Re: cryptome log downloads

2003-02-26 Thread lcs Mixmaster Remailer
On Wed, 26 Feb 2003 23:50:06 +0100 (CET), you wrote:
>
> These IPs downloaded access log from cryptome during hacked state.



Didn't everybody who wanted to know who had downloaded the log, 
which includes you, have to download the log?

Idiot.



Re: Trivial OTP generation method? (makernd.c)

2003-02-26 Thread Thomas Shaddack
> >After that, you actually want to feed the entropy you're getting
> >from the radio tuner *into* /dev/[u]random.
>
> He may wish to pre-process the raw bits to remove any potential
> bias they may have.
>
> Here's what I do for random bits:
> http://www.etoan.com/random-number-generation/index.html

Nice!!! :) I wasn't aware such electronics is so cheap!

Here is the final version of the OTP generator:
Hints and constructive criticism welcomed.

News: Elementary sanity check on input data is performed.



//-- cut here - makernd.c -- cut here 
/*
## ###
##
## makernd - program for generation of random files suitable for one-time
## pads. Uses audio signal from soundcard input.
##
## Performs basic sanity check for sufficient entropy on the input.
## Reads 64 bytes from DSP, checks if there is at least one pair of
## adjanced bytes where the bytes are different by more than 16
## (arbitrarily chosen value). This should be replaced with some kind
## of statistical analysis. The check is also done on each block read
## from the input, discarding suspicious input data.
##
## Reads blocks of 128 bytes from RANDOMINPUT, hashes them with MD5,
## outputs 16-byte blocks to output file and RANDOMDEV (so as the side
## effect it feeds the entropy pool).
##
## Takes one mandatory parameter (number of random bytes to produce) and
## one optional parameter (output file name - uses stdout if not present).
##
## ###
*/

#include 
#include 
#include 

#define RANDOMDEV "/dev/urandom"
#define RANDOMINPUT "/dev/dsprandom"

char output[18];
FILE*fo,*frnd;

void outputbinary(char*s,long n)
{ while(n>0)
  {fprintf(fo,"%c",s[0] & 0xff);s++;n--;}
}

// FIXME: Replace with real statistical check
int isinsufficiententropy(char*data,int n)
{ int t;
  for(t=0;t16)return 0;
  return 1;
}

int checkinputentropy(FILE*f)
{ char data[64];
  fread(data,64,1,f);
  return isinsufficiententropy(data,64);
}

int output16bytes(FILE*f,long n)
{ char data[128];
  MD5_CTX c;
  MD5_Init(&c);
  MD5_Update(&c,output,16);
  for(;;){fread(data,128,1,f);
  if(!isinsufficiententropy(data,128))break;
  fprintf(stderr,"Insufficient input entropy. Rereading block.\n");}
  MD5_Update(&c,data,128);
  MD5_Final(output,&c);
  if(n>16)n=16;if(n<0)n=0;
  outputbinary(output,n);
  if(frnd)fwrite(output,16,1,frnd);
  return 0;
}

int main(int argc,char*argv[])
{
  FILE*f;
  long n;

  if(argc<2)
   {printf("makernd  [output.file]\n"
   "Creates LENGTH bytes of random numbers derived from "RANDOMINPUT", "
   "which should be a symlink to eg. /dev/dsp0 fed with analog signal "
   "from eg. a white noise generator.\n"
   "Outputs to stdout if output.file is not specified.\n"
   "Feeds the output also to "RANDOMDEV".\n");
return 0;}

  n=atol(argv[1]);
  if(n<=0)
   {fprintf(stderr,"Argument '%s' has to be greater than zero.\n",argv[1]);
return 111;}

  f=fopen(RANDOMINPUT,"r");
  if(!f)
   {perror("ERROR: Cannot open "RANDOMINPUT);
fprintf(stderr,"Check if the symlink or device exists.\n");
return 111;}

  if(checkinputentropy(f))
   {fprintf(stderr,"ERROR: Input entropy seems to be insufficient.\n"
   "No two adjanced bytes in "RANDOMINPUT" that are different by more 
than 16.\n"
   "Check the input signal volume.\n"
   "Cowardly refusing to create any output.\n");
return 1;}

  frnd=fopen(RANDOMDEV,"rw");
if(frnd){fread(output,16,1,frnd);}
else{fprintf(stderr,"Cannot open "RANDOMDEV", cannot initialize output. Proceeding 
anyway.\n");}

  if(argc>2){fo=fopen(argv[2],"w");
 if(!fo){perror("ERROR: Cannot open output file");return(111);}}
 else fo=stdout;

  while(n>0){output16bytes(f,n);n-=16;}

  fclose(f);fclose(frnd);
  return 0;
}



Re: Say Bush is Nuts, Go to Jail

2003-02-26 Thread Steve Furlong
On Wednesday 26 February 2003 17:15, Tyler Durden wrote:
> Gulp. But then again, are they going to arrest all 250 million of us?

