Re: geographically removed? eHalal

2004-12-01 Thread Steve Furlong
On Tue, 2004-11-30 at 21:36, Major Variola (ret) wrote:

 Halal was deemed a terrorist weapon, and contrary to the treasury's
 policies, game over.

Hawala




China 'blocks Google news site'

2004-12-01 Thread R.A. Hettinga
Reminds me of Imperial Russia's railroad gauge, which was different from
the rest of Europe's, maybe the whole world's, on purpose, to prevent
attacks. Common trick, lots of countries did it, though it impedes lots of
progress at the border besides military progress toward your capital. You
have to offload *all* the freight, both ways, and put it onto new trains,
for instance. Way worse than going from diesel to electric, like they did
at New Haven, for instance, where you used to just change engines. More of
a symptom than a cause, of course.


Anyone want to take bets on China, though? I think the Great Firewall
will choke, or more be likely ignored, long before China will block all
truth at its border, instead of mere efficient transit prices for foreign
trade. But then I was a Polly during the Y2K thing, too.

Oh. Wait...

(Yeah, I know, I was *dead* wrong about Jim Bell getting a guilty verdict.
Surest way to be wrong is to make a prediction, and all that...)

Cheers,
RAH
Oddly enough, the Aussies had exactly this railroad gauge problem about
half way across their southern coast. I think they've fixed it since,
though I'm not sure.


http://news.bbc.co.uk/2/low/technology/4056255.stm

The BBC

Tuesday, 30 November, 2004, 16:39 GMT

 China 'blocks Google news site'

China has been accused of blocking access to Google News by the media
watchdog, Reporters Without Borders.

 The Paris-based pressure group said the English-language news site had
been unavailable for the past 10 days.

 It said the aim was to force people to use a Chinese edition of the site
which, according to the watchdog, does not include critical reports.

 Google told the BBC News website it was aware of the problems and was
investigating the causes.

 Chinese firewall

China is believed to extend greater censorship over the net than any other
country in the world.

   China is censuring Google News to force internet users to use the
Chinese version of the site which has been purged of the most critical news
reports 
 Reporters Without Borders


 A net police force monitors websites and e-mails, and controls on gateways
connecting the country to the global internet are designed to prevent
access to critical information.

 Popular Chinese portals such as Sina.com and Sohu.com maintain a close eye
on content and delete politically sensitive comments.

 And all 110,000 net cafes in the country have to use software to control
access to websites considered harmful or subversive.

 Local versions

China is censuring Google News to force internet users to use the Chinese
version of the site which has been purged of the most critical news
reports, said the group in a statement.

 By agreeing to launch a news service that excludes publications disliked
by the government, Google has let itself be used by Beijing, it said.

 For its part, the search giant said it was looking into the issue.

 It appears that many users in China are having difficulty accessing
Google News sites in China and we are working to understand and resolve the
issue, said a Google spokesperson.

 Google News gathers information from some 4,500 news sources. Headlines
are selected for display entirely by a computer algorithm, with no human
editorial intervention.

 It offers 15 editions of the service, including one tailored for China and
one for Hong Kong.

 Google launched a version in simplified Chinese in September. The site
does not filter news results to remove politically sensitive information.

 But Google does not link to news sources which are inaccessible from
within China as this would result in broken links.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Anti-RFID outfit deflates Mexican VeriChip hype

2004-12-01 Thread R.A. Hettinga
http://www.theregister.co.uk/2004/11/30/mexican_verichip_hype/print.html

The Register


 Biting the hand that feeds IT


Anti-RFID outfit deflates Mexican VeriChip hype
By Thomas C Greene (thomas.greene at theregister.co.uk)
Published Tuesday 30th November 2004 18:00 GMT

Reports that 160 Mexican officials have had RFID chips implanted within
their flesh in some bizarre security scheme have been exaggerated,
Anti-RFID outfit CASPIAN (http://www.nocards.org/) (Consumers Against
Supermarket Privacy Invasion and Numbering) says.

Our concern is that dozens of news outlets have repeated the inflated
number, which has reached the level of an urban legend, CASPIAN Director
Katherine Albrecht said in a recent press release.


I myself have repeated the erroneous figure in several media interviews,
and I want to set the record straight, she added.

The true number of Mexico's new robo-crats, based on a transcript
(http://www.spychips.com/press-releases/mexican-translation.html) from a
Televisa Mexican interview, is only 18, CASPIAN says.

In a 19 July, 2004 press release, Albrecht made a clear mention of the
imaginary 160:

Promoting implanted RFID devices as a security measure is downright
'loco,' says Katherine Albrecht. Advertising you've got a chip in your
arm that opens important doors is an invitation to kidnapping and
mutilation.

That's Albrecht's response to the announcement by Mexican Attorney General
Rafael Macedo de la Concha that he and 160 other Mexican officials were
implanted with Verichip RFID devices.

We wondered how the inflated figure got circulating in the first place. The
earliest mention in English that we could find on the Web, following a
not-terribly-aggressive search, comes from a blog called igargoyle
(http://igargoyle.com/archives/000448.html) on 13 July 2004. This is
followed, with more details, by the Associated Press
(http://www.msnbc.msn.com/id/5439055/), The Guardian
(http://www.guardian.co.uk/life/news/story/0,12976,1260858,00.html), and
The Register
(http://www.theregister.co.uk/2004/07/14/mexicans_get_chipped/), each on 14
July.

