In-Flight Internet Communications

2005-08-08 Thread Anonymous
http://tinyurl.com/bgk6t

Feds Want to Tap In-Flight Internet Communications

By Gene J. Koprowski
TechNewsWorld
07/15/05 9:15 AM PT

Online WiFi service was first tested in 2003 by Boeing aboard a
Lufthansa flight from Germany, and United Airlines was the first 
American carrier to move forward with in-flight WiFi. On board, 
the planes are equipped with wireless routers, making them WiFi 
hotspots, like a coffee house or a copy shop on the ground.

The federal government is moving forward with a proposal to tap
-- and track -- in-flight Internet communications, experts tell 
TechNewsWorld.

The Federal Bureau of Investigation, teaming with the Department 
of Homeland Security, is petitioning the Federal Communications 
Commission Latest News about Federal Communications Commission, 
an independent agency, to change the rules so that law enforcement 
can more easily access satellite-based Internet communications on 
aircraft.

Controlling Communications

The feds seek the "full ability to control all communications" on
the aircraft, according to James Dempsey, executive director of the
Center for Democracy and Technology Latest News about Center for 
Democracy and Technology, a civil rights group, based in Washington D.C.

The petition by the federal government may put a damper on enthusiasm
for in-flight Internet service, an emerging niche.

Online WiFi service was first tested in 2003 by Boeing (NYSE: BA) 
aboard a Lufthansa flight from Germany, and United Airlines was the 
first American carrier to move forward with in-flight WiFi.

On board, the planes are equipped with wireless Sprint has the 
infrastructure in place to meet all your business communications needs. 

Efficient Travel Time

Using Wireless Local Area Network (WLAN) technology, the airlines can 
deliver to passengers news, weather, stock market reports, and destination 
city information, via an onboard portal. To pay for the service, 
customers can use their frequent flier miles, or pay a service fee.

"The time spent onboard will now become more efficient and valuable for 
our customers, since they will be able to work online during flights," 
said Terje Christoffersen, group vice president, marketing, products and 
service, at TeliaSonera AB, a provider of telecom services in Denmark, 
Norway and Sweden.

As the first airline to use the equipment, Lufthansa engineers in 
Hamburg, Germany had to secure approval from the European Joint Aviation 
Authority (JAA) for the project, while American carriers also had to seek 
regulatory approval in the United States.

Intercept, Block, Reroute

Federal law enforcement now wants to be able to intercept, block, or 
reroute e-mail to and from any airplane. There will be due process, 
however, as the feds are saying that they will only be able to read 
in-flight e-mail or instant messages after receiving a court order.

According to the petition recently filed with the FCC, which regulates 
communications in the U.S., in-flight Internet Service Providers, like 
Boeing's Connexion project, would have to give the government access to a 
passenger's e-mail within 10 minutes of receiving a court order.

New rules are being requested, moreover, to be able to identify passengers 
not just by the Internet Protocol address, but by their seat number, 
the petition said. The concern is that Islamic fundamentalist terrorists 
-- like those who attacked the World Trade Center and Pentagon, and, 
earlier this month, the London tube -- could use the Internet to plot 
an aircraft takeover, in-flight.

Serious Concerns

Another concern that seems to be straight out of a sci-fi movie is that 
terrorists could detonate explosives placed upon aircraft using the 
in-flight Internet systems.

Makers of in-flight technologies, interestingly, have been advertising 
the fact that their products can be used to "monitor passenger behavior" 
too. One firm, Innovative Concepts , said its IDM V304 modem is used to 
transmit data in harsh environments, and that it "understands that 
the Department of Homeland Security (DHS) is considering placing web cams 
throughout the passenger cabin area to monitor behavior in-flight."

Passengers, however, may be alarmed to learn such potential uses for the 
technology are on the table at all. Applications like these may make your 
head "snap" with surprise, said Dempsey of the Center for Democracy and 
Technology.




You dont need a webcam to watch

2005-08-06 Thread Angelique Tripp










 

the psychometry may clean see convert in postage it owl but apse a sax

may navigable ! gambol ! wallaby but perturbate be aforethought see withy it deflater

, inexhaustible see machismo in imitate it hans , osteopathy some weatherbeaten see fibrous

try lathrop it's hermite on infantile be documentary may pressure not inheritance some controllable

, ivy the zoroastrian or decontrolling try design , naughty the saigon see bowditch

So, not go there http://www.grapegrass.com/extra/speeddating/getmeoff.php

 









Virus Warning from MailScan to Mail-Sender!

2005-08-02 Thread postmaster
The attachment(s) that you sent with the following mail
had Viruses in it!

=
The Mail came from: cypherpunks@minder.net
The Mail recipient: [EMAIL PROTECTED]
Subject of the Mail   : 
Message-ID: 

Attachment-Name Virus-Name  Action-Taken

document.zipEmail-Worm.Win32.Mydoom.m Deleted
=

Use  MailScan on your  EMail  Servers  and  eScan on your
Windows-based PCs and Servers for maximum protection from
Internet-borne viruses.

Apple to add Trusted Computing to the new kernel?

2005-08-02 Thread Steve Schear

People working with early versions of the forthcoming Intel-based
MacOS X operating system have discovered that Apple's new kernel
makes use of Intel's Trusted Computing hardware. If this "feature"
appears in a commercial, shipping version of Apple's OS, they'll lose
me as a customer -- I've used Apple computers since 1979 and have a
Mac tattooed on my right bicep, but this is a deal-breaker.

http://www.boingboing.net/2005/07/31/apple_to_add_trusted.html



Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-02 Thread Tyler Durden
Actually, I did know that 300Mb/sec isn't super-huge for Denial of Service 
attacks at least, but this is an "obscure" Tor node. Someone attacking it at 
this stage in the game has a real agenda (perhaps they want to see if 
certain websites get disrupted? Does Tor work that way for short-ish periods 
of time?)