cf The Asylum from Douglas Adams' _So Long and Thanks for All the Fish_. 
Just turn the entire US into a jail with a few, small "not jail" 
locations.

-- 
Steve FurlongComputer Condottiere   Have GNU, Will Travel

Guns will get you through times of no duct tape better than duct tape
will get you through times of no guns. -- Ron Kuby



cryptome log downloads

2003-02-26 Thread Nomen Nescio
These IPs downloaded access log from cryptome during hacked state.


pcp259331pcs.howard01.md.comcast.net
212.54.205.184
host.159-142-70-179.gsa.gov
c-889471d5.021-3-73746f50.cust.bredbandsbolaget.se
217.167.197.20
193.128.179.38
217.167.197.20
host.21.88.68.195.rev.coltfrance.com
216.155.104.95
204.249.177.229
c-889471d5.021-3-73746f50.cust.bredbandsbolaget.se
206.180.129.0.dial-ip.hal-pc.org
mchesnik.resnet.bucknell.edu
logos.relcom.ru
pcp03280952pcs.nrockv01.md.comcast.net
pool-138-88-125-69.res.east.verizon.net
adsl441.estpak.ee
194.90.22.83
h219-110-056-001.catv01.itscom.jp
host33-206.pool80181.interbusiness.it
213-140-14-139.fastres.net
pcp03280952pcs.nrockv01.md.comcast.net
server2.gescenter.com
c-889471d5.021-3-73746f50.cust.bredbandsbolaget.se
user142.intonet.co.uk
p50902fb5.dip.t-dialin.net
217.19.80.197
adsl441.estpak.ee
bragi.fh-brandenburg.de
esprx02x.nokia.com
62.92.119.47
washdc3-ar2-4-64-017-068.washdc3.elnk.dsl.genuity.net
bragi.fh-brandenburg.de
mail.emainc.com
cf2.andrews.af.mil
cachix1.tele.net
stop.justice.gc.ca
218.1.37.179
212.137.60.106
m206-5.dsl.tsoft.com
195.243.47.34
host91-189.pool80181.interbusiness.it
130.94.106.228
folsom.officedepot.com
63.171.232.247
gateway1.scottish-southern.co.uk
19.203.252.64.snet.net
156.54.249.179
esprx02x.nokia.com
156.54.249.179
ip68-108-169-227.lv.lv.cox.net
ip-192.landsend.com
212.54.205.184
dssback.smsu.edu
adsl441.estpak.ee
nycmny1-ar5-4-41-204-222.nycmny1.elnk.dsl.genuity.net
ip68-12-36-71.ok.ok.cox.net
spock.ti.telenor.net
h00e018b87996.ne.client2.attbi.com
146.7.100.197
194.102.45.134
ppp011.datacom.bg
paginiaurii.rdsnet.ro
12.146.66.131
segfault.net
host18-121.pool8021.interbusiness.it
212.54.205.184
server.olgastift.s.bw.schule.de
adsl441.estpak.ee
anancy-104-1-2-19.abo.wanadoo.fr
12-238-233-6.client.attbi.com
ppp011.datacom.bg
adsl-154-201-4.clt.bellsouth.net
193.1.100.103
section.eu.org
adsl-65-69-105-82.dsl.tulsok.swbell.net
65.123.207.130
www-cache.rz.uni-karlsruhe.de
interlock.doeal.gov
pcp01686411pcs.wchstr01.pa.comcast.net
px2o.wpafb.af.mil
adsl441.estpak.ee
1cust113.tnt14.stk3.swe.da.uu.net
js.bitnux.com
dsl081-198-094.nyc2.dsl.speakeasy.net
gussie.cs.queensu.ca
62.173.76.47
65.213.245.17
netcache-2002.public.lawson.webtv.net
65.213.245.17
mail.targettv.com
paginiaurii.rdsnet.ro