CASPIAN, weighing in several days later, is clearly not to blame for the
hype. And now the outfit has learned that classic lesson about believing
what one reads in the papers.

But who is to blame? Well, there is a 13 July item in Spanish
(http://www.el-universal.com.mx/pls/impreso/noticia_busqueda.html?id_nota=113215tabla=nacion_h)
that seems to have words in it that relate to the RFID story, along with
the number 160; but this is unlikely to be the original source. There is
also (we believe) a brief mention
(http://presidencia.gob.mx/buenasnoticias/index.php?contenido=8614pagina=28)
in a 13 July press release on what we think is the Mexican President's
official Web site.

The thirteenth seems to be when the story broke in Mexico, and the source
seems to be Attorney General Rafael Macedo de la Concha himself, although
we could not find a place where he is directly quoted as saying that 160
employees would be chipped. Reporters have offered the number in the
context of interviewing him, which suggests that he's the source, but there
are no specific, direct quotes that we could find. Perhaps, like many
senior bureaucrats, he had no idea what he was talking about.

Perhaps a companion press release contained the bogus number, or perhaps
the Spanish words for 18 and 160 sound alike, as fifteen and fifty do in
English.

In any case, we're pleased to have cleared this up. ®


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: geographically removed? eHalal

2004-12-01 Thread Major Variola (ret)
At 10:33 PM 11/28/04 -0500, Steve Furlong wrote:
I see that an irrevocable payment system, used by itself, is ripe for
fraud, more so if it's anonymous. But why wouldn't a mature system make

use of trusted intermediaries? The vendors register with the intermedi-

ary *, who takes some pains to verify their identity, trustworthiness,
and so on, and to keep the vendors' identities a secret, if
appropriate.

Halal was deemed a terrorist weapon, and contrary to the treasury's
policies, game over.





Re: geographically removed?

2004-12-01 Thread Major Variola (ret)
At 06:44 PM 11/28/04 -0800, James A. Donald wrote:
--
On 27 Nov 2004 at 6:43, Major Variola (ret) wrote:
 Internal resistance mediated by cypherpunkly tech can always
 be defeated by cranking up the police state a notch.

You assume the police state is competent, technically skilled,
determined, disciplined, and united.  Observed police states
are incompetent, indecisive, and quarrelsome.

 This is eg why e-cash systems have anonymity problems.

The problem is that any genuinely irrevocable payment system
gets swarmed by conmen and fraudsters.   We have a long way to
go before police states are the problem.

Call me pessimistic, but you seem optimistic to me.

At least we're moderately back on topic :-)





Re: geographically removed? eHalal

2004-12-01 Thread Tyler Durden
Variola:
By Halal (are you getting this term confused with that for Islamic version 
of Kosher? I think the name is similar but not this) Do you mean that system 
of monetary transfers whereby local services are exchanged in place of 
direct cash transfer? (In other words, if I want to sell something abroad 
the money is actually wired to a 3rd party who appears to the authorities 
not to have anything to do with any purchasing...this person then obtains 
services or perhaps local cash in lieu of the money he transferred. The 
system seems to operate largely on trusted intermediaries, along with a 
series of barters...)

Well, this system may technically be illegal, but it's done all the time in 
the wilds of Queens, both by middle easterners as well as South Americans, 
and I see little that could be done to stop it. Even the feds can't keep up 
with bugging all the Dominican brothels on Roosevelt Avenue.

It is, in effect, an analog Blacknet, though transactions are of course 
probably limited to the low 5-figure range without some kind of big tipoff, 
but I'm sure the locals are fully aware of the threshold values.

The only way are true police state could crack down would be to nuke Queens, 
which they might actually allow Al Qaeda to do if they chose to (seems like 
Al Qaeda could come in handy for a lot of things...Oh, where did that 
baddie bin Laden go...guess we'll never find him...)

-TD


From: Major Variola (ret) [EMAIL PROTECTED]
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: Re: geographically removed?  eHalal
Date: Tue, 30 Nov 2004 18:36:39 -0800
At 10:33 PM 11/28/04 -0500, Steve Furlong wrote:
I see that an irrevocable payment system, used by itself, is ripe for
fraud, more so if it's anonymous. But why wouldn't a mature system make
use of trusted intermediaries? The vendors register with the intermedi-
ary *, who takes some pains to verify their identity, trustworthiness,
and so on, and to keep the vendors' identities a secret, if
appropriate.
Halal was deemed a terrorist weapon, and contrary to the treasury's
policies, game over.



Re: geographically removed?

2004-12-01 Thread James A. Donald
--
Major Variola:
   Internal resistance mediated by cypherpunkly tech can 
   always be defeated by cranking up the police state a 
   notch.
  
   This is eg why e-cash systems have anonymity problems.

James A. Donald:
  The problem is that any genuinely irrevocable payment 
  system gets swarmed by conmen and fraudsters.   We have a 
  long way to go before police states are the problem.

