Papers Show Confusion as Government Watch List Grew Quickly

2004-10-10 Thread R. A. Hettinga
http://www.nytimes.com/2004/10/09/politics/09nofly.html?oref=loginpagewanted=printposition=

The New York Times
October 9, 2004

Papers Show Confusion as Government Watch List Grew Quickly
By ERIC LICHTBLAU

ASHINGTON, Oct. 8 - The government's list of banned airline passengers has
grown from just 16 names on Sept. 11, 2001, to thousands of people today
amid signs of internal confusion and dissension over how the list is
implemented, newly disclosed government documents and interviews showed
Friday.

 A transportation security official acknowledged in one internal memorandum
that the standards used to ban passengers because of terrorism concerns
were necessarily subjective, with no hard and fast rules.

 More than 300 pages of internal documents, turned over by the Justice
Department on Friday as part of a lawsuit brought by the American Civil
Liberties Union, provide a rare glimpse inside the workings of the
government's so-called no-fly list.

 Federal officials have maintained tight secrecy over the list, saying
little publicly about how it is developed, how many people are on it or how
it is put into practice, even as prominent people like Senator Edward M.
Kennedy have been mistakenly blocked from boarding planes.

The American Civil Liberties Union sued the federal government last year
under the Freedom of Information Act on behalf of two San Francisco women
who said they suspected their vocal antiwar protests led to their being
banned from flying.

 The Justice Department fought the release of information on the no-fly
list on national security grounds, leading a federal judge in San Francisco
to admonish government lawyers for making frivolous claims to justify the
unusual secrecy. He ordered the government to comply with the Freedom of
Information Act, prompting the Justice Department to turn over the internal
documents to the A.C.L.U. on Friday.

 Federal officials said they could not discuss the documents Friday because
of the pending lawsuit.

 In general, said Brian Roehrkasse, spokesman for the Department of
Homeland Security, we have taken numerous steps to refine the no-fly
system, including better definition of the criteria for the watch list and
putting in place an effective redress system that allows passengers who are
mistakenly put on the list to be removed.

But Thomas R. Burke, a lawyer representing the A.C.L.U., said the documents
raised some very serious concerns about the criteria the government is
using in developing the no-fly list and the internal miscommunication in
implementing it.

In an internal e-mail message in May 2002, for instance, an F.B.I.
supervisor, whose name was deleted, complained that the Transportation
Security Administration had made the F.B.I. responsible for pursuing
possible matches from the list but had failed to inform the bureau about
changes in no-fly security directives.

 Despite my best efforts, the T.S.A. just motors along, and I and the
agents are being whipped around the flagpole trying to do the right thing,
the official wrote.

In another internal message in October 2002, an F.B.I. official in St.
Louis cited difficulties in getting suspects put on the no-fly list and in
coordinating different watch lists. The various watch lists are not
comprehensive and not centralized, said the official, whose name was also
deleted. Some people appear on one list but not the others. Some of the
lists are old and not current. We are really confused.

Federal officials have been developing a master terrorist watch list to
consolidate the no-fly list and nine others kept by different agencies. But
a report last week by Clark K. Ervin, the Department of Homeland Security's
inspector general, found serious coordination problems in that effort.

 The documents released Friday show that the government's no-fly list as of
Sept. 11, 2001, had only 16 names on it - fewer than the number of
terrorists who hijacked the four airliners that day. Several investigations
have criticized the government's failure to put two of the hijackers on
watch lists even after their terrorist ties became known.

 The no-fly list grew drastically after the attacks, and one document in
Friday's material said the number of banned passengers ballooned to nearly
600 within about two months. Another 365 names were put on a secondary list
that allows them to board a plane after getting closer scrutiny. The two
lists had grown to about 1,000 names by December 2002, one document showed.

The documents do not give a current total, but a law enforcement official,
speaking on condition of anonymity, said Friday the names on the no-fly and
secondary flight lists total about 10,000, with the no-fly list accounting
for a few thousand. Another government official corroborated that account.