grossetto.cinetic.de
212.185.163.2
grossetto.cinetic.de
rnet.riss.net
adsl-208-190-44-194.dsl.rcsntx.swbell.net
199.195.109.4
user-0ccskj1.cable.mindspring.com
webcacheh02a.cache.pol.co.uk
202.166.126.229
supercache.qualitynet.net
210.187.2.163
170.red-80-58-4.pooles.rima-tde.net
adsl441.estpak.ee
207.140.171.115
mail.targettv.com
62.118.206.245
gozer.adams.edu
h36n1fls23o1073.telia.com
webcacheh02a.cache.pol.co.uk
mix-poitiers-106-4-203.abo.wanadoo.fr
valis.net.pl
210.187.2.163
200.60.244.210
paginiaurii.rdsnet.ro
user31.net518.tx.sprint-hsd.net
rd.centennialrd.com
grossetto.cinetic.de
doc.atstake.com
paginiaurii.rdsnet.ro
user-2ivfj0h.dialup.mindspring.com
dyn325.win.tue.nl
doc.atstake.com
us1.pharmacia.com
199.67.140.75
198.65.201.34
pf.epsa.pl
cache4.ihug.com.au
24-90-126-37.nyc.rr.com
217.206.228.15
adsl441.estpak.ee
sigsegv.us
199.195.109.4
www.japet.si
el8.net
acb4aa08.ipt.aol.com
ocw-fl6.mit.edu
cache-da03.proxy.aol.com
radio-15.cvairnet.com
ocw-fl6.mit.edu
eric.mvc.mcc.ac.uk
65.213.245.17
host70-246.pool8173.interbusiness.it
adsl-216-102-104-158.dsl.scrm01.pacbell.net
host18-121.pool8021.interbusiness.it
65.213.245.17
india.dsnethosting.com
12.146.66.131
adsl-66-140-35-4.dsl.rcsntx.swbell.net
cc37206-b.ensch1.ov.home.nl
hiryu.st.ryukoku.ac.jp
cc37206-b.ensch1.ov.home.nl
0x50a1be60.abnxx5.adsl.tele.dk
62.13.170.12
130.156.3.254
dhcp80ffaf1a.residence-rooms.uiowa.edu
193.122.21.42
dpc6682075068.direcpc.com
mke-65-29-141-70.wi.rr.com
12-246-108-182.client.attbi.com
209-102-194-133.ipv4.intur.net
unknown1.ne.client2.attbi.com
adsl-66-140-96-228.dsl.lbcktx.swbell.net
makkai1.mfa.kfki.hu
63-216-250-91.sdsl.cais.net
198.143.25.22
63-216-250-91.sdsl.cais.net
pool-138-88-125-69.res.east.verizon.net
adsl-67-37-28-9.dsl.mdsnwi.ameritech.net
200-147-88-242.tlm.dialuol.com.br
d-ip-129-15-111-167.lab.ou.edu
216-39-176-101.ip.theriver.com
ip68-98-187-120.nv.nv.cox.net
170.135.241.45
ip68-98-15-128.ph.ph.cox.net
unwg01a008.customs.gov
stargazer-o.stars-smi.com
stargazer-o.stars-smi.com
rrcs-west-24-106-45-5.biz.rr.com
rrcs-west-24-106-45-5.biz.rr.com
200-147-88-242.tlm.dialuol.com.br
sycamore-226-190.tbcnet.com
218.145.25.13
mankey-76.dynamic.rpi.edu
multilink.deva.rdsnet.ro
wsp000466wss.nebraska.edu
65.213.245.17
cs6669249-49.austin.rr.com
156.80.89.71
212.42.228.2
cache219.156ce.scvmaxonline.com.sg
p0033-121.customer.soneraliving.fi
sycamore-226-190.tbcnet.com
208.247.107.169
ool-18ba0937.dyn.optonline.net
pd958f774.dip.t-dialin.net
ns1.amgen.com
lns-p19-18-81-57-233-23.adsl.proxad.net
host.145.83.23.62.rev.coltfrance.com
ca-westla-cuda5-c7a-48.stmnca.adelphia.net
fwmoc06.fw.gannett.com
adsl441.estpak.ee
gw.forbes.net
ppp-216-7.25-151.libero.it
forced.attrition.

