Papers Show Confusion as Government Watch List Grew Quickly
http://www.nytimes.com/2004/10/09/politics/09nofly.html?oref=loginpagewanted=printposition= The New York Times October 9, 2004 Papers Show Confusion as Government Watch List Grew Quickly By ERIC LICHTBLAU ASHINGTON, Oct. 8 - The government's list of banned airline passengers has grown from just 16 names on Sept. 11, 2001, to thousands of people today amid signs of internal confusion and dissension over how the list is implemented, newly disclosed government documents and interviews showed Friday. A transportation security official acknowledged in one internal memorandum that the standards used to ban passengers because of terrorism concerns were necessarily subjective, with no hard and fast rules. More than 300 pages of internal documents, turned over by the Justice Department on Friday as part of a lawsuit brought by the American Civil Liberties Union, provide a rare glimpse inside the workings of the government's so-called no-fly list. Federal officials have maintained tight secrecy over the list, saying little publicly about how it is developed, how many people are on it or how it is put into practice, even as prominent people like Senator Edward M. Kennedy have been mistakenly blocked from boarding planes. The American Civil Liberties Union sued the federal government last year under the Freedom of Information Act on behalf of two San Francisco women who said they suspected their vocal antiwar protests led to their being banned from flying. The Justice Department fought the release of information on the no-fly list on national security grounds, leading a federal judge in San Francisco to admonish government lawyers for making frivolous claims to justify the unusual secrecy. He ordered the government to comply with the Freedom of Information Act, prompting the Justice Department to turn over the internal documents to the A.C.L.U. on Friday. Federal officials said they could not discuss the documents Friday because of the pending lawsuit. In general, said Brian Roehrkasse, spokesman for the Department of Homeland Security, we have taken numerous steps to refine the no-fly system, including better definition of the criteria for the watch list and putting in place an effective redress system that allows passengers who are mistakenly put on the list to be removed. But Thomas R. Burke, a lawyer representing the A.C.L.U., said the documents raised some very serious concerns about the criteria the government is using in developing the no-fly list and the internal miscommunication in implementing it. In an internal e-mail message in May 2002, for instance, an F.B.I. supervisor, whose name was deleted, complained that the Transportation Security Administration had made the F.B.I. responsible for pursuing possible matches from the list but had failed to inform the bureau about changes in no-fly security directives. Despite my best efforts, the T.S.A. just motors along, and I and the agents are being whipped around the flagpole trying to do the right thing, the official wrote. In another internal message in October 2002, an F.B.I. official in St. Louis cited difficulties in getting suspects put on the no-fly list and in coordinating different watch lists. The various watch lists are not comprehensive and not centralized, said the official, whose name was also deleted. Some people appear on one list but not the others. Some of the lists are old and not current. We are really confused. Federal officials have been developing a master terrorist watch list to consolidate the no-fly list and nine others kept by different agencies. But a report last week by Clark K. Ervin, the Department of Homeland Security's inspector general, found serious coordination problems in that effort. The documents released Friday show that the government's no-fly list as of Sept. 11, 2001, had only 16 names on it - fewer than the number of terrorists who hijacked the four airliners that day. Several investigations have criticized the government's failure to put two of the hijackers on watch lists even after their terrorist ties became known. The no-fly list grew drastically after the attacks, and one document in Friday's material said the number of banned passengers ballooned to nearly 600 within about two months. Another 365 names were put on a secondary list that allows them to board a plane after getting closer scrutiny. The two lists had grown to about 1,000 names by December 2002, one document showed. The documents do not give a current total, but a law enforcement official, speaking on condition of anonymity, said Friday the names on the no-fly and secondary flight lists total about 10,000, with the no-fly list accounting for a few thousand. Another government official corroborated that account. Copyrigh -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect
Financial identity is *dangerous*? (was re: Fake companies, real money)
at Beacon Bank in Minnesota, where one of the checking accounts used to receive the stolen funds had been set up, confirmed that he had discussed the situation with Duhl, but would not provide further comment. Corporate ID theft Whoever impersonated T-Data were clever enough to throw a few monkey wrenches in the path of anyone trying to detect them. When applying for the compulsory credit check needed to obtain the fake merchant account, for example, the thieves didn't use T-Data's tax ID number. Instead, they used the name and credit profile of a man unconnected with the company. Steven Wiencek, who lives on Long Island near the company, didn't even know his credit had been checked until contacted by MSNBC.com for this story. But the application, which listed Wiencek as company president, gives his Social Security number and driver's license number, suggesting the people behind this scheme have access to a wide swath of stolen credit cards and stolen identities. Another attempt at misdirection was foiled by an alert mail carrier. The application for the merchant account used a slight variation of Duhl's address -- apparently an attempt to ensure that mail to Duhl would be lost. But a knowledgeable local postal worker recognized the company name anyway, leading Duhl to discover the dupe. Without that, I may not have found out about this for a long time, he said. The thieves were also persistent. Using one stolen credit card, they attempted to steal $2,500 through five separate faked merchant accounts, according to an affidavit of credit card fraud supplied by Duhl. Another corporate ID victim, John Bartholomew of Abcom Services, said he was lucky, because Duhl contacted him just as the scam began. We are a management company in long-term health care. We would have no reason to use credit cards, he said. The firm had been in business for 21 years, and never accepted a single charge -- until the criminals stole his company's name, Bartholomew said. True to form, the criminals hijacked his brand name and set up merchants accounts using his company's name and a similar -- but slightly altered -- street address. The good news is, Bartholomew was able to warn the merchant account providers soon enough that only about $4,000 in charges were run through his company's name. The bad news is, some of the providers are still trying to make him pay the bill for the charges. He figures he's spent about $5,000 in legal fees trying to clean up the mess. Who are they working with? Rob Douglas, a consultant who operates PrivacyToday.com, blames the merchant account providers for never checking to see if the name on the account application actually represented a real person who worked at the firm. You have to ask what the companies that set up the merchant accounts are doing? he said. Who has the responsibility to do due diligence that they are in fact working with who they think they are working with when they open an account? But several of the merchant service providers pointed out the difficulty of stopping all fraudulent applications in a world where identities are so easily stolen. For all of us, it's a tough business, Steinberg, of Merchant E Services, said. It's a large, large problem. Duhl himself blames the banks where the money was to eventually wind up -- wondering how the thieves were able to set up accounts in the post-Patriot Act era. Apparently worried as much about security implications as his personal loss, Duhl contacted the FBI, the Secret Service and the U.S. Postal Inspector's Office. None of the agents he spoke to returned phone calls placed by MSNBC.com. He says he is frustrated that none of the agencies seem to have taken any interest in the incident -- particularly because at least one phone call was placed to Pakistan using the cell phone purchased in his company's name, and one of the bank accounts used to funnel money was established by suspects who presented Russian passports as identification, he says his own research revealed. No one in the government seems like they are going to get interested in establishing a case, Duhl said. Douglas, who consults with firms trying to deal with the new trend of corporate identity theft, says there's little small companies like Duhl's can do to prevent this kind of incident. But one piece of practical advice he offers larger firms: search the Web once a week for evidence of impersonation. As strange as it sounds, companies need to have one or more people assigned to surf the Web and see if there are mirror sites out there, just like we tell parents to surf for their child's name, he said. Bob Sullivan is the author of Your Evil Twin: Behind the Identity Theft Epidemic -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end
Passengers refuse to fly with two women in black on board
http://english.pravda.ru/printed.html?news_id=14300 - PRAVDA.Ru Passengers refuse to fly with two women in black on board - 09/23/2004 13:51 Incidents when Russian passengers refuse to fly due to suspicious-looking females of Middle Eastern descent are becoming a norm these days. On September 1, the day of the Beslan tragedy, passengers of a Moscow-bound flight from Sharm el Sheih (Egypt) refused to fly with two Muslim women in traditional clothes onboard. This time, another flight from Moscow to Khurgada has been delayed. ?Two Egyptian women were set to fly aboard a TU-154 airplane ofKrasAir? departing for Khurgada,? stated RIANovosti?s? spokesman. A group of five students from Dagestan were the last ones to board the aircraft. Among them were two Egyptian women dressed in black. ?Considering the recent events, security services searched them thoroughly. Their documents were fine; nothing was wrong with the luggage either. However, due to such time-consuming security check, they were the last ones to board the plane. This in turn caused major uproar among the passengers. People demanded them to be taken off the flight,? added he. ?A young man accompanied by a woman and two children was the last one to step aboard due to a long security check. They were on their way to Egypt, where they?ve been living for five years. As soon as the rest of the passengers saw them aboard, people simply refused to fly perhaps, they were fearful of a possible terrorist act,? noted the airline company?s spokesman. In the course of the following two hours, airport and airline spokespeople were trying to persuade the passengers to fly along with the Egyptians. People however remained steadfast. All the passengers were then escorted back to the airport where each one of them had to undergo additional security check. The two Egyptian women have been examined publicly. There were 120 people aboard the Tu-154 airplane. As a result of this little incident, the flight Moscow-Khurgada had eventually departed for Egypt with a four-and-a-half-hour delay. Similar incident took place in Egypt on 1 September, 2004. Passengers along with crew members of a Moscow-bound airplane (KrasAir) from Sharm el Sheih refused to continue the flight after Egyptian personnel had allowed 2 Middle Eastern women to board the plane. According to the crew, both of the females behaved rather suspiciously: they locked themselves up in the lavatory right after boarding. In the end, due to the crew?s and the passenger?s protest, they were asked to leave the plane. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: How small towns are reversing a century of corporate personhood
At 7:04 PM -0400 10/1/04, R. A. Hettinga wrote: the idea of abolishing the personhood of corporations Of course, the act of abolition, using the law itself, is an exercise in mental masturbation, which is what is really happening in Pennsylvania. Financial cryptography gives us at least the hope of property -- or control of property -- without legislation, if not prior legal agreement. David Friedman's private law without public law. Corporations, as creatures of this state wouldn't have to exist in such a world, where limited liability could be done the old fashioned way: with anonymity. :-) Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
How small towns are reversing a century of corporate personhood
a weekend at Landmark College in Putney, attending one of CELDF's democracy schools. Among them was Larry Bloch, a small-business owner from Brat-tleboro who is with Vermonters Restoring Democracy. It's an umbrella organization of groups that deal with issues ranging from genetically modified organisms to nuclear power to social and economic justice. Though its members come from a variety of political backgrounds, what unites them, Bloch explains, is a desire to combat corporate dominance over local decision-making. When a predatory corporation comes in and says, 'We're moving in no matter what and we don't care if we push out your independently owned local businesses,' that doesn't affect only progressives or only conservatives, Bloch says. To hear the stories from Pennsylvania was inspiring because these were people who had never been activists and weren't blessed with a lot of free time or money or the inclination to shake things up. Representative Sarah Edwards (P-Brattleboro) agrees. Edwards, who also attended the democracy school, says the seminar helped reframe the debate in her mind, especially on the issue of nuclear power. It's helping me to know who my adversary is, Edwards says. I'm not talking about individuals. I'm talking about the corporations. I have friends who work at [Vermont] Yankee. I know management who work at Yankee, she adds. This is not about them. This is about the system, the machine of the corporation squeezing out the diversity of voices that is necessary to have a good and healthy democracy. Democracy schools already have been held in six states. By next year, there will be five permanent Daniel Pennock Democracy Schools - named for one of the two boys who died after coming into contact with the toxic sludge. In the past, these schools have largely addressed environmental issues. But that's charging, Linzey notes. Activists in Roxbury, Massa-chusetts, for example, hope the Pennsylvania model can be used to challenge the pharmaceutical industry on its policies pertaining to AIDS drugs. Others see the approach as a way to counter international agreements like NAFTA. John Berkowitz is executive director of Southern Vermonters for a Fair Economy and Environmental Protection. He points to a law passed in Massachusetts 10 years ago that prohibited municipalities from signing contracts with companies that do business with Burma - a country with an abysmal human rights record. After Japan and the European Union filed a complaint about the law with the WTO, in 1997 the U.S. Supreme Court struck down the Massachusetts laws as unconstitutional. Wait a minute. Who's deciding what's best for a community? Berkowitz asks. Is it absentee corporations and people working for trade organizations like the WTO? We're finding that people's local decision-making abilities are being trumped by trade agreements that basically say, 'You can't decide that at the local level.' But as Linzey reminds people who attend CELDF's democracy schools, local communities can reclaim the power of self-rule. Like hurricanes that feed off warmer waters, the anti-corporate movement draws strength through legal provocation. Says Linzey, This is about shifting the paradigm to let people understand that the courts do step in to defend community rights over corporate rights. © Seven Days Newspaper, 2004 www.sevendaysvt.com web queries? d -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Spotting the Airline Terror Threat
Wherein the TSA thinks they can observe a lot by watching... Cheers, RAH --- http://www.time.com/time/nation/printout/0,8816,708924,00.html Saturday, Oct. 02, 2004 Spotting the Airline Terror Threat TIME exclusive: A new airport security system soon to be tested will rely on human judgment By SALLY B. DONNELLY/WASHINGTON TIME exclusive: A new airport security system soon to be tested will rely on human judgment The most dangerous threat to commercial aviation is not so much the things bad people may be carrying, but the bad people themselves. That refrain heard constantly from airline security experts over the past three years appears to have finally been heeded by the Transportation Security Administration (TSA). Aviation sources tell TIME that the TSA plans to address the problem by launching its own passenger profiling system. The system known as SPOT (Screening of Passengers by Observation Techniques) relies more on the human dimension in detecting threats, and is to be tested at two northeastern airports starting later this month. This is a radical change to aviation security, says Sgt. Peter DiDomenica, the Massachusetts State Police officer who developed the racially-neutral profiling program in place at Boston's Logan Airport, on which SPOT is based. This is a very subtle but very effective program. Unlike the TSA's recently announced program to use computer databases to scan for suspicious individuals whose names occur on passenger lists, SPOT is instead based squarely on the human element: the ability of TSA employees to identify suspicious individuals by using the principles of surveillance and detection. Passengers who flag concerns by exhibiting unusual or anxious behavior will be pointed out to local police, who will then conduct face-to-face interviews to determine whether any threat exists. If such inquiries turn up other issues of concern, such as travel to countries like Afghanistan, Iraq or Sudan, for example, police officers will know to pursue the questioning or alert Federal counter-terrorism agents. DiDomenica has first-hand experience of the effectiveness of the system. He was using his own observation techniques - called BASS (Behavior Assessment Screening System) - last year when he saw man acting oddly near the checkpoint and stopped him. The suspect passenger turned out to be an agent from the Department of Homeland Security who had been trying to test the system by sneaking a prohibited device onto a plane. Although the profiling programs are aimed primarily at stopping terrorists, they have had other benefits. The Massachusetts State Police have arrested about 20 people for infractions ranging from being in the country illegally to failing to answer outstanding warrants for various offenses. The TSA plans to test SPOT for 60 days before committing to taking it nationwide, eventually to all of the country's 429 commercial airports. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Foreign Travelers Face Fingerprints and Jet Lag
. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
A Proposed Nomenclature for the Four Horseman of The Infocalypse
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I've been talking about this for the last decade, and never found a reference on the web whenever I was thinking about it. Thanks to Google, it was well within my prodigiously diminished attention span this morning. Given the events on the net over the past few years, I figure we might as well have fun with the idea. Humor is good leverage, and these days we need *lots* of leverage. In arbitrary order (in other words, *I* chose it. :-)), and with apologies to Toru Iwatani, by way of Michael Thomasson at http://www.gooddealgames.com/articles/Pac-Man%20Ghosts.html, here it is: A Proposed Nomenclature for the Four Horseman of The Infocalypse Horseman Color Character Nickname 1 TerrorismRedShadow Blinky 2 NarcoticsPink Speedy Pinky 3 Money Laundering Aqua Bashful Inky 4 Paedophilia Yellow Pokey Clyde It is acceptable to refer to a horseman by any of the above, i.e., Horseman No. 1, The Red Horseman, Shadow, or Blinky. Apparently there was a, um, pre-deceased, dark-blue ghost, used in Japanese tournament play, named Kinky, I leave that particular horseman for quibblers. Cheers, RAH -BEGIN PGP SIGNATURE- Version: PGP 8.0.3 iQA/AwUBQWBN/MPxH8jf3ohaEQKfBwCfYAtDGjP6jjsUHfhWcddqDYTEWfEAoOTU I056iw3tAhHohzkh1ptzJ8Es =/tt7 -END PGP SIGNATURE- -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Call for Papers: ShmooCon. 2005. No moose. We swear.
http://www.shmoocon.org/cfp.html Washington, D.C. Call for Papers [PDF] http://www.shmoocon.org The Shmoo Group is soliciting papers and presentations for the first annual ShmooCon. ShmooCon 2005 will be a highly-technical and entertaining East coast hacker convention focused on technology exploitation, inventive software and hardware solutions, as well as open discussion on a variety of technology and security topics. ShmooCon 2005 will be held on February 4-6, 2005 at the Wardman Park Marriott in Washington, D.C., just minutes from your choice of 3-letter agencies. ShmooCon 2005 will have three tracks, each dedicated to the following: Break It! - Technology Exploitation Build It! - Inventive Software and Hardware Solutions BoF It! - Open Discussion of Technology and Security Topics Topics for the Break It! track may include, but are not limited to, EXPLOITATION of: - Consumer electronic devices - Application, host, and network security - Telephony - Physical security Topics for the Build It! track may include, but are not limited to, inventive software and hardware SOLUTIONS in: - Robotics - Distributed computing - Community wireless networking - Mobile personal computing Topics for the BoF It! track may include, but are not limited to, open DISCUSSION of the following: - Privacy and anonymity - Exploit and vulnerability disclosure / databases - DRM (Digital Rights Management), fair use, copyright infringement - Open source software world domination strategies Presentation Format All presentations and discussions will be 55 minutes in length. Presentations in the Break It! and Build It! tracks must include demonstrations of personally developed techniques, working code, and/or devices, with code and/or schematics being open-source and released to the public for free. Initiating an open discussion for BoF It! requires subject matter expertise, active involvement with the topic at hand, and a brief presentation of the topic/problem scope. Shmooballs will be issued to the audience, to facilitate a frank and open discussion of opinions. Speakers are encouraged to present innovative ideas that not everyone agrees with. Submission Procedure To submit, email [EMAIL PROTECTED] with the following information: 1. Speaker name(s) and/or handle(s) 2. Presentation Title 3. Track preference 4. Two to three paragraph presentation description and/or outline 5. List facilities required. Projector for use with VGA input, flipchart, sound projection, Internet connectivity will be provided. 6. Speaker bio 7. Contact info for speaker (email AND mobile number, please) Accepted speakers will receive free admission to the conference, as well as a $100 honorarium after evaluation of their completed presentation. 6 runner-ups will receive free admission as hot-alternates. They should come to ShmooCon 2005 prepared to speak, and, if it becomes necessary for them to speak as an alternate, they too will receive a $100 honorarium after evaluation of their completed presentation. NOTE: select presentation submissions which are not accepted will be awarded a 50% discounted admission to ShmooCon 2005. Presentations must be designed to include source code, schematics, or other substantial details that demonstrate the topic being discussed. Presentation proposals will be reviewed by members of the Shmoo Group. A list of the reviewers will be posted on the ShmooCon 2005 web site when the Call For Papers is formally issued. If you feel you have a presentation that would be appropriate but that does not meet these guidelines, feel free to submit it anyway but be sure to include a cover letter explaining your reasoning so we can evaluate your proposal. All questions regarding this call for papers should be addressed to [EMAIL PROTECTED] Schedule Check the web site for final dates July 30, 2004 CFP opens Early Fall 2004 papers for preferential first round consideration due Middle Fall 2004 final due date for all papers Late Fall 2004 speakers notified Submissions are due by late fall 2004. Preference will be given to submissions received by early fall 2004. Selected speakers will be notified by Halloween, 2004. We look forward to receiving your submissions as well as seeing you at ShmooCon 2005! ShmooCON 2005 CFP 1.0 RC6 news about registration cfp program schedule location sponsors links contact us . privacy policy ©2004, The Shmoo Group -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
CFP: Privacy Enhancing Technologies (PET 2005)
University, USA Matthew Wright, University of Texas at Arlington, USA Papers should be at most 15 pages excluding the bibliography and well-marked appendices (using an 11-point font), and at most 20 pages total. Submission of shorter papers (from around 4 pages) is strongly encouraged whenever appropriate. Papers must conform to the Springer LNCS style. Follow the Information for Authors link at http://www.springer.de/comp/lncs/authors.html. Reviewers of submitted papers are not required to read the appendices and the paper should be intelligible without them. The paper should start with the title, names of authors and an abstract. The introduction should give some background and summarize the contributions of the paper at a level appropriate for a non-specialist reader. A preliminary version of the proceedings will be made available to workshop participants. Final versions are not due until after the workshop, giving the authors the opportunity to revise their papers based on discussions during the meeting. Submit your papers in Postscript or PDF format. To submit a paper, compose a plain text email to [EMAIL PROTECTED] containing the title and abstract of the paper, the authors' names, email and postal addresses, phone and fax numbers, and identification of the contact author (to whom we will address all subsequent correspondence). Attach your submission to this email and send it. By submitting a paper, you agree that if it is accepted, you will sign a paper distribution agreement allowing for publication, and also that an author of the paper will register for the workshop and present the paper there. Our current working agreement with Springer is that authors will retain copyright on their own works while assigning an exclusive 3-year distribution license to Springer. Authors may still post their papers on their own Web sites. See http://petworkshop.org/2004/paper-dist-agreement-5-04.html for the 2004 version of this agreement. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Paper submissions must be received by February 7. We acknowledge all submissions manually by email. If you do not receive an acknowledgment within a few days (or one day, if you are submitting right at the deadline), then contact the program committee chairs directly to resolve the problem. Notification of acceptance or rejection will be sent to authors no later than April 4 and authors will have the opportunity to revise for the preproceedings version by May 6. We also invite proposals of up to 2 pages for panel discussions or other relevant presentations. In your proposal, (1) describe the nature of the presentation and why it is appropriate to the workshop, (2) suggest a duration for the presentation (ideally between 45 and 90 minutes), (3) give brief descriptions of the presenters, and (4) indicate which presenters have confirmed their availability for the presentation if it is scheduled. Otherwise, submit your proposal by email as described above, including the designation of a contact author. The program committee will consider presentation proposals along with other workshop events, and will respond by the paper decision date with an indication of its interest in scheduling the event. The proceedings will contain 1-page abstracts of the presentations that take place at the workshop. Each contact author for an accepted panel proposal must prepare and submit this abstract in the Springer LNCS style by the Camera-ready copy for preproceedings deadline date. ___ NymIP-rg-interest mailing list [EMAIL PROTECTED] http://www.nymip.org/mailman/listinfo/nymip-rg-interest --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Patriot Act Misinformation
http://online.wsj.com/article_print/0,,SB109659214177033379,00.html The Wall Street Journal October 1, 2004 REVIEW OUTLOOK Patriot Act Misinformation October 1, 2004; Page A14 The American Civil Liberties Union has been spinning its victory in a federal court in New York this week as a blow against the USA Patriot Act. One typical headline: Federal Judge Calls Patriot Act Secret Searches Unconstitutional. An ACLU press release hails the decision as a landmark victory against the Ashcroft Justice Department. Well, no. If reporters had bothered to read Judge Victor Marrero's decision, they would have learned that the law he actually struck down was a provision of the Electronic Communications Privacy Act of 1986. Section 2709 authorizes the FBI to issue National Security Letters to obtain information from wire communications companies about their subscribers. NSLs are issued secretly and the recipient is prohibited from notifying anyone about the request. As Judge Marrero noted in his ruling, Section 2790 has been available to the FBI since 1986. He concludes that there must have been hundreds of NSLs issued since that time. The Patriot Act did amend Section 2790, but that amendment has nothing to do with the part that Judge Marrero says is unconstitutional. One more thing: The Electronics Communications Act was not the invention of John Ashcroft. It was sponsored by that famous and menacing right-winger, Vermont Senator Patrick Leahy, who said at the time that Section 2790 provides a clear procedure for access to telephone toll records in counterintelligence investigations. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
'Frustrated' U.S. Cybersecurity Chief Abruptly Resigns
http://www.local6.com/print/3776699/detail.html?use=print local6.com 'Frustrated' U.S. Cybersecurity Chief Abruptly Resigns POSTED: 11:32 AM EDT October 1, 2004 WASHINGTON -- The government's cybersecurity chief has abruptly resigned after one year with the Department of Homeland Security, confiding to industry colleagues his frustration over what he considers a lack of attention paid to computer security issues within the agency. Amit Yoran, a former software executive from Symantec Corp., informed the White House about his plans to quit as director of the National Cyber Security Division and made his resignation effective at the end of Thursday, effectively giving a single's day notice of his intentions to leave. Yoran said Friday he felt the timing was right to pursue other opportunities. It was unclear immediately who might succeed him even temporarily. Yoran's deputy is Donald Andy Purdy, a former senior adviser to the White House on cybersecurity issues. Yoran has privately described frustrations in recent months to colleagues in the technology industry, according to lobbyists who recounted these conversations on condition they not be identified because the talks were personal. As cybersecurity chief, Yoran and his division - with an $80 million budget and 60 employees - were responsible for carrying out dozens of recommendations in the Bush administration's National Strategy to Secure Cyberspace, a set of proposals to better protect computer networks. Yoran's position as a director -- at least three steps beneath Homeland Security Secretary Tom Ridge -- has irritated the technology industry and even some lawmakers. They have pressed unsuccessfully in recent months to elevate Yoran's role to that of an assistant secretary, which could mean broader authority and more money for cybersecurity issues. Amit's decision to step down is unfortunate and certainly will set back efforts until more leadership is demonstrated by the Department of Homeland Security to solve this problem, said Paul Kurtz, a former cybersecurity official on the White House National Security Council and now head of the Washington-based Cyber Security Industry Alliance, a trade group. Under Yoran, Homeland Security established an ambitious new cyber alert system, which sends urgent e-mails to subscribers about major virus outbreaks and other Internet attacks as they occur, along with detailed instructions to help computer users protect themselves. It also mapped the government's universe of connected electronic devices, the first step toward scanning them systematically for weaknesses that could be exploited by hackers or foreign governments. And it began routinely identifying U.S. computers and networks that were victims of break-ins. Yoran effectively replaced a position once held by Richard Clarke, a special adviser to President Bush, and Howard Schmidt, who succeeded Clarke but left government during the formation of the Department of Homeland Security to work as chief security officer at eBay Inc. Yoran cofounded Riptech Inc. of Alexandria, Va., in March 1998, which monitored government and corporate computers around the world with an elaborate sensor network to protect against attacks. He sold the firm in July 2002 to Symantec for $145 million and stayed on as vice president for managed security services. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: How to fuck with airports - a 1 step guide for (Redmond) terrorists.