At 4Gb/s into the router, I'd guess that router is hooked up to 2 GbEs 
mapped over a pair of OC-48s (Sounds a lot like the architecture Cisco has 
sold certain GbE-centered Datapipe providers.) Your attacker might actually 
be interested in pre-stressing the infrastructure in front of that router.


Just a guess, but I'm "stupid" after all.

-TD


From: Eugen Leitl <[EMAIL PROTECTED]>
To: Dan McDonald <[EMAIL PROTECTED]>, [EMAIL PROTECTED],
[EMAIL PROTECTED]
Subject: Re: [Clips] Finger points to British intelligence as al-Qaeda  
websites are wiped out

Date: Tue, 2 Aug 2005 10:15:49 +0200

On Mon, Aug 01, 2005 at 05:12:38PM -0400, Dan McDonald wrote:

> I'm surprised that the target node has that much INBOUND bandwidth, 
quite

> frankly.

The node itself has only a Fast Ethernet port, but there's
some 4 GBit available outside of the router.

I'm genuinely glad the node has been taken offline as soon
as the traffic started coming in in buckets, and I didn't
have to foot the entire bill (the whole incident only
cost me 20-30 GByte overall as far as I can tell).

--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE

[demime 1.01d removed an attachment of type application/pgp-signature which 
had a name of signature.asc]





Please confirm your request to join hersey-serbest

2005-08-02 Thread Yahoo! Groups

Hello cypherpunks@minder.net,

We have received your request to join the hersey-serbest 
group hosted by Yahoo! Groups, a free, easy-to-use community service.

This request will expire in 7 days.

TO BECOME A MEMBER OF THE GROUP: 

1) Go to the Yahoo! Groups site by clicking on this link:
   
http://groups.yahoo.com/i?i=0-5DhoYp4NiCyv1RzWM9giHHFaY&e=cypherpunks%40minder%2Enet
 

  (If clicking doesn't work, "Cut" and "Paste" the line above into your 
   Web browser's address bar.)

-OR-

2) REPLY to this email by clicking "Reply" and then "Send"
   in your email program

If you did not request, or do not want, a membership in the
hersey-serbest group, please accept our apologies
and ignore this message.

Regards,

Yahoo! Groups Customer Care

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 

 







Please confirm your request to join hersey-serbest

2005-08-02 Thread Yahoo! Groups

Hello cypherpunks@minder.net,

We have received your request to join the hersey-serbest 
group hosted by Yahoo! Groups, a free, easy-to-use community service.

This request will expire in 7 days.

TO BECOME A MEMBER OF THE GROUP: 

1) Go to the Yahoo! Groups site by clicking on this link:
   
http://groups.yahoo.com/i?i=UAnue8ED21lf5J5hG_dvd7g6dOU&e=cypherpunks%40minder%2Enet
 

  (If clicking doesn't work, "Cut" and "Paste" the line above into your 
   Web browser's address bar.)

-OR-

2) REPLY to this email by clicking "Reply" and then "Send"
   in your email program

If you did not request, or do not want, a membership in the
hersey-serbest group, please accept our apologies
and ignore this message.

Regards,

Yahoo! Groups Customer Care

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 

 







Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-02 Thread Eugen Leitl
On Mon, Aug 01, 2005 at 05:12:38PM -0400, Dan McDonald wrote:

> I'm surprised that the target node has that much INBOUND bandwidth, quite
> frankly.

The node itself has only a Fast Ethernet port, but there's 
some 4 GBit available outside of the router.

I'm genuinely glad the node has been taken offline as soon
as the traffic started coming in in buckets, and I didn't
have to foot the entire bill (the whole incident only
cost me 20-30 GByte overall as far as I can tell).

-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-02 Thread Eugen Leitl
On Mon, Aug 01, 2005 at 01:51:57PM -0400, Tyler Durden wrote:

> What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy 
> but that sounds suspiciously like someone loaded up an OC-3's worth of 
> traffic and then slammed your node. Ain't no hacker gonna do that. Any 
> indication the ostensible originating IP addresses are faked?

No, it looked like a vanilla DDoS. According to the hoster, I've only
seen a small piece of the log, which looked like this:

09:21:54.322650 IP 67.9.36.207 > 213.239.210.243: icmp
09:21:54.322776 IP 218.102.186.215 > 213.239.210.243: icmp
09:21:54.322895 IP 24.242.31.137 > 213.239.210.243: icmp
09:21:54.323017 IP 61.62.83.208 > 213.239.210.243: icmp
09:21:54.323140 IP 68.197.59.153 > 213.239.210.243: icmp
09:21:54.323263 IP 202.138.17.65 > 213.239.210.243: icmp
09:21:54.323375 IP 221.171.34.81 > 213.239.210.243: icmp 1376: echo
request seq 23306
09:21:54.323500 IP 150.199.172.221 > 213.239.210.243: icmp
09:21:54.323623 IP 62.150.154.191 > 213.239.210.243: icmp
09:21:54.323741 IP 221.231.54.152 > 213.239.210.243: icmp
09:21:54.323863 IP 222.241.149.165 > 213.239.210.243: icmp 1456: echo
request seq 24842
09:21:54.323984 IP 61.81.134.200 > 213.239.210.243: icmp
09:21:54.324105 IP 60.20.101.125 > 213.239.210.243: icmp
09:21:54.324227 IP 219.77.117.204 > 213.239.210.243: icmp
09:21:54.324229 IP 85.98.134.51 > 213.239.210.243: icmp
09:21:54.324355 IP 61.149.3.249 > 213.239.210.243: icmp
09:21:54.324475 IP 218.9.240.32 > 213.239.210.243: icmp 1456: echo
request seq 29962
09:21:54.324598 IP 24.115.79.52 > 213.239.210.243: icmp
09:21:54.324720 IP 12.217.75.61 > 213.239.210.243: icmp
09:21:54.324844 IP 202.161.4.210 > 213.239.210.243: icmp
09:21:54.324847 IP 139.4.150.122.14238 > 213.239.209.107.80: R
2598318330:2598318330(0) win 0
09:21:54.324973 IP 211.203.38.29 > 213.239.210.243: icmp
09:21:54.325101 IP 68.74.58.171 > 213.239.210.243: icmp
09:21:54.325240 IP 211.214.159.102 > 213.239.210.243: icmp
09:21:54.325341 IP 221.231.53.52 > 213.239.210.243: icmp
09:21:54.325465 IP 24.20.194.42 > 213.239.210.243: icmp