Re: Say Bush is Nuts, Go to Jail

2003-02-26 Thread Tim May
On Wednesday, February 26, 2003, at 11:53 AM, Eric Cordian wrote:

http://santafenewmexican.com/site/ 
news.cfm?BRD=2144&dept_id=415763&newsid=7071930&PAG=461&rfi=9

-

...

According to Andrew J. O'Connor, 40, a former Santa Fe public defender,
two city police officers removed him from the school's library about 9
p.m. Thursday while he was using a computer. "They Mirandized me,
handcuffed me and took me to the police station where two Secret  
Service
agents from Albuquerque interrogated me for hours," O'Connor said.

...

While he was at the library, O'Connor said he had a conversation with a
woman wearing a button that read, "No war with Iraq." "We talked with  
each
other about that, and I said I think Bush is ... out of control,"  
O'Connor
said.

The woman with the "No war with Iraq" button was probably a provocateur.

SOP for a police state. And SOP since the PATRIOT Act, the Homeland  
Security Act, and the Protektion of the Reich Act.

--Tim May



Re: Say Bush is Nuts, Go to Jail

2003-02-26 Thread Tyler Durden
Damn. Some odd details there. Crap I'm getting paranoid. Wait, I may be 
paranoid but that doesn't mean I'm wrong.

So the guy was known to belong to an Anti-Pallestinian group, and this was 
known to the SS folks prior to him being arrested. So apparently, they were 
watching this guy.

Gulp. But then again, are they going to arrest all 250 million of us? 
Declaring anyone who's anti-war (or anti-Bush) an automatic terrorist 
doesn't look like its going to fly after all, but I could be wrong.

-TD






From: Eric Cordian <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Say Bush is Nuts, Go to Jail
Date: Wed, 26 Feb 2003 11:53:44 -0800 (PST)
http://santafenewmexican.com/site/news.cfm?BRD=2144&dept_id=415763&newsid=7071930&PAG=461&rfi=9

-

...

According to Andrew J. O'Connor, 40, a former Santa Fe public defender,
two city police officers removed him from the school's library about 9
p.m. Thursday while he was using a computer. "They Mirandized me,
handcuffed me and took me to the police station where two Secret Service
agents from Albuquerque interrogated me for hours," O'Connor said.
...

While he was at the library, O'Connor said he had a conversation with a
woman wearing a button that read, "No war with Iraq." "We talked with each
other about that, and I said I think Bush is ... out of control," O'Connor
said.
...

--
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"


_
Tired of spam? Get advanced junk mail protection with MSN 8. 
http://join.msn.com/?page=features/junkmail



Re: Trivial OPT generation method?

2003-02-26 Thread Dan Veeneman
At 10:55 AM 2/26/03 -0500, you wrote:
He only needs a pseudo-random seed, though. The real random comes
from the radio white-noise.
[...]

After that, you actually want to feed the entropy you're getting
from the radio tuner *into* /dev/[u]random.
He may wish to pre-process the raw bits to remove any potential
bias they may have.
Here's what I do for random bits:
http://www.etoan.com/random-number-generation/index.html
Cheers,

Dan



Say Bush is Nuts, Go to Jail

2003-02-26 Thread Eric Cordian
http://santafenewmexican.com/site/news.cfm?BRD=2144&dept_id=415763&newsid=7071930&PAG=461&rfi=9

-

...

According to Andrew J. O'Connor, 40, a former Santa Fe public defender,
two city police officers removed him from the school's library about 9
p.m. Thursday while he was using a computer. "They Mirandized me,
handcuffed me and took me to the police station where two Secret Service
agents from Albuquerque interrogated me for hours," O'Connor said.

...

While he was at the library, O'Connor said he had a conversation with a
woman wearing a button that read, "No war with Iraq." "We talked with each
other about that, and I said I think Bush is ... out of control," O'Connor
said.

...

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"



Re: Ethnomathematics

2003-02-26 Thread John Bethencourt
On Wed, Feb 26, 2003 at 10:02:05PM +1300, Peter Gutmann wrote:
> 
> Well, I made a start a few years ago with "Network Security: A Feminist
> Perspective" (done when "people ask me to do security talks for them without
> bothering to specify which aspect of security they want me to talk about")
> about halfway down my home page.  The direct link to the slides is
> http://www.cs.auckland.ac.nz/~pgut001/pubs/fhealth.pdf.
> 
> Peter.

Hilarious! I loved it, but it was so short. You should do an extended, in
depth treatment of this subject in the spirit of Sokal.