 Copyrigh
-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect

Financial identity is *dangerous*? (was re: Fake companies, real money)

2004-10-09 Thread R. A. Hettinga
 at Beacon Bank in Minnesota, where one of the checking
accounts used to receive the stolen funds had been set up, confirmed that
he had discussed the situation with Duhl, but would not provide further
comment.

 Corporate ID theft
Whoever impersonated T-Data were clever enough to throw a few monkey
wrenches in the path of anyone trying to detect them.

When applying for the compulsory credit check needed to obtain the fake
merchant account, for example, the thieves didn't use T-Data's tax ID
number. Instead, they used the name and credit profile of a man unconnected
with the company. Steven Wiencek, who lives on Long Island near the
company, didn't even know his credit had been checked until contacted by
MSNBC.com for this story.

But the application, which listed Wiencek as company president, gives his
Social Security number and driver's license number, suggesting the people
behind this scheme have access to a wide swath of stolen credit cards and
stolen identities.

Another attempt at misdirection was foiled by an alert mail carrier.

 The application for the merchant account used a slight variation of Duhl's
address -- apparently an attempt to ensure that mail to Duhl would be lost.
But a knowledgeable local postal worker recognized the company name anyway,
leading Duhl to discover the dupe.

Without that, I may not have found out about this for a long time, he said.

 The thieves were also persistent. Using one stolen credit card, they
attempted to steal $2,500 through five separate faked merchant accounts,
according to an affidavit of credit card fraud supplied by Duhl.

 Another corporate ID victim, John Bartholomew of Abcom Services, said he
was lucky, because Duhl contacted him just as the scam began.

 We are a management company in long-term health care. We would have no
reason to use credit cards, he said. The firm had been in business for 21
years, and never accepted a single charge -- until the criminals stole his
company's name, Bartholomew said.

True to form, the criminals hijacked his brand name and set up merchants
accounts using his company's name and a similar -- but slightly altered --
street address.

 The good news is, Bartholomew was able to warn the merchant account
providers soon enough that only about $4,000 in charges were run through
his company's name. The bad news is, some of the providers are still trying
to make him pay the bill for the charges. He figures he's spent about
$5,000 in legal fees trying to clean up the mess.

Who are they working with?
Rob Douglas, a consultant who operates PrivacyToday.com, blames the
merchant account providers for never checking to see if the name on the
account application actually represented a real person who worked at the
firm.

You have to ask what the companies that set up the merchant accounts are
doing? he said. Who has the responsibility to do due diligence that they
are in fact working with who they think they are working with when they
open an account?

But several of the merchant service providers pointed out the difficulty of
stopping all fraudulent applications in a world where identities are so
easily stolen. 

 For all of us, it's a tough business, Steinberg, of Merchant E Services,
said. It's a large, large problem.

Duhl himself blames the banks where the money was to eventually wind up --
wondering how the thieves were able to set up accounts in the post-Patriot
Act era. Apparently worried as much about security implications as his
personal loss, Duhl contacted the FBI, the Secret Service and the U.S.
Postal Inspector's Office.  None of the agents he spoke to returned phone
calls placed by MSNBC.com.

 He says he is frustrated that none of the agencies seem to have taken any
interest in the incident -- particularly because at least one phone call
was placed to Pakistan using the cell phone purchased in his company's
name, and one of the bank accounts used to funnel money was established by
suspects who presented Russian passports as identification, he says his own
research revealed. 

 No one in the government seems like they are going to get interested in
establishing a case, Duhl said.

 Douglas, who consults with firms trying to deal with the new trend of
corporate identity theft, says there's little small companies like Duhl's
can do to prevent this kind of incident. But one piece of practical advice
he offers larger firms: search the Web once a week for evidence of
impersonation.

As strange as it sounds, companies need to have one or more people
assigned to surf the Web and see if there are mirror sites out there, just
like we tell parents to surf for their child's name, he said.