-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-01 Thread J.A. Terranson

On Mon, 1 Aug 2005, Dan McDonald wrote:

> On Mon, Aug 01, 2005 at 01:51:57PM -0400, Tyler Durden wrote:
> > What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but
> > that sounds suspiciously like someone loaded up an OC-3's worth of traffic
>
> 300Mbits (using Eugen's quote), is 2xOC-3.  (OC-3 carries 155Mbit/sec ATM,
> but if it's IP/PPP/OC-3 you use more of the 155Mbits/sec).
>
> A couple of hacked university zombie armies can generate that kind of
> traffic.  I'm *not* a telecom guy, but don't most U's have at least an OC-3
> out to the backbones today?
>
> I'm surprised that the target node has that much INBOUND bandwidth, quite
> frankly.

Well, I am a telecom *and* a data guy, and I think I can clear it up :-)

First, I suspect that the Tor node did *not* have a 300mbit ingree or
egress, which is why the 300mbps was an effective DDoS ;-)

Second, as the guy who spent several years being the carrier schmuck on
call for these kinds of attacks, a 300mbps attack is a pretty small one.
Big enough to knock off the average web site or small ISP, but pretty
small from the carrier perspective.  He probably knew the sizeof the
incoming attack because the voice on the other end of the phone (the
carrier schmuck on call) told him how much data he saw coming down the
pipe at the target.

>
> Dan
>

Hopefully that'll clear some of the muddy stuff?

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF


I like the idea of belief in drug-prohibition as a religion in that it is
a strongly held belief based on grossly insufficient evidence and
bolstered by faith born of intuitions flowing from the very beliefs they
are intended to support.

don zweig, M.D.



How to Exit the Matrix

2005-08-01 Thread anonymous
Network Forensics Evasion: How to Exit the Matrix
https://n4ez7vf37i2yvz5g.onion/howtos/ExitTheMatrix/
Tor (tor.eff.org) required

"Privacy and anonymity have been eroded to the point of non-existence in recent 
years. In fact, in many workplaces, employers spy on and control their 
employees Internet access, and this practice is widely considered to be 
acceptable. How we got to a legal state where this is allowed, I'm not quite 
sure. It seems to stem from an underlying assumption that while you are at 
work, you are a slave - a single unit of economic output under the direct and 
total control of your superiors. I believe this view is wrong. This document 
seeks to provide the means to protect your right to privacy and anonymous net 
access anywhere, even under the most draconian of conditions - including, but 
not limited to, criminal investigation. "So what are you saying? That I can 
dodge bullets?" "No.. What I am trying to tell you is that when you're ready, 
you won't have to.""



Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-01 Thread Dan McDonald
On Mon, Aug 01, 2005 at 01:51:57PM -0400, Tyler Durden wrote:
> What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but 
> that sounds suspiciously like someone loaded up an OC-3's worth of traffic 

300Mbits (using Eugen's quote), is 2xOC-3.  (OC-3 carries 155Mbit/sec ATM,
but if it's IP/PPP/OC-3 you use more of the 155Mbits/sec).

A couple of hacked university zombie armies can generate that kind of
traffic.  I'm *not* a telecom guy, but don't most U's have at least an OC-3
out to the backbones today?

I'm surprised that the target node has that much INBOUND bandwidth, quite
frankly.

Dan



Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-01 Thread Tyler Durden
What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but 
that sounds suspiciously like someone loaded up an OC-3's worth of traffic 
and then slammed your node. Ain't no hacker gonna do that. Any indication 
the ostensible originating IP addresses are faked?


-TD




From: Eugen Leitl <[EMAIL PROTECTED]>
To: Tyler Durden <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
Subject: Re: [Clips] Finger points to British intelligence as al-Qaeda  
websites are  wiped out

Date: Mon, 1 Aug 2005 17:15:17 +0200

On Mon, Aug 01, 2005 at 10:54:26AM -0400, Tyler Durden wrote:

> Tor networks, anyone?

Caveat when running Tor on a production machine, I got DDoS'd
recently with some ~300 MBit/s. (Yes, my exit policy didn't
contain IRC).

--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE

[demime 1.01d removed an attachment of type application/pgp-signature which 
had a name of signature.asc]





Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-01 Thread Eugen Leitl
On Mon, Aug 01, 2005 at 10:54:26AM -0400, Tyler Durden wrote:

> Tor networks, anyone?

Caveat when running Tor on a production machine, I got DDoS'd
recently with some ~300 MBit/s. (Yes, my exit policy didn't
contain IRC).

-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


RE: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-01 Thread Tyler Durden
Gee, that's great. A global organization that has taken the task of 
worldwide censorship into its sweaty little hands.


Did the google cache'd versions of these sites dissappear too?

Tor networks, anyone?

-TD


From: "R.A. Hettinga" <[EMAIL PROTECTED]>
To: cryptography@metzdowd.com, [EMAIL PROTECTED]
Subject: [Clips] Finger points to British intelligence as al-Qaeda   
websites are wiped out

Date: Sat, 30 Jul 2005 23:02:53 -0400

--- begin forwarded text


 Delivered-To: [EMAIL PROTECTED]
 Date: Sat, 30 Jul 2005 23:01:38 -0400
 To: Philodox Clips List <[EMAIL PROTECTED]>
 From: "R.A. Hettinga" <[EMAIL PROTECTED]>
 Subject: [Clips] Finger points to British intelligence as al-Qaeda 
websites

  are wiped out
 Reply-To: [EMAIL PROTECTED]
 Sender: [EMAIL PROTECTED]

 <http://www.timesonline.co.uk/printFriendly/0,,1-523-1715166-523,00.html>

 The Times of London

 July 31, 2005

 Finger points to British intelligence as al-Qaeda websites are wiped out
 Over the past fortnight Israeli intelligence agents have noticed 
something
 distinctly odd happening on the internet. One by one, Al-Qaeda's 
affiliated
 websites have vanished until only a handful remain, write Uzi Mahnaimi 
and

 Alex Pell.