John Bethencourt



Re: Trivial OPT generation method?

2003-02-26 Thread gabriel rosenkoetter
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Wed, Feb 26, 2003 at 03:37:10PM -, Vincent Penquerc'h wrote:
> > 1) Get 8 bytes from /dev/urandom. (Just for sure.) Put them into the
> You probably know this if you use it, but /dev/random is the most
> "random" one, as it always uses system entropy, rather than falling
> back on an algorithm to generate more bits than are available in
> the pool.

He only needs a pseudo-random seed, though. The real random comes
from the radio white-noise.

I'd say it'd be better to not waste the system's random bytes on
this at all, but just to gen your own pseudo-random bytes using
/dev/urandom's out-of-entropy function from your OS of choice
(audit, I guess, but it's mostly just to blank the memory of
anything useful).

After that, you actually want to feed the entropy you're getting
from the radio tuner *into* /dev/[u]random.

- -- 
gabriel rosenkoetter
[EMAIL PROTECTED]
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.1 (NetBSD)

iD8DBQE+XONt9ehacAz5CRoRAl9yAJ40RRX2GqexHdYa76owwab8sjd+bQCfRn6s
pv5PaYjQB4fkCE8QefC+u8g=
=3OKq
-END PGP SIGNATURE-



Re: Be careful about technological "self help" methods

2003-02-26 Thread Steve Schear
At 10:46 AM 2/26/2003 -0500, you wrote:
http://www.suntimes.com/output/news/cst-nws-booby25.html

Family of electrocuted thief gets $75,000

February 25, 2003

BY DAN ROZEK STAFF REPORTER

The family of a convicted burglar who was electrocuted in 1997 when he 
tried to break in to a bar in Aurora after-hours and triggered a homemade 
booby trap has been awarded a $75,000 jury verdict to be paid by the 
owners of the bar and the property.
Its important to make sure you are judgement proof before taking similar 
actions.

steve



Mischief afoot in Bolivia from IMF et al U.S. proxies?

2003-02-26 Thread Steve Schear
[Translation via Craig Spencer]

http://www.buscabo.net/20030223/economia_8.html


 >The Hidden Agenda of the IMF

 >The IMF has been urging an income tax (on Bolivia) for 4 years.

 > ...which included provisions for progressive rates between 13%
 > and 25%...

 > ... according to this document Bolivia has a tax structure that
 > is too simple.  The number of national and local taxes is only
 > about a dozen.  Doubtless, "this simplicity", according to the
 > IMF "has a cost in structural terms which results in an inability
 > to mitigate inequality of income and difficulty in directing
 > national resources.  ...

 > The IMF's proposal aimed at increasing tax revenues.  For this
 > purpose ... an income tax, especially on all the income of natural
 > persons is required


http://www.laprensa-bolivia.net//20030224/politica/politica06.htm

 >La Prensa : The Police Anti-Terrorist Squad fired at the Palace
 >of Government

 >... the Institute of Forensic Investigation ... established that
 >the anti-terrorist police of the Rapid Reaction Force (GAI) fired
 >at the Palace of Government during the armed confrontation with the
 >military in Murillo Square, Wednesday the 12th of February.

 >The GAI, whose unit is entirely financed by the US Embassy in
 >La Paz, apparently in aid of the rebellious police that resisted the
 >soldiers fired their sniper rifles ... at the windows of the
 >offices in the Palace of government. [where the President was
at the time]



Be careful about technological "self help" methods

2003-02-26 Thread Declan McCullagh
http://www.suntimes.com/output/news/cst-nws-booby25.html

Family of electrocuted thief gets $75,000

February 25, 2003

BY DAN ROZEK STAFF REPORTER

The family of a convicted burglar who was electrocuted in 1997 when he 
tried to break in to a bar in Aurora after-hours and triggered a homemade 
booby trap has been awarded a $75,000 jury verdict to be paid by the owners 
of the bar and the property.
...



RE: Trivial OPT generation method?

2003-02-26 Thread Vincent Penquerc'h
> 1) Get 8 bytes from /dev/urandom. (Just for sure.) Put them into the

You probably know this if you use it, but /dev/random is the most
"random" one, as it always uses system entropy, rather than falling
back on an algorithm to generate more bits than are available in
the pool. Since you only need 8 bytes of random seed (and if you
don't need to generate many OTPs at a time...) it might be worth
using it instead.
Can't help you on the entropy quality though.