Bob Sullivan is the author of Your Evil Twin: Behind the Identity Theft
Epidemic

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end

Passengers refuse to fly with two women in black on board

2004-10-04 Thread R. A. Hettinga
http://english.pravda.ru/printed.html?news_id=14300

   - PRAVDA.Ru


 Passengers refuse to fly with two women in black on board - 09/23/2004 13:51

 Incidents when Russian passengers refuse to fly due to suspicious-looking
females of Middle Eastern descent are becoming a norm these days.

  On September 1, the day of the Beslan tragedy, passengers of a
Moscow-bound flight from Sharm el Sheih (Egypt) refused to fly with two
Muslim women in traditional clothes onboard. This time, another flight from
Moscow to Khurgada has been delayed.

  ?Two Egyptian women were set to fly aboard a TU-154 airplane ofKrasAir?
departing for Khurgada,? stated RIANovosti?s? spokesman.

  A group of five students from Dagestan were the last ones to board the
aircraft. Among them were two Egyptian women dressed in black.

  ?Considering the recent events, security services searched them
thoroughly. Their documents were fine; nothing was wrong with the luggage
either. However, due to such time-consuming security check, they were the
last ones to board the plane. This in turn caused major uproar among the
passengers. People demanded them to be taken off the flight,? added he.

  ?A young man accompanied by a woman and two children was the last one to
step aboard due to a long security check. They were on their way to Egypt,
where they?ve been living for five years. As soon as the rest of the
passengers saw them aboard, people simply refused to fly ˆ perhaps, they
were fearful of a possible terrorist act,? noted the airline company?s
spokesman.

  In the course of the following two hours, airport and airline
spokespeople were trying to persuade the passengers to fly along with the
Egyptians. People however remained steadfast.

  All the passengers were then escorted back to the airport where each one
of them had to undergo additional security check. The two Egyptian women
have been examined publicly.

  There were 120 people aboard the Tu-154 airplane. As a result of this
little incident, the flight Moscow-Khurgada had eventually departed for
Egypt with a four-and-a-half-hour delay.

  Similar incident took place in Egypt on 1 September, 2004. Passengers
along with crew members of a Moscow-bound airplane (KrasAir) from Sharm el
Sheih refused to continue the flight after Egyptian personnel had allowed 2
Middle Eastern women to board the plane.

   According to the crew, both of the females behaved rather suspiciously:
they locked themselves up in the lavatory right after boarding. In the end,
due to the crew?s and the passenger?s protest, they were asked to leave the
plane.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




Re: How small towns are reversing a century of corporate personhood

2004-10-03 Thread R. A. Hettinga
At 7:04 PM -0400 10/1/04, R. A. Hettinga wrote:
the idea of
abolishing the personhood of corporations

Of course, the act of abolition, using the law itself, is an exercise in
mental masturbation, which is what is really happening in Pennsylvania.

Financial cryptography gives us at least the hope of property -- or control
of property -- without legislation, if not prior legal agreement. David
Friedman's private law without public law.

Corporations, as creatures of this state wouldn't have to exist in such a
world, where limited liability could be done the old fashioned way: with
anonymity. :-)

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



How small towns are reversing a century of corporate personhood

2004-10-03 Thread R. A. Hettinga
 a weekend at
Landmark College in Putney, attending one of CELDF's democracy schools.
Among them was Larry Bloch, a small-business owner from Brat-tleboro who is
with Vermonters Restoring Democracy. It's an umbrella organization of
groups that deal with issues ranging from genetically modified organisms to
nuclear power to social and economic justice. Though its members come from
a variety of political backgrounds, what unites them, Bloch explains, is a
desire to combat corporate dominance over local decision-making.

When a predatory corporation comes in and says, 'We're moving in no matter
what and we don't care if we push out your independently owned local
businesses,' that doesn't affect only progressives or only conservatives,
Bloch says. To hear the stories from Pennsylvania was inspiring because
these were people who had never been activists and weren't blessed with a
lot of free time or money or the inclination to shake things up.

Representative Sarah Edwards (P-Brattleboro) agrees. Edwards, who also
attended the democracy school, says the seminar helped reframe the debate
in her mind, especially on the issue of nuclear power. It's helping me to
know who my adversary is, Edwards says. I'm not talking about
individuals. I'm talking about the corporations.