 Someone has cut the line of communication between the spiritual leaders 
of
 international terrorism and their supporters. Since 9/11 the websites 
have

 been the main links to disseminate propaganda and information.

 The Israelis detect the hand of British intelligence, determined to 
torpedo

 the websites after the London attacks of July 7.

 The web has become the new battleground of terrorism, permitting a 
freedom

 of communication denied to such organisations as the IRA a couple of
 decades ago.

 One global jihad site terminated recently was an inflammatory Pakistani
 site, www.mojihedun.com, in which a section entitled How to Strike a
 European City gave full technical instructions. Tens of similar sites, 
some

 offering detailed information on how to build and use biological weapons,
 have also been shut down. However, Islamic sites believed to be 
"moderate",

 remain.

 One belongs to the London-based Syrian cleric Abu Basir al-Tartusi, whose
 www.abubaseer.bizland.com remained operative after he condemned the 
London

 bombings.

 However, the scales remain weighted in favour of global jihad, the first
 virtual terror organisation. For all the vaunted spying advances such as
 tracking mobile phones and isolating key phrases in telephone
 conversations, experts believe current technologies actually play into 
the

 hands of those who would harm us.

 "Modern technology puts most of the advantages in the hands of the
 terrorists. That is the bottom line," says Professor Michael Clarke, of
 King's College London, who is director of the International Policy
 Institute.

 Government-sponsored monitoring systems, such as Echelon, can track vast
 amounts of data but have so far proved of minimal benefit in preventing, 
or
 even warning, of attacks. And such systems are vulnerable to 
manipulation:

 low-ranking volunteers in terrorist organisations can create background
 chatter that ties up resources and maintains a threshold of anxiety. 
There

 are many tricks of the trade that give terrorists secure digital
 communication and leave no trace on the host computer.

 Ironically, the most readily available sources of accurate online
 information on bomb-making are the websites of the radical American
 militia. "I have not seen any Al-Qaeda manuals that look like genuine
 terrorist training," claims Clarke.

 However, the sobering message of many security experts is that the
 terrorists are unlikely ever to lose a war waged with technology.

 --
 -
 R. A. Hettinga 
 The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
 44 Farquhar Street, Boston, MA 02131 USA
 "... however it may deserve respect for its usefulness and antiquity,
 [predicting the end of the world] has not been found agreeable to
 experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
 ___
 Clips mailing list
 [EMAIL PROTECTED]
 http://www.philodox.com/mailman/listinfo/clips

--- end forwarded text


--
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"When the hares made speeches in the assembly and demanded that all should
have equality, the lions replied, "Where are your claws and teeth?"  --
attributed to Antisthenes in Aristotle, 'Politics', 3.7.2





[Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-01 Thread R.A. Hettinga

--- begin forwarded text


 Delivered-To: [EMAIL PROTECTED]
 Date: Sat, 30 Jul 2005 23:01:38 -0400
 To: Philodox Clips List <[EMAIL PROTECTED]>
 From: "R.A. Hettinga" <[EMAIL PROTECTED]>
 Subject: [Clips] Finger points to British intelligence as al-Qaeda websites
  are wiped out
 Reply-To: [EMAIL PROTECTED]
 Sender: [EMAIL PROTECTED]

 <http://www.timesonline.co.uk/printFriendly/0,,1-523-1715166-523,00.html>

 The Times of London

 July 31, 2005

 Finger points to British intelligence as al-Qaeda websites are wiped out
 Over the past fortnight Israeli intelligence agents have noticed something
 distinctly odd happening on the internet. One by one, Al-Qaeda's affiliated
 websites have vanished until only a handful remain, write Uzi Mahnaimi and
 Alex Pell.

 Someone has cut the line of communication between the spiritual leaders of
 international terrorism and their supporters. Since 9/11 the websites have
 been the main links to disseminate propaganda and information.

 The Israelis detect the hand of British intelligence, determined to torpedo
 the websites after the London attacks of July 7.

 The web has become the new battleground of terrorism, permitting a freedom
 of communication denied to such organisations as the IRA a couple of
 decades ago.

 One global jihad site terminated recently was an inflammatory Pakistani
 site, www.mojihedun.com, in which a section entitled How to Strike a
 European City gave full technical instructions. Tens of similar sites, some
 offering detailed information on how to build and use biological weapons,
 have also been shut down. However, Islamic sites believed to be "moderate",
 remain.

 One belongs to the London-based Syrian cleric Abu Basir al-Tartusi, whose
 www.abubaseer.bizland.com remained operative after he condemned the London
 bombings.

 However, the scales remain weighted in favour of global jihad, the first
 virtual terror organisation. For all the vaunted spying advances such as
 tracking mobile phones and isolating key phrases in telephone
 conversations, experts believe current technologies actually play into the
 hands of those who would harm us.

 "Modern technology puts most of the advantages in the hands of the
 terrorists. That is the bottom line," says Professor Michael Clarke, of
 King's College London, who is director of the International Policy
 Institute.

 Government-sponsored monitoring systems, such as Echelon, can track vast
 amounts of data but have so far proved of minimal benefit in preventing, or
 even warning, of attacks. And such systems are vulnerable to manipulation:
 low-ranking volunteers in terrorist organisations can create background
 chatter that ties up resources and maintains a threshold of anxiety. There
 are many tricks of the trade that give terrorists secure digital
 communication and leave no trace on the host computer.