-- 
Vincent Penquerc'h 



Re: Trivial OPT generation method?

2003-02-26 Thread David Howe
> There is no weakness in it that I could come up with (presuming the
audio
> input is sufficiently random, which in case of badly tuned station it
> seems to be; white noise generator would be better, though).
Sounds good to me. you should certainly get 16 good bytes from 128, and
while assuming a higher entropy would be faster, it is better to be
conservative if you can afford it.



Trivial OPT generation method?

2003-02-26 Thread Thomas Shaddack
I am playing with an one-time pad generator.

I have a FM radio receiver card in the computer, as /dev/dsp3.
I wrote a small simple program that takes the filename and file size as
arguments, then produces the desired file as full of random numbers.

The algorithm of generating the numbers is this:

1) Get 8 bytes from /dev/urandom. (Just for sure.) Put them into the
   variable "output".
2) Initialize the MD5 function.
3) Update MD5 with the value of the variable "output".
4) Update MD5 with 128 bytes from /dev/dsp3.
5) Finish the MD5 calculation, retrieve 16 bytes of result into the
   variable "output".
6) Append the content of "output" to the output file.
7) Repeat 2-6 until I get the desired number of bytes.

There is no weakness in it that I could come up with (presuming the audio
input is sufficiently random, which in case of badly tuned station it
seems to be; white noise generator would be better, though). However, with
my lack of experiences I am not sure the output has enough of entropy, or
if it on the other hand isn't a drastic overkill.

Are there any hints/caveats for this approach? It's admittedly a quick
hack glued together in couple minutes of spare time on the basis of an
immediate idea.

Thanks for any comments. :)



Re: Ethnomathematics

2003-02-26 Thread Peter Gutmann
Bill Stewart <[EMAIL PROTECTED]> writes:

>Actually doing a female-oriented physics or teaching curriculum is fine, if
>somebody can do a good job of it.

Well, I made a start a few years ago with "Network Security: A Feminist
Perspective" (done when "people ask me to do security talks for them without
bothering to specify which aspect of security they want me to talk about")
about halfway down my home page.  The direct link to the slides is
http://www.cs.auckland.ac.nz/~pgut001/pubs/fhealth.pdf.

Peter.



RSA Conference Awards Nominations now open.

2003-02-26 Thread Trei, Peter
I'm sure the folks on this list can come up with some
interesting nominations :-)
Peter Trei


Deadline March 3rd 

Nominations opened today for the sixth annual RSA. Conference Awards.  The 
Awards recognize individuals and organizations that make significant and 
ongoing contributions to the advancement of electronic security. Organizers 
of RSA Conference 2003, the world's leading e-security event, will honor 
one winner in each of three categories: Mathematics, Public Policy and 
Security Practices, at the 12th annual RSA Conference in April 2003.

The Security Practices category is new this year, and is intended to 
recognize remarkable contributions in commercial applications of 
cryptography or the practice of or unique implementation of data security 
within an organization.

Nomination forms are available at 
http://www.rsasecurity.com/conference/awards/ and must be submitted by 
March 3, 2003. Award winners will be announced at RSA Conference 2003 to be 
held April 13-17, 2003 at Moscone Center in San Francisco, Calif. The 
selection committee comprises members of the industry, academic community 
and public sector.

Regards,
Sandra Toms LaPedis
Vice President & General Manager
RSA Conference 



Re: The next time you see someone on TV in a "newsroom"

2003-02-26 Thread Bill Stewart
At 04:40 PM 02/24/2003 -0800, Tim May wrote:
Putting up fake newsrooms is quite another matter, though. I don't recall 
seeing this static shot of the "New York Times-Washington Bureau" 
newsroom. It seems like a silly thing to do, to have a photo of a newsroom 
with nobody in it.
On the backdrops themselves, I'm surprised they're not using blue screen 
technology. The weather reporters have it, though with a sometimes visible 
"edge" (which is distracting).
Comedy Central's "The Daily Show" does this all the time,
in a broad mixture of serious news coverage, comedic spoofs, and
various ranges of irony and sarcasm in between.
Usually it's when their "Senior War Correspondent" is off somewhere.
Since the War on (Some) Terrorists is the Wag the Dog War, we may soon be 
seeing actual faked war footage.
You haven't been seeing it?  It's right their next to the fnords, er, um,
it must be your Broadcast Flag settings keeping you from receiving that part.