Steve Furlong
 Heh. When the stasi come a-callin' tell them they'll have to 
 wait because you've got bigger problems. Wonder how well that 
 would work?

The stasi are not a callin yet on ecash, and have not been 
particularly effective against people publishing bittorrents.

 I see that an irrevocable payment system, used by itself, is 
 ripe for fraud, more so if it's anonymous. But why wouldn't a 
 mature system make use of trusted intermediaries?

People issuing e-cash systems want to be irrevocable and 
anonymous, in part because the market niche for revocable 
payments is occupied by paypal and credit card companies, but 
they are running into trouble from fraudsters.  They also have 
trouble from states, but as yet the trouble from states is 
merely the usual mindless bureaucratic regulatory harassment 
that disrupts all businesses, not any specific hostility to 
difficult-to-trace extranational payments.

 The vendors register with the intermedi- ary *, who takes 
 some pains to verify their identity, trustworthiness, and so 
 on, and to keep the vendors' identities a secret, if 
 appropriate. The sellers pay the intermediary, who takes a 
 piece of the action to act basically as an insurer of the 
 vendor's good faith. If there's a problem with the service or 
 merchandise and the vendor won't make good, the intermediary 
 is responsible for making the buyer whole. Is there some 
 reason this wouldn't work? If not, why hasn't anyone tried it 
 yet? Not enough cash flow to make it worth their while?

Lots of people have tried it, with varying degrees of success. 
Not much demand for it yet.  A big problem is that whenever any 
such a website achieves some degree of acceptance, a storm of 
fake websites appear imitating its name, its look and feel, 
with urls that looks very similar. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 Y34+Yhj/+imvS+mJMNI1gisrEu1m1KVnVZ1XWcQC
 4IiGQ9ui1sYZ89OBlTxmM6HA8I+qJa2Q8CwcRJu3c




RE: Oswald, Atta, Your Name Here

2004-12-01 Thread Major Variola (ret)
At 10:08 AM 11/29/04 -0500, Trei, Peter wrote:
Steve Furlong wrote:
 Major Variola (ret) wrote:
  Bill Stewart wrote:
  Slsahdot reports that MSNBC reports
 http://msnbc.msn.com/id/6549265/
  that there's a new video game JFK Reloaded
  http://www.jfkreloaded.com/start/
 
  I'm waiting for Grand Theft Auto IV, Drunk Over the Bridge With the

  Secretary variant.  Wonder what Teddie will say about that one.
 
  Oswald saved the world from nuclear conflict, thank the gods he
  offed the sex  drug crazed toothy one as soon as he (et al :-)
did.
 
  And a hell of a shot as well.   Gotta respect that, with a
 bolt-action,
  no less.

 A piece-of-shit boltie. I don't believe the official story, myself.

Hitting at a upper-body sized target at less than 90 yards,
using a scoped rifle, is about as difficult shooting fish in a
barrel. The slow steady movement of the car makes it
slightly more interesting, but hardly challenging to a
decent marksman.

True nuff.  I recently fired up M$ FS '98, and on my first attempt was
able to Atta the WTC in a 747-300, whereas a more nimble plane
was too responsive to my commands and stalled, spiralled, etc.

And I could cycle my 7.52x54R bolt-action in under a second on my
first try, but again, grace under pressure is cool.




Perle: Rumsfeld Opposed, Powell Wanted Occupation

2004-12-01 Thread R.A. Hettinga
Remember what I said about the original estimate of only 50,000 men to take
down Iraq, with the next stop being Damascus?

:-)

Cheers,
RAH
---

http://newsmax.com/scripts/printer_friendly.pl?page=http://newsmax.com/archives/ic/2004/11/30/80903.shtml

Reprinted from NewsMax.com
Tuesday, Nov. 30, 2004 8:03 a.m. EST

Perle: Rumsfeld Opposed, Powell Wanted Occupation

 Secretary Colin Powell, the State Department and the CIA - not Secretary
of Defense Donald Rumsfeld - are responsible for the chaos that has grown
out of the U.S. occupation of Iraq, says Richard Perle, the former chairman
of Pentagon's Defense Policy Review Board.

 Appearing on Fox News' O'Reilly Factor Monday night, Perle said the U.S.
made a most serious mistake after Iraq was liberated and the keys were
not handed over immediately to Iraqis to run their own country.

Thus, the U.S. military became an occupying force - and an increasingly
unpopular one.

 We didn't hand the keys over to the Iraqis. Instead we embarked on what
became an extended occupation. That was fundamentally mistaken - it was
politically driven, Perle said.

 Perle's remarks places significant distance between postwar policies and
neo-conservatives like himself who have backed the war and have been
championed in the Bush administration by Defense Secretary Rumsfeld, his
deputy Paul Wolfowitz, and Vice President Cheney.

Perle told O'Reilly the idea of a military occupation was not the
Pentagon's original plan.

 It was not Don Rumsfeld's decision, he said.

 Asked by O'Reilly if handing the keys over to the Iraqis after deposing
Saddam would have sparked a civil war between the Sunnis, Kurds and
Shiites, Perle said he didn't think so. He noted that there were already
groups of anti-Saddam Iraqis in place when the dictator fell.