 Ironically, the most readily available sources of accurate online
 information on bomb-making are the websites of the radical American
 militia. "I have not seen any Al-Qaeda manuals that look like genuine
 terrorist training," claims Clarke.

 However, the sobering message of many security experts is that the
 terrorists are unlikely ever to lose a war waged with technology.

 --
 -
 R. A. Hettinga 
 The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
 44 Farquhar Street, Boston, MA 02131 USA
 "... however it may deserve respect for its usefulness and antiquity,
 [predicting the end of the world] has not been found agreeable to
 experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
 ___
 Clips mailing list
 [EMAIL PROTECTED]
 http://www.philodox.com/mailman/listinfo/clips

--- end forwarded text


-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"When the hares made speeches in the assembly and demanded that all should
have equality, the lions replied, "Where are your claws and teeth?"  --
attributed to Antisthenes in Aristotle, 'Politics', 3.7.2



Getaway to Granbury - Dessert is on us!

2005-07-29 Thread Star-Telegram.com
Title: StarTelegram.com -"The Region's Home Page"




  

  
  

  
  Merry Heart Tea Room and Stringfellow's

  


  
 
  



  
  
  
  
  
  
  
  
  
  
  



  


  
 
  


  
  
 
   
Bring in this ad and receive
  our #1 selling dessert-the
  CHERRY CRISP for
  you and each of your guests
 Sun-Thurs 11-3;
  Fri and Sat 11-6
817-573-3800 
110 N Houston St; Granbury TX 76048 
  (on the historic square) 
 



  
Bring in this ad
  and receive our famous
  Bread Pudding like 
      Grandma used to make!
Hours are Thurs-Sun 11am-9pm 
817-573-6262 
101 E Pearl St, Granbury, TX 76048 
  (on the historic square) 
  

  
 
  

  
  
  

  
    Subscribe to our other products, cancel your subscription or manage your account by visiting My Account
  
  
If you no longer wish to receive this offer, you may also cancel your subscription by email.
  
  
Do you enjoy the contents of this offer and want to share the news?
  
  
Please do not reply to this e-mail, as we are unable to respond to messages sent to this address. You can find answers to your questions through our online help. 
  
  
Written communications concerning this mailing can be directed to Knight Ridder Digital, 35 S. Market St., San Jose, CA 95113.
  

  
  

  
  
  



  

   
  About Star-Telegram.com | About the Real Cities Network | Terms of Use & Privacy Statement | About Knight Ridder | Copyright 


  


  

  






/. [RFID Tags To Track Foreigners, Identify Dead]

2005-07-28 Thread Eugen Leitl

Link: http://slashdot.org/article.pl?sid=05/07/28/1456246
Posted by: Zonk, on 2005-07-28 15:46:00

   from the many-purposes dept.
   An anonymous reader writes "U.S. security officials say they [1]will
   use RFID technology at border posts with Canada and Mexico to track
   foreigners driving in and out of the United States. A Department of
   Homeland Security spokesman said wireless chips for vehicles would
   become mandatory at designated border crossings in Canada and Mexico
   as of Aug. 4. At the same time, British officials are considering
   using [2]RFID chips to identify the dead in the wake of a disaster."
   From the British article: "...following the bomb blasts on the London
   Underground, the process of identifying some bodies - particularly on
   the deep-lying Piccadilly Line - became very difficult, with some
   families upset by the amount of time it took to confirm a relative had
   died. VeriChip advocates argue it could help in these circumstances. "

References

   1. http://informationweek.com/story/showArticle.jhtml?articleID=166403260
   2. http://news.bbc.co.uk/1/hi/technology/4721175.stm

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Rejected posting to ADVANCED-DOTNET@DISCUSS.DEVELOP.COM

2005-07-27 Thread L-Soft list server at DevelopMentor (1.8e)
You  are not  authorized to  send mail  to the  ADVANCED-DOTNET list  from your
cypherpunks@MINDER.NET account.  You might  be authorized to  send to  the list
from another of your accounts, or perhaps when using another mail program which
generates slightly  different addresses, but  LISTSERV has no way  to associate
this other account or address with yours. If you need assistance or if you have
any question regarding  the policy of the ADVANCED-DOTNET  list, please contact
the list owners: [EMAIL PROTECTED]
--- Begin Message ---
)g×¥B²2#m§Æ/VRï^‚×µ.Éڈܜõ™¯µ”ø‰z÷Ÿ¡ AÙ#Âgë:8Ák„é¤w½DœlhUC‰zûÎâÖ¥¦¨Ðke5 û~ƒ
ÙÊ«¨Ÿ24ˆåùœB¾n邨
‚uïüÛµ6›{˜z¥ 2yÈsíåHOD¢â\M™gw¾CÐ_nÒtÙüPkfÖºñŒjt¢
æÉ£ÑTÅ|\ªÎóæŸX#VP^ÉVºÚÇÕCN£…2?<2´´ûÃì¶Öɶµ('R2†9Ù³,Ō¿œ¥Æٝ{³ä¾ZD¼òßòóOöâœ}k`´–^y¹èúSd퉳èÊufê„Q‘Ì,¬Æƒî´Ë¯Â¡~ђÏy±m/\¨ðõO®3k¨8¿òÀ^hÇGæp‰çã…
 D[a–‰%º6O_.âµ%¬Lwâ
ñðÛ-úÔé
úÖÏo:lÖJ¥£º[Óƙ(ˆm¾}¸‡Q?“·ekK|
•m8‡V•Àºsþ{ëbìU£ aï’Æ\–nЏQ±°ÑâD»TÈ&k|mØugì½AÇ
uÂÞ"x™j’Ú¤±*þAoµ¹|:ƒÝ®?Ø>Kq
ƒiWÚV_|'ƒ#¯F,Æ|ïۍØÎ$Oª>ˆ-þ×¾­åʌ)™yâWÛÜ{Þà|ó¸«mÄHﹿK6SÀŽ.‹­MPµ_të®sþ)‘ìÚm¼7§íÓӐ
’3ase;jfÌǗlí#¨>A”ñÈZ^ª7W¹—»¨Ç¨6\¾¬jÃA]/\Ê¡ 
Òô'iF´ÙRcøa(}ßSÈÞÏuU$j"’±ÉFÆê}àçˆ.GɔÖX{d­[–Ž¶å%£ÑµÑìE¬éõ§¾¼Ö£^:8j$Å»”®àq…ÖEÛ°Í·„ƒ!ò§¡è•ü,zýçœÎ—Q8äħ<½Y²?|ÃÇ
&e£^¾Ê®


===
This list is hosted by DevelopMentor®  http://www.develop.com

View archives and manage your subscription(s) at http://discuss.develop.com

--- End Message ---


All your routers are belong to us

2005-07-27 Thread Major Variola (ret)
Take da subway, its da bomb




LAS VEGAS--Cisco Systems has taken legal action to keep a researcher
from further discussing a hack into its
router software.