I have friends who work at [Vermont] Yankee. I know management who work at
Yankee, she adds. This is not about them. This is about the system, the
machine of the corporation squeezing out the diversity of voices that is
necessary to have a good and healthy democracy.

Democracy schools already have been held in six states. By next year, there
will be five permanent Daniel Pennock Democracy Schools - named for one
of the two boys who died after coming into contact with the toxic sludge.
In the past, these schools have largely addressed environmental issues. But
that's charging, Linzey notes. Activists in Roxbury, Massa-chusetts, for
example, hope the Pennsylvania model can be used to challenge the
pharmaceutical industry on its policies pertaining to AIDS drugs.

Others see the approach as a way to counter international agreements like
NAFTA. John Berkowitz is executive director of Southern Vermonters for a
Fair Economy and Environmental Protection. He points to a law passed in
Massachusetts 10 years ago that prohibited municipalities from signing
contracts with companies that do business with Burma - a country with an
abysmal human rights record. After Japan and the European Union filed a
complaint about the law with the WTO, in 1997 the U.S. Supreme Court struck
down the Massachusetts laws as unconstitutional.

Wait a minute. Who's deciding what's best for a community? Berkowitz
asks. Is it absentee corporations and people working for trade
organizations like the WTO? We're finding that people's local
decision-making abilities are being trumped by trade agreements that
basically say, 'You can't decide that at the local level.'

But as Linzey reminds people who attend CELDF's democracy schools, local
communities can reclaim the power of self-rule. Like hurricanes that feed
off warmer waters, the anti-corporate movement draws strength through legal
provocation. Says Linzey, This is about shifting the paradigm to let
people understand that the courts do step in to defend community rights
over corporate rights.

© Seven Days Newspaper, 2004

www.sevendaysvt.com

web queries?


d

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Spotting the Airline Terror Threat

2004-10-03 Thread R. A. Hettinga
Wherein the TSA thinks they can observe a lot by watching...

Cheers,
RAH
---

http://www.time.com/time/nation/printout/0,8816,708924,00.html

 Saturday, Oct. 02, 2004
Spotting the Airline Terror Threat
TIME exclusive: A new airport security system soon to be tested will rely
on human judgment
By  SALLY B. DONNELLY/WASHINGTON

 TIME exclusive: A new airport security system soon to be tested will rely
on human judgment  The most dangerous threat to commercial aviation is not
so much the things bad people may be carrying, but the bad people
themselves. That refrain heard constantly from airline security experts
over the past three years appears to have finally been heeded by the
Transportation Security Administration (TSA). Aviation sources tell TIME
that the TSA plans to address the problem by launching its own passenger
profiling system. The system known as SPOT (Screening of Passengers by
Observation Techniques) relies more on the human dimension in detecting
threats, and is to be tested at two northeastern airports starting later
this month.

 This is a radical change to aviation security, says Sgt. Peter
DiDomenica, the Massachusetts State Police officer who developed the
racially-neutral profiling program in place at Boston's Logan Airport, on
which SPOT is based. This is a very subtle but very effective program.

 Unlike the TSA's recently announced program to use computer databases to
scan for suspicious individuals whose names occur on passenger lists, SPOT
is instead based squarely on the human element: the ability of TSA
employees to identify suspicious individuals by using the principles of
surveillance and detection. Passengers who flag concerns by exhibiting
unusual or anxious behavior will be pointed out to local police, who will
then conduct face-to-face interviews to determine whether any threat
exists. If such inquiries turn up other issues of concern, such as travel
to countries like Afghanistan, Iraq or Sudan, for example, police officers
will know to pursue the questioning or alert Federal counter-terrorism
agents.

 DiDomenica has first-hand experience of the effectiveness of the system.
He was using his own observation techniques - called BASS (Behavior
Assessment Screening System) - last year when he saw man acting oddly near
the checkpoint and stopped him. The suspect passenger turned out to be an
agent from the Department of Homeland Security who had been trying to test
the system by sneaking a prohibited device onto a plane.