 There was an umbrella group of opposition figures. It included Shia,
Sunnis, Kurds and in the end, of course, we did turn to the Iraqis. We
asked them to form a governing council, then an interim government, but we
made the big mistake of not trusting the Iraqis.

 I'm not saying that everything would have worked out, but everything
certainly didn't work out the way we did it. My own view is we should have
supported a government in exile even before going into Iraq.

 O'Reilly asked how much responsibility Rumsfeld bears for the current
situation in Iraq.

 I think the conduct of the war was brilliant, Perle observed. The
campaign will go down in history as one of the greatest military campaigns
ever. Saddam was removed and his regime fell within three weeks.

 The problems didn't start immediately after Saddam's removal. The
problems started when the occupation began to wear on the people, and that
was predictable.

 When O'Reilly cited Colin Powell as a dissenting voice who warned the
president that if you break it [Iraq], you'll own it, Perle said, the
irony is that it was Secretary Powell and some others who wanted the
extended occupation. They are the ones who did not want to turn things over
to the Iraqis, who feared and distrusted the Iraqis and blocked all efforts
to do precisely that.

 Perle then revealed that even before the war Rumsfeld's Department of
Defense had argued that we should train thousands of Iraqis to go in with
us so that we wouldn't be the aggressor, we wouldn't be the occupying
power, and those proposals were blocked largely by the State Department and
the CIA. Rumsfeld was never able to get approval for the political strategy
that might well have saved us from much of the subsequent trouble.

 Responding to O'Reilly's remark that the we are now seen as the bad
guys, Perle said that the situation in Iraq can be cleaned up.

 Remember, we were portrayed as the bad guys when the only policy for
dealing with Saddam were sanctions and the argument was that Iraqi babies
were dying as result of the sanctions. We're making real progress and the
political evolution is critical. There is a desperate effort now to cope
with the fact that after these elections the Iraqis will be fully invested
in their own future, and I think we've already begun to turn the corner.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Anti-RFID outfit deflates Mexican VeriChip hype

2004-12-01 Thread John Young
Lying about having an implant is kidnapping and mutilation
protection. Whether any justice official, with or without a
denied implant, will be believed by the slicers is no different
than the terrorism risk of anyone living within 100 miles of a
US defense base and/or industry, or Wall Street suckblood
HQ. No matter that the implantee likes to hide among the 
innocent, the families of the protective servicers are easy
ransom, easy lessons taught for no safe sanctuary.

Bring em on, oops, they are here already. Darn, it wasn't
the commies and nazis who were the threat, it was your
indolent life-style paid for by your swell-paid, smarter wife, 
up to women-empowered thieving the marketplace and 
making innumerable enemies for you to blame for your 
swelling brain fat-globules.

Pray the draft is women-empowered so there's no need
to shanghai the overaged, over-decrepit, over-funny-loving,
inbred-feeders, pray for the Condies and the Maggies to 
fight the gameboy-dreamy battles, really face-to-face,
not just stomp-hoof the youngsters into hell for a face-save
the empire.

And that's not all. James Donald, you're losing your vile
truth-twisting tongue, what with your conciliatory mein 
recently. Get your shaggy blue-balled mouth-organ off 
the commie-nazi symp gravy train.






Spooks, Root Beer, and My Keyboard...

2004-12-01 Thread R.A. Hettinga
..so, courtesy of BitTorrent and http://www.tvtorrents.net, I started to
download and watch Spooks something that looked like a British knock-off
of the really-better-off-dead The Agency from a few years back over here.

Fine. First episode I see (Year 3 episode 6, episode titles forgotten),
seemed okay, mostly, though she was *awfully* scrawny the old honey trap,
um trick. Second one (episode 7), though, starts off with an almost
plausible hacking-for-jihad storyline with only the odd bit of Star-Trek
science, admittedly I'm a sucker for hand-waving, but then, but then...

..but then they got to the crypto.

Hence the subject line of this message.

Sigh. I'll never learn.

Root beer, keyboards, and Spooks don't mix.

But we knew that already, right?

:-)

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Tin Foil Passports, Al foil diplomas

2004-12-01 Thread Major Variola (ret)
At 08:02 PM 11/29/04 +, Justin wrote:
On 2004-11-27T06:36:24-0800, Major Variola (ret) wrote:
 At 09:13 AM 11/27/04 +0100, Eugen Leitl wrote:
 Link: http://slashdot.org/article.pl?sid=04/11/27/0026222
 Posted by: michael, on 2004-11-27 05:05:00
low-cost solution: '[I]incorporate a layer of metal foil into the

cover of the passport so it could be read only when opened.'
Don't
they know that the whole tinfoil hat thing is supposed to be a
joke?

 What is most poignant about this post is the lack of education of /.
 authors.  Don't they teach Maxwell any more?  Is Faraday just the guy

 who said ...

Standardized education. We can't have anyone teaching to the 50th
percentile, even assuming the median teen-citizen can handle basic
calculus and EM.  Teachers must teach one or two sigmas below that
level, and anyone who gets hyperactive in such an inane educational
environment is malfunctioning and requires medication.