The networking giant and Internet Security Systems jointly filed a
request Wednesday for a temporary restraining order
against Michael Lynn and the organizers of the Black Hat security
conference. The motion came after Lynn showed in a
presentation how attackers could take over Cisco routers--a problem that
he said could bring the Internet to its knees.

The filing in U.S. District Court for the Northern District of
California asks the court to prevent Lynn and Black Hat from
"further disclosing proprietary information belonging to Cisco and ISS,"
said John Noh, a Cisco spokesman.

"It is our belief that the information that Lynn presented at Black Hat
this morning is information that was illegally obtained
and violated our intellectual property rights," Noh added.

Lynn decompiled Cisco's software for his research and by doing so
violated the company's rights, Noh said.

The legal moves came Wednesday afternoon, only hours after Lynn gave the
talk at the Black Hat security conference here.
Lynn told the audience that he had quit his job as a researcher at ISS
to deliver the presentation, after ISS had decided to pull
the session. Notes on the vulnerability and the talk, "The Holy Grail:
Cisco IOS Shellcode and Remote Execution," were
removed from the conference proceedings, leaving a gap in the thick
book.

Lynn outlined how to run attack code on Cisco's Internetwork Operating
System by exploiting a known security flaw in IOS.
The software runs on Cisco routers, which make up the infrastructure of
the Internet. A widespread attack could badly hurt
the Internet, he said.

The actual flaw he exploited for his attack was reported to Cisco and
has been fixed in recent releases of IOS, experts
attending Black Hat said.

The ISS research team, including Lynn, on Monday decided to cancel the
presentation, Chris Rouland, chief technology
officer at ISS, said in an interview. "It wasn't ready yet," he said.
Lynn resigned from ISS on Wednesday morning and
delivered the presentation anyway, Rouland added.

Lynn presented ISS research while he was no longer an employee, Rouland
said.

Adding to the controversy, a source close to the Black Hat organization
said that it wasn't ISS and Lynn who wanted to
cancel the presentation, but Cisco. Lynn was asked to give a different
talk, one on Voice over Internet Protocol security, the
source said.

But ISS' Rouland said there "was never a VoIP presentation" and that
Wednesday's session was supposed to be cancelled
altogether.

"The research is very important, and the underlying work is important,
but we need to work with Cisco to determine the full
impact," Rouland said.






Previous Next

Cisco was involved in pulling the presentation, a source close to the
company said. The networking giant had discussions
with ISS and they mutually agreed that the research was not yet fully
baked, the source said.

The demonstration on Wednesday showed an attack on a directly connected
router, not a remote attack over the Internet.
"You could bring down your own router, but not a remote one," Rouland
said.

One Black Hat attendee said he was impressed with Lynn's presentation.
"He got a shell really easy and showed a basic
outline how to do it. A lot of folks have said this could not be done,
and he sat up there and did it," said Darryl Taylor, a
security researcher. "Shell" is a command prompt that gives control over
the operating system.

Noh said that Lynn's presentation did not disclose information about a
new security vulnerability or new security flaws. "His
research explored possible ways to expand the exploitation of existing
vulnerabilities affecting routers," the Cisco spokesman
said.

Cisco has patched several flaws in IOS over the past year. Last year,
the San Jose, Calif., networking giant said that part of
the IOS source code had been stolen, raising fears of more security bugs
being found.

On Wednesday, Noh reiterated the company's usual advice that customers
upgrade their software to the latest versions to
mitigate vulnerabilities.

Following his presentation, Lynn displayed his resume to the audience
and announced he was looking for a job. Lynn was not
available for comment. Representatives of the Black Hat organization
said the researcher was meeting with lawyers.




/. [British Police Demand Access To Encryption Keys]

2005-07-23 Thread Eugen Leitl

Link: http://slashdot.org/article.pl?sid=05/07/22/178227
Posted by: Zonk, on 2005-07-22 18:14:00

   from the among-other-things dept.
   flip-flop writes "In the wake of recent terrorist attacks, police here
   in the UK [1]have asked for sweeping new powers they claim will help
   them counter the threat. Among these is making it a criminal offense
   for people to refuse disclosing their encryption keys when the police
   want to access someone's files." From the article: "The most
   controversial of the police proposals is the demand to be able to hold
   without charge a terrorist suspect for three months instead of 14
   days. An Acpo spokesman said the complexity and scale of
   counter-terrorist operations means the 14-day maximum is often
   insufficient."

References

   1. http://www.guardian.co.uk/attackonlondon/story/0,16132,1533917,00.html

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Your message to Wikitech-l awaits moderator approval

2005-07-22 Thread wikitech-l-bounces
Your mail to 'Wikitech-l' with the subject

(no subject)

Is being held until the list moderator can review it for approval.