At 8:28 AM +0200 9/29/04, Eugen Leitl wrote: The mind boggles. Even more interesting: how many heads have rolled due to this? None, of course. Microsoft is the new IBM. As in, Nobody ever got fired for buying Microsoft... Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Federal judge rejects part of Patriot Act
http://msnbc.msn.com/id/6131670/print/1/displaymode/1098/ MSNBC.com Federal judge rejects part of Patriot Act Provision giving FBI access to business records overturned Reuters Updated: 12:11 p.m. ET Sept. 29, 2004 NEW YORK - A federal judge Wednesday found unconstitutional a part of the United States' anti-terror Patriot Act that allows authorities to demand customer records from businesses without court approval. U.S. District Judge Victor Marreo ruled in favor of the American Civil Liberties Union, which challenged the power the FBI has to demand confidential financial records from companies as part of terrorism investigations. The ruling was the latest blow to the Bush administration's anti-terrorism policies. In June, the U.S. Supreme Court ruled that terror suspects being held in places like Guantanamo Bay can use the American judicial system to challenge their confinement. That ruling was a defeat for the president's assertion of sweeping powers to hold enemy combatants indefinitely after the Sept. 11, 2001, attacks. The ACLU sued the Department of Justice, arguing that part of the Patriot legislation violated the Constitution because it authorizes the FBI to force disclosure of sensitive information without adequate safeguards. The judge agreed, stating that the provision effectively bars or substantially deters any judicial challenge. Under the provision, the FBI did not have to show a judge a compelling need for the records and it did not have to specify any process that would allow a recipient to fight the demand for confidential information. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Their Crisis, Our Leviathan
and Mirrors Market, by John Maudlin, p. 105, (John Wiley Sons, New York, 2004). http://by1fd.bay1.hotmail.msn.com/cgi-bin/dasp/EN/rte___90801.asp#_ftnref15[15] What makes us rich, writes Murray Rothbard, is an abundance of goods, and what limits that abundance is a scarcity of resources: . . . Multiplying coin will not whisk these resources into being. We may feel twice as rich for the moment, but clearly all we are doing is diluting the money supply. P. 33. See Rothbards http://www.mises.org/money.aspWhat Has Government Done to Our Money? http://by1fd.bay1.hotmail.msn.com/cgi-bin/dasp/EN/rte___90801.asp#_ftnref16[16] Here, wrote William Graham Sumner about a century ago, we have the Forgotten Man again, and once again we find him worthy of all respect and consideration, but passed by in favor of the noisy, pushing and incompetent. From Social Darwinsim. Selected Essays of William Graham Sumner, p. 127, (Prentice-Hall, Englewood Cliffs, New Jersey, 1963). http://by1fd.bay1.hotmail.msn.com/cgi-bin/dasp/EN/rte___90801.asp#_ftnref17[17] The Republican Party, in 1952, turned away from isolationism when it turned its back on Senator Robert Taft. He was the Reluctant Dragon, unable to wage permanent war against the Soviet menace. The party, instead, turned to the internationalist Dwight Eisenhower. See Prophets on the Right. Profiles of Conservative Critics of American Globalism, by Ronald Radosh, p. 192, (Simon and Shuster, New York, 1975). http://by1fd.bay1.hotmail.msn.com/cgi-bin/dasp/EN/rte___90801.asp#_ftnref18[18]See The Politics of War. The Story of Two Wars which Altered Forever the Political Life of the American Republic (18901920) by Walter Karp, Harper Row, New York, 1979). http://by1fd.bay1.hotmail.msn.com/cgi-bin/dasp/EN/rte___90801.asp#_ftnref19[19] Ibid. http://by1fd.bay1.hotmail.msn.com/cgi-bin/dasp/EN/rte___90801.asp#_ftnref20[20] Germany has double the unemployment rate of the United States. See the Wall Street Journal op-ed page of August 2, 2004,. Auf Wiedersehen to the Leisure Economy, p. A11. http://by1fd.bay1.hotmail.msn.com/cgi-bin/dasp/EN/rte___90801.asp#_ftnref21[21] See my http://www.mises.org/fullstory.aspx?control=344The Social Security Deal of 1972 at mises.org or simply by doing on an on line search using my name. http://by1fd.bay1.hotmail.msn.com/cgi-bin/dasp/EN/rte___90801.asp#_ftnref22[22]See Alexis de Tocquevilles Democracy in America. Here De Tocqueville, over a century and a half ago, warned of the potential for an administrative despotism that would be unlike any other tyranny ever experienced in history. It would resemble parental authority, if, fatherlike, it tried to prepare its charges for a mans life, but on the contrary, it only tries to keep them in perpetual childhood. P. 692, Vol II, (Perrenial Classics, New York, 2000). In response to many requests, it is now possible to set your credit-card contribution to the Mises Institute to be recurring. You can easily set this up on-line with a donation starting at $10 per month. See the https://www.mises.org/donate.aspMembership Page. This is one way to ensure that your support for the Mises Institute is ongoing. http://www.mises.org/fullstory.aspx?Id=1621[Print Friendly Page] http://www.mises.org/blog/ http://www.mises.org/elist.aspMises Email List Services https://www.mises.org/donate.aspJoin the Mises Institute http://www.mises.org/storeMises.org Store http://www.mises.org/Home | http://www.mises.org/about.aspAbout | http://www.mises.org/elist.aspEmail List | http://www.google.com/u/MisesSearch | http://www.mises.org/contact.aspContact Us | http://www.mises.org/journals.aspPeriodicals | http://www.mises.org/articles.aspArticles | http://www.mises.org/fun.aspGames Fun http://www.mises.org/StudyGuideDisplay.asp?SubjID=117EBooks | http://www.mises.org/scholar.aspResources | http://www.mises.org/catalog.aspCatalog | https://www.mises.org/donate.aspContributions | http://www.mises.org/calendar.aspFreedom Calendar You are subscribed as: [EMAIL PROTECTED] Manage http://mises.biglist.com/list/article/?p=prefspre=le=13958347pw=1tyvx5togcyour account. Unsubscribe http://mises.biglist.com/list/article/?p=unsubpre=le=13958347pw=1tyvx5togchere or send email to mailto:[EMAIL PROTECTED]this address. --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: Geopolitical Darwin Awards
At 8:11 PM -0700 9/20/04, Major Variola (ret) wrote: At 04:57 PM 9/19/04 -0700, James A. Donald wrote: But the Saudi Arabian elite, of among which Bin Laden was born with a silver spoon in his mouth, are not getting screwed over. 1. you don't get religion 2. UBL's mom was a low-caste yemeni, dig? Actually, UBL's *dad* was a low-caste Yemeni, too. And your point is? Like all cultural components, religion is about the allocation of scarce resources. War is the penultimate form of this kind of allocation. In fact, the actual content of religion is immaterial, except where it affects the ability of a culture to raise the resources to fight a *war*, which, as Hanson puts it so nicely in Carnage and Culture, is everything. Because of its inability to raise the resources to fight a modern war -- capital (by several orders of magnitude, go look at a map with GDP superimposed), and, most important the freedom to create new *science* to produce that capital with, virtually out of thin air -- Islam is a dead religion. It just doesn't know it yet. UBL, and the entire Islamic culture, will eventually go the way of Hannibal and Carthage. Carthage sacrificed children to their gods too. Go for it, I say... Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
AOL to Sell Secure ID Tags to Fight Hackers
http://www.reuters.com/newsArticle.jhtml?type=internetNewsstoryID=6284760 Reuters AOL to Sell Secure ID Tags to Fight Hackers Mon Sep 20, 2004 06:18 PM ET NEW YORK (Reuters) - America Online will begin offering to sell members a security device and service that has been used to safeguard business computer networks, the world's largest Internet service provider said on Monday. AOL, a unit of Time Warner Inc. (TWX.N: Quote, Profile, Research) , signed a deal with Internet security company RSA Security Inc. (RSAS.O: Quote, Profile, Research) , to launch its new AOL PassCode, designed to add an additional layer of protection to member accounts. PassCode users will be provided with a small handheld six-digit numeric code key. To log onto an AOL account equipped with the service, users will have to type in the six-digits, which refresh on the device every 60 seconds, on top of using the regular password. The code-key device will cost $9.95. Monthly service costs range from $1.95 to $4.95. AOL PassCode is like adding a deadbolt to your AOL account by automatically creating a new secondary password every 60 seconds, said Ned Brody, senior vice president of AOL Premium Services. Hackers coined the term phishing in 1996 to refer to the act of swindling unsuspecting AOL customers into giving up their passwords through phony e-mails or instant messages. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: Geopolitical Darwin Awards
At 8:12 PM -0700 9/20/04, Major Variola (ret) wrote: The yank minutemen were not above taking children as soldiers, any more than Dan'l Boone was above taking a 14 year old as a wife. That's more a definition of adult, than anything else. If they're old enough to blee-... Oh, forget it... Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The internment taboo
of internment, past and present. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: :-) (was re: How one can become a terrorist?)
At 9:30 PM -0500 9/19/04, J.A. Terranson wrote: This is a well known joe-job. Well, *sure*. Too bad they didn't put blacknet's address on it, or something... Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Academics locked out by tight visa controls
http://www.mercurynews.com/mld/mercurynews/9710963.htm?template=contentModules/printstory.jsp Posted on Mon, Sep. 20, 2004 Academics locked out by tight visa controls U.S. SECURITY BLOCKS FREE EXCHANGE OF IDEAS By Bruce Schneier Cryptography is the science of secret codes, and it is a primary Internet security tool to fight hackers, cyber crime, and cyber terrorism. CRYPTO is the world's premier cryptography conference. It's held every August in Santa Barbara. This year, 400 people from 30 countries came to listen to dozens of talks. Lu Yi was not one of them. Her paper was accepted at the conference. But because she is a Chinese Ph.D. student in Switzerland, she was not able to get a visa in time to attend the conference. In the three years since 9/11, the U.S. government has instituted a series of security measures at our borders, all designed to keep terrorists out. One of those measures was to tighten up the rules for foreign visas. Certainly this has hurt the tourism industry in the U.S., but the damage done to academic research is more profound and longer-lasting. According to a survey by the Association of American Universities, many universities reported a drop of more than 10 percent in foreign student applications from last year. During the 2003 academic year, student visas were down 9 percent. Foreign applications to graduate schools were down 32 percent, according to another study by the Council of Graduate Schools. There is an increasing trend for academic conferences, meetings and seminars to move outside of the United States simply to avoid visa hassles. This affects all of high-tech, but ironically it particularly affects the very technologies that are critical in our fight against terrorism. Also in August, on the other side of the country, the University of Connecticut held the second International Conference on Advanced Technologies for Homeland Security. The attendees came from a variety of disciplines -- chemical trace detection, communications compatibility, X-ray scanning, sensors of various types, data mining, HAZMAT clothing, network intrusion detection, bomb diffusion, remote-controlled drones -- and illustrate the enormous breadth of scientific know-how that can usefully be applied to counterterrorism. It's wrong to believe that the U.S. can conduct the research we need alone. At the Connecticut conference, the researchers presenting results included many foreigners studying at U.S. universities. Only 30 percent of the papers at CRYPTO had only U.S. authors. The most important discovery of the conference, a weakness in a mathematical function that protects the integrity of much of the critical information on the Internet, was made by four researchers from China. Every time a foreign scientist can't attend a U.S. technology conference, our security suffers. Every time we turn away a qualified technology graduate student, our security suffers. Technology is one of our most potent weapons in the war on terrorism, and we're not fostering the international cooperation and development that is crucial for U.S. security. Security is always a trade-off, and specific security countermeasures affect everyone, both the bad guys and the good guys. The new U.S. immigration rules may affect the few terrorists trying to enter the United States on visas, but they also affect honest people trying to do the same. All scientific disciplines are international, and free and open information exchange -- both in conferences and in academic programs at universities -- will result in the maximum advance in the technologies vital to homeland security. The Soviet Union tried to restrict academic freedom along national lines, and it didn't do the country any good. We should try not to follow in those footsteps. BRUCE SCHNEIER is a security technologist and chief technology officer of Counterpane Internet Security, Inc., in Mountain View. He wrote this for the Mercury News. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
O'Rourke: Why Americans hate foreign policy
of South Carolina's JFK look-alike contest, John Edwards, and the winner of Florida's Bob Gramm look-alike contest, Bob Gramm, said that America had won the war in Iraq but was losing the peace because Iraq was so unstable. When Iraq was stable, it attacked Israel in 1967 and 1973. It attacked Iran. It attacked Kuwait. It gassed the Kurds. It butchered the Shiites. It fostered terrorism in the Middle East. Who wanted a stable Iraq? And perennial representative of the House of Representatives Dick Gephardt wouldn't talk much about foreign policy. He was concentrating on economic issues, claiming that he'd make the American Dream come true for everyone. Gephardt may have been on to something there. Once people get rich, they don't go in much for war-making. The shoes are ugly and the uniforms itch. Some day, Osama bin Laden will call a member of one of his sleeper cells - a person who was planted in the United States years before and told to live like a normal American, and... Dad, some guy named Ozzy's on the phone. Oh, uh, good to hear from you. Of course, of course... Rockefeller Center?... Next Wednesday?... I'd love to, but the kid's got her ballet recital. You miss something like that, they never forget it... Thursday's no good. I have to see my mom off on her cruise to Bermuda in the morning. It's Fatima's yoga day. And I've got courtside seats for the Nets... Friday, we're going to the Hamptons for the weekend... But how, exactly, did Gephardt plan to make everyone on earth as materialistic, self-indulgent, and over-scheduled as Americans? Would Gephardt give foreigners options on hot dot-com stocks? That might have worked during the Clinton years. As of early 2004, America didn't seem to have the answers for postwar Iraq. Then again, what were the questions? Was there a bad man? And his bad kids? Were they running a bad country? That did bad things? Did they have a lot of oil money to do bad things with? Were they going to do more bad things? If those were the questions, was the answer UN-supervised national reconciliation or rapid return to self-rule? No. The answer was blow the place to bits. A mess was left behind. But it's a mess without a military to fight aggressive wars; a mess without the facilities to develop dangerous weapons; a mess that cannot systematically kill, torture, and oppress millions of its citizens. It's a mess with a message - don't mess with us. As frightening as terrorism is, it's the weapon of losers. When someone detonates a suicide bomb, that person does not have career prospects. And no matter how horrific the terrorist attack, it's conducted by losers. Winners don't need to hijack airplanes. Winners have an air force. This is an edited extract from Peace Kills: America's Fun New Imperialism by P J O'Rourke (Atlantic), to be published on September 23. To order for £14.99 + £2.25 pp, please call Telegraph Books Direct on 0870 155 7222 -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
:-) (was re: How one can become a terrorist?)