Today I heard a guy at work describe the Turkish empire to another.
Their plan
was to eliminate foreign schools for ca. 300 years so the conquered
would
be lame.  No Canticle For Liebowitz for the conquered.

I refrained from expressing the parallels I perceived, camoflage is best

some times.

Got IED?




Re: Fallujah: Marine Eye-Witness Report

2004-12-01 Thread Steve Thompson
 --- James A. Donald [EMAIL PROTECTED] wrote: 
 [permanent holy war]
 Steve Thompson
  True, but there's a question of the waste of resources and
  man-years that would come from such a circumstance.
 
 All the oil money has been wasted, most of the humans in the
 middle east have suffered poverty, ignorance, lack of freedom
 and the unproductive absence of useful labor.

Just like the good ol' USA, AFAIK.  It's just that the inequities at home
aren't limited to those that are a product of the petrochemical industry. 
All of which is not too different from what I see in the poorer parts of
the city I live in: Toronto.
 
 All my life, people have been proposing to solve this problem.
 Nearly every American president since 1950 announced some big
 and expensive initiative that would supposedly solve this
 problem, or make some substantial progress towards a solution.

Lately people were talking about PSE/COA topics which make moot much of
the bickering and squabbling that is a constant feature of capitalism.  We
don't hear much about PSE these days for some reason.  I suspect that the
path from here to there is still too far beyond the planning horizon of
too many people.  So, if PSE in a recognizeable form represents a rational
outcome of current economic progress, then I guess we must wait until it
looms nearer before selling it to the world.

 What is your solution?

PSE.  And the death of all superstitious nonsense.  Of course, there are
probably enough people around who like domination games that the
elimination of bogus memes such as those attached to theology may prove
difficult.

Do you have a better idea?
 
  And then there's the ethical[1] side of the coin: do the
  (largely financial benefits) that might come from a civil war
  in Iraq really justify the consequent standard-of-living for
  the residents of Iraq?
 
 And your remedy for improving the standard of living in the
 arab world is?

Give them more money.  Aridrop directv dishes, televisions, and old
computers.  Hell, I don't know.  Winning arab hearts and minds is a topic
that is entirely beyond my area of expertise.
 
 Steve Thompson
  Aren't we all about to run out of oil soon anyways?
 
 Forty years or so, according to estimates by the more sane and
 conventional authorities.

And then what?  What are we and they going to do the following year?  And
the year after that?  I'm sure your military think-tanks have walked
through the scenarios and have a good handle on the likely outcomes, but
they aren't really talking at this time.  (And of course, I wouldn't trust
public military think-tank product to correctly predict the sunrise.)
 
 James A. Donald:
the people who organize large scale terror can be
   identified, particularly by locals and coreligionists,
   which is why they have been dying in large numbers in
   Afghanistan.
 
 Steve Thompson
  Um, what planet are you on?
 
 The planet where the Afghans held an election, in which nearly
 everybody voted, some of them several times, and the Taliban
 were unable to carry out any of the threats they made against
 the voters, which indicates that the Afghans have been pretty
 efficient in killing Taliban.

Ok.  That may well be true.  And it is a step in the right direction. 
However I would guess that the long-term stable state of Afghanistan is
entirely up in the air.  Barring coups and such I guess we'll have to
revisit the Afghanistan question in a few decades.  At that time, and
after they've had a little practice with the democratic process, we'll
probably have a much better idea of how well their liberation from the
taliban went. 
 
  The people who, as you say, organize large scale terror tend
  to be protected by virtue of large bureaucratic firewalls,
  legislated secrecy, misdirection (smoke and mirrors), and
  even taboos.
 
 The average Afghan warlord is untroubled by any of this crap. 

I suspect that not many of them get to the civilised portions of the
Internet all that often.

 He sees someone who looks suspicious, says Hey, you don't look
 like you are from around here.  What are you doing?  If he
 does not like the answers, he brings out his skinning knife,
 and asks a few more questions.  If the answers make him even
 more unhappy, he hands his skinning knife to the womenfolk, and
 tells them to take their time.

You gotta admire the hands-on leadership style, at the very least.

  But perhaps you are not referring to Western terrorists, but
  are expecting your reader to assume that terrorists always
  wear turbans, and who generally will live and operate in the
  Middle-Eastern theatre. Perhaps you have forgotten about the
  people who planned and executed the operations that helped
  South-American tyrants form up and train their death- and
  terror-squads?
 
 The parties that sponsored death squads of Latin America, when
 victorious, held free and fair elections, which they won, and
 those they had been fighting lost.  The death squads were an
 response to 

RE: Oswald, Atta, Your Name Here

2004-12-01 Thread R.A. Hettinga
At 6:41 PM -0800 11/30/04, Major Variola (ret) wrote:
And I could cycle my 7.52x54R bolt-action in under a second on my
first try, but again, grace under pressure is cool.

..and here I bet you thought that Marine marksman rating, bordering on
sharpshooter, whatever, would *never* come in handy...

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Jewish wholy words..

2004-12-01 Thread Nomen Nescio
Is it true that the jews have these texts in their scriptures?