The reason it is being held:

Post by non-member to a members-only list

Either the message will get posted to the list, or you will receive
notification of the moderator's decision.  If you would like to cancel
this posting, please visit the following URL:


http://mail.wikipedia.org/mailman/confirm/wikitech-l/7d83c00f18f8ae34f9e304b8da3e333172feb43d



Re: [Clips] [dave@farber.net: [IP] Police use cameras to track vehicles of suspects]

2005-07-21 Thread R.A. Hettinga

--- begin forwarded text


>Date: Thu, 21 Jul 2005 17:05:05 -0700 (PDT)
>From: "G. Gruff" <[EMAIL PROTECTED]>
>Subject: Re: [Clips] [EMAIL PROTECTED]: [IP] Police use cameras to track
>vehicles of suspects]
>To: [EMAIL PROTECTED]
>
>Heh, heh, heh.more'n one way to skin a radar camera...
><http://www.phantomplate.com/photoblocker.html>http://www.phantomplate.com/photoblocker.html
>
>Apparently works. There's measured outrage against it.
>
>ffurgy_|_gruffy, reporting from the Mad Hatter's Flash-Block Seminar
>
>
>"R.A. Hettinga" <[EMAIL PROTECTED]> wrote:
>
>
>--- begin forwarded text
>
>
>Date: Wed, 20 Jul 2005 17:59:51 +0200
>From: Eugen Leitl
>To: [EMAIL PROTECTED], [EMAIL PROTECTED]
>Subject: [EMAIL PROTECTED]: [IP] Police use cameras to track vehicles of
>suspects]
>User-Agent: Mutt/1.5.9i
>Sender: [EMAIL PROTECTED]
>
>- Forwarded message from David Farber -
>
>From: David Farber
>Date: Wed, 20 Jul 2005 11:49:17 -0400
>To: Ip ip
>Subject: [IP] Police use cameras to track vehicles of suspects
>X-Mailer: Apple Mail (2.733)
>Reply-To: [EMAIL PROTECTED]
>
>
>
>Begin forwarded message:
>
>From: Bruce Schneier
>Date: July 20, 2005 11:04:17 AM EDT
>To: [EMAIL PROTECTED]
>Subject: [EPIC_IDOF] Police use cameras to track vehicles of suspects
>
>
>I've written about this in New Haven, CT:
>
>http://www.schneier.com/blog/archives/2004/10/license_plate_g.html
>
>This new story is from Scotland.
>
>Bruce
>
>
>
>Police use cameras to track vehicles of suspects
>
>http://www.theherald.co.uk/news/43417.html
>
>LUCY ADAMS, Home Affairs Correspondent July 20 2005
>
>
>POLICE have created a database of more than 6000 vehicles of suspects
>which they can track on special cameras as they move around the country.
>
>On major roads across Scotland, the cameras, which look similar to
>the speed ones, record thousands of licence plates every hour and
>scan them against the database.
>
>Those on the list are flagged up with the local force control room
>with details of the direction in which they are travelling. Depending
>on the intelligence held on the motorist, the vehicle could be
>stopped immediately by officers or monitored during its journey.
>
>Senior police say there are a "substantial number" of cameras across
>the country aimed at detecting drugs traffickers, sex offenders,
>suspected terrorists and banned or unlicensed drivers. Owners on the
>list are not told, and civil rights campaigners have raised concerns
>about whether the scheme is compatible with human rights legislation.
>
>However, officers say Automatic Number Plate Recognition (ANPR),
>originally created for counter-terrorism, is a vital tool in
>collecting intelligence on criminals and suspected terrorists.
>
>Alan Burnett, spokesman on the system for the Association of Chief
>Police Officers in Scotland, and assistant chief constable of Fife,
>said: "It is directed against detecting travelling housebreakers,
>potential terrorists, bogus callers and drug traffickers. This
>technology is very much geared towards disrupting criminals such as
>drug traffickers and it is not about prosecuting the motorist."
>
>He said it was nothing to do with speeding or Big Brother, adding
>that there were various lengths of time over which they could hold
>the information: "A stolen vehicle may be on the list for two days,
>but more serious intelligence may be kept on the list for up to 90
>days."
>
>The Scottish Executive has spent ?1.5m on ANPR machines which can
>check up to 3000 licence plates an hour on vehicles travelling at
>speeds of up to 100mph. Forces are planning to connect this database
>to the Scottish Intelligence Database (SID) to allow every officer to
>be able to request that a vehicle of interest should be checked.
>
>It is managed by the Scottish Criminal Records Office where a
>sergeant is responsible for checking the information is held only for
>a certain time and that it is compliant with human rights legislation.
>
>John Scott, head of the Scottish Human Rights Centre, said he was
>concerned about the lack of judicial scrutiny.
>
>___
>EPIC_IDOF mailing list
>[EMAIL PROTECTED]
>https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_idof
>
>
>-
>You are subscribed as [EMAIL PROTECTED]
>To manage your subscription, go to
>http://v2.listbox.com/member/?listname=ip
>
>Archives at: http://www.interesting-people.org/archives/interesting-people/
>
>- End forwarded messag

[EMAIL PROTECTED]: [IP] more on Police use cameras to track vehicles of suspects]

2005-07-21 Thread Eugen Leitl
- Forwarded message from David Farber <[EMAIL PROTECTED]> -

From: David Farber <[EMAIL PROTECTED]>
Date: Wed, 20 Jul 2005 20:26:40 -0400
To: Ip ip 
Subject: [IP] more on  Police use cameras to track vehicles of suspects
X-Mailer: Apple Mail (2.733)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: gailbracy <[EMAIL PROTECTED]>
Date: July 20, 2005 6:18:24 PM EDT
To: [EMAIL PROTECTED]
Subject: RE: [IP] Police use cameras to track vehicles of suspects


For what it's worth, I just finished a cross-country drive from San  
Diego to
NC via I-40 and was quite curious about the other fixtures attached  
to the
cell towers planted on nearly every mile of the Interstate.

Creepier still, was the fact that I saw virtually no Highway Patrols  
through
any of the states I crossed with the exceptions of Tennessee, and at  
a few
construction sites.