 Although the profiling programs are aimed primarily at stopping
terrorists, they have had other benefits. The Massachusetts State Police
have arrested about 20 people for infractions ranging from being in the
country illegally to failing to answer outstanding warrants for various
offenses.

 The TSA plans to test SPOT for 60 days before committing to taking it
nationwide, eventually to all of the country's 429 commercial airports.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Foreign Travelers Face Fingerprints and Jet Lag

2004-10-03 Thread R. A. Hettinga
.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



A Proposed Nomenclature for the Four Horseman of The Infocalypse

2004-10-03 Thread R. A. Hettinga
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I've been talking about this for the last decade, and never found a
reference on the web whenever I was thinking about it. Thanks to
Google, it was well within my prodigiously diminished attention span
this morning.

Given the events on the net over the past few years, I figure we
might as well have fun with the idea. Humor is good leverage, and
these days we need *lots* of leverage.

In arbitrary order (in other words, *I* chose it. :-)), and with
apologies to Toru Iwatani, by way of Michael Thomasson at
http://www.gooddealgames.com/articles/Pac-Man%20Ghosts.html, here
it is:


A Proposed Nomenclature for the Four Horseman of The Infocalypse

   Horseman Color  Character   Nickname

1  TerrorismRedShadow  Blinky
2  NarcoticsPink   Speedy  Pinky
3  Money Laundering Aqua   Bashful Inky
4  Paedophilia  Yellow Pokey   Clyde

It is acceptable to refer to a horseman by any of the above, i.e.,
Horseman No. 1, The Red Horseman, Shadow, or Blinky.

Apparently there was a, um, pre-deceased, dark-blue ghost, used in
Japanese tournament play, named Kinky, I leave that particular
horseman for quibblers.


Cheers,
RAH

-BEGIN PGP SIGNATURE-
Version: PGP 8.0.3

iQA/AwUBQWBN/MPxH8jf3ohaEQKfBwCfYAtDGjP6jjsUHfhWcddqDYTEWfEAoOTU
I056iw3tAhHohzkh1ptzJ8Es
=/tt7
-END PGP SIGNATURE-

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Call for Papers: ShmooCon. 2005. No moose. We swear.

2004-10-01 Thread R. A. Hettinga
http://www.shmoocon.org/cfp.html

 Washington, D.C.

 Call for Papers [PDF]

 http://www.shmoocon.org

 The Shmoo Group is soliciting papers and presentations for the first
annual ShmooCon. ShmooCon 2005 will be a highly-technical and entertaining
East coast hacker convention focused on technology exploitation, inventive
software and hardware solutions, as well as open discussion on a variety of
technology and security topics. ShmooCon 2005 will be held on February 4-6,
2005 at the Wardman Park Marriott in Washington, D.C., just minutes from
your choice of 3-letter agencies.

 ShmooCon 2005 will have three tracks, each dedicated to the following:
 Break It! - Technology Exploitation
 Build It! - Inventive Software and Hardware Solutions
 BoF It! - Open Discussion of Technology and Security Topics

 Topics for the Break It! track may include, but are not limited to,
EXPLOITATION of:
 - Consumer electronic devices
 - Application, host, and network security
 - Telephony
 - Physical security

 Topics for the Build It! track may include, but are not limited to,
inventive software and hardware SOLUTIONS in:
 - Robotics
 - Distributed computing
 - Community wireless networking
 - Mobile personal computing

 Topics for the BoF It! track may include, but are not limited to, open
DISCUSSION of the following:
 - Privacy and anonymity
 - Exploit and vulnerability disclosure / databases
 - DRM (Digital Rights Management), fair use, copyright infringement
 - Open source software world domination strategies

 Presentation Format
 All presentations and discussions will be 55 minutes in length.
Presentations in the Break It! and Build It! tracks must include
demonstrations of personally developed techniques, working code, and/or
devices, with code and/or schematics being open-source and released to the
public for free. Initiating an open discussion for BoF It! requires
subject matter expertise, active involvement with the topic at hand, and a
brief presentation of the topic/problem scope.