#1. Sanhedrin 59a:
Murdering Goyim (Gentiles) is like killing a wild animal.

#2. Aboda Sarah 37a:
A Gentile girl who is three years old can be violated.

#3. Yebamoth 11b:
Sexual intercourse with a little girl is permitted if she is three
years of age.

#4. Abodah Zara 26b:
Even the best of the Gentiles should be killed.

#5. Yebamoth 98a:
All gentile children are animals.

#6. Schulchan Aruch, Johre Deah, 122:
A Jew is forbidden to drink from a glass of wine which a Gentile has
touched, because the touch has made the wine unclean.

#7. Baba Necia 114, 6:
The Jews are human beings, but the nations of the world are not
human beings but beasts.






RE: Jewish wholy words..

2004-12-01 Thread Tyler Durden
No.
Technically speaking, only the Torah (the first 5 books of the Bible, 
written by Moses) are technically scripture...everything else is 
commentary.

-TD
From: Nomen Nescio [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Jewish wholy words..
Date: Wed,  1 Dec 2004 19:30:05 +0100 (CET)
Is it true that the jews have these texts in their scriptures?
#1. Sanhedrin 59a:
Murdering Goyim (Gentiles) is like killing a wild animal.
#2. Aboda Sarah 37a:
A Gentile girl who is three years old can be violated.
#3. Yebamoth 11b:
Sexual intercourse with a little girl is permitted if she is three
years of age.
#4. Abodah Zara 26b:
Even the best of the Gentiles should be killed.
#5. Yebamoth 98a:
All gentile children are animals.
#6. Schulchan Aruch, Johre Deah, 122:
A Jew is forbidden to drink from a glass of wine which a Gentile has
touched, because the touch has made the wine unclean.
#7. Baba Necia 114, 6:
The Jews are human beings, but the nations of the world are not
human beings but beasts.



Quantum key distribution

2004-12-01 Thread R.A. Hettinga
http://www.aip.org/tip/INPHFA/vol-10/iss-6/p22.html
  - The Industrial Physicist

?Quantum key distribution

Data carrying photons may be transmitted by laser and detected in such a
way that any interference will be noted

by Jennifer Ouellette

pdf version of this article

Computing's exponential increase in power requires setting the bar always
higher to secure electronicdata transmissions from would-be hackers. The
ideal solution would transmit data in quantum bits, but truly quantum
information processing may lie decades away. Therefore, several companies
have focused on bringing one aspect of quantum communications to market-
quantum key distribution (QKD), used to exchange secret keys that protect
data during transmission. Two companies, MagiQ Technologies (New York, NY)
and ID Quantique (Geneva, Switzerland), have released commercial QKD
systems, and several others plan to enter the marketplace within two years.
Figure 1. When blue light is pumped into a nonlinear crystal, entangled
photon pairs (imaged here as a red beam with the aid of a diode laser)
emerge at an angle of 3° to the blue beam, and the beams are sent into
single-mode fibers to be detected. Because the entangled photons know
each other, any interference will result in a mismatch when the two beams
are compared. (University of Vienna/Volker Steger)

 There is a continuous war between code makers and code breakers, says
Alexei Trifonov, chief scientist with MagiQ. Cryptologists devise more
difficult coding schemes, only to have them broken. Quantum cryptography
has the potential to end that cycle. This is important to national security
and modern electronic business transactions, which transmit credit card
numbers and other sensitive information in encrypted form. The Department
of Defense (DoD) currently funds several quantum-cryptography projects as
part of a $20.6 million initiative in quantum information. Globally, public
and private sources will fund about $50 million in quantum-cryptography
work over the next several years. Andrew Hammond, a vice president of
MagiQ, estimates that the market for QKD systems will reach $200 million
within a few years, and one day could hit $1 billion annually.

Key types

QKD was proposed roughly 20 years ago, but its premise rests on the
formulation of Heisenberg's uncertainty principle in 1927. The very act of
observing or measuring a particle-such as a photon in a data stream-changes
its behavior (Figure 1). Any moving photon can have one of four
orientations: vertical, horizontal, or diagonal in either direction. A
standard laser can be modified to emit single photons, each with a
particular orientation. Would-be hackers (eavesdroppers in cryptography
parlance) can record the orientations with photon detectors, but doing so
changes the orientation of some photons-and, thus, alerts the sender and
receiver of a compromised transmission.

An encryption key-the code needed to encrypt or decipher a message-consists
of a string of random bits.  Such a key is useless unless it is completely
random, known only to the communicating parties, and changed regularly. In
the one-time-pad approach, the key length must equal the message length,
and it should be used only once. In theory, this makes the encrypted
message secure, but problems arise in practice. In the real world, keys
must be exchanged by a CD-ROM or some other physical means, which makes
keys susceptible to interception. Reusing a key gives code breakers the
opportunity to find patterns in the encrypted data that might reveal the
key. Historically, the Soviet Union's accidental duplication of
one-time-pad pages allowed U.S. cryptanalysts to unmask the spy Klaus Fuchs
in 1949.