--- begin forwarded text Return-Path: [EMAIL PROTECTED] Received: from bullae.ibuc.com ([unix socket]) by bullae.ibuc.com (Cyrus v2.1.13) with LMTP; Sun, 19 Sep 2004 21:29:53 -0400 X-Sieve: CMU Sieve 2.2 Received: from cpe-066-061-026-172.midsouth.rr.com (cpe-066-061-026-172.midsouth.rr.com [66.61.26.172]) by bullae.ibuc.com (Postfix) with SMTP id C8526827C8D for [EMAIL PROTECTED]; Sun, 19 Sep 2004 21:29:52 -0400 (EDT) Message-ID: [EMAIL PROTECTED] Date: Mon, 20 Sep 2004 01:33:55 + From: [EMAIL PROTECTED] Subject: How one can become a terrorist? To: [EMAIL PROTECTED] MIME-Version: 1.0 Content-Type: text/plain Welcome to our web site www.shadowcrew.com/phpBB2/index.php Please use http://63.240.81.5 in case of our domain outage. You're invited to shop for large selection of bombs and different kinds of rockets such as surface-to-air, surface-to-surface and weaponry available at reduced price. With the following types of rockets you will be able to commit terrorist attacks, destroy buildings, electric power stations, bridges, factories and anything else that comes your mind. Most items are in stock and available for next day freight delivery in the USA. Worldwide delivery is available at additional cost. Prices are negotiable. Please feel free to inquire by ICQ # 176928755 or contacting us directly: +1-305-592- +1-919-319-8249 +1-314-770-3395 Today special: *** AIR BOMBS *** OFAB-500U HE fragmentation air bomb Fuel-air explosive air bombs -Not in stock BETAB-500U concrete-piercing air bomb ZB-500RT incendiary tank 500-KG SIZE RBK-500U unified cluster bomb RBK-500U OAB-2.5PT loaded with fragmentation submunitions RBK-500U BETAB-M loaded with concrete-piercing submunitions-Not in stock RBK-500U OFAB-50UD loaded with HE fragmentation submunitions *** UNGUIDED AIRCRAFT ROCKETS *** Main-purpose unguided aircraft rockets S-8 unguided aircraft rockets S-8KOM S-8BM-Not in stock S-13 unguided aircraft rockets S-13, S-13T, S-13-OF, S-13D, S-13DF S-25-0 S-25-OFM S-24B -Not in stock RS-82 RS-132-Not in stock *** ROCKET PODS *** B-8M pod for S-8 rockets B-8V20-A pod for S-8 rockets B-13L pod for S-13 rockets Recently received *NEW* Hydra 70 2.75 inch Rockets Air-Launched 2.75-Inch Rockets FIM-92A Stinger Weapons System Stinger 101: Anti-Air Our clients are well known Al-Qaida, Hizballah, Al-Jihad, HAMAS, Abu Sayyaf Group and many other terrorist groups. We are well known supplier in the market and looking forward to expand our clientage with assistance of Internet. Do not hesitate to contact us via ICQ # 176928755 Impatiently awaiting for your orders, ShadowCrew --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: Nanometer Bamboo Carbon TEMPEST Protection
At 9:40 AM -0700 9/14/04, Bill Stewart wrote: Hey, you cultural imperialist! Western domination of the Tinfoil Hat market has got to stop! Traditional Chinese materials can be equally effective and aesthetically superior. Who you callin' imperialist! You Veridian!!! ;-) Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Symantec labels China censor-busting software as Trojan
http://www.theregister.co.uk/2004/09/14/symantec_targets_freegate/print.html The Register Biting the hand that feeds IT The Register » Internet and Law » Digital Rights/Digital Wrongs » Original URL: http://www.theregister.co.uk/2004/09/14/symantec_targets_freegate/ Symantec labels China censor-busting software as Trojan By John Leyden (john.leyden at theregister.co.uk) Published Tuesday 14th September 2004 18:10 GMT Symantec has labelled a program that enables Chinese surfers to view blocked websites as a Trojan Horse. Upshot? Users of Norton Anti-Virus cannot access Freegate, a popular program which circumvents government blocks, the FT reports. Freegate has 200,000 users, Dynamic Internet Technology (DIT (http://www.dit-inc.us)), its developer, estimates. It lets users view sites banned by the Chinese government by taking advantage of a range of proxy servers assigned to changeable internet addresses. But a recent update to Symantec's AV definition files means the latest version of Freegate is treated as malware and removed from systems protected by Norton. Short of disabling Norton AV, users would have little say in this. A Symantec staffer in China told the FT that Norton Anti-Virus identified Freegate as a Trojan horse, but declined to provide a rationale for such a definition. The absence of an explanation from Symantec raises concerns. We hope that the mislabelling of Freegate is a simple mistake, soon rectified, rather than yet another example of an IT firm helping Beijing implement restrictions. History provides as least one example (http://www.vmyths.com/rant.cfm?id=316page=4) of the AV industry extending favours to China that it would normally withhold. AV firms normally keep virus samples under lock and key. But suppliers agreed to hand over virus samples to the Chinese government a few years ago as a condition of trading in the country. These samples could be easily found on the net but the incident illustrates a precedent of China being treated as a special exception. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
[irtheory] An Interview with Jacques Derrida
[salut] of salvation. Not alien to the salavation [salut] of the other, nor alien to the farewell or to justice, but still rebellious towards the economy of redemption. I thought this very beautiful. Almost a prayer to insert - into the everyday, into our project. What is it, this messianism without religion? JD: The weak force indeed refers to the interpretation of Benjamin, but it is not exactly mine. It is what I call messianicity without messianism: I would say that today, one of the incarnations, one of the implementations of this messianicity, of this messianism without religion, may be found in the alter-globalisation movements. Movements that are still heterogeneous, still somewhat unformed, full of contradictions, but that gather together the weak of the earth, all those who feel themselves crushed by the economic hegemonies, by the liberal market, by sovereignism, etc. I believe it is these weak who will prove to be strongest in the end and who represent the future. Even though I am not a militant involved in these movements, I place my bet on the weak force of those alter-globalisation movements, who will have to explain themselves, to unravel their contradictions, but who march against all the hegemonic organisations of the world. Not just the United States, also the International Monetary Fund, the G8, all those organised hegemonies of the rich countries, the strong and powerful countries, of which Europe is part. It is these alter-globalisation movements that offer one of the best figures of what I would call messianicity without messianism, that is to say a messianicity that does not belong to any determined religion. The conflict with Iraq involved numerous religious elements, from all sides-from the Christian side as well as from the Muslim side. What I call messianicity without messianism is a call, a promise of an independent future for what is to come, and which comes like every messiah in the shape of peace and justice, a promise independent of religion, that is to say universal. A promise independent of the three religions when they oppose each other, since in fact it is a war between three Abrahamic religions. A promise beyond the Abrahamic religions, universal, without relation to revelations or to the history of religions. My intent here is not anti-religious, it is not a matter of waging war on the religious messianisms properly speaking, that is to say Judaic, Christian, Islamic. But it is a matter of marking a place where these messianisms are exceeded by messianicity, that is to say by that waiting without waiting, without horizon for the event to come, the democracy to come with all its contradictions. And I believe we must seek today, very cautiously, to give force and form to this messianicity, without giving in to the old concepts of politics (sovereignism, territorialised nation-state), without giving in to the Churches or to the religious powers, theologico-political or theocratic of all orders, whether they be the theocracies of the Islamic Middle East, or whether they be, disguised, the theocracies of the West. (In spite of everything, Europe, France especially, but also the United States are secular in principle in their Constiutions. I recently heard a journalist say to an American: how do you explain that Bush always says 'God bless America', that the President swears on the Bible, etc. and the American replied: don't lecture us on secularity for we put the separation of Church and State into our Constitution long before you did, that the State was not under the control of any religion whatsoever, which does not stop Christian domination from exerting itself, but there too it is imperative to be very cautious). Messianicity without messianism, that is: independence in respect of religion in general. A faith without religion in some sort. Transcribed by Maïwenn Furic (Ris Orangis, Thursday February 19 2004) Translated by Ortwin de Graef 1 Derrida alludes to his reflection on Kant and his idea of a 'Völkerbund' (alliance of peoples) in Voyous [Rogues], pp. 118-25. Yahoo! Groups Sponsor ~-- Make a clean sweep of pop-up ads. Yahoo! Companion Toolbar. Now with Pop-Up Blocker. Get it for free! http://us.click.yahoo.com/L5YrjA/eSIIAA/yQLSAA/_tgrlB/TM ~- Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/irtheory/ * To unsubscribe from this group, send an email to: [EMAIL PROTECTED] * Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable
[ISN] Mitnick movie comes to the US
I wonder if they include Shinomura boffing Gilmore's girlfriend in the Toad Hall hot tub? Got Skills indeed... Cheers, RAH --- begin forwarded text Date: Thu, 9 Sep 2004 05:41:59 -0500 (CDT) From: InfoSec News [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: [ISN] Mitnick movie comes to the US Reply-To: [EMAIL PROTECTED] List-Id: InfoSec News isn.attrition.org List-Archive: http://www.attrition.org/pipermail/isn List-Post: mailto:[EMAIL PROTECTED] List-Help: mailto:[EMAIL PROTECTED] List-Subscribe: http://www.attrition.org/mailman/listinfo/isn, mailto:[EMAIL PROTECTED] Sender: [EMAIL PROTECTED] http://www.theregister.co.uk/2004/09/09/mitnick_movie_us/ [ http://www.amazon.com/exec/obidos/ASIN/B0002L57YQ/c4iorg - WK] By Kevin Poulsen, SecurityFocus 9th September 2004 Nearly six years after it was filmed, Hollywood's trouble-plagued movie version of the hunt for hacker Kevin Mitnick is headed for video stores in the US Originally titled Takedown, then Cybertraque, the film is set for a September 28th U.S. release on DVD with the new title, Track Down. The movie is from Miramax's horror and sci-fi label Dimension Films, and is based on the book Takedown: The Pursuit and Capture of America's Most Wanted Computer Outlaw - By The Man Who Did It, authored by computer scientist Tsutomu Shimomura and New York Times reporter John Markoff. Shimomura electronically tracked Mitnick to his Raleigh, North Carolina hideout in February, 1995, and sold the book and movie rights for an undisclosed sum amidst the storm of publicity following the fugitive hacker's arrest. Early versions of the screenplay for the movie adaptation of Takedown cast Mitnick - played by Scream star Skeet Ulrich - as violent and potentially homicidal. In July, 1998, supporters of the then-imprisoned cyberpunk rallied against the film outside Miramax's New York City offices. Writers later revised the script, and shooting wrapped on the project in December, 1998. The film then languished without a US release date amid rumors of poor test screenings and a re-shot ending. Perhaps hoping to recoup some of their losses, Miramax finally released the movie to French theatres in March, 2000, as Cybertraque. It was generally panned by critics: a reviewer for the newspaper Le Monde noted the film's problems in translating a virtual manhunt to the action-adventure genre. Can the repeated image of faces sweating over keyboards renew the principles of the Hollywood thriller?, the paper asked. It's easy to say that the filmmaker hardly reaches that point, regardless of his saturation of the soundtrack with rock music to defeat the boredom of the viewer. Cybertraque was later released in Europe on DVD with French subtitles, and enjoyed some underground circulation on peer-to-peer networks, often misidentified as the sequel to the 1995 film Hackers. The real-life Mitnick cracked computers at cellphone companies, universities and ISPs. He pleaded guilty in March, 1999, to seven felonies, and was released from prison on 21 January, 2000, after nearly five years in custody. Now a security consultant and author, the ex-hacker says he's not happy to see the movie come to America. I didn't expect the film would ever be released to the US, so this is kind of shock to me, he says. I'm kind of disappointed because the film depicts me doing things that are not real. The fictionalized plot of Track Down centers around Shimomura's efforts to capture Mitnick before the hacker can access a terrifying computer program capable of causing blackouts, disabling hospital equipment and scrambling air traffic control systems. Hollywood's Mitnick character is portrayed somewhat sympathetically, but is prone to random outbursts of rage, and suffers a creepy penchant for electronic eavesdropping and a lurking hatred of women. You wouldn't believe the amount of emails I get from all around the world saying, 'I saw this movie about you, it's great, you're my hero, it was a fantastic movie,' says Mitnick. I'm thinking, these guys are a little bit off... It's not an interesting film. I think it was done pretty poorly. _ Donate online for the Ron Santo Walk to Cure Diabetes - http://www.c4i.org/ethan.html --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: Spam Spotlight on Reputation
At 1:33 PM +0100 9/13/04, Ben Laurie wrote: Surely you should check that: a) The signature works b) Is someone in your list of good keys before whitelisting? Amen. A (cryptographic) whitelist for my friends, all others pay cash. :-) Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: Call for 'hackers' to try to access voting machines draws stern warning
At 7:56 AM -0700 9/11/04, Major Variola (ret) wrote: The No paper trail, no trust coalition In St. Thomas, of course, it's No paper trail, no trus' mon. ;-) Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Perplexing proof
http://www.vnunet.com/print/1157970 Perplexing proof E-commerce is only one mathematical breakthrough away from disaster Robert Valpuesta, IT Week 09 Sep 2004 The fact that even experts often do not fully understand how IT systems work was underlined by recent reports that the Riemann hypothesis, established in 1859, may finally have been proved. It seems the hypothesis would explain the apparently random pattern of prime numbers that form the basis for much internet cryptography, used for e-commerce and online banking to guard accounts and credit card details. Louis de Branges, a renowned mathematician at Purdue University in the US, has claimed he can prove the hypothesis. But the maths is so complicated that no one has yet been able to say whether his solution is right. [The suggested proof] is rather incomprehensible, professor Marcus du Sautoy of Oxford University told The Guardian, adding that if correct it could lead to the creation of a prime spectrometer that would bring the whole of e-commerce to its knees overnight. Unfortunately, most managers have no way of telling whether the proof is right or its implications are indeed as stated. This could be an embarrassment if they are asked to assess risks for corporate governance reports, since they clearly now have a duty to own up and admit that business could be threatened by a theoretical prime spectrometer. Alternatively they might accept that security is a matter of faith, declare that nothing can truly be known, and add that the way of Zen shows that security is probably an illusion anyway. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Flying with Libertarian Hawks
for networks over hierarchies, as the former tend to do a better job of sustaining complexity among agents in a society. But further investigation along these lines may reveal something like a feed-forward network that is formed when inputs of a certain type allow a system is changed, in a sense, by example. Of course, this is somewhat of a metaphor in the context of Iraq. And, of course, nation-building isn't an exact science. But I would have always preferred to hedge my bets that given enough of the appropriate initial conditions, Iraqis would find that -- in the absence of a dangerous dictator -- they would begin to form of the mutually beneficial relationships with one another that bring about prosperity and peace. I doubt they could've done this alone. I think the Coalition was right to help them towards a tipping point. And if we fail, the failure will have been a practical one, not a moral one. My guess is that there are others who would like to see less of this accretion of libertarians around the Dove. I am one of those who doesn't fancy the idea of staring down the point of a chemical warhead before I decide to act. (Even if such warheads turn out to be a chimera today, they won't likely be tomorrow.) In the nuclear age, when the degree of certainty that you will be attacked is at fifty percent, you are as good as done for in terms of your ability to protect yourself. Thus, preventive action in a world of uncertainty is, unfortunately, the only reasonable course. In the meantime, it behooves us to try to make our enemies more like us and then allow globalization to proceed apace. For the more like us they are, the more likely they are to enter into the tenuous human covenants that are our only means of having peace. The author is a TCS contributor. He is Program Director, Institute for Humane Studies. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: Perplexing proof
--- begin forwarded text Date: Fri, 10 Sep 2004 11:40:08 -0400 From: Victor Duchovni [EMAIL PROTECTED] To: R. A. Hettinga [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: Re: Perplexing proof Mail-Followup-To: R. A. Hettinga [EMAIL PROTECTED], [EMAIL PROTECTED] User-Agent: Mutt/1.4.1i On Fri, Sep 10, 2004 at 08:23:06AM -0400, R. A. Hettinga wrote: [The suggested proof] is rather incomprehensible, professor Marcus du Sautoy of Oxford University told The Guardian, adding that if correct it could lead to the creation of a prime spectrometer that would bring the whole of e-commerce to its knees overnight. http://www.maths.ox.ac.uk/~dusautoy/flash/1hard/listpub.htm So at least now we have a named source, even one who works on generalized zeta functions. The out of the blue prime spectrometer claim is still rather puzzling... Does anyone know why Du Sautoy is making this claim (if it is indeed reported correctly). -- /\ ASCII RIBBON NOTICE: If received in error, \ / CAMPAIGN Victor Duchovni please destroy and notify X AGAINST IT Security, sender. Sender does not waive / \ HTML MAILMorgan Stanley confidentiality or privilege, and use is prohibited. --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
potential new IETF WG on anonymous IPSec
--- begin forwarded text Delivered-To: [EMAIL PROTECTED] From: Paul Syverson [EMAIL PROTECTED] To: [EMAIL PROTECTED] Cc: Paul Syverson [EMAIL PROTECTED] Subject: potential new IETF WG on anonymous IPSec User-Agent: Mutt/1.4.1i Sender: [EMAIL PROTECTED] List-Id: Primary NymIP discussion list nymip-res-group.nymip.org List-Post: mailto:[EMAIL PROTECTED] List-Help: mailto:[EMAIL PROTECTED] List-Subscribe: http://www.nymip.org/mailman/listinfo/nymip-res-group, mailto:[EMAIL PROTECTED] List-Archive: http://www.nymip.org/pipermail/nymip-res-group/ Date: Wed, 8 Sep 2004 15:24:53 -0400 - Forwarded message from Catherine Meadows [EMAIL PROTECTED] - From: Catherine Meadows [EMAIL PROTECTED] Date: Tue, 7 Sep 2004 11:29:56 -0400 Paul: The IETF has been discussing setting up a working group for anonymous IPSec. They will have a BOF at the next IETF in DC in November. They're also setting up a mailing list you might be interested in if you haven't heard about it already. Information is below. At 10:08 PM -0700 9/6/04, Joe Touch wrote: Hi, all, To follow-up on related presentations at both SAAG and TCPM, we've created a mailing list for discussions of anonymous security. Further information on the list and how to join it, as well as pointers to related resources can be found at: http://www.postel.org/anonsec The mailing list address is: [EMAIL PROTECTED] Joe Cathy - End forwarded message - ___ NymIP-res-group mailing list [EMAIL PROTECTED] http://www.nymip.org/mailman/listinfo/nymip-res-group --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
BrinCity 2.0: Mayor outlines elaborate camera network for city
http://abclocal.go.com/wls/news/print_090904_ap_ns_camera.html ABC7Chicago.com: Mayor outlines elaborate camera network for city By Paul Meincke September 9, 2004 (Chicago) - From a hi-tech command center, the City of Chicago plans to monitor a vast security network. Thousands of surveillance cameras will be linked -- and authorities will be alerted to crimes and terrorist acts. The mayor unveiled the plans for this new security network at a news conference this morning. Some people are concerned about Big Brother invading their privacy but Mayor Daley says the cameras will be located in public areas. The technology that is now so much a part of crime-fighting and anti-terrorism has gone -- as one police spokesman says -- from Stone Age to Star Wars in less than a decade. This step in the evolution will link more than 2,000 public surveillance cameras in Chicago into a unified system. George Orwell might be restless that Big Brother is growing, but the city believes that more efficient response to emergency will help the public rest easier There are, of course, thousands of cameras watching -- it seems -- everywhere. The city's plan is to route the live images provided by those cameras on the public way into a unified network piped into the 911 Center. That includes every city department. That includes the Chicago public schools, the CTA, city colleges. That includes the park district, any other sister agencies that have cameras out there, said Mayor Daley. There are well over 2,000 cameras that the city and its sister agencies -- like the school system -- monitor everyday. The city is adding another 250 cameras to potential high risk areas, most of them downtown. For instance, if there is a crime on a CTA platform-- most of which are or will be equipped with surveillance cameras, a call to 911 will activate a video link-up. When the system determines there's a camera in the vicinity of the 911 call, it will automatically beam back an image to the call-taker of the origin of where it occurred, said Ron Huberman, Emergency Mgt. and Com. Dir. The 911 dispatcher will have -- in many cases -- the ability to remotely control cameras at the scene of a crime miles away. The system is also equipped with software that can alert the 911 Center to changes in traffic flow, or the presence of people where they're not supposed to be. If this is a water filtration plant or a field in O'Hare where no one should be walking, it will issue an alert that someone is walking, said Huberman. All those images will be monitored in a room that is under construction as the 911 Operations Center. In 18-months it will look more like the bridge of the Starship Enterprise with a wall of 200 constantly changing images. How the software is tweaked will determine which pictures pop up, which the city says will greatly enhance emergency response. The mayor dismisses concerns about invasion of privacy since the cameras record what happens on the public way. You could photograph me walking down the street. They do it every day. I don't object. You do it every day. You have that right. Why do you have that right? said Mayor Daley. Critics say the cameras ought not be regarded as a panacea in crime fighting. They say the more there are, the greater the potential for abuse. In some Chicago neighborhoods, the cameras have led to a marked reduction in crime. The new unified system is being financed by a $5 million grant from the Department of Homeland Security and is scheduled to be up and running in 18 months. It will also have the capacity to watch crowds at the marathon downtown, football games, etc... -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Digital content spurs micropayments resurgence
content, to subscriptions, and now per-item sales, with the options for vendors and consumers growing quickly. At Peppercoin, the emphasis is placed squarely on e-commerce vendors. The Waltham, Mass., company acts as a proxy between vendors and credit card companies, allowing its users to aggregate their small-value transactions into larger bills to cut down on the fees charged them by the credit card companies themselves. Peppercoin signed a deal with the Smithsonian Institute last year to help the organization begin marketing music files stored in its archives on a per-song basis. The organization had previously struggled to do so, based on the percentage of its income that was in turn headed back out to the credit companies in the form of transaction fees. According to Rob Carney, vice president of marketing at Peppercoin, increased demand for digital content is driving short-term growth of micropayments, but the potential for the market is far greater. Online digital content sales, specifically for music, are generating more attention for micropayments than ever before, but it makes sense, because what are you going to sell for dollars online that you have to pay to ship? Carney said. Digital content is leading the way, but it's really just the thin edge of the wedge when you consider the possibilities in the physical world as well. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Maths holy grail could bring disaster for internet
the world over understood that he tackled the essential challenge. Once again the jury is still out: this time, however, his fellow mathematicians believe he may be onto something big. The plus: the multidimensional topology of space in three dimensions will seem simple at last and a million dollar reward will be there for the asking. The minus: the solver does not claim to have found a solution, he doesn't want the reward, and he certainly doesn't want to talk to the media. There is good reason to think the kind of approach Perelman is taking is correct. However there are some problems. He is very reclusive, won't talk to the press, has shown no indication of publishing this as a paper, which you would have to do if you wanted to get the prize from the Clay Institute, and has shown no interest in the prize whatsoever, Dr Devlin said. Has it been proved? We don't know. We have good reason to assume it has been and within the next 12 months, in the inner core of experts in differential geometry, which is the field we are speaking about, people will start to say, yes, OK, this looks right. But there is not going to be a golden moment. The implications of a proof of the Poincaré conjecture would be enormous, but like the problem itself, very difficult to explain, he said. It can't fail to have huge ramifications: not only the result, but the methods as well. At that level of abstraction, that level of connection, so much can follow. Differential geometry is the subject that is really underneath understanding everything about space and spacetime. Seven baffling pillars of wisdom 1 Birch and Swinnerton-Dyer conjecture Euclid geometry for the 21st century, involving things called abelian points and zeta functions and both finite and infinite answers to algebraic equations 2 Poincaré conjecture The surface of an apple is simply connected. But the surface of a doughnut is not. How do you start from the idea of simple connectivity and then characterise space in three dimensions? 3 Navier-Stokes equation The answers to wave and breeze turbulence lie somewhere in the solutions to these equations 4 P vs NP problem Some problems are just too big: you can quickly check if an answer is right, but it might take the lifetime of a universe to solve it from scratch. Can you prove which questions are truly hard, which not? 5 Riemann hypothesis Involving zeta functions, and an assertion that all interesting solutions to an equation lie on a straight line. It seems to be true for the first 1,500 million solutions, but does that mean it is true for them all? 6 Hodge conjecture At the frontier of algebra and geometry, involving the technical problems of building shapes by gluing geometric blocks together 7 Yang-Mills and Mass gap A problem that involves quantum mechanics and elementary particles. Physicists know it, computers have simulated it but nobody has found a theory to explain it -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Spam Spotlight on Reputation
http://www.eweek.com/print_article/0,1761,a=134748,00.asp EWeek Spam Spotlight on Reputation Spam Spotlight on Reputation September 6, 2004 By Dennis Callaghan As enterprises continue to register Sender Protection Framework records, hoping to thwart spam and phishing attacks, spammers are upping the ante in the war on spam and registering their own SPF records. E-mail security company MX Logic Inc. will report this week that 10 percent of all spam includes such SPF records, which are used to authenticate IP addresses of e-mail senders and stop spammers from forging return e-mail addresses. As a result, enterprises will need to increase their reliance on a form of white-listing called reputation analysis as a chief method of blocking spam. E-mail security appliance developer CipherTrust Inc., of Alpharetta, Ga., also last week released a study indicating that spammers are supporting SPF faster than legitimate e-mail senders, with 38 percent more spam messages registering SPF records than legitimate e-mail. The embrace of SPF by spammers means enterprises' adoption of the framework alone will not stop spam, which developers of the framework have long maintained. Enter reputation analysis. With the technology, authenticated spammers whose messages get through content filters would have reputation scores assigned to them based on the messages they send. Only senders with established reputations would be allowed to send mail to a user's in-box. Many anti-spam software developers already provide such automated reputation analysis services. MX Logic announced last week support for such services. There's no question SPF is being deployed by spammers, said Dave Anderson, CEO of messaging technology developer Sendmail Inc., in Emeryville, Calif. Companies have to stop making decisions about what to filter out and start making decisions about what to filter in based on who sent it, Anderson said. The success of reputation lists in organizations will ultimately depend on end users' reporting senders as spammers, Anderson said. In the system we're building, the end user has the ultimate control, he said. Scott Chasin, chief technology officer of MX Logic, cautioned that authentication combined with reputation analysis services still won't be enough to stop spam. Chasin said anti-spam software vendors need to work together to form a reputation clearinghouse of good sending IP addresses, including those that have paid to be accredited as such. There is no central clearinghouse at this point to pull all the data that anti-spam vendors have together, said Chasin in Denver. We're moving toward this central clearinghouse but have to get through authentication first. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Tilting at the Ballot Box
are decrypted (using a complicated Chaumian mathematical process that's all but tamperproof). Meanwhile, the encoded images are posted on the Web, so that you can go online afterward and confirm that your vote was counted by using a serial number on your strip. There's no denying that Votegrity teeters on the brink of genius. By letting voters take receipts, Chaum's system would erect formidable hurdles to election fraud -- while simultaneously, through encryption, preserving the sacrosanct anonymity of the ballot box. That said, I can think of at least three glaring reasons to be skeptical of Votegrity's prospects. First, the system isn't exactly a paragon of simplicity; it took nearly four hours of explication by Chaum for me to get my head fully around it. Second, election officials are by inclination a deeply conservative lot, especially around new technology. A system combining cryptography and the Web isn't likely to set their pulses racing -- or cause their checkbooks to spring open. Third, there's verified voting. Whatever the imperfections of ballot-under-glass, I suspect that many people who distrust e-voting will consider it a good-enough safeguard. And as the history of technology makes abundantly clear, in a contest between perfect and good enough, the latter wins every time. Naturally, Chaum disagrees. Given the intensity of the uproar over the current touchscreen terminals, he believes that states will have no choice but to adopt a more sophisticated system. The more people swear that the machines should be trusted, the less trust there is, he says. Forget whether they're really secure or reliable. What matters is that major chunks of the public don't believe they are. We've got a crisis of voter confidence on our hands -- and it's not going to go away. As for verified voting, Chaum simply says, I don't think a system that's equivalent to punch cards is going to cut it at this point. Depending on what happens in November, Chaum could be proven right. With the election only two months off, the backlash against e-voting has produced a situation bordering on chaos. At the start of the year, it appeared that some 50 million voters-roughly 30 percent of the total -- would be casting their ballots digitally. Now, who knows? In California, the secretary of state has banned the Diebold machines from use and decertified all the rest. In other states, there are movements afoot to require verified voting. In still others, officials are pressing ahead with the machines despite the hue and cry. All of which suggests one thing: If the election turns out to be as close as most polls suggest, we may be headed for a multistate postelection conflagration, complete with protests and litigation, that will make the contretemps over Florida in 2000 look like a schoolyard spat. For Chaum, who's in the process of rounding up investors and hiring executives for the firm he's starting around Votegrity, such a conflagration would be, perversely, the best news imaginable. Not that he's the kind of guy who'd root for such an outcome. A bone-deep do-gooder, a privacy crusader, he's an unabashed idealist whose desire to make the world better is so earnest it's slightly painful. When I asked him why he was still tilting at windmills even after the anguish of DigiCash, he smiled, shrugged, and softly replied, This is really important stuff -- someone's got to do it. On that point he'll get no argument from me. No matter what transpires on Election Day and in its aftermath, Chaum and his allies have already rendered an invaluable service: not only exposing the flaws of e-voting today, but pointing toward something better for tomorrow. Coming up with that something -- a digital system that's secure, private, and verifiable -- will plainly be no mean feat. As more and more geeks take up the challenge, the odds will inevitably decline that Chaum's will be the system that triumphs. But I can't help hoping that, for once in his life, he kicks the windmill's ass.? John Heilemann wrote Pride Before the Fall. His next book is The Valley. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: MD5 collisions?