 Shmooballs will be issued to the audience, to facilitate a frank and open
discussion of opinions. Speakers are encouraged to present innovative ideas
that not everyone agrees with.

 Submission Procedure
 To submit, email [EMAIL PROTECTED] with the following information:
 1. Speaker name(s) and/or handle(s)
 2. Presentation Title
 3. Track preference
 4. Two to three paragraph presentation description and/or outline
 5. List facilities required. Projector for use with VGA input, flipchart,
sound projection, Internet connectivity will be provided.
 6. Speaker bio
 7. Contact info for speaker (email AND mobile number, please)

 Accepted speakers will receive free admission to the conference, as well
as a $100 honorarium after evaluation of their completed presentation. 6
runner-ups will receive free admission as hot-alternates. They should come
to ShmooCon 2005 prepared to speak, and, if it becomes necessary for them
to speak as an alternate, they too will receive a $100 honorarium after
evaluation of their completed presentation. NOTE: select presentation
submissions which are not accepted will be awarded a 50% discounted
admission to ShmooCon 2005. Presentations must be designed to include
source code, schematics, or other substantial details that demonstrate the
topic being discussed.

 Presentation proposals will be reviewed by members of the Shmoo Group. A
list of the reviewers will be posted on the ShmooCon 2005 web site when the
Call For Papers is formally issued.

 If you feel you have a presentation that would be appropriate but that
does not meet these guidelines, feel free to submit it anyway but be sure
to include a cover letter explaining your reasoning so we can evaluate your
proposal.

 All questions regarding this call for papers should be addressed to
[EMAIL PROTECTED]

 Schedule
 Check the web site for final dates
 July 30, 2004 CFP opens
 Early Fall 2004 papers for preferential first round consideration due
 Middle Fall 2004 final due date for all papers
 Late Fall 2004 speakers notified

 Submissions are due by late fall 2004. Preference will be given to
submissions received by early fall 2004. Selected speakers will be notified
by Halloween, 2004. We look forward to receiving your submissions as well
as seeing you at ShmooCon 2005!

 ShmooCON 2005 CFP 1.0 RC6


news


about


registration


cfp


program


schedule


location


sponsors


links






contact us . privacy policy
 ©2004, The Shmoo Group




-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



CFP: Privacy Enhancing Technologies (PET 2005)

2004-10-01 Thread R. A. Hettinga
 University, USA
Matthew Wright, University of Texas at Arlington, USA

Papers should be at most 15 pages excluding the bibliography and
well-marked appendices (using an 11-point font), and at most 20 pages
total.  Submission of shorter papers (from around 4 pages) is strongly
encouraged whenever appropriate.  Papers must conform to the Springer
LNCS style.  Follow the Information for Authors link at
http://www.springer.de/comp/lncs/authors.html.

Reviewers of submitted papers are not required to read the appendices
and the paper should be intelligible without them.  The paper should
start with the title, names of authors and an abstract.  The
introduction should give some background and summarize the
contributions of the paper at a level appropriate for a non-specialist
reader.  A preliminary version of the proceedings will be made
available to workshop participants.  Final versions are not due until
after the workshop, giving the authors the opportunity to revise their
papers based on discussions during the meeting.

Submit your papers in Postscript or PDF format.  To submit a paper,
compose a plain text email to [EMAIL PROTECTED]
containing the title and abstract of the paper, the authors' names,
email and postal addresses, phone and fax numbers, and identification
of the contact author (to whom we will address all subsequent
correspondence).  Attach your submission to this email and send it.
By submitting a paper, you agree that if it is accepted, you will sign
a paper distribution agreement allowing for publication, and also that
an author of the paper will register for the workshop and present the
paper there.  Our current working agreement with Springer is that
authors will retain copyright on their own works while assigning an
exclusive 3-year distribution license to Springer.  Authors may still
post their papers on their own Web sites.  See
http://petworkshop.org/2004/paper-dist-agreement-5-04.html for the 2004
version of this agreement.

Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference with proceedings.

Paper submissions must be received by February 7.  We acknowledge all
submissions manually by email.  If you do not receive an
acknowledgment within a few days (or one day, if you are submitting
right at the deadline), then contact the program committee chairs
directly to resolve the problem.  Notification of acceptance or
rejection will be sent to authors no later than April 4 and authors
will have the opportunity to revise for the preproceedings version by
May 6.

We also invite proposals of up to 2 pages for panel discussions or
other relevant presentations.  In your proposal, (1) describe the
nature of the presentation and why it is appropriate to the workshop,
(2) suggest a duration for the presentation (ideally between 45 and 90
minutes), (3) give brief descriptions of the presenters, and (4)
indicate which presenters have confirmed their availability for the
presentation if it is scheduled.  Otherwise, submit your proposal by
email as described above, including the designation of a contact
author.  The program committee will consider presentation proposals
along with other workshop events, and will respond by the paper
decision date with an indication of its interest in scheduling the
event.  The proceedings will contain 1-page abstracts of the
presentations that take place at the workshop.  Each contact author
for an accepted panel proposal must prepare and submit this abstract
in the Springer LNCS style by the Camera-ready copy for
preproceedings deadline date.



___
NymIP-rg-interest mailing list
[EMAIL PROTECTED]
http://www.nymip.org/mailman/listinfo/nymip-rg-interest

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Patriot Act Misinformation

2004-10-01 Thread R. A. Hettinga
http://online.wsj.com/article_print/0,,SB109659214177033379,00.html

The Wall Street Journal


 October 1, 2004

 REVIEW  OUTLOOK


Patriot Act Misinformation
October 1, 2004; Page A14

The American Civil Liberties Union has been spinning its victory in a
federal court in New York this week as a blow against the USA Patriot Act.
One typical headline: Federal Judge Calls Patriot Act Secret Searches
Unconstitutional. An ACLU press release hails the decision as a landmark
victory against the Ashcroft Justice Department.

Well, no. If reporters had bothered to read Judge Victor Marrero's
decision, they would have learned that the law he actually struck down was
a provision of the Electronic Communications Privacy Act of 1986. Section
2709 authorizes the FBI to issue National Security Letters to obtain
information from wire communications companies about their subscribers.
NSLs are issued secretly and the recipient is prohibited from notifying
anyone about the request.

As Judge Marrero noted in his ruling, Section 2790 has been available to
the FBI since 1986. He concludes that there must have been hundreds of
NSLs issued since that time. The Patriot Act did amend Section 2790, but
that amendment has nothing to do with the part that Judge Marrero says is
unconstitutional.

One more thing: The Electronics Communications Act was not the invention of
John Ashcroft. It was sponsored by that famous and menacing right-winger,
Vermont Senator Patrick Leahy, who said at the time that Section 2790
provides a clear procedure for access to telephone toll records in
counterintelligence investigations.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



'Frustrated' U.S. Cybersecurity Chief Abruptly Resigns

2004-10-01 Thread R. A. Hettinga
http://www.local6.com/print/3776699/detail.html?use=print

local6.com

'Frustrated' U.S. Cybersecurity Chief Abruptly Resigns

POSTED: 11:32 AM EDT October 1, 2004
WASHINGTON -- The government's cybersecurity chief has abruptly resigned
after one year with the Department of Homeland Security, confiding to
industry colleagues his frustration over what he considers a lack of
attention paid to computer security issues within the agency.

 Amit Yoran, a former software executive from Symantec Corp., informed the
White House about his plans to quit as director of the National Cyber
Security Division and made his resignation effective at the end of
Thursday, effectively giving a single's day notice of his intentions to
leave.

 Yoran said Friday he felt the timing was right to pursue other
opportunities. It was unclear immediately who might succeed him even
temporarily. Yoran's deputy is Donald Andy Purdy, a former senior adviser
to the White House on cybersecurity issues.

 Yoran has privately described frustrations in recent months to colleagues
in the technology industry, according to lobbyists who recounted these
conversations on condition they not be identified because the talks were
personal.