Rather than one-time-pad keys, many data-transmission security systems
today use public-key cryptography, which relies on very long prime numbers
to transmit keys. A typical public-key encryption scheme uses two keys. The
first is a public key, available to anyone with access to the global
registry of public keys, and the message is encrypted with it. The second
is private, accessible only to the receiver. Both keys are needed to
unscramble a message. The system's primary weakness is that a powerful
computer could use the public key to learn the private key (see The
Industrial Physicist, August 2000, pp. 29-33).

Quantum key distribution

A key distributed using quantum cryptography would be almost impossible to
steal because QKD systems continually and randomly generate new private
keys that both parties share automatically. A compromised key in a QKD
system can only decrypt a small amount of encoded information because the
private key may be changed every second or even continuously. To build up a
secret key from a stream of single photons, each photon is encoded with a
bit value of 0 or 1, typically by a photon in some superposition state,
such as polarization. These photons are emitted by a conventional laser as
pulses of light so dim that most pulses do not emit a 

Swedish military feared linked to Estonia ferry disaster

2004-12-01 Thread Nomen Nescio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

For those interested in intelligence, munitions smuggling by
authorities and so on - a few words concerning military smuggling of
munitions on the Estonia, feared to have played a part in the sinking
and killings of 852 people on Sept 28, 1994, when the ferry M/S
Estonia sinked during a journey from Estonia to Sweden. It has been
rumoured for a long time that there were some kind of smuggling of
sensitive material taking place on Estonia and that Russian
authorities did not like this, needless to say. The very stressed and
hasty investigation performed by the involved nations also raised
suspicions amongst a lot of people. On top of all this the Swedish
social democratic government did all they could to hinder future
investigations of the wreckage by trying to cover it with stones and
concrete.

First some other related info.

The reader should know that the Swedish social democratic party is
notorious for acting in undemocratic and deceitful manners against
the Swedish people. Two of the most infamous affairs being the IB
affair and the Catalina affair.

In the IB affair it was shown that the social democratic party had
founded a secret and unlawful military intelligence bureau as the
party's own private spy organization to spy on other politcal
adversaries, a Swedish version of Watergate if you will, but it went
far beyond that. Hundreds of thousands of people were targeted during
a number of years. Even Olof Palme himself knew about break-ins that
the intelligence officers performed in other countries embassies in
Stockholm, one of them was Egypt's embassy. One major characteristic
is that the Swedish way of doing things means sweeping things under
the carpet and not letting the public know the truths, this is shown
in every affair known in resent years, including the Estonia
disaster. In all of these affairs it's the social democrats that has
been the most responsible party and the party almost in constant
power in Sweden historically speaking.

The magazine breaking the news in 1973 today has a web site about the
affair, http://www.fib.se/IB/

In the Catalina affair it was very recently shown actually, after the
planes was discovered east of the island Gotland in the Baltic Sea,
that they were both indeed gunned down, as had been suspected for
decades. On June 13 1952 the DC3 plane Hugin disappeared and the only
thing found was a trashed rescue raft. Three days later the rescure
plane of type Catalina was also gunned down and forced to emergency
landing. It's today also known however that the Swedish (social
democratic) governments have all been maliciously and intentionally
lying all along about the Hugin's purpose to both the Swedish people
as well as the families.

Hugin was in fact gathering intelligence very close (some say on the
wrong side even) of the Russian border and was relaying all this
signal intelligence directly to the Americans. USA was amongst other
things interested in Russias capacity to fight the B-47. This was
well known for the Russians and this was the direct cause of the
attacks in 1952. It is believed that the Swedish FRA, standing for
Försvarets RadioAnstalt, translating to The Defence's Radio
Institution, which is Swedens NSA, signed secret treaties with the
US some three years prior to the assult on these planes. The FRA had
5 employees on the Hugin when it was gunned down. It wasn't until
1991 that the families knew what happened, that was when the Russians
admitted a Mig-15 gunned them down.

When the recon plane was found in June 2004 it was situated far east
of the earlier officially declared crash site which further fules the
speculation that Hugin was indeed flying where it shouldn't have
been, conducting its sigint operations and that the Swedish
governments knew this all along. The Hugin was found June 10, 2003.


I'm not sure how much of these affairs is known outside Sweden, but
it's interesting read that's for sure and I just may get back to
these things and others like them later on.


Back to other things now.

This was published today in Sweden, along with a tv show of one hour:

INRIKES Publicerad 30 november
 
   Krigsmateriel fraktades på Estonia   
 
 
   Estonia hade veckorna före förlisning- 
   en vid två tillfällen krigsmateriel
   från Baltikum i lasten. Enligt kväll-  
   ens Uppdrag granskning i SVT rörde 
   det sig om rysk elektronik som svenska 
   försvaret tog in för att studera.  
 
   Lars Borgnäs som gjort programmet  
   säger att avslöjandet belyser hur  
   svenska myndigheter hanterat kata- 
   strofen. -Man har t.ex. inte undersökt 
   bildäck, säger han till SVT Text.  
 