At 8:58 PM -0500 8/17/04, Declan McCullagh wrote: I hadn't noticed. How uncharacteristic of him. Never would have guessed. ..and my mother dresses me funny? You can do better than that, Declan -- if you do say so yourself. Self-important git. -RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: MD5 collisions?
..and another thing... At 7:33 PM -0500 8/17/04, Declan McCullagh wrote: -Declan TCM McCullagh Does this mean you spend all day in a Barcolounger dry-jacking a Mossberg, muttering about Janet Reno? ;-) Cheers, RAH Banks in Hong Kong and Shanghai, indeed... -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: MD5 collisions?
At 7:33 PM -0500 8/17/04, Declan McCullagh wrote: One is enough. Less is more. Let's eliminate redundancy, thus eliminating redundancy. Yawn. Let's piss up a rope, shall we? Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: MD5 collisions?
At 10:03 PM -0500 8/17/04, Declan McCullagh wrote: Sigh. RAH has descended to the level of a net.kook. Never would have guessed. You've exactly the same used the same rhetorical device twice now. Are you just lazy, or, more likely, have you just peaked too soon? How does it feel to be someone whose best years are a decade behind him, Declan? You are *sooo* boring. RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Owning Ones Own Words, Peaking Too Soon, The Cypherpunk Purity Test, and Bora-Bora (Re: MD5 collisions?)
, *any* forwards are equivalent to *all* forwards? I thought not. Hey, I got an idea, myself. Let's just close down the list and do it *all* on the web? Maybe CNET can stick pop-up ads in our faces for the privilege, Declan an up his click-count, and CNET will send him to the Black Rock Desert, or Bora-Bora, or the Crimea, or wherever, for some conference or other. Or a Senate hearing. Or whatever. I mean, who needs that pesky 'd' key, anyway? In the meantime, Declan, own *these* words: don't be a putz. Cheers, RAH -BEGIN PGP SIGNATURE- Version: PGP 8.0.3 iQA/AwUBQSNXn8PxH8jf3ohaEQJwTQCg+hpBwCoGQryuoJAdyYP4awO3nDYAoLKa UKwhmMOEdC2q2yA/JLjIbFuV =fO4K -END PGP SIGNATURE- -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Dope-Slaps and the Imaginary Axis (Re: Cryptome on ABC Evening News?)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 At 5:44 PM -0700 8/14/04, Bill Stewart wrote: the site there showing pictures of cable landings Wow. Didn't know that. I was *at* Spencer Beach on the Big Island last month, *looking*, :-), and I didn't see *anything*. V8-autodope-slap I coulda looked at cryptome /v-a-s. I was at Morro Bay with Vin and Cyn once, popping over from SLO, but we weren't looking then for what is the other end of several other pipes fulla pan-pacific fiber... There sure isn't much else around Spencer Beach, though, and, besides, the wife likes Hilo anyway. (It's, um, dry there, at Spencer Beach. She hates ABQ's climate, too, where most of my, heh, addressable family lives: My God!!! It looks like the *moon* out there!!! she says to the plane window the first time out, Where are the *trees*??? :-) A shopping trip to Old Town and a Death by Santa Fe Style outfit later she's over the problem. Gotta keep her away from Corpus, though, or I'm doomed. Or maybe I just show her a post-hurricane pic of the T and L heads, covered in beached yachts...) I was all depressed about maybe retiring to Hilo -- it was my idea we were there to begin with, c'punkly visions in my head about a financial-crypto lab/detox facility, or something -- until I saw the biz/lab-park up above UH-Hilo where all the observatories (except Keck in Waimea/Kamuela) have their headquarters. Nice fat fiber pipes going in and out. Kewl. I knew there was fiber to Mauna Kea, a ranger named Pablo up there showed me a huge junction box(?); nice they ran it down the other side. I shoulda realized, as the Gemini scopes are all We're Internet2, donchaknow The local connectivity providers, who sell WiFi to the touristas for $5/hr (or not, one says WiFi's not safe, methinks he doth not know his firewall from his elbow), had no idea where the fiber, if any, was on the whole wet side of the island, so they weren't any help. The proximal cause of said depression, that was. Besides having flashbacks of various deep-and-recent past Caribbean Island-Time episodes. Anyway, there's bandwidth with a capital b, and I keep forgetting about the Island Time thing. Something about me and what Beaver called the imaginary axis. Like a moth and a flame. Cheers, RAH -BEGIN PGP SIGNATURE- Version: PGP 8.0.3 iQA/AwUBQSJVQMPxH8jf3ohaEQL+vgCg0Zo1xxbPInOfb40buM1zTxts0/YAn1TN BSV8PdaVmrXaC8Odr5nuk9If =lDFR -END PGP SIGNATURE- -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
[e-gold-list] An interesting technology for cashlike tokens.
And James makes the next step. The online gold systems, like goldmoney and e-gold, certainly have an enormously cheaper cost of entry than trying to plug into, say, the ATM system. Cheers, RAH --- begin forwarded text From: James A. Donald [EMAIL PROTECTED] To: e-gold Discussion [EMAIL PROTECTED] Date: Sun, 15 Aug 2004 21:28:19 -0700 Subject: [e-gold-list] An interesting technology for cashlike tokens. Priority: normal -- Reusable Proofs of Work by Hal Finney rpow.net Hal Finney has an interesting technology for electronic money. The intended application is electronic postage, an anti spam measure. The same technique could be used to anonymously transfer certificates of possession of gold. The method is like trusted computing in reverse. Instead of the client computer needing to prove to the server it is trustworthy, the server must prove to the client it is trustworthy. For transactions that involve substantially greater periods than email, a money based on gold is better than a money based on proofs of computational work, since the cost of mining gold changes only slowly, while the cost of doing computations diminshes rapidly, but for the intended application, a high inflation rate is not a problem. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG qaxLVMrKlZJuFzjYAxmdhu7F4wsAds1g0b9s1d2G 4fcchBYWopL00KqdJyRYp/27QCChV9H4oizZtSKGc s --- You are currently subscribed to e-gold-list as: [EMAIL PROTECTED] To unsubscribe send a blank email to [EMAIL PROTECTED] Use e-gold's Secure Randomized Keyboard (SRK) when accessing your e-gold account(s) via the web and shopping cart interfaces to help thwart keystroke loggers and common viruses. --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
F.B.I. Goes Knocking for Political Troublemakers
participants, injuries to citizens, injuries to police and first responders. F.B.I. officials would not say how many people had been interviewed in recent weeks, how they were identified or what spurred the bureau's interest. They said the initiative was part of a broader, nationwide effort to follow any leads pointing to possible violence or illegal disruptions in connection with the political conventions, presidential debates or the November election, which come at a time of heightened concern about a possible terrorist attack. F.B.I. officials in Washington have urged field offices around the country in recent weeks to redouble their efforts to interview sources and gather information that might help to detect criminal plots. The only lead to emerge publicly resulted in a warning to authorities before the Boston convention that anarchists or other domestic groups might bomb news vans there. It is not clear whether there was an actual plot. The individuals visited in recent weeks are people that we identified that could reasonably be expected to have knowledge of such plans and plots if they existed, Mr. Parris said. We vetted down a list and went out and knocked on doors and had a laundry list of questions to ask about possible criminal behavior, he added. No one was dragged from their homes and put under bright lights. The interviewees were free to talk to us or close the door in our faces. But civil rights advocates argued that the visits amounted to harassment. They said they saw the interrogations as part of a pattern of increasingly aggressive tactics by federal investigators in combating domestic terrorism. In an episode in February in Iowa, federal prosecutors subpoenaed Drake University for records on the sponsor of a campus antiwar forum. The demand was dropped after a community outcry. Protest leaders and civil rights advocates who have monitored the recent interrogations said they believed at least 40 or 50 people, and perhaps many more, had been contacted by federal agents about demonstration plans and possible violence surrounding the conventions and other political events. This kind of pressure has a real chilling effect on perfectly legitimate political activity, said Mark Silverstein, legal director for the American Civil Liberties Union of Colorado, where two groups of political activists in Denver and a third in Fort Collins were visited by the F.B.I. People are going to be afraid to go to a demonstration or even sign a petition if they justifiably believe that will result in your having an F.B.I. file opened on you. The issue is a particularly sensitive one in Denver, where the police agreed last year to restrictions on local intelligence-gathering operations after it was disclosed that the police had kept files on some 3,000 people and 200 groups involved in protests. But the inquiries have stirred opposition elsewhere as well. In New York, federal agents recently questioned a man whose neighbor reported he had made threatening comments against the president. He and a lawyer, Jeffrey Fogel, agreed to talk to the Secret Service, denying the accusation and blaming it on a feud with the neighbor. But when agents started to question the man about his political affiliations and whether he planned to attend convention protests, that's when I said no, no, no, we're not going to answer those kinds of questions, said Mr. Fogel, who is legal director for the Center for Constitutional Rights in New York. In the case of the three young men subpoenaed in Missouri, Denise Lieberman, legal director for the American Civil Liberties Union in St. Louis, which is representing them, said they scrapped plans to attend both the Boston and the New York conventions after they were questioned about possible violence. The men are all in their early 20's, Ms. Lieberman said, but she would not identify them. All three have taken part in past protests over American foreign policy and in planning meetings for convention demonstrations. She said two of them were arrested before on misdemeanor charges for what she described as minor civil disobedience at protests. Prosecutors have now informed the men that they are targets of a domestic terrorism investigation, Ms. Lieberman said, but have not disclosed the basis for their suspicions. They won't tell me, she said. Federal officials in St. Louis and Washington declined to comment on the case. Ms. Lieberman insisted that the men didn't have any plans to participate in the violence, but what's so disturbing about all this is the pre-emptive nature - stopping them from participating in a protest before anything even happened. The three men were really shaken and frightened by all this, she said, and they got the message loud and clear that if you make plans to go to a protest, you could be subject to arrest or a visit from the F.B.I. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http
Apparently one can spell Snake Oil in Capital Letters, too (Re: CRYPTO-GRAM, August 15, 2004)
At 11:26 PM -0500 8/14/04, Bruce Schneier wrote: From: Ken Lavender [EMAIL PROTECTED] Subject: ICS Atlanta I am APPAULED at your comments that you had made on your website: http://www.schneier.com/crypto-gram-0407.html#9 You have statements are nothing but slander defamation. They shall be dealt with accordingly. Lie #1: How do they demonstrate Tree's security? 'Over 100 professionals in mathematics in computer science at Massachusetts Institute of Technology at Georgia Tech, had sample encoded messages submitted to them. Not a single person could break this code!' That is not the ONLY way we prove it. We have examples offer to allow people to submit their OWN messages to have encoded to SEE how good the code is. So there are THREE methods, NOT just ONE as you IMPLY. Lie #2: These guys sent unsolicited e-mails... HOW do you KNOW that this was the case? Have any PROOF of such? NO! Lie #3: And if all that isn't enough to make you run screaming from these guys, their website proudly proclaims: 'Tree Encoded Files Can Be Zipped.' Because they can be zipped does NOT mean that it is bad encoding. The code talkers of ww2 used LANGUAGE to code the messages, and THOSE COULD BE ZIPPED!!! And that code was NEVER BROKEN!!! Lie #4: That's right; their encryption is so lousy that the ciphertext doesn't even look random. AGAIN, HOW would you KNOW??? Did you break it? NO! And what is random??? random : without definite aim, direction, rule, or method So lousy? HOW WOULD YOU KNOW??? You would have to KNOW how we encode BEFORE you can make such a statement, YOU DO NOT KNOW HOW!!! If it is SO LOUSY, how come NOBODY HAS BROKEN IT YET??? And we have people ALL THE TIME trying to, with ZERO SUCCESS. I do not like you slandering something that you do not understand. ATALL!!! The ONLY question you asked was how long is the key AND THAT WAS IT! HOW long was the key that the 'code talkers' used? ZERO!!! JUST AS OUR IS. The encoding routine was created, tested, verified on PAPER PENCIL WITHOUT COMPUTERS! A child could encode data using our routine. The computer is merely used to speed-up the process, NOT TO CREATE IT. Our routine is based on LANGUAGE, NOT MATH. So all of you comments are just false, misleading just plain ole lies! SHOW PROVE that it is NOT random. What is the PATTERN THEN??? I am DEMANDING A FULL RETRACTION OF YOUR COMMENTS A FULL, COMPLETE APOLOGY TO THESE AND ALL STATEMENTS. I am a person who tries to work with people as a man w/o having to drag others into the mess. Others? THE COURTS. You have violated Calf law by your statements. [Text of California Civil Code Section 46 deleted.] Your LIES have damaged my respect in my job has damaged any sales of this routine. You have ZERO proof of your comments, ANY OF THEM!!! I beseech of you, do the RIGHT THING and comply. I DO NOT wish to escalate this matter any higher. And remember this, Tree is based on LANGUAGE, NOT MATH! [Phone number deleted out of mercy.] -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
[osint] FBI Warns Storage Unit Operators
--- begin forwarded text To: Bruce Tefft [EMAIL PROTECTED] Thread-Index: AcSAr6Y/Mj9PmYHqQZO/G2/Eo29FYgAgaLTg From: Bruce Tefft [EMAIL PROTECTED] Mailing-List: list [EMAIL PROTECTED]; contact [EMAIL PROTECTED] Delivered-To: mailing list [EMAIL PROTECTED] Date: Fri, 13 Aug 2004 08:30:35 -0400 Subject: [osint] FBI Warns Storage Unit Operators Reply-To: [EMAIL PROTECTED] FBI Warns Storage Unit Operators Terrorist alert is extended to self-storage units Joyce Lavoy is a manager for South Toledo Self Storage. Lavoy says she was stunned when an FBI agent walked into her office and told her to be on the lookout for possible terrorist activity. Local FBI agents are visiting about 350 storage places in 19 northwest Ohio communities, including Toledo, Lucas County, and Sandusky. They're handing out alerts to owners and employees on potential terrorist activity in storage facilities. Federal sources tell 13 Action News in the past, terror suspects have been known to use storage units to devise their plans. Everytime Joyce Lavoy unlocks an empty storage unit and lifts the door, she's looking for the warning signs of possible terrorist activity. Lavoy has worked in the storage business for five years. She says she's never had an FBI agent walk into her office. I thought there was someone renting a storage unit he was looking for. That wasn't the case. Lavoy says FBI agents wanted to put managers on alert that terrorists have been known to store and mix deadly chemicals in storage units. The FBI alert cautions storage owners and employees to be on the lookout for: suspicious people who visit the storage facility late at night or at unusual times. unusual fumes, liquids, residues or odors emanating from their storage unit. explosives, blasting caps, fuses, weapons, and ammunition. flight manuals or other similar materials. Lavoy says security cameras are in place and she's taking extra trips around the building with her employees looking for anything suspicious. Source: _http://abclocal.go.com/wtvg/news/811_storageunits.html_ (http://abclocal.go.com/wtvg/news/811_storageunits.html) This information is provided by PURE PURSUIT as a service to members of the Military and Air Defense Community with the purpose of offering relevant and timely information on defense, aviation, emergency, law enforcement and terrorism issues. Posts may be forwarded to other individuals, organizations and lists for non-commercial purposes. For new subscriptions please send an e-mail with Pure Pursuit in the subject line to Nena Wiley at : [EMAIL PROTECTED] Yahoo! Groups Sponsor ~-- Yahoo! Domains - Claim yours for only $14.70 http://us.click.yahoo.com/Z1wmxD/DREIAA/yQLSAA/TySplB/TM ~- -- Want to discuss this topic? Head on over to our discussion list, [EMAIL PROTECTED] -- Brooks Isoldi, editor [EMAIL PROTECTED] http://www.intellnet.org Post message: [EMAIL PROTECTED] Subscribe:[EMAIL PROTECTED] Unsubscribe: [EMAIL PROTECTED] *** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. OSINT, as a part of The Intelligence Network, is making it available without profit to OSINT YahooGroups members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/osint/ * To unsubscribe from this group, send an email to: [EMAIL PROTECTED] * Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The New Digital Media: You Might Have It, But Not Really Own It
, for instance, be able to make a copy of the Toy Story 4 DVD for your laptop -- but not do the same thing with Charlie's Angels 5. Those variations will likely require some form of labeling on DVDs so consumers will know what they're getting, according to companies involved in planning them. Alan Davidson, associate director of the civil liberties group Center for Democracy and Technology, says he isn't opposed to DRM, but worries consumers may not understand what rights come with content they purchase. DRM underscores the point that consumers are going to have to become a lot more sophisticated about what they're buying, he says. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: Cryptome on ABC Evening News?
At 12:49 AM +0200 8/13/04, Thomas Shaddack wrote: Can somebody record it in MPEG or DivX, please? :) It's difficult to get ABC News across the Atlantic without a dish. I didn't see anything. But, like an idiot, I surfed out of it. ADD's a bitch. :-). Anyone see the whole show? Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Cryptome on ABC Evening News?