 As cybersecurity chief, Yoran and his division - with an $80 million
budget and 60 employees - were responsible for carrying out dozens of
recommendations in the Bush administration's National Strategy to Secure
Cyberspace, a set of proposals to better protect computer networks.

 Yoran's position as a director -- at least three steps beneath Homeland
Security Secretary Tom Ridge -- has irritated the technology industry and
even some lawmakers. They have pressed unsuccessfully in recent months to
elevate Yoran's role to that of an assistant secretary, which could mean
broader authority and more money for cybersecurity issues.

 Amit's decision to step down is unfortunate and certainly will set back
efforts until more leadership is demonstrated by the Department of Homeland
Security to solve this problem, said Paul Kurtz, a former cybersecurity
official on the White House National Security Council and now head of the
Washington-based Cyber Security Industry Alliance, a trade group.

 Under Yoran, Homeland Security established an ambitious new cyber alert
system, which sends urgent e-mails to subscribers about major virus
outbreaks and other Internet attacks as they occur, along with detailed
instructions to help computer users protect themselves.

 It also mapped the government's universe of connected electronic devices,
the first step toward scanning them systematically for weaknesses that
could be exploited by hackers or foreign governments. And it began
routinely identifying U.S. computers and networks that were victims of
break-ins.

 Yoran effectively replaced a position once held by Richard Clarke, a
special adviser to President Bush, and Howard Schmidt, who succeeded Clarke
but left government during the formation of the Department of Homeland
Security to work as chief security officer at eBay Inc.

 Yoran cofounded Riptech Inc. of Alexandria, Va., in March 1998, which
monitored government and corporate computers around the world with an
elaborate sensor network to protect against attacks. He sold the firm in
July 2002 to Symantec for $145 million and stayed on as vice president for
managed security services.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: How to fuck with airports - a 1 step guide for (Redmond) terrorists.

2004-09-29 Thread R. A. Hettinga
At 8:28 AM +0200 9/29/04, Eugen Leitl wrote:
The mind boggles. Even more interesting: how many heads have rolled due to
this?

None, of course. Microsoft is the new IBM. As in, Nobody ever got fired
for buying Microsoft...

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Federal judge rejects part of Patriot Act

2004-09-29 Thread R. A. Hettinga
http://msnbc.msn.com/id/6131670/print/1/displaymode/1098/
  MSNBC.com

Federal judge rejects part of Patriot Act
Provision giving FBI access to business records overturned
Reuters
Updated: 12:11 p.m. ET Sept. 29, 2004


NEW YORK - A federal judge Wednesday found unconstitutional a part of the
United States' anti-terror Patriot Act that allows authorities to demand
customer records from businesses without court approval.

 U.S. District Judge Victor Marreo ruled in favor of the American Civil
Liberties Union, which challenged the power the FBI has to demand
confidential financial records from companies as part of terrorism
investigations.

 The ruling was the latest blow to the Bush administration's anti-terrorism
policies.

 In June, the U.S. Supreme Court ruled that terror suspects being held in
places like Guantanamo Bay can use the American judicial system to
challenge their confinement. That ruling was a defeat for the president's
assertion of sweeping powers to hold enemy combatants indefinitely after
the Sept. 11, 2001, attacks.

 The ACLU sued the Department of Justice, arguing that part of the Patriot
legislation violated the Constitution because it authorizes the FBI to
force disclosure of sensitive information without adequate safeguards.

 The judge agreed, stating that the provision effectively bars or
substantially deters any judicial challenge.

 Under the provision, the FBI did not have to show a judge a compelling
need for the records and it did not have to specify any process that would
allow a recipient to fight the demand for confidential information.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Their Crisis, Our Leviathan

2004-09-28 Thread R. A. Hettinga
 and Mirrors
Market, by John Maudlin, p. 105, (John Wiley  Sons, New York, 2004).

http://by1fd.bay1.hotmail.msn.com/cgi-bin/dasp/EN/rte___90801.asp#_ftnref15