   Den pensionerade tullintendenten   
   Lennart Henriksson uppger att han fått 
   order om att släppa igenom bilarna på  
   begäran av försvarsmakten. 
Läs mer på svt.se/nyheter  



Which translates into something like this:

DOMESTIC Published 

RE: Quantum key distribution

2004-12-01 Thread Tyler Durden
Andrew Hammond, a vice president of
MagiQ, estimates that the market for QKD systems will reach $200 million
within a few years, and one day could hit $1 billion annually.
What an idiot. OK, it's basically a marketing guy's job to make up all kinds 
of BS, but any reasonably comptetant marketing guy knows to make up BS that 
someone will actually BELIEVE.

-TD

From: R.A. Hettinga [EMAIL PROTECTED]
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Quantum key distribution
Date: Wed, 1 Dec 2004 12:29:31 -0500
http://www.aip.org/tip/INPHFA/vol-10/iss-6/p22.html
  - The Industrial Physicist
?Quantum key distribution
Data carrying photons may be transmitted by laser and detected in such a
way that any interference will be noted
by Jennifer Ouellette
pdf version of this article
Computing's exponential increase in power requires setting the bar always
higher to secure electronicdata transmissions from would-be hackers. The
ideal solution would transmit data in quantum bits, but truly quantum
information processing may lie decades away. Therefore, several companies
have focused on bringing one aspect of quantum communications to market-
quantum key distribution (QKD), used to exchange secret keys that protect
data during transmission. Two companies, MagiQ Technologies (New York, NY)
and ID Quantique (Geneva, Switzerland), have released commercial QKD
systems, and several others plan to enter the marketplace within two years.
Figure 1. When blue light is pumped into a nonlinear crystal, entangled
photon pairs (imaged here as a red beam with the aid of a diode laser)
emerge at an angle of 30 to the blue beam, and the beams are sent into
single-mode fibers to be detected. Because the entangled photons know
each other, any interference will result in a mismatch when the two beams
are compared. (University of Vienna/Volker Steger)
 There is a continuous war between code makers and code breakers, says
Alexei Trifonov, chief scientist with MagiQ. Cryptologists devise more
difficult coding schemes, only to have them broken. Quantum cryptography
has the potential to end that cycle. This is important to national security
and modern electronic business transactions, which transmit credit card
numbers and other sensitive information in encrypted form. The Department
of Defense (DoD) currently funds several quantum-cryptography projects as
part of a $20.6 million initiative in quantum information. Globally, public
and private sources will fund about $50 million in quantum-cryptography
work over the next several years. Andrew Hammond, a vice president of
MagiQ, estimates that the market for QKD systems will reach $200 million
within a few years, and one day could hit $1 billion annually.
Key types
QKD was proposed roughly 20 years ago, but its premise rests on the
formulation of Heisenberg's uncertainty principle in 1927. The very act of
observing or measuring a particle-such as a photon in a data stream-changes
its behavior (Figure 1). Any moving photon can have one of four
orientations: vertical, horizontal, or diagonal in either direction. A
standard laser can be modified to emit single photons, each with a
particular orientation. Would-be hackers (eavesdroppers in cryptography
parlance) can record the orientations with photon detectors, but doing so
changes the orientation of some photons-and, thus, alerts the sender and
receiver of a compromised transmission.
An encryption key-the code needed to encrypt or decipher a message-consists
of a string of random bits.  Such a key is useless unless it is completely
random, known only to the communicating parties, and changed regularly. In
the one-time-pad approach, the key length must equal the message length,
and it should be used only once. In theory, this makes the encrypted
message secure, but problems arise in practice. In the real world, keys
must be exchanged by a CD-ROM or some other physical means, which makes
keys susceptible to interception. Reusing a key gives code breakers the
opportunity to find patterns in the encrypted data that might reveal the
key. Historically, the Soviet Union's accidental duplication of
one-time-pad pages allowed U.S. cryptanalysts to unmask the spy Klaus Fuchs
in 1949.
Rather than one-time-pad keys, many data-transmission security systems
today use public-key cryptography, which relies on very long prime numbers
to transmit keys. A typical public-key encryption scheme uses two keys. The
first is a public key, available to anyone with access to the global
registry of public keys, and the message is encrypted with it. The second
is private, accessible only to the receiver. Both keys are needed to
unscramble a message. The system's primary weakness is that a powerful
computer could use the public key to learn the private key (see The
Industrial Physicist, August 2000, pp. 29-33).
Quantum key distribution
A key distributed using quantum cryptography would be almost impossible to
steal because QKD systems continually and randomly generate new 

Re: Anti-RFID outfit deflates Mexican VeriChip hype

2004-12-01 Thread Anonymous via the Cypherpunks Tonga Remailer
 Bring em on, oops, they are here already. Darn, it wasn't
 the commies and nazis who were the threat, it was your
 indolent life-style paid for by your swell-paid, smarter wife, 
 up to women-empowered thieving the marketplace and 
 making innumerable enemies for you to blame for your 
 swelling brain fat-globules.
 
 Pray the draft is women-empowered so there's no need
 to shanghai the overaged, over-decrepit, over-funny-loving,
 inbred-feeders, pray for the Condies and the Maggies to 
 fight the gameboy-dreamy battles, really face-to-face,
 not just stomp-hoof the youngsters into hell for a face-save
 the empire.

Won't someone please slip a healthy dose of haloperidol into
JYA's food?