There's a teaser for tonight's 6:30 news about a wesite that publishes pipeline maps and the names and addresses of government employees. The horror. :-) Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Too Much Information?
http://abcnews.go.com/sections/WNT/US/internet_sensitive_info_040812.html Too Much Information? Web Site Raises Questions About Public Access to Sensitive Government Info By JakeTapper ABCNEWS.com Aug. 12, 2004- John Young, a 69-year-old architect, was contacted a few weeks ago by Department of Homeland Security officials, who expressed concern about what he was posting on his Web site. Officials questioned Young about information he had posted about the 2004 Democratic National Convention, including satellite photos of the convention site and the location of specific police barricades referred to on the site as a complete joke. In response to a complaint, two special agents from the FBI's counterterrorism office in New York City interviewed Young in November 2003. They said, 'Why didn't you call us about this? Why are you telling the public?' And we said, 'Because it's out there and you can see it. You folks weren't doing anything,' Young told ABC News. The agents, according to Young, stressed they knew that nothing on the site was illegal. Young added: They said, 'What we'd like you to do, if you're approached by anyone that you think intends to harm the United States, we're asking you to let us know that.' I know there are a lot of people in the government who find him troublesome, said former White House terrorism adviser Richard Clarke, now an ABC News consultant. There is a real tension here between the public's right to know and civil liberties, on the one hand, and security on the other. But Young argues his actions enhance national security, since he points out to the public vulnerabilities the government does not want to acknowledge. Like others who run similar Web sites, Young does so by using information from the public domain, such as: * Photographs of preparations for the upcoming Republican National Convention at New York City's Madison Square Garden * Detailed maps of bridges and tunnels leading in and out of Manhattan * Maps of New York City's single natural gas pipeline * The location of an underground nuclear weapons storage complex in New Mexico Enabling the Enemy? I think it's very, very bad for the country to have anyone putting together information that makes it easier for anyone that wants to injure Americans to do so, said Rep. Chris Cox, R-Calif., chair of the House Homeland Security Committee. Law enforcement officials were particularly upset that Young posted the satellite photos and addresses for the homes of top Bush administration officials. We think public officials should be totally transparent. There should be no secrecy, said Young. We are opposed to government secrecy in all of its forms. Officials call that argument outrageous and argue some secrecy is necessary. The Department of Homeland Security has taken aggressive measures to protect critical infrastructure across the country, said a Department of Homeland Security spokeswoman. We discourage Web posting of detailed information about critical infrastructure. This information is not helpful to our ongoing efforts to protect the American people and our nation's infrastructure. When asked how he would respond to those who consider his Web site unpatriotic since it could provide useful information for those who seek to harm the United States, Young said, If this is not done, more Americans are going to die. More harm is going to come to the United States. It is more patriotic to get information out than to withhold it. Officials acknowledge there is not much they can do; Young has not broken any laws. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Joux found a collision for SHA-0 !
* - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED] --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: SF Bay Area Cypherpunks August 2004 Physical Meeting Announcement
At 9:33 PM -0400 8/10/04, R. A. Hettinga wrote: --- begin forwarded text Date: Tue, 10 Aug 2004 09:56:44 -0700 To: [EMAIL PROTECTED], [EMAIL PROTECTED] doh! I meant to send it to perrypunks. One more time. You won't even notice... :-) Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: ...Hold still for the camera, Mehdi...
At 7:49 PM -0700 8/10/04, James A. Donald wrote: Presumably the IDs do not display true names I would bet you're stretching the bounds of presumption, myself. Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA Several times a week, to enter a TV studio say, or to board a plane, I have to produce a tiny picture of my face. -- Christopher Hitchens
...Hold still for the camera, Mehdi...
From Tyler's Iraq SLO-expat S-ISP CTO blog (http://www.livejournal.com/users/giantlaser/): http://www.aljazeera.net/news/arabic/2004/8/8-6-13.htm Al Sadr got himself a laminator. His goons, er, freedom fighters, have ID's now. Skip the arabic, notice the guy on the left in the first pic. BWAHAHAHAHA! Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
...and Mr. Hughes wants to give it to him.
. The average Joe wants something for nothing. With knowledge and information, we can come as close as possible to this ideal. Let the scarcity economists haggle over flesh. We won't appreciably change GDP figures. The new institution is an exercise in abundance economics. Free knowledge and information add untold real wealth to the world. Let our revenge upon scarcity be that its limitation upon wealth become miniscule. Eric Hughes ([EMAIL PROTECTED]) was one of the founders of cypherpunks, and has been worried about software infrastructure ever since. He is Chief Technology Officer of Signet Assurance Company, LLC, a development company soon to announce its first products and services. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Every Vote Counts - If It's Counted
of proof ought to be on the vendor. You ask about the hardware. 'Secret.' The software? 'Secret.' What's the cryptography? 'Can't tell you because that'll compromise the secrecy of the machines.' ... Federal testing procedures? 'Secret'! Results of the tests? 'Secret'! Basically we are required to have blind faith. Dugger also quotes recent testimony from Johns Hopkins' Avi Rubin to the federal Election Assistance Commission: I do not know of a single computer security expert who would testify that these machines are secure. Advocates of e-voting have portrayed criticism as coming from a handful of unhappy academics, or as being motivated by partisan politics -- claims the media have largely bought into. Among the chief proponents of the new system is Gov. Jeb Bush, who presided over the 2000 debacle from which his brother emerged with an official winning margin of 537 votes. As the Miami Herald reported last month, Gov. Bush has suggested that, as the paper put it, people who repeatedly raise questions about the touch-screen machines were doing it to motivate their voters in the upcoming presidential election, in which Florida will be a battleground state. But that's not necessarily true elsewhere. The Republican secretaries of state in Nevada and Missouri -- both expected to be hotly contested this fall -- have expressed concerns about the reliability of the equipment. As a result, they have required that touch-screen voting machines also be equipped with a voter-verified paper trail in November. (This is an inexpensive add-on to the machine, which allows a voter to confirm manually his or her vote before it is cast; that confirmation is retained independently of the computer tally in the event a recount is required.) It is this type of backup that Adam Cohen and others believe will eliminate many of the potential problems with e-voting. Nevada's 2,000 electronic voting machines will all come equipped with printers this fall. Secretary of State Dean Heller told the Associated Press that paper receipts are an intrinsic component of voter confidence. Nevada is the first state to institute such a policy statewide. Nationally, legislation requiring printed backups is pending in both the House and Senate -- but no action is expected before November. So, the question remains: Will this year's contested presidential election proceed smoothly, or will the scenario be closer to what a letter-writer to The New York Times predicted: [T]he havoc wreaked by the butterfly ballot [in 2000] will soon be compounded by a plague of worms, the kind encoded in electronic voting machines that leave no 'voter verified paper trail.' No one knows. But it sure sounds like a story worth pursuing by more than a few lonely souls like The Nation's Ronnie Dugger and the Times' Adam Cohen. Posted 08/08/04 at 12:01 AM -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
IRS may use First Data info for help in finding tax evaders
http://www.denverpost.com/cda/article/print/0,1674,36%257E33%257E2312378,00.html The Denver Post IRS may use First Data info for help in finding tax evaders By Andy Vuong Denver Post Staff Writer Wednesday, August 04, 2004 - A federal judge has granted the Internal Revenue Service the right to seek information from First Data Corp. about certain credit-card transactions the company has processed. The IRS wants the information as part of its crackdown on tax evaders. Specifically, the IRS wants information about holders of American Express, Visa and MasterCard credit cards that were issued by or on behalf of certain offshore financial institutions. The government listed more than 30 offshore jurisdictions, including Aruba, the Bahamas, Bermuda, the Cayman Islands, Hong Kong, Singapore and Switzerland. The IRS said in a court filing that it believes those account holders may fail, or may have failed, to comply with internal revenue laws. The IRS is targeting people who held such accounts between Dec. 31, 1999, and Dec. 31, 2003. The government is seeking the names of the account holders, their credit-card statements, their credit limit and information on when they opened their accounts. We haven't seen the order, but we always comply with the law, said First Data spokeswoman Staci Busby. She declined to comment further about the order by U.S. District Judge Phillip Figa, which was made Monday. In 2003, Greenwood Village-based First Data processed 12.2 billion payment transactions, Busby said. Judges have granted so-called John Doe summons in five similar situations, the IRS said in court documents. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Terror Threat Level Is Raised For Key U.S. Financial Buildings
http://online.wsj.com/article_print/0,,SB109136672993879685,00.html The Wall Street Journal August 1, 2004 2:46 p.m. EDT WORLD NEWS Terror Threat Level Is Raised For Key U.S. Financial Buildings Associated Press August 1, 2004 2:46 p.m. NEW YORK -- The federal government warned today of possible terrorist attacks against iconic financial institutions in New York City, Washington and Newark, N.J., saying a confluence of intelligence over the weekend pointed to a car or truck bomb. Specifically, the government named these buildings as potential targets: The Citicorp building and the New York Stock Exchange in New York City; The International Monetary Fund and the World Bank buildings in Washington; and the Prudential Financial building in Newark. The government said the new intelligence indicated the meticulous planning of al Qaeda. He identified explosives as the likely mode of attack, as opposed to a chemical or biological attack or a radiological dirty bomb. Mr. Ridge said the government's threat level for financial institutions in just these three cities would be raised to orange, or high alert, but would remain at yellow, or elevated, elsewhere. The government provided a wealth of detail that it had picked up in the past 36 hours, but a senior intelligence official described it only on condition of anonymity. The official described excruciating detail and meticulous planning indicative of al Qaeda. The official said the intelligence included security in and around these buildings; the flow of pedestrians; the best places for reconnaissance; how to make contact with employees who work in the buildings; the construction of the buildings; traffic patterns; locations of hospitals and police departments; and which days of the week present less security at these buildings. To illustrate the level of detail obtained, the official cited these examples: midweek pedestrian traffic of 14 people per minute on each side of the street for a total of 28 people; that some explosives might not be hot enough to melt steel; and that the construction of some buildings might prevent them from falling down. The official said he had not seen such extraordinary detail in his 24 years in intelligence work. Mr. Ridge said it would be up to New York City officials to decide whether to move to the highest level, red. The city has remained on orange since the attacks of Sept. 11, 2001. The threat potential remains through the Nov. 2 elections, he said. The secretary said the government took the unprecedented step of naming specific buildings because of the level of specificity of the intelligence. This is not the usual chatter. This is multiple sources that involve extraordinary detail, Mr. Ridge said. He said the government decided to notify the public because of the specificity of detail it had obtained. Mr. Ridge acknowledged that protecting these buildings, located in heavily populated areas, would require additional security measures, especially because thousands of cars and trucks travel through these cities daily. Car and truck bombs are one of the most difficult tasks we have in the war on terror, Mr. Ridge said. Local and state officials were notified earlier in the day and Mr. Ridge said new security procedures were already being put in place. A White House spokeswoman, Erin Healy, said the intelligence on the threat was very new, coming in during the last 72 hours. The president made the final decision today agreeing with the recommendation of Secretary Ridge to go ahead and raise the threat level in these select areas, Ms. Healy said. This was the first time the color-coded warning system had been used in such a narrow, targeted way, Mr. Ridge said at a news conference at department headquarters. With this kind of information comes action, he said. This is sobering news. Referring to terrorists who are hostile to the U.S., Mr. Ridge said, Iconic economic targets are at the heart of their interest. He said workers at the five specific buildings should get guidance from security officers at each site and remain alert as they go to work. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
ECC 2004
to be added to the mailing list for the third announcement, please send a brief email to [EMAIL PROTECTED] The announcements are also available from the web site www.cacr.math.uwaterloo.ca/conferences/2004/ecc2004/announcement.html --- REGISTRATION: The website for registration is open and can be found at: http://www.ruhr-uni-bochum.de/hgi/tanja.html For this year the full conference fee is 170 EUR, we offer a reduced fee of 80 EUR for students. Please register as soon as possible as the number of participants is limited. -- ACCOMMODATIONS: We set aside a number of rooms on a first-come first-serve basis at following hotels. To get the prices listed below include the respective quotations when making your reservation Hotel Acora http://www.acora.de/html/bochum.html Tel.: (+49)234 68 96 0 Fax: (+49)234 68 96 700 Nordring 44-50 (center of Bochum) single 66,50 EUR double 80,50 EUR both including breakfast mention ECC-Workshop These rooms are set aside till 30.07.2004. Holiday Inn Bochum http://www.ichotelsgroup.com/h/d/hi/394/de/hd/bocge Tel.: 49-234-9690 Fax: 49-234-969 Massenbergstrasse 19-21 (center, close to main station) single 85,00 EUR incl. breakfast mention ECC-Workshop These rooms are set aside till 13.08.2004. Hotel Haus Oekey http://www.oekey.de/ Tel.: (+49)234 388 13 0 Fax: (+49)234 388 13 88 Auf dem Alten Kamp 10 (halfway between university and city center) single 52 EUR double 70 EUR both including breakfast mention Ruhr-University, Lange These rooms are set aside till 10.08.2004. Hotel IBIS am Hauptbahnhof http://www.ibishotel.com Tel.: (+49)234/91430 Fax : (+49)234/680778 Kurt- Schumacher- Platz 13-15 (next to main station) single 58 EUR double 67 EUR (The prices include breakfast for 9 EUR.) The fee includes free public transport in Bochum mention ECC These rooms are set aside till 12.08.2004. Hotel Kolpinghaus http://www.kolpinghaus-bochum.de/html/hotel.html Maximilian-Kolbe-Str. 14-18 (close to main station, center) single 46 EUR double 24 EUR including breakfast. Facilities include linen and have communal bathrooms on each floor. Please make your booking via Tanja Lange [EMAIL PROTECTED] and mention with whom you would like to share a room. These rooms are available till 09.08.2004. Other hotels can be found at http://www.bochum.de/english/ http://www.bochum.de/bochum/bohotel.htm (the hotel page is available in German only) == FURTHER INFORMATION: For further information, please contact: Tanja Lange Information Security and Cryptography Ruhr-University Bochum e-mail: [EMAIL PROTECTED] Fax: +49 234 32 14430 Tel: +49 234 32 23260 == --- --- --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
More American vigilantes may be in Afghanistan, U.S. military says
http://www.billingsgazette.com/printer.php?id=1display=rednews/2004/07/24/stories/world/55-afghan.txt BillingsGazette.com printable article More American vigilantes may be in Afghanistan, U.S. military says Associated Press KABUL, Afghanistan - The U.S. military said Saturday there could be more vigilantes hunting terror suspects here after a group of Americans were arrested for allegedly abusing Afghans in a private jail. The U.S. government is offering big rewards for the capture of top terrorist suspects, including a US$50 million bounty on al-Qaida leader Osama bin Laden. It remains unclear if the three Americans who went on trial in the Afghan capital on Wednesday charged with hostage-taking and torture were hoping to cash in _ or if they were the only such group in the country. It is entirely possible that there are others acting independently, military spokesman Maj. Jon Siepmann said. Afghanistan is awash with shadowy foreign security operatives. Some work for private contractors protecting reconstruction workers, others apparently with the military or secret services. The U.S. military has tried to distance itself from the three detained Americans, led by a former U.S. soldier on a self-appointed counter-terrorism mission. But both the Americans and NATO peacekeepers acknowledge contact with the group, which dressed in army fatigues and wore the beards and dark glasses favored by special forces soldiers. NATO troops helped the trio with three raids in the capital last month, while the U.S. military gratefully accepted a detainee at Bagram Air Field, north of Kabul, in May. Afghan authorities, who also mistook the men for U.S. special forces, arrested them only in July after NATO troops and the U.S. military denounced them as impostors and raised the alarm. Siepmann didn't say whether the military knew of any other freelancers or bounty-hunters in Afghanistan. However, I think the issue of Mr. Idema has brought a heightened awareness to everyone involved ... to be on the lookout for this kind of behavior, Siepmann said. I think Mr. Idema's arrest and current judicial process will serve as a warning to others who will attempt to do this in Afghanistan, he said. The three face up to 20 years in jail if convicted. Afghan security forces freed eight prisoners from the group's makeshift jail in a house in downtown Kabul. Firearms were also seized in the house. Idema, who claims to have fought with Afghan forces against the Taliban in 2001-2002, says the men were arrested to avert an al-Qaida plot to attack foreign troops and assassinate a string of Afghan political leaders. He told reporters in court on Wednesday that he had support from within the U.S. Department of Defense and that he could produce evidence to prove it _ a claim Pentagon officials dispute. The trial is expected to resume early next month. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Internet providers test ways to outsmart spam
marketers will have no choice but to authenticate their messages to prevent them from being blocked. And if they authenticate, ISPs and other spam fighters will be able to keep track of senders and their reputations. Companies would be held accountable for the sending habits of their employees, and ISPs would be responsible for their customers' e-mail. Those that developed a reputation for generating spam could find their e-mail blocked -- a situation that could force e-mail providers to ensure that their customers' computers are secured, so spammers couldn't hijack them to send junk mail. Legitimate e-mail marketers that allow recipients to remove themselves from mailing lists and that obey other professional codes of conduct would have their messages whisked around spam filters instead of getting blocked. Technologies like DomainKeys and Sender ID are needed to take SMTP from being dangerously wide open to being much more controlled, said Steve Jillings, chief executive of FrontBridge Technologies Inc., a Marina del Rey, Calif., e-mail security company that plans to implement Sender ID. The catch is that an authentication standard has to be widely adopted to be effective. Getting companies across the world to agree on a standard and implement it seems highly unlikely to technologists such as Carnegie Mellon's Farber. But the future of e-mail depends on it, said Scott Weiss, chief executive of the anti-spam company IronPort Systems Inc. The innovation of e-mail now needs to catch up with many of the rich features that have now been rendered virtually unusable. Back Copyright ©1997-2004 PG Publishing Co., Inc. All Rights Reserved. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
As Cash Fades, America Becomes A Plastic Nation
experiment in which she used plastic for every purchase over $10. Rushing through airports from country to country to join qualifying meets, she never had to change currencies. For roughly 60 million Americans without bank accounts, however, living without cards is getting harder. They can't easily rent cars or stay in hotels, among other things. You're effectively locked out of the American Dream if you don't have some kind of plastic, and it's going to get worse, says Mr. Simmons, the hip-hop mogul, whose RushCard lets holders put their paychecks onto plastic. U-Haul International Inc., the truck-rental company, has begun issuing payroll cards to about 3,000 of its employees, or about 17% of its work force. They are mostly hourly workers who lack bank accounts. Workers can withdraw cash once a week from any automated teller machine without paying a fee, and they can use the cards wherever Visa is accepted. They can even get cash back after a purchase from the supermarket without any charge. The company, meanwhile, says it is saving about $500,000 a year in costs associated with issuing checks. More technological innovation is coming, and plastic itself may eventually fall into disuse. After all, it is the numbers carried on plastic, not the plastic cards themselves, that are necessary to complete transactions. Since cards are susceptible to theft and fraud, the industry is working on biometric identification techniques. Computers would link credit-card numbers, housed on an electronic database, to unique body parts such as fingerprints, irises or facial characteristics. Card industry executives envision consumers being identified at cash registers with devices such as fingerprint readers or eye scanners, which would replace the signature or PIN that consumers currently use to verify identity. Online shoppers might identify themselves by pressing fingers to a silicon wafer embedded in the keyboard, which would read the fingerprint, match it online with a copy held by bank or merchant, then authorize the sale. They wouldn't need a card at all. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Anonymity, ... - A Proposal for Terminology v 0.18
I've been sent the pdf and .doc versions of this. If you can't get this through the site or the author, ping me and I can send you what they sent me. Cheers, RAH --- begin forwarded text Delivered-To: [EMAIL PROTECTED] To: long list snipped From: Andreas Pfitzmann [EMAIL PROTECTED] Subject: Anonymity, ... - A Proposal for Terminology v 0.18 Sender: [EMAIL PROTECTED] List-Id: Primary NymIP discussion list nymip-res-group.nymip.org List-Post: mailto:[EMAIL PROTECTED] List-Help: mailto:[EMAIL PROTECTED] List-Subscribe: http://www.nymip.org/mailman/listinfo/nymip-res-group, mailto:[EMAIL PROTECTED] List-Archive: http://www.nymip.org/pipermail/nymip-res-group/ Date: Thu, 22 Jul 2004 09:21:49 +0200 Hi all, Marit Hansen and myself are happy to release herewith Anonymity, Unobservability, Pseudonymity, and Identity Management - A Proposal for Terminology v0.18 Since the beginning of this undertaking in 2000, it is joint work with many criticizing and contributing. Thanx a lot to them all. May I encourage you to make use of this document and help in its further development as well? To help you in this, I did put online at http://dud.inf.tu-dresden.de/Literatur_V1.shtml all older versions of this document (starting with v0.5) not only in .pdf, but in .doc as well. The latter you can use easily using, e.g. MS Word, to highlight any delta between versions, e.g. the differences between the last version you have read and the current version. Happy to hear from you Andreas -- Andreas Pfitzmann Dresden University of Technology Phone (mobile) +49 170 443 87 94 Department of Computer Science (office) +49 351 463 38277 Institute for System Architecture (secretary) +49 351 463 38247 01062 Dresden, Germany Fax +49 351 463 38255 http://dud.inf.tu-dresden.de e-mail[EMAIL PROTECTED] Content-Type: application/pdf; x-unix-mode=0644; name=Anon_Terminology_v0.18.pdf Content-Disposition: inline; filename=Anon_Terminology_v0.18.pdf Content-Type: application/msword; x-mac-type=5738424E; x-unix-mode=0644; x-mac-creator=4D535744; name=Anon_Terminology_v0.18.doc Content-Disposition: attachment; filename=Anon_Terminology_v0.18.doc --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
[ISN] Stolen code shop back in business - on Usenet