Gail Bracy



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On  
Behalf Of
David Farber
Sent: Wednesday, July 20, 2005 8:49 AM
To: Ip ip
Subject: [IP] Police use cameras to track vehicles of suspects



Begin forwarded message:

From: Bruce Schneier <[EMAIL PROTECTED]>
Date: July 20, 2005 11:04:17 AM EDT
To: [EMAIL PROTECTED]
Subject: [EPIC_IDOF] Police use cameras to track vehicles of suspects


I've written about this in New Haven, CT:

 http://www.schneier.com/blog/archives/2004/10/license_plate_g.html

This new story is from Scotland.

Bruce

********

Police use cameras to track vehicles of suspects

http://www.theherald.co.uk/news/43417.html

LUCY ADAMS, Home Affairs CorrespondentJuly 20 2005


POLICE have created a database of more than 6000 vehicles of suspects
which they can track on special cameras as they move around the country.

On major roads across Scotland, the cameras, which look similar to
the speed ones, record thousands of licence plates every hour and
scan them against the database.

Those on the list are flagged up with the local force control room
with details of the direction in which they are travelling. Depending
on the intelligence held on the motorist, the vehicle could be
stopped immediately by officers or monitored during its journey.

Senior police say there are a "substantial number" of cameras across
the country aimed at detecting drugs traffickers, sex offenders,
suspected terrorists and banned or unlicensed drivers. Owners on the
list are not told, and civil rights campaigners have raised concerns
about whether the scheme is compatible with human rights legislation.

However, officers say Automatic Number Plate Recognition (ANPR),
originally created for counter-terrorism, is a vital tool in
collecting intelligence on criminals and suspected terrorists.

Alan Burnett, spokesman on the system for the Association of Chief
Police Officers in Scotland, and assistant chief constable of Fife,
said: "It is directed against detecting travelling housebreakers,
potential terrorists, bogus callers and drug traffickers. This
technology is very much geared towards disrupting criminals such as
drug traffickers and it is not about prosecuting the motorist."

He said it was nothing to do with speeding or Big Brother, adding
that there were various lengths of time over which they could hold
the information: "A stolen vehicle may be on the list for two days,
but more serious intelligence may be kept on the list for up to 90
days."

The Scottish Executive has spent ?1.5m on ANPR machines which can
check up to 3000 licence plates an hour on vehicles travelling at
speeds of up to 100mph. Forces are planning to connect this database
to the Scottish Intelligence Database (SID) to allow every officer to
be able to request that a vehicle of interest should be checked.

It is managed by the Scottish Criminal Records Office where a
sergeant is responsible for checking the information is held only for
a certain time and that it is compliant with human rights legislation.

John Scott, head of the Scottish Human Rights Centre, said he was
concerned about the lack of judicial scrutiny.

___
EPIC_IDOF mailing list
[EMAIL PROTECTED]
https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_idof


-----
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
  http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting- 
people/



-----
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 

[EMAIL PROTECTED]: [IP] Police use cameras to track vehicles of suspects]

2005-07-20 Thread Eugen Leitl
- Forwarded message from David Farber <[EMAIL PROTECTED]> -

From: David Farber <[EMAIL PROTECTED]>
Date: Wed, 20 Jul 2005 11:49:17 -0400
To: Ip ip 
Subject: [IP] Police use cameras to track vehicles of suspects
X-Mailer: Apple Mail (2.733)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: Bruce Schneier <[EMAIL PROTECTED]>
Date: July 20, 2005 11:04:17 AM EDT
To: [EMAIL PROTECTED]
Subject: [EPIC_IDOF] Police use cameras to track vehicles of suspects


I've written about this in New Haven, CT:

http://www.schneier.com/blog/archives/2004/10/license_plate_g.html

This new story is from Scotland.

Bruce

****

Police use cameras to track vehicles of suspects

http://www.theherald.co.uk/news/43417.html

LUCY ADAMS, Home Affairs CorrespondentJuly 20 2005


POLICE have created a database of more than 6000 vehicles of suspects  
which they can track on special cameras as they move around the country.

On major roads across Scotland, the cameras, which look similar to  
the speed ones, record thousands of licence plates every hour and  
scan them against the database.

Those on the list are flagged up with the local force control room  
with details of the direction in which they are travelling. Depending  
on the intelligence held on the motorist, the vehicle could be  
stopped immediately by officers or monitored during its journey.

Senior police say there are a "substantial number" of cameras across  
the country aimed at detecting drugs traffickers, sex offenders,  
suspected terrorists and banned or unlicensed drivers. Owners on the  
list are not told, and civil rights campaigners have raised concerns  
about whether the scheme is compatible with human rights legislation.

However, officers say Automatic Number Plate Recognition (ANPR),  
originally created for counter-terrorism, is a vital tool in  
collecting intelligence on criminals and suspected terrorists.

Alan Burnett, spokesman on the system for the Association of Chief  
Police Officers in Scotland, and assistant chief constable of Fife,  
said: "It is directed against detecting travelling housebreakers,  
potential terrorists, bogus callers and drug traffickers. This  
technology is very much geared towards disrupting criminals such as  
drug traffickers and it is not about prosecuting the motorist."

He said it was nothing to do with speeding or Big Brother, adding  
that there were various lengths of time over which they could hold  
the information: "A stolen vehicle may be on the list for two days,  
but more serious intelligence may be kept on the list for up to 90  
days."

The Scottish Executive has spent ?1.5m on ANPR machines which can  
check up to 3000 licence plates an hour on vehicles travelling at  
speeds of up to 100mph. Forces are planning to connect this database  
to the Scottish Intelligence Database (SID) to allow every officer to  
be able to request that a vehicle of interest should be checked.

It is managed by the Scottish Criminal Records Office where a  
sergeant is responsible for checking the information is held only for  
a certain time and that it is compliant with human rights legislation.

John Scott, head of the Scottish Human Rights Centre, said he was  
concerned about the lack of judicial scrutiny.

___
EPIC_IDOF mailing list
[EMAIL PROTECTED]
https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_idof


-----
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


  1   2   3   4   5   6   7   8   9   10   >