--- begin forwarded text Date: Tue, 20 Jul 2004 07:12:55 -0500 (CDT) From: InfoSec News [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: [ISN] Stolen code shop back in business - on Usenet Reply-To: [EMAIL PROTECTED] List-Id: InfoSec News isn.attrition.org List-Archive: http://www.attrition.org/pipermail/isn List-Post: mailto:[EMAIL PROTECTED] List-Help: mailto:[EMAIL PROTECTED] List-Subscribe: http://www.attrition.org/mailman/listinfo/isn, mailto:[EMAIL PROTECTED] Sender: [EMAIL PROTECTED] http://www.itworld.com/Man/2681/040719stolencode/ Paul Roberts IDG News Service 7/19/04 An online group claiming to have the source code for two popular computer programs for sale opened its doors for business again on Saturday. An e-mail message that claims to come from larry hobbles and the Source Code Club was sent to the Full-Disclosure security discussion list. The message said that the group has moved operations to Usenet, the network of online bulletin boards that makes up part of the Internet, where interested customers can buy the source code for the Dragon intrusion detection system (IDS) software from Enterasys Networks Inc. and peer-to-peer server and client software from Napster LLC, now owned by Roxio Inc. The club made headlines last week after posting messages to online discussion groups that advertised a Web site selling the source code and design documents for Dragon and Napster. By Thursday, the group's Web page displayed a message saying the club had ceased operations due to fears our customers faced. A subsequent newsletter from the club dated July 17 and posted to the Usenet group alt.gap.international.sales at 10:28 PM Pacific Standard Time called Usenet the official home of the Source Code Club and said the informal network was better suited to the club and would give potential customers two ways to contact club members: through a club e-mail address and through messages posted in the Usenet group. The newsletter claims that the Source Code Club soon hopes to go underground and stop offering code for sale in public, but is offering the Dragon and Napster code to authenticate our skills. The Enterasys code would allow purchasers to understand the secrets behind Dragon, whereas the Napster code could give any company interested in breaking into the online music industry a jump-start, the newsletter said. The club also expressed regret for the public fiasco that ensues when you publicly offer source code, an apparent reference to media attention to the group's unveiling. The club also posted instructions for potential customers to purchase the stolen code. Customers are encouraged to contact the group using e-mail and PGP (Pretty Good Privacy) encryption to disguise their requests. Source code for the Dragon software was priced at US$16,000 and Napster for $10,000, with payments made through one of a number of online payment services. Those wary of sending money to the club have the option of buying the source code in $500 increments to build confidence. Enterasys is working with the U.S. Federal Bureau of Investigation and reviewing the club's claims. The company claims that its product code was lifted off stolen media, such as a compact disc or computer hard drive, rather than stolen directly from its computer network, according to Kevin Flanagan, an Enterasys spokesman. A Napster spokeswoman said last week that while Roxio owns the rights to the original Napster code being sold by the club, the current Napster online service does not use any code from the original, free music swapping service and is not affected by the alleged theft. _ Help InfoSec News with a donation: http://www.c4i.org/donation.html --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
A cypherpunk in Baghdad (was re: giantlaser: Ali Baba returns)
-18 08:41 (link) Another note-to-self: emergency shoes. Nothing like trying to flee from a building when glass is all over the floor. (Reply to this) gori11a 2004-07-18 09:21 (link) In Nairobi, our Askari (night guard? There's no real translation) carried Rungas, which are short narrow clubs with knotted gnarls at the end. Bandits usually were armed with Machettes. A siren and spinning light alarm on the top of a house would summon all the Askaris on the block to beat the bandits to within an inch of their lives. It was not uncommon for an Askari to be found asleep on his watch. I'm glad guns weren't as prevalent there as they seem to be in Baghdad. (Reply to this) cambler 2004-07-18 10:14 (link) I've said it before, and I'll say it again - I look forward to your book more than you can know. (Reply to this) re: turns of phrase (Anonymous) 2004-07-18 12:30 (link) faithful manservant, eh? aide-de-camp is also very good. (Reply to this) pinkish 2004-07-18 23:55 (link) What about good ole motion sensor lights? Scare the shit out of me walking by someone's garage at 4am. (Reply to this) (Post a new comment) -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: TCG(TCPA) anonymity and Lucky Green
At 4:18 PM -0400 6/29/04, An Metet wrote: On August 6, 2002, Lucky Green wrote a reply to Anonymous (whom I will now come clean and admit was none other than me) Prove it. ;-) Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Third announcement ECC 2004
for registration is open and can be found at: http://www.ruhr-uni-bochum.de/hgi/tanja.html For this year the full conference fee is 170 EUR, we offer a reduced fee of 80 EUR for students. Please register as soon as possible as the number of participants is limited. -- ACCOMMODATIONS: We set aside a number of rooms on a first-come first-serve basis at following hotels. To get the prices listed below include the respective quotations when making your reservation Hotel Acora http://www.acora.de/html/bochum.html Tel.: (+49)234 68 96 0 Fax: (+49)234 68 96 700 Nordring 44-50 (center of Bochum) single 66,50 EUR double 80,50 EUR both including breakfast mention ECC-Workshop These rooms are set aside till 30.07.2004. Hotel Haus Oekey http://www.oekey.de/ Tel.: (+49)234 388 13 0 Fax: (+49)234 388 13 88 Auf dem Alten Kamp 10 (halfway between university and city center) single 52 EUR double 70 EUR both including breakfast mention Ruhr-University, Lange These rooms are set aside till 10.08.2004. Hotel IBIS am Hauptbahnhof http://www.ibishotel.com/ Tel.: (+49)234/91430 Fax : (+49)234/680778 Kurt- Schumacher- Platz 13-15 (next to main station) single 49 EUR breakfast is available for 9 EUR. The fee includes free public transport in Bochum mention ECC These rooms are set aside till 12.08.2004. Hotel Kolpinghaus http://www.kolpinghaus-bochum.de/html/hotel.html Maximilian-Kolbe-Str. 14-18 (close to main station, center) single 46 EUR double 24 EUR including breakfast. Facilities include linen and have communal bathrooms on each floor. Please make your booking via Tanja Lange [EMAIL PROTECTED] and mention with whom you would like to share a room. These rooms are available till 09.08.2004. Other hotels can be found at http://www.bochum.de/english/ http://www.bochum.de/bochum/bohotel.htm (The hotel page is available in German only) == FURTHER INFORMATION: For further information, please contact: Tanja Lange Information Security and Cryptography Ruhr-University Bochum e-mail: [EMAIL PROTECTED] Fax: +49 234 32 14430 Tel: +49 234 32 23260 == --- --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
GeoEcon: Fahrenheit 9/11 -- Sticking the Motorcycle's Irony Gauge
thought not... Cheers, RAH - --- -BEGIN PGP SIGNATURE- Version: PGP 8.0.3 iQA/AwUBQOCcK8PxH8jf3ohaEQJu3ACeOHP1fqembZi5WG412cDnHEsDvfwAn08y CwvcyvgOntaJUfB2qgCaH1eH =0EFe -END PGP SIGNATURE- -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Privacy fears on welfare offensive
Try not to laugh too hard, now, boys and girls... Cheers, RAH --- http://australianit.news.com.au/common/print/0,7208,9982358%5E15319%5E%5Enbv%5E15306,00.html Australian IT Privacy fears on welfare offensive Karen Dearne JUNE 29, 2004 THE crackdown on welfare cheats is hotting up as more federal police are assigned to help Centrelink track social security fraud identified by data matching. Centrelink gained access to AusTRAC's financial transactions database earlier this year and took on 46 specialists to deal with the increased cross-matching and analysis workload. Centrelink also does online matching with Australian Tax Office and Immigration Department databases. Justice Minister Chris Ellison and Children and Youth Affairs Minister Larry Anthony have agreed to more than double, from four to 10, the number of AFP agents posted to Centrelink's fraud investigation teams. They expect the move to result in 1200 extra investigations this year, rising to 3000 in 2006-07 with projected net savings of $60 million over four years. Centrelink's access to AusTRAC resources was aimed at cracking down on high-end welfare cheats, they said. According to AusTRAC data, about 5 per cent of suspicious transaction reports concern social security fraud - about 400 cases a year. The Child Support Agency and the Department of Veterans' Affairs were also given access to AusTRAC data. As techniques to perpetrate fraud against the social security system are becoming more sophisticated, the AFP and Centrelink are working more closely to put law enforcement one step ahead of criminals trying to defraud the system, Senator Ellison and Mr Anthony said. Australia has a generous welfare system and the Government recognises that most people are honest. However, there are always some people who take more than their share. Taxpayers can rest assured that Centrelink and the Australian Federal Police (AFP) are making sure people are only paid their correct entitlement - no more, no less. The Australian Privacy Foundation has expressed concern about the large expansion of citizens' data-matching occurring between AusTRAC and other agencies, at a time when AusTRAC is taking on increased responsibilities for international money laundering and terrorist financing reform. We objected very strongly to the extension of access to Centrelink, Child Support and Veterans' Affairs when the legislation went through late last year, APF convenor Nigel Waters said. It was a major extension of the scheme. We've also put in a very strong submission about the proposed extension of AusTRAC's operations under changes to the Financial Transactions Reporting Act. We believe this is one of the most dangerous developments yet, because it basically extends that sort of spying routine that banks already do on their customers to other people, like real estate agents. Australian Consumers Association IT policy spokesman Charles Britton said AusTRAC appeared to be positioning itself as a manager of citizens' identity data, rather than a cash transactions manager. It's a subtle change, but AusTRAC appears to be taking on that identity manager role, particularly as far as government agencies are concerned, Mr Britton said. I'm sure it's within their charter, I'm not suggesting it's not, but they seem to be emphasising an aspect to their work that isn't exactly what springs to people's minds in relation to AusTRAC. Mr Waters said the APF was concerned that there was no independent oversight of AusTRAC's activities. Part of the problem is that they don't claim to be exercising any independent judgment, he said. AusTRAC says it is just a clearing house, so it can't be blamed for the way information is used. That comes down to the law enforcement agencies, the Australian Tax office (ATO) and Centrelink. We think that's totally inadequate. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
VeriSign service takes on spam
..A whitelist for my friends... Cheers, RAH --- http://news.com.com/2102-7355_3-5250010.html?tag=st.util.print CNET News VeriSign service takes on spam By Dinesh C. Sharma Special to CNET News.com http://news.com.com/2100-7355-5250010.html Story last modified June 28, 2004, 8:11 AM PDT VeriSign on Monday announced a new e-mail security service designed to stop viruses and spam. The service uses custom blacklists, fingerprinting and heuristic tools, which calculate the probability that a particular e-mail message is spam by examining a pattern of characteristics in the message. VeriSign's heuristic tools use more than 10,000 rules to determine whether a message is spam, the company said. For blocking malicious mail, the service deploys three antivirus engines. For policy enforcement, customers can use domain-level filtering to scan inbound and outbound e-mail. And a disaster recovery feature allows for automatic switchover to VeriSign's network to provide SMTP connections that queue e-mail, if a company's e-mail server is not available. The company has begun free trials of the service, which will be available on July 12. Pricing details were not announced. VeriSign said it plans to add more functions, such as verification of sender identity and domain authentication. Domain names of all incoming mail will be checked against the company's list of verified domains. This list will be made available free to antispam software and service providers. Although e-mail has become a critical tool for business communication, it is often saddled with problems caused by spam, viruses and worms. Last week, malicious software infected some Web sites, redirecting visitors to a Russian server that downloaded software onto surfers' computers. Some have speculated that the purpose of this malicious plan was spam distribution. Recently, IBM introduced a security management service to help businesses stop viruses and spam before they enter their networks. The introduction of this service will help enterprises restore the productivity gains from e-mail communication that are now under threat from spam and viruses, Judy Lin, executive vice president at VeriSign, said in a statement. With a service-oriented approach, enterprises can easily obtain comprehensive e-mail protection in a matter of hours, without deploying any software or hardware. This service will enable customers to rely on VeriSign's highly available and scalable infrastructure for mission-critical functions. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Shuffling to the sound of the Morlocks' dinner bell
principles, who (no matter which wins) will proceed to raise your taxes, take away more of your freedoms, and continue frittering away whatever remains of America's reputation for decency by continuing the violent military occupation of scores of foreign countries that have never attacked nor declared war upon us. All this in hopes of temporarily propping up the bottom lines of sundry well-heeled banks, oil companies and federally subsidized engineering and construction firms. All because you don't want to throw away your vote -- and register your disapproval with that state of affairs -- by voting for a guy who would make you feel decent and clean. Because he's going to lose. So, I don't get it: Let's say you flip a coin and manage to pick the winner. What do you win? Vin Suprynowicz is assistant editorial page editor of the Review-Journal and author of the books Send in the Waco Killers and The Ballad of Carl Drega. His Web site is www.privacyalert.us. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Florida to Tax Home Networks
http://www.wired.com/news/print/0,1294,63962,00.html Wired News Florida to Tax Home Networks By Michelle Delio? Story location: http://www.wired.com/news/business/0,1367,63962,00.html 02:00 AM Jun. 24, 2004 PT Florida state officials are considering taxing home networks that have more than one computer, under a modified 1985 state law that was intended to tax the few businesses that used internal communication networks instead of the local telephone company. Officials from Florida's Department of Revenue held a meeting on Tuesday to see whether the law would apply to wired households, and exactly who would be taxed. About 200 people attended, including community and business representatives. In 1985 the state passed a law to tax businesses using their own communications networks, because otherwise the state could not collect tax revenue on the businesses' local telephone service. In 2001, that law was expanded to make any system that is used for voice or data that connects multiple users with the use of switching or routing technology taxable up to 16 percent. The law is so broad that it would apply to networked computers, wireless services, two-way radios and even fax machines -- or substitute communications systems, as the state calls them. The tax would be applicable (PDF) to the costs of operating such a substitute communications system, not to the purchase of the system's components. In some cases, it appears the tax would be collected by the providers of communications services such as wireless companies or voice-over-IP firms. The tax would be added to the user's bill and then turned over to the Department of Revenue. But some substitute communications services don't require a service plan. For those, the state could take the tax from the amount deducted on business, and perhaps personal, tax filings. According to my accountant, the way the law is written, if my tax filing includes deductions for the repair or maintenance of my two computer and one printer network, those costs will be subject to state communication taxes, said graphic artist Linda Kellman, who works from home. Self-employed people get slammed with insane taxes everywhere, and I've sadly but grudgingly accepted that. But this tax, if they ever try to collect it, would be the last straw. Can I outsource my network to a more sensible state, do you think? Florida businesses and residents -- and even some officials in the Florida Department of Revenue -- agree that the wording of the law is too broad. In May, the Florida Senate unanimously passed a bill that would have prevented collection of the tax until 2006, during which time the law could be carefully reviewed. The bill was then sent to the House, but wasn't voted on before the summer break, clearing the way for officials to begin collecting the tax. As a result, the Florida Department of Revenue, which, according to local newspaper reports, was in favor of the bill to delay the collection of the tax, must now begin to address how the tax should be implemented. The tax language is so broad that virtually any communication technologies in your home or office could be subject to this tax, said Chris Hart, spokesman for ITFlorida, a not-for-profit industry organization for the state's technology professionals. It's difficult to imagine a more anti-technology, anti-business tax. It directly attacks the efficient use of information technology. Florida businesses aren't in favor of the tax. It also could tax almost any Florida resident who uses any sort of modern communications technology, something that Florida's battalions of retirees on fixed incomes have just begun to become aware of, according to Hart. Information on this issue is starting to reach the general public, and it probably isn't widely understood just yet, he said. However, once people do realize how this tax could impact them on a personal level, they wake up very fast. All my life, I've willingly paid my fair share of taxes in exchange for community services, said 73-year-old George Fedoro, a retired engineer who now lives in Boca Raton. But this tax is not fair and could turn senior citizens into criminals, because no one that I know can or will pay it. Florida Gov. Jeb Bush would have to approve any rule the tax department suggests. Bush has said he isn't in favor of the tax, but many fear he may be swayed by city and county government officials. The tax would go, in part, toward school construction and other projects. Additional meetings on the proposed rules for the tax will be held in other locations around the state later in the year, Department of Revenue officials said. If the law is implemented, Florida would have the most wide-reaching state tax on technology. But it may not be the last -- state officials estimate enforcement of the tax could bring in more than $1 billion a year in revenue for the state. -- - R. A. Hettinga mailto: [EMAIL PROTECTED
Senate Passes Two Measures To Combat Piracy on the Web
http://online.wsj.com/article_print/0,,SB108820092814147912,00.html The Wall Street Journal June 28, 2004 E-COMMERCE/MEDIA Senate Passes Two Measures To Combat Piracy on the Web By NICK WINGFIELD Staff Reporter of THE WALL STREET JOURNAL June 28, 2004; Page B3 The Senate passed two pieces of legislation designed to help crack down on individuals who trade pirated music and other material over the Internet. But another Senate proposal is causing a growing uproar among technology companies, which are afraid it could stifle innovation and make devices such as Apple Computer Inc.'s iPod a possible target of entertainment-industry lawsuits. The Senate on Friday passed the Protecting Intellectual Rights Against Theft and Expropriation, or Pirate, Act, introduced by Senators Patrick Leahy and Orrin Hatch, under which the Department of Justice will be able to bring civil copyright-infringement cases against people who download unauthorized copies of music, movies and other works using Internet file-sharing programs such as Kazaa. Under current law, the Justice Department can bring only criminal prosecutions, making copyright-infringement cases more difficult to prove in court. The Senate on Friday also passed a bill introduced by Sens. John Cornyn (R., Texas) and Dianne Feinstein (D., Calif.) that would increase penalties for distributing pre-release copyrighted works and create a federal law against use of camcorders in movie theaters. Comparable bills still need to be passed by the House of Representatives. While the bills were praised by the entertainment industry and criticized by technology-advocacy groups, the greatest controversy stemmed from a proposal introduced in the Senate Judiciary Committee last week by Sen. Hatch (R., Utah), called the Inducing Infringement of Copyrights Act. The bill, co-sponsored by a powerful bipartisan group including Senators Bill Frist (R., Tenn.), Tom Daschle (D., S.D.) and Barbara Boxer (D., Calif.), would allow entertainment companies to bring lawsuits against any company that intentionally induces individuals to violate copyrights by making unauthorized copies of songs, movies and other works. High-tech companies have often been at loggerheads with legislation backed by the entertainment industry, but the latest proposal seems to have struck an especially sensitive nerve in the tech world. The fear: that the proposal could effectively invalidate a key 1984 Supreme Court ruling in a lawsuit between Sony Corp. and the movie industry over the video cassette recorder. The ruling protected the VCR, which allowed users to make bootleg copies of movies, because it also had substantial noninfringing uses. Critics of the Hatch proposal say it could go far beyond penalizing the file-sharing programs that allow users to swap music and movies. Indeed, they said, it could make targets of manufacturers of DVD and CD recorders, personal computers and other hardware. We are concerned it will have an immediate chilling effect on the introduction of new technologies, says Jeff Joseph, a spokesman for the Consumer Electronics Association. Cindy Cohn, an attorney for the Electronic Frontier Foundation, an online civil-liberties group, said that under the Hatch proposal it could be argued, for instance, that the huge song storage capacity of Apple's iPod audio player induces copyright violations since it enhances the appeal of file-sharing programs and the piracy therein. Similarly, Toshiba Corp., maker of the iPod's hard drive, and CNET Networks Inc., which has explained how to use music on the iPod, might be considered inducers, the EFF said. Supporters of the bill insisted that such examples are unrealistic and that the proposal is aimed at a more a narrow group of companies, such as makers of file-sharing programs. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
And now, USA Today Presents a Word from Horseman #2
http://www.usatoday.com/tech/news/2004-06-27-terrorweb-usat_x.htm USA Today Internet's many layers give terrorists room to post, then hide Terrorists are increasingly using the Internet to spread shocking images and state their demands. In the past month, video and photos of the beheadings of American Paul Johnson Jr. and South Korean Kim Sun Il were posted on Web sites sympathetic to Islamic terrorists. Last week, a Saudi Web site posted a statement from alleged terrorist leader Abu Musab al-Zarqawi claiming responsibility for attacks across Iraq. Weimann says the Web offers terrorists anonymity, easy access ... and the ability to disappear. By Stephen J. Boitano, AP The sites are often shut down by the governments of the countries in which they're based, but new ones quickly appear. USA TODAY's Mark Memmott talked with an expert on terrorists' use of the Internet, Gabriel Weimann, a senior fellow at the federally funded U.S. Institute of Peace. Their conversation has been edited for length and clarity. Q: Can't terrorists be caught by tracing who posts their messages? A: You can track it. ... The question is, how deep can you go and how far can you go? Let me explain the layers. ... The first layer will be to look at the Web site and see the address. With the address, you can track the server (host computer) that is used - you can see where the Web site is based. That can be done in seconds. It's not a problem. ... That is being done by security agencies and counterterrorism forces all over the world. Q: What's the next layer? A: To know where the message or the video or the announcement or the picture or whatever was sent from. ... If I try to post something on a Web site, I'm using a server, too. There are two servers connected: the server that I'm using and the server that posts it on your Web site. Q: Sounds simple to trace. A: But there are many options. You can access different servers from different domains, which are public. It can be a university library. You go to a public library or a university library or an Internet cafe. Q: So, physically, there's little evidence to find if investigators get to that library or cafe? A: Now we're getting to the third level: the user. Let's say that I find the server that you used. I still didn't get to the individual user. I can say, 'This was sent from a computer in Jakarta' ... or from wherever. It was in a library or a computer network. ... But the user may disappear seconds after posting the message. Usually they do. So the deeper you go, the harder it is to find the user. This is one of the most important advantages of the Internet for terrorists. Anonymity, easy access, free access and the ability to disappear. Q: And if the person who sat at the computer and sent the video out is ever found, who is he likely to be? A: The guy who's posting the messages for the terrorists, or doing the downloading, is like the smallest of actors in the theater. You won't find the scriptwriters. I'm sure modern terrorists are quite aware of the possibility to track them down. So the chains (in their organizations) will be very long, and probably nobody knows who's the third link from him. Q: How do you, and investigators, monitor terrorists' use of the Web? A: It takes time. ... Al-Qaeda right now is moving among 50 different Web addresses. ... You have to follow the psychology of terrorists, the publicity-seeking mind of terrorists. They want you to find (information they put on the Web). They want people who are supporters or potential supporters, and journalists, to find them. To do so they have to publicize the new (Web addresses). They will go into Internet chat rooms and notify people. Q: So you monitor the chat rooms, watching for messages? A: We call it lurking. You sit quietly in a chat room. You do nothing. Just join it and sit quietly in the dark. This is what I do and what my research assistants are doing. You find very important information. (Relevant chat rooms can be found, for example, by performing a Google groups search using key words such as al-Qaeda or jihad.) Q: What are the messages like? A: Someone might ask, Where can I find video of a Chechen slitting the throat of a Russian? A few lines later, someone will answer, Go to this Web site, and you'll see it. Q: People are looking for such things, then? A: Yes, and now we're coming to the speed at which things move. Once (terrorists' messages or video) appears somewhere, especially after an execution or dramatic event, within seconds it will be diffused and posted on other Web sites. You can find it within seconds all over the Internet. Even the beheading of Mr. Johnson. It was posted first on an Arab (Web) forum in England. But within seconds, it was also posted on American servers and American Web sites and then worldwide. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar
SciAm: The Mystery of the Voynich Manuscript
. But a crucial question remains: Does the manuscript contain only meaningless gibberish or a coded message? I found two ways to employ the grilles and tables to encode and decode plaintext. The first was a substitution cipher that converted plaintext characters to midfix syllables that are then embedded within meaningless prefixes and suffixes using the method described above. The second encoding technique assigned a number to each plaintext character and then used these numbers to specify the placement of the Cardan grille on the table. Both techniques, however, produce scripts with much less repetition of words than Voynichese. This finding indicates that if the Cardan grille was indeed used to make the Voynich manuscript, the author was probably creating cleverly designed nonsense rather than a ciphertext. I found no evidence that the manuscript contains a coded message. This absence of evidence does not prove that the manuscript was a hoax, but my work shows that the construction of a hoax as complex as the Voynich manuscript was indeed feasible. This explanation dovetails with several intriguing historical facts: Elizabethan scholar John Dee and his disreputable associate Edward Kelley visited the court of Rudolf II during the 1580s. Kelley was a notorious forger, mystic and alchemist who was familiar with Cardan grilles. Some experts on the Voynich manuscript have long suspected that Kelley was the author. My undergraduate student Laura Aylward is currently investigating whether more complex statistical features of the manuscript can be reproduced using the Cardan grille technique. Answering this question will require producing large amounts of text using different table and grille layouts, so we are writing software to automate the method. This study yielded valuable insights into the process of reexamining difficult problems to determine whether any possible solutions have been overlooked. A good example of such a problem is the question of what causes Alzheimer's disease. We plan to examine whether our approach could be used to reevaluate previous research into this brain disorder. Our questions will include: Have the investigators neglected any field of relevant expertise? Have the key assumptions been tested sufficiently? And are there subtle misunderstandings between the different disciplines that are involved in this work? If we can use this process to help Alzheimer's researchers find promising new directions, then a medieval manuscript that looks like an alchemist's handbook may actually prove to be a boon to modern medicine. GORDON RUGG became interested in the Voynich manuscript about four years ago. At first he viewed it as merely an intriguing puzzle, but later he saw it as a test case for reexamining complex problems. He earned his Ph.D. in psychology at the University of Reading in 1987. Now a senior lecturer in the School of Computing and Mathematics at Keele University in England, Rugg is editor in chief of Expert Systems: The International Journal of Knowledge Engineering and Neural Networks. His research interests include the nature of expertise and the modeling of information, knowledge and beliefs. © 1996-2004 Scientific American, Inc. All rights reserved. Reproduction in whole or in part without permission is prohibited. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Cryptography Research's Nate Lawson to Speak at USENIX '04
http://biz.yahoo.com/prnews/040628/sfm086_1.html Yahoo! Finance Press Release Source: Cryptography Research, Inc. Cryptography Research's Nate Lawson to Speak at USENIX '04 Monday June 28, 9:05 am ET Presents Lessons Learned in Secure Storage for Digital Cinema SAN FRANCISCO, June 28 /PRNewswire/ -- Digital cinema transforms the protection and physical transport of film cans into an outsourced storage security problem, but security expert Nate Lawson believes that conventional IT solutions are not up to the task. Lawson, senior security engineer at Cryptography Research, Inc., has used open source software to rapidly prototype digital cinema storage solutions and will offer advice on how to maintain security throughout the entire cinema life cycle, from filming and production to projection, at the USENIX '04 Annual Technical Conference. ADVERTISEMENT Lawson's presentation, Building a Secure Digital Cinema Server Using FreeBSD, is scheduled for 3:30 p.m. on Tuesday, June 29 in the Boston Marriott Copley Place Hotel. Traditional storage security solutions are designed to operate within a data center under the data owner's physical management and control, but in digital cinema, the data representing the film passes through multiple parties with different incentives and levels of security, said Lawson. While encryption is important, it is not sufficient to ensure data integrity or provide the evidence needed to ensure accountability and mitigate leaks at critical junctures in film production and distribution. According to Lawson, the projection booth at the local cinema is rapidly taking on many of the aspects of a traditional IT data center, with racks of computers and storage devices, high-bandwidth LANs and SANs, and other equipment. Digital cinema is still in an embryonic stage, with about 90 digital cinema-ready theaters across the U.S. Lawson's talk will present new criteria for evaluating storage security solutions, from disk encryption or file system encryption to other storage security products, and show how open source software supported the rapid development of a prototype digital cinema server in a proprietary environment. Lawson will also discuss the importance of standardization efforts, including the Digital Cinema Initiative. Nate Lawson, senior security engineer at Cryptography Research, is focused on the design and analysis of platform and network security. Previously, he was the original developer of ISS RealSecure and various products for digital cinema, storage security, network mapping, and IPSEC. Nate has evaluated cryptographic systems for FIPS 140 and other secure standards. He is a FreeBSD developer in his spare time, contributing a SCSI target driver and working on ACPI and CAM. Nate holds a B.S. computer science degree from Cal Poly and is a member of USENIX and SMPTE. USENIX, the Advanced Computing Systems Association, supports and disseminates practical research, provides a neutral forum for discussion of technical issues and encourages computing outreach into the community at large. USENIX conferences have become essential meeting grounds for the presentation and discussion of advanced developments in all aspects of computing systems. About Cryptography Research, Inc. Cryptography Research, Inc. provides consulting services and technology to solve complex security problems. In addition to security evaluation and applied engineering work, CRI is actively involved in long-term research in areas including tamper resistance, content protection, network security, and financial services. This year, security systems designed by Cryptography Research engineers will protect more than $60 billion of commerce for wireless, telecommunications, financial, digital television, and Internet industries. For additional information or to arrange a consultation with a member of our technical staff, please contact Jennifer Craft at 415-397-0329 or visit www.cryptography.com. Source: Cryptography Research, Inc. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Spam sender sentenced in Russia for the first time
http://english.pravda.ru/printed.html?news_id=13170 Spam sender sentenced in Russia for the first time - 06/23/2004 19:32 On June 22 student Dmitry Anosov from the city of Chelybinsk was sentenced forcreating software causing uncontrolled blocking computers and copying information?. His crime was about sending unsolicited messages to the owners of GSM-telephones, that is spam. The student was put on probation for one year and required to pay fine of 3,000 roubles ($100), the Kommersant reported. In the summer of 2003 the employees of cell operator companyUralsky GSM?, the subsidiary of Megafon company, complained to the police that more than 15,000 cell phone owners were receiving unquotable SMS-messages on May 23-24. The suspect was detected, his apartment was searched, and the police confiscated the material evidence the computer having the software for sending SMS-messages. According to the police, the student created the software for sending SMS-messages to the customers of Uralsky GSM company. In February, 2003 Androsov tested his software by sending several SMS-messages to a company customer. In the end of May, 2003 Androsov used somebody else?s data to connect to the Internet, and uploaded his software to the server hosted in St. Petersburg to avoid being detected, and started the software. As a result, the customers received unquotable SMS-message discrediting the image of cell phone operator Megafon company. SMS-spam sender pleaded guilty. This case can create precedent and help Russian law-enforcers and legal system to safeguard Russian society people from spam. There is a special law on spam in the USA, but Russia lacks such a law. The legal regulating of the Internet is only being discussed in Russia. Internet companies do not try to lobby special anti-spam laws. Therefore, this court verdict was unique for Russia. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
For Liars and Loafers, Cellphones Offer an Alibi
of such clubs focusing on subjects large and small, ranging from animal rights to the question of whether pirates or ninjas are tougher. In Ms. Logan's case, she promptly used the alibi club she had started to get out of a blind date. She sent out a text message asking for help, and in came a response from a stranger in San Jose, Calif., who agreed to call the blind date, pretend to be Ms. Logan's boss, and explain that she had to go to Europe for a training seminar. These days, Ms. Logan spends much of her time overseeing the e-mail traffic and watching her club grow. It now has 3,400 members, with hundreds of new members signing up each week. One member recently used the club to fool his wife so he could stay at a sports bar to watch the N.B.A. finals. Another member - the wife of a soldier stationed in Iraq - sent out a message asking for help to conjure up an excuse after becoming pregnant by another man. But in that case, many responders urged the woman to tell her husband the truth, according to club members. The European alibi club which inspired Ms. Logan grew to 4,000 members, but was shut down late last year by its founder, Kayle Hanson, 21. I got a new girl and she wasn't too keen on it, said Mr. Hanson, who lives in Hamburg, Germany. She thought it was immoral. Imagine that! Ms. Logan said she was not terribly concerned about lying. Still, she said one reason she preferred counting on strangers to help her was that she did not want her friends to know what she was doing. You wouldn't really want your friends to know you're sparing people's feelings with these white lies, she said, laughing. Another problem, which even alibi club members admit, is that other members may not be entirely trustworthy. Mr. Hall, the student in Denver, said that when he gave away his girlfriend's phone number to a stranger, he worried that the stranger might do more than make an excuse. I didn't want him hitting on her or telling her what I was up to, Mr. Hall said. But now he is a believer in the power of the cellphone-assisted alibi. It worked out good, actually. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Sewing Machine Escrow...
Links * To visit your group on the web, go to: http://groups.yahoo.com/group/osint/ * To unsubscribe from this group, send an email to: [EMAIL PROTECTED] * Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Police fudge on ID theft: expert
http://australianit.news.com.au/common/print/0,7208,9890733%5E15319%5E%5Enbv%5E15306,00.html Australian IT Police fudge on ID theft: expert Kelly Mills JUNE 22, 2004 REPORTS of increasing identity fraud attacks have been exaggerated by law enforcement agencies seeking to maintain budgets, according to a former Scotland Yard detective. Identity fraud attacks, such as phishing, have increased in the past year as international syndicates target Australian financial institutions. However, SAS Institute fraud and anti-money laundering solutions director Rowan Bosworth-Davies, a former Scotland Yard detective and lawyer, says identity theft is relatively rare. I would need more evidence from law enforcement agencies of identity theft before I got too excited about it, he says. It is a sexy subject and you can say what you like and no-one will say that you are wrong. Bosworth-Davies says there is a lot of hype around identity theft and a great deal of misinformation, which he attributes partly to some police agencies that want to increase funding. If someone was living the life of Riley on your credit card, wouldn't you know within a month, when you got your credit card statement? Bosworth-Davies says genuine cases of identity fraud, using stolen credit card details and other identity documents, are relatively few. Speaking at the SAS International Forum 2004 in Copenhagen, Bosworth-Davies was also critical of banks' ability to deal with money laundering. Prior to September 11, 2001, there was debate about money laundering, and if banks had software it was largely developed internally, he says. In the past three or four years, however, large banks had installed anti-money-laundering software to comply with new international regulations. Leading banks in the UK have adopted new solutions, but it would be less true in Australia, which has different regulatory drivers. Kelly Mills attended SAS Forum International 2004 in Copenhagen as a guest of SAS Australia. This report appears on australianIT.com.au. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Let the Patriot Act Die
in to showcase the very latest in citizen surveillance wares. The US Chamber of Commerce has hired the former deputy assistant to the Joint Chiefs of Staff to act as a liaison between the chamber and businesses seeking homeland security contracts. PoliticalMoneyline says that 444 groups and individuals have registered as lobbyists to deal with terror and security issues. IBM has opened a Government Solutions Center in Vienna, Virginia. The high-tech Unisys Corporation has established a similar exhibition for inspection by federal surveillance planners, called the Homeland Security Center for Excellence. Both corporations are racing to cash in on billions of dollars for facial recognition systems at airports and, in anticipation of trusted traveler cards, a high-tech ID tied to extensive background checks and biometric identification. And finally this: with all of its new data banks, the Department of Justice announced last March (2003) that accuracy is no longer a concern for the building of one of the world's largest databases called the National Crime Information Center (NCIC). The NCIC has been exempted from the Privacy Act of 1974 that requires information entered into government databases be timely, relevant, complete and accurate. Also exempt are two other Department of Justice databases, the Central Records System and the National Center for Analysis of Violent Crime. The rational for exempting some of the nation's largest databases is that law-enforcement officers need bad data entered into NCIC in order to hurry in solving cases. The false hope, Mr. President, is that repealing our liberties in the name of fighting terrorism will somehow lead to peace. Let the Patriot Act die and keep the American dream alive. About the Author: Tom DeWeese is the publisher/editor of The DeWeese Report and president of the American Policy Center: www.americanpolicy.org -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Gross Minus Net Equals Zero: Repeal the Sixteenth Amendment
. At the philosophic level there is something morally repugnant in forcing people who get off their butt and work for a living to pay for that privilege. Life can be trying to say the least but when one works, prospers and finally succeeds it is a travesty to levy a tax on that person's good fortune. No working person should have to look over their shoulder to see where the taxman is hiding. The income tax system makes citizens angry at their government, and distrustful to boot. It makes enemies of people who vie to place tax burdens on their fellow countrymen. It divides the nation into permanent classes of the haves versus the have-nots, divisions that accentuate envy and ill will among the populace. Finally I note that taxing income is hardly fair as it fails miserably as a barometer of who should pay what. With great envy (see above paragraph) I calculate that for the year 2003 I paid a higher income tax rate than ketchup nabob Theresa Heinz Inheritance Kerry (me, 20% average rate on income of 200k, Ms. Kerry, 11.5%, on income of 5.1M). Her fabulous wealth immune from government pillage, she smugly endorses taxation on others so that all below her can be equally poor. I marvel continuously that such a system would ever employ the term fair as an adjective. Of course the income tax system is not fair, has never been fair, and indeed can never be fair. As the Ms. Kerry example demonstrates, our tax system is based on the faulty premise that a person's income can be arbitrarily classified to produce a tax that affects all taxpayers equitably. A person making $200,000 in San Francisco may be worse off financially than a rustic living in Idaho on an income of $30,000. Net worth is the true measure of wealth, not income. The solution to these systemic injustices is not to tweak the tax code so that Ms. Kerry pays more. The solution is to scrap the entire system. Anything that has had one hundred years to prove itself and fails to do so is, well, a failure. Dismally so. The efforts of our great people must be directed toward invention, business and improving life rather than filling tax forms, hiring accountants and fighting the government. Work must always be rewarded. So let us begin the fight against freedom's enemies by finally making gross -minus net-pay equal to zero. About the Author: Mr. Michael Marriott has been in the information technology field for nineteen years. He has worked for some large companies in the capacity of consultant including Allstate insurance, Transamerica Financial and Saudi Aramco. Mr. Michael Marriott writes for Capitalism Magazine. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Antipiracy bill targets technology
http://news.com.com/2102-1028_3-5238140.html?tag=st.util.print CNET News Antipiracy bill targets technology By Declan McCullagh Staff Writer, CNET News.com http://news.com.com/2100-1028-5238140.html Story last modified June 17, 2004, 5:32 PM PDT A forthcoming bill in the U.S. Senate would, if passed, dramatically reshape copyright law by prohibiting file-trading networks and some consumer electronics devices on the grounds that they could be used for unlawful purposes. News.context What's new: A bill called the Induce Act is scheduled to come before the Senate sometime next week. If passed, it would make whoever aids, abets, induces (or) counsels copyright violations liable for those violations. Bottom line:If passed, the bill could dramatically reshape copyright law by prohibiting file-trading networks and some consumer electronics devices on the grounds that they could be used for unlawful purposes. More stories on this topic The proposal, called the Induce Act, says whoever intentionally induces any violation of copyright law would be legally liable for those violations, a prohibition that would effectively ban file-swapping networks like Kazaa and Morpheus. In the draft bill seen by CNET News.com, inducement is defined as aids, abets, induces, counsels, or procures and can be punished with civil fines and, in some circumstances, lengthy prison terms. The bill represents the latest legislative attempt by influential copyright holders to address what they view as the growing threat of peer-to-peer networks rife with pirated music, movies and software. As file-swapping networks grow in popularity, copyright lobbyists are becoming increasingly creative in their legal responses, which include proposals for Justice Department lawsuits against infringers and action at the state level. Originally, the Induce Act was scheduled to be introduced Thursday by Sen. Orrin Hatch, R-Utah, but the Senate Judiciary Committee confirmed at the end of the day that the bill had been delayed. A representative of Senate Majority Leader Bill Frist, a probable co-sponsor of the legislation, said the Induce Act would be introduced sometime next week, a delay that one technology lobbyist attributed to opposition to the measure. Though the Induce Act is not yet public, critics are already attacking it as an unjustified expansion of copyright law that seeks to regulate new technologies out of existence. They're trying to make it legally risky to introduce technologies that could be used for copyright infringement, said Jessica Litman, a professor at Wayne State University who specializes in copyright law. That's why it's worded so broadly. Litman said that under the Induce Act, products like ReplayTV, peer-to-peer networks and even the humble VCR could be outlawed because they can potentially be used to infringe copyrights. Web sites such as Tucows that host peer-to-peer clients like the Morpheus software are also at risk for inducing infringement, Litman warned. Jonathan Lamy, a spokesman for the Recording Industry Association of America, declined to comment until the proposal was officially introduced. It's simple and it's deadly, said Philip Corwin, a lobbyist for Sharman Networks, which distributes the Kazaa client. If you make a product that has dual uses, infringing and not infringing, and you know there's infringement, you're liable. The Induce Act stands for Inducement Devolves into Unlawful Child Exploitation Act, a reference to Capitol Hill's frequently stated concern that file-trading networks are a source of unlawful pornography. Hatch is a conservative Mormon who has denounced pornography in the past and who suggested last year that copyright holders should be allowed to remotely destroy the computers of music pirates. Foes of the Induce Act said that it would effectively overturn the Supreme Court's 1984 decision in the Sony Corp. v. Universal City Studios case, often referred to as the Betamax lawsuit. In that 5-4 opinion, the majority said VCRs were legal to sell because they were capable of substantial noninfringing uses. But the majority stressed that Congress had the power to enact a law that would lead to a different outcome. At a minimum (the Induce Act) invites a re-examination of Betamax, said Jeff Joseph, vice president for communications at the Consumer Electronics Association. It's designed to have this fuzzy feel around protecting children from pornography, but it's pretty clearly a backdoor way to eliminate and make illegal peer-to-peer services. Our concern is that you're attacking the technology. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
International conference targets Internet hate speech
http://www.cnn.com/2004/TECH/internet/06/17/online.hate.ap/index.html CNN International conference targets Internet hate speech Thursday, June 17, 2004 Posted: 10:14 AM EDT (1414 GMT) International delegates are meeting for two days in Paris. PARIS, France (AP) -- European neo-Nazis post online pictures of paint-smeared mosques. Web sites of Islamic radicals call for holy war on the West. Aliases like Jew Killer pop up on Internet game sites. International experts met Wednesday in Paris to tackle the tricky task of fighting anti-Semitic, racist and xenophobic propaganda on the Internet -- seen as a chief factor in a rise in hate crime. Purveyors of hate have found a potent tool in the Internet, spreading fear with such grisly images as the beheading of Wall Street Journal reporter Daniel Pearl in 2002. The new technology has proven to be a boon for hatreds of old, many experts say. Our responsibility is to underline that by its own characteristics -- notably, immediacy and anonymity -- the Internet has seduced the networks of intolerance, French Foreign Minister Michel Barnier said in opening remarks at the two-day conference. France, which is spearheading the effort, has faced a surge in anti-Semitic violence in the last two years. Some fault the growth of Internet use among hate groups. But differing views about the limits of free speech and the ease of public access to the nebulous, anonymous Web largely stymied officials hoping to find common ground in Wednesday's talks. A sticking point was whether the United States, which has championed nearly unfettered free speech, would line up with European countries that have banned racist or anti-Semitic speech in public. The dilemma is all the more acute because the Internet is global, easy to use and tough to regulate -- as shown by widespread sharing of music online, an illegal practice that has confounded record companies. Terror groups have also used the Internet to plot attacks. American approach differs There are no easy solutions, delegates said. Many urged more youth education, better cooperation between governments and Internet service providers, or new studies on links between Web racism and hate crimes. The Organization for Security and Cooperation in Europe, a 55-country body that promotes security and human rights, organized the conference with the backing of the French government. Six countries in the Middle East and North Africa also sent envoys. The meeting is one of three OSCE conferences on anti-Semitism and racism this year. U.S. Assistant Attorney General Dan Bryant acknowledged the American approach differs from that of other countries. We believe that government efforts to regulate bias-motivated speech on the Internet are fundamentally mistaken, Bryant said. At the same time, however, the United States has not stood and will not stand idly by, when individuals cross the line from protected speech to criminal conduct. He said the United States believes the best way to reduce hate speech is to confront it, by promoting tolerance, understanding and other ideas that enlighten. Robert Badinter, a former French justice minister, said that of 4,000 racist sites counted worldwide in 2002, some 2,500 were based in the United States. Growing problem There are signs that online hate is getting worse. The French foreign minister cited a recent report in Britain that showed the number of violent and extremist sites had ballooned by 300 percent in the last four years in 15 OSCE countries surveyed. France last year banned a Web site responsible for thousands of daily racist messages, one of which claimed responsibility for dousing mosques with paint in the colors of the French flag, the International Network Against Cyber Hate wrote in a report released Wednesday. Christopher Wolf, chairman of the Internet Task Force of the U.S. Anti-Defamation League, pointed out how one student on a blog site at Brandeis University described playing an Internet video game against a rival who had nicknamed himself Jew Killer. In Egypt, some sites have shown pictures of American soldiers in Iraq to dredge up anti-U.S. feeling; one purportedly showed the June 8 killing of American civilian Robert Jacobs in Saudi Arabia. Rabbi Abraham Cooper, associate dean of the Simon Wiesenthal Center, a Jewish human rights group based in Los Angeles, said one strategy is for Internet service providers in the United States to honor anti-racism language in their own contracts. But even that won't stamp out Internet hate, he said. Will this put the (Ku Klux Klan) out of business? No. They will be able to find some way of getting their messages back online, he said. But it will put a crimp in that subculture on the Internet. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness
Feds: VoIP a potential haven for terrorists
VOIP operators: The fifth horsemen of the infocalypse? Cheers, RAH --- http://zdnet.com.com/2102-1105_2-5236233.html?tag=printthis Feds: VoIP a potential haven for terrorists By Declan McCullagh CNET News.com June 16, 2004, 10:54 AM PT URL: http://zdnet.com.com/2100-1105-5236233.html WASHINGTON--The U.S. Department of Justice on Wednesday lashed out at Internet telephony, saying the fast-growing technology could foster drug trafficking, organized crime and terrorism. Laura Parsky, a deputy assistant attorney general in the Justice Department, told a Senate panel that law enforcement bodies are deeply worried about their ability to wiretap conversations that use voice over Internet Protocol (VoIP) services. Get Up to Speed on... VoIP? Get the latest headlines and company-specific news in our expanded GUTS section.?I am here to underscore how very important it is that this type of telephone service not become a haven for criminals, terrorists and spies, Parsky said. Access to telephone service, regardless of how it is transmitted, is a highly valuable law enforcement tool. Police been able to conduct Internet wiretaps for at least a decade, and the FBI's controversial Carnivore (also called DCS1000) system was designed to facilitate online surveillance. But Parsky said that discerning what the specific (VoIP) protocols are and how law enforcement can extract just the specific information are difficult problems that could be solved by Congress requiring all VoIP providers to build in backdoors for police surveillance. The Bush administration's request was met with some skepticism from members of the Senate Commerce committee, who suggested that it was too soon to impose such weighty regulations on the fledgling VoIP industry. Such rules already apply to old-fashioned telephone networks, thanks to a 1994 law called the Communications Assistance for Law Enforcement Act (CALEA). What you need to do is convince us first on a bipartisan basis that there's a problem here, said Sen. Ron Wyden, D-Ore. I would like to hear specific examples of what you can't do now and where the law falls short. You're looking now for a remedy for a problem that has not been documented. Wednesday's hearing was the first to focus on a bill called the VoIP Regulatory Freedom Act, sponsored by Sen. John Sununu, R-N.H. It would ban state governments from regulating or taxing VoIP connections. It also says that VoIP companies that connect to the public telephone network may be required to follow CALEA rules, which would make it easier for agencies to wiretap such phone calls. The Justice Department's objection to the bill is twofold: Its wording leaves too much discretion with the Federal Communications Commission, Parsky argued, and it does not impose wiretapping requirements on Internet-only VoIP networks that do not touch the existing phone network, such as Pulver.com's Free World Dialup. It is even more critical today than (when CALEA was enacted in 1994) that advances in communications technology not provide a haven for criminal activity and an undetectable means of death and destruction, Parsky said. Sen. Frank Lautenberg, D-N.J., wondered if it was too early to order VoIP firms to be wiretap-friendly by extending CALEA's rules. Are we premature in trying to tie all of this down? he asked. The technology shift is so rapid and so vast. The Senate's action comes as the FCC considers a request submitted in March by the FBI. If the request is approved, all broadband Internet providers--including companies using cable and digital subscriber line technology--will be required to rewire their networks to support easy wiretapping by police. Wednesday's hearing also touched on which regulations covering 911 and universal service should apply to VoIP providers. The Sununu bill would require the FCC to levy universal service fees on Internet phone calls, with the proceeds to be redirected to provide discounted analog phone service to low-income and rural American households. One point of contention was whether states and counties could levy taxes on VoIP connections to support services such as 911 emergency calling. Because of that concern, I would not support the bill as drafted and I hope we would not mark up legislation at this point, said Sen. Byron Dorgan, D-N.D. Sen. Conrad Burns, R-Mont., added: The marketplace does not always provide for critical services such as emergency response, particularly in rural America. We must give Americans the peace of mind they deserve. Some VoIP companies, however, have announced plans to support 911 calling. In addition, Internet-based phone networks have the potential to offer far more useful information about people who make an emergency call than analog systems do. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may
Breaking Iranian Codes (Re: CRYPTO-GRAM, June 15, 2003)
other intelligence source of theirs. During the 1950s, the Americans dug under East Berlin in order to eavesdrop on a communications cable. They received all sorts of intelligence until the East Germans discovered the tunnel. However, the Soviets knew about the operation from the beginning, because they had a spy in the British intelligence organization. But they couldn't stop the digging, because that would expose George Blake as their spy. If the Iranians knew that the U.S. knew, why didn't they pretend not to know and feed the U.S. false information? Or maybe they've been doing that for years, and the U.S. finally figured out that the Iranians knew. Maybe the U.S. knew that the Iranians knew, and are using the fact to discredit Chalabi. The really weird twist to this story is that the U.S. has already been accused of doing that to Iran. In 1992, Iran arrested Hans Buehler, a Crypto AG employee, on suspicion that Crypto AG had installed back doors in the encryption machines it sold to Iran -- at the request of the NSA. He proclaimed his innocence through repeated interrogations, and was finally released nine months later in 1993 when Crypto AG paid a million dollars for his freedom -- then promptly fired him and billed him for the release money. At this point Buehler started asking inconvenient questions about the relationship between Crypto AG and the NSA. So maybe Chalabi's information is from 1992, and the Iranians changed their encryption machines a decade ago. Or maybe the NSA never broke the Iranian intelligence code, and this is all one huge bluff. In this shadowy world of cat-and-mouse, it's hard to be sure of anything. Hans Buehler's story: http://www.aci.net/kalliste/speccoll.htm -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
2 million bank accounts robbed
banking online, and Gartner's study confirms some of that group's worst fears: that accounts can be tapped into by criminals. They should be afraid, Litan said. The banks should be requiring more than just passwords to use online banking. They all know they have to do something, but they are all afraid to take the first step. Identity theft expert Rob Douglas described the study results as blockbuster, and said banks may be forced to re-think the way they are giving consumers access to checking accounts online. They may say it's because customers are not practicing the appropriate safeguards, he said. But when it comes to online banking, they are not doing a good enough job of educating customers what to watch out for. Someone is making a lot of money. Litan said the industry was reeling in part because there is no software designed to detect unusual checking account withdrawal patterns, outside of software that looks for money laundering, which doesn't catch simple unauthorized withdrawals. Most credit card users are familiar with industry software called Falcon, which alerts issuers when out-of-the-ordinary purchases are attempted. Such software will often cause a card issuer to call a consumer and ask questions like, Are you really in London buying a diamond necklace right now? There's no similar product for online banking, Litan said. Still, there are simpler solutions banks could implement to protect themselves and consumers. One idea is a shared secret -- a picture that consumers would give to a bank, which would then appear each time the consumer visited the bank's site, confirming it was the authentic corporate Web site and not a spoof site controlled by a hacker. There's a lot at stake here, Litan said. And there's a lot that banks can do. Limited window for refunds In most cases, analysts say, consumers are eventually refunded the money they lose. Federal regulations governing electronic transfers, known as Regulation E, requires banks to refund the money as long as consumers notify the institution within 60 days of receiving their bank statement. But outside the 60-day window, banks are under no obligation to issue refunds. Fact File Know your rights Regulation E protects consumers when they are hit by electronic financial fraud * What's covered * Consumer liability * What consumers should do * What banks are required to do * For more information Consumers have well-defined rights with respect to fraudulent electronic transfers, and should generally be able to obtain refunds with little hassle. The rights are spelled out in what's known as Reg-E, or the Federal Reserve Board's Regulation E. The Fed was authorized to draw up the regulation by the Electronic Funds Transfer Act of 1979. The regulation covers all manner of transfers into and out of bank accounts outside of paper checks, including the use of debit cards. It does not cover credit card transactions. * Print this Many banks don't make consumer rights clear enough, said George Tubin, an analyst at Tower Group. He praised Bank of America, Citibank, and Wells Fargo for offering credit-card style zero liability policies on their online banking products. Until a bank is comfortable enough with their product to say you're covered, how can consumers feel comfortable? he said. Betty Reese, a spokeswoman for Bank of America, said her firm simply requires consumers to report any fraud on a timely basis. She decline to disclose fraud statistics. Still, getting a refund can be inconvenient, and there are scattered reports of banks not making the process easy. And ultimately, all consumers pay when banks increase fees to recoup their losses. The new Gartner results are staggering numbers, said Jim Bruene, editor and founder of the Online Banking Report. If that's true, we are really facing a monster problem, he said. It's something that could have been anticipated by the banks. ... There should be and will be more controls in place. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: 2 million bank accounts robbed
At 12:22 PM -0400 6/15/04, Jack Lloyd wrote: I mean really. I'd lay this at the feet of book-entry settlement, but I'm supposed to say that. :-) Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
He Pushed the Hot Button of Touch-Screen Voting
father also served in Congress and the California Legislature, where, he was one of two lawmakers to vote against the internment of Japanese-Americans in World War II. My dad's vote seems like a no-brainer now, Mr. Shelley said. But at the time, it spoke to who he was and what he believed in, and he passed that on to me. (Jack Shelley died of lung cancer in 1974, when his son was 18.) Mr. Shelley began his career as a legislative director in Washington for Representative Phil Burton, a liberal icon in California. He was elected to the San Francisco Board of Supervisors and then the State Assembly, where he served for the allowable limit of three two-year terms and became majority leader. He said he ran for secretary of state because he wanted to counteract the decline in voting, though he has used the office to highlight other issues, like domestic partner rights and corporate responsibility. Mr. Shelley did not deny an interest in the governor's office someday but said his goal for now was to make policy and set precedent; it has nothing to do with my future. Eric Jaye, a political consultant here and longtime associate of Mr. Shelley, said he had transformed what was essentially an administrative post into a bully pulpit. Several recent analyses have bolstered Mr. Shelley's view that touch screens need more security. These include a recommendation by the chairman of the federal Election Assistance Commission that every voting jurisdiction that uses touch screens enhance their security, with either paper trails or other methods, by November. A joint report issued yesterday by the Kennedy School of Government at Harvard and the National Science Foundation endorsed touch screens with paper trails as the most effective voting system. Still, many officials who run elections believe the push for paper trails is more window-dressing than a necessary expense. San Bernardino County, which is among those suing Mr. Shelley, plans to ignore his directive to provide separate paper ballots for those uncomfortable with touch screens. It would be an expression of a lack of confidence in the machines, for which the county just spent $14 million, said David Wert, a spokesman for the county supervisors. In May, the supervisors noted that Mr. Shelley had certified the county's system before the March 2 primary and that absolutely nothing has occurred since that certification to call the system's performance or reliability into question. To those who say he is only fanning fears, Mr. Shelley laughs. If a machine breaks down in San Diego, and it breaks down in Georgia, and they break down in Maryland, and they break down in Alameda and we have high schools where they can hack into the systems, the deficiencies are in the machines, he said. Look, he added, I believe these machines have a very, very firm place in our future, but I also believe that in responding to the chaos in Florida in 2000 these machines were rushed out before all the kinks were worked out. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: Breaking Iranian Codes (Re: CRYPTO-GRAM, June 15, 2003)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 At 2:09 PM -0400 6/15/04, Jack Lloyd wrote: Erm... he disassembled source code? With what? Emacs? Or vim maybe? If you look down a bit, you might notice he's pulling your leg. If you're not *real* careful, he'll pull it clean off and beat you over the head with it. Besides, he's an architect, ferchrissakes. The only disassembly he knows about is done with stuff like this: http://www.rocklandmfg.com/demolition_attachments.htm BTW, I met a guy once who swore you were an fed informer. I mean, he sounded really positive. Said you had told him yourself. Naw. That was his brother-in-law, or something. The one in Maryland, someplace. A venerated man in his profession, John's still an old lefty from way back. If you squint real hard, maybe you can see him in the crowd here: http://www.columbia.edu/acis/history/68-dead.html. ;-) He ain't no spook. His heart would stop, or something. There are lots of people who hate the state from the left. John's one of 'em -- if you can understand what he says. :-) Cheers, RAH -BEGIN PGP SIGNATURE- Version: PGP 8.0.3 iQA/AwUBQM9UZsPxH8jf3ohaEQIF+ACgwp8+iQCp0ZQvJfQ+tHgd9592IdkAnRvQ JIgNq+x70jzgFNAoWmwKBcRJ =KS9O -END PGP SIGNATURE- -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
[osint] Assassination Plans Found On Internet
, and on to Somalia where he fought with the militant groups against the Ethiopian forces. He was arrested in Somalia, and extradited to Saudi Arabia, where he was sentenced to four years in prison. He was released after two years on good behavior. A month after his release, he made his way back to Yemen, and then to Afghanistan in 2001.There he joined combat operations with the Taliban against the American troops. After the fall of the Taliban, he returned to Saudi Arabia, to his home in the Swedish district of Riyadh. He immediately became involved in the establishment of jihad training camps in the middle and western regions of Saudi Arabia. When Khaled Al Bin Al Haj was killed on March 15 in a shootout with the Saudi security forces, Abu Hajar assumed leadership of Al Qaeda in the Arabian Peninsula. Abu Hajar was raised in the city of Riyadh. He is a high school dropout. He was married at the age of 19, and has one child (currently 10 years old) with this wife. According to the biography, Abu Hajar remarried without the knowledge of his family, and had a second child, who died before the age of 2. Yahoo! Groups Sponsor ~-- Yahoo! Domains - Claim yours for only $14.70 http://us.click.yahoo.com/Z1wmxD/DREIAA/yQLSAA/TySplB/TM ~- -- Want to discuss this topic? Head on over to our discussion list, [EMAIL PROTECTED] -- Brooks Isoldi, editor [EMAIL PROTECTED] http://www.intellnet.org Post message: [EMAIL PROTECTED] Subscribe:[EMAIL PROTECTED] Unsubscribe: [EMAIL PROTECTED] *** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. OSINT, as a part of The Intelligence Network, is making it available without profit to OSINT YahooGroups members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/osint/ * To unsubscribe from this group, send an email to: [EMAIL PROTECTED] * Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: [osint] Assassination Plans Found On Internet
At 6:12 PM -0400 6/14/04, Sunder wrote: Or it could just be agitprop meant to raise the theat level back up a notch, or provide more funding to the surveillance kitty. On Mon, 14 Jun 2004, R. A. Hettinga wrote: At 10:45 PM +0200 6/14/04, Thomas Shaddack wrote: It may be also a very cheap method of attack. True enough. I usually apply occam's razor to these things, but, around here, that's cheating... :-) Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: [osint] Assassination Plans Found On Internet
At 10:45 PM +0200 6/14/04, Thomas Shaddack wrote: It may be also a very cheap method of attack. True enough. Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: [irtheory] War ain't beanbag. Irony is conserved.
--- begin forwarded text To: [EMAIL PROTECTED] From: R. A. Hettinga [EMAIL PROTECTED] Mailing-List: list [EMAIL PROTECTED]; contact [EMAIL PROTECTED] Delivered-To: mailing list [EMAIL PROTECTED] Date: Sun, 13 Jun 2004 17:01:04 -0400 Subject: Re: [irtheory] War ain't beanbag. Irony is conserved. Reply-To: [EMAIL PROTECTED] At 4:43 PM -0400 6/13/04, Daniel Nexon wrote: The quotation marks here, I assume, are a disclaimer. Liberalism is not Marxism. Nor, for that matter, is support for social democracy. There *you* go again. :-) Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire' Yahoo! Groups Sponsor ~-- Make a clean sweep of pop-up ads. Yahoo! Companion Toolbar. Now with Pop-Up Blocker. Get it for free! http://us.click.yahoo.com/L5YrjA/eSIIAA/yQLSAA/_tgrlB/TM ~- Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/irtheory/ * To unsubscribe from this group, send an email to: [EMAIL PROTECTED] * Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: [irtheory] War ain't beanbag. Irony is conserved.
--- begin forwarded text To: [EMAIL PROTECTED] From: Daniel Nexon [EMAIL PROTECTED] Mailing-List: list [EMAIL PROTECTED]; contact [EMAIL PROTECTED] Delivered-To: mailing list [EMAIL PROTECTED] Date: Sun, 13 Jun 2004 16:43:00 -0400 Subject: Re: [irtheory] War ain't beanbag. Irony is conserved. Reply-To: [EMAIL PROTECTED] At 3:37 PM +0100 6/13/04, Lee James wrote: I'd like to hear how children who werent old enough to pronounce the colour were 'reds' who were rightly tortured (apparently) in your view, as well as the many women raped and tortured at the hands of SOA graduates. Funny how liberals always do the debits and not the credits in these grotesque calculations. Shall we count the several-orders-of-magnitude number of starved (*and* butchered) children in various Marxist paradises around the world, too? I thought not. It wouldn't be fair. The quotation marks here, I assume, are a disclaimer. Liberalism is not Marxism. Nor, for that matter, is support for social democracy. I don't see how antipathy towards the right-wing dictatorships that committed gross violations of human rights against opponents seeking peaceful change or political liberalization translates into having to champion Stalin, Pol Pot, Mao, or whomever. I'd also be keen to see evidence of this free-market success of which you talk, because it isn't in central america for the countless millions in poverty. Freedom, market or otherwise, isn't about the fool's errand of forced income redistribution, which is, invariably, what actually causes famine and tragedy. Why do so many on your side of this argument use definitional fiat to wind up rationalizing Pinochet's reign of terror, Guatemala's genocide against the Mayans, an so on? Indeed, freedom, on face, isn't about arbitrary imprisonment or torture. Is taxation for social goods, which often involves income redistribution, an equivalent violation of freedom? I'm not so sure. Income redistribution in the US did not cause famine and tragedy, nor in the UK, France, the Federal Republic of Germany, Denmark, etc. It seems to me famine and/or tragedy were direct results, however, of the policies put into place by many graduates of the SOA. I prefer to think about the McDonald's paradox: No country that has a McDonald's has attacked another. :-). We'll see how long *that* stands up. Already happened. Kosovo campaign. As for democracy somehow being magical, remember that Athens brought on the Peloponnesian war, not Sparta. I'm not sure what this has to do with the supposed democratic peace. I'm not sure that it is defensive to defend a country against its own people, when europe did so it was called colonisation. Yawn. When Europe did it it was called economics. A word you seem to be unfamiliar with. When their economic interests were attacked (First the Portuguese, then the Spanish, then The Dutch, then the English), surprise, they won. See Diamond's Guns, Germs, and Steel, A remarkably flawed book, deployed in an even more remarkably strange way here. To wit: for details. Eventually, having won all these mostly defensive wars, ^^ These would be? The goal of the Portuguese, the Spanish, and the Dutch, for example, was to secure monopolies through military coercion... often, in the process, breaking apart other European powers' monopolies (e.g., the Dutch struggle against Portugal and Spain). --- Daniel Nexon Assistant Professor of Government / School of Foreign Service Georgetown University Washington, DC 202-687-2273 Yahoo! Groups Sponsor ~-- Yahoo! Domains - Claim yours for only $14.70 http://us.click.yahoo.com/Z1wmxD/DREIAA/yQLSAA/_tgrlB/TM ~- Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/irtheory/ * To unsubscribe from this group, send an email to: [EMAIL PROTECTED] * Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
[irtheory] Re: War ain't beanbag. Irony is conserved.
--- begin forwarded text To: [EMAIL PROTECTED] From: R. A. Hettinga [EMAIL PROTECTED] Mailing-List: list [EMAIL PROTECTED]; contact [EMAIL PROTECTED] Delivered-To: mailing list [EMAIL PROTECTED] Date: Sun, 13 Jun 2004 17:00:23 -0400 Subject: [irtheory] Re: War ain't beanbag. Irony is conserved. Reply-To: [EMAIL PROTECTED] At 8:37 PM + 6/13/04, Carmi Turchick wrote: Thank you for the perfect illustration of pure evil There you go again. ;-) Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire' Yahoo! Groups Sponsor ~-- Make a clean sweep of pop-up ads. Yahoo! Companion Toolbar. Now with Pop-Up Blocker. Get it for free! http://us.click.yahoo.com/L5YrjA/eSIIAA/yQLSAA/_tgrlB/TM ~- Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/irtheory/ * To unsubscribe from this group, send an email to: [EMAIL PROTECTED] * Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
War ain't beanbag. Irony is conserved.
of force-monopoly with free markets someday, war, and monopolistic violence, is, paradoxically, how we protect free markets, and, through them, freedom itself. Irony, apparently, is abundant in the universe, and, like matter and energy, force and fraud, it is conserved as well. Cheers, RAH -BEGIN PGP SIGNATURE- Version: PGP 8.0.3 iQA/AwUBQMxbPcPxH8jf3ohaEQIV1QCg3WCvUqbISoWl83PYkCi04IflyJsAoI8p /FuTkpzHwSDUaTG392g2yuB1 =nx0v -END PGP SIGNATURE- -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
RE: [irtheory] War ain't beanbag. Irony is conserved.
At 10:17 PM +0200 6/13/04, Thomas Shaddack wrote: Weapons can mean a lot, but they are far from being everything. Tell that to the USSR. An economy produces weapons. Just the prospect of a new battlefield, real or not, coupled with the largest military buildup in history, crushed them. When they signed an agreement saying that nuclear war was unwinnable and should happen, they lost, right then and there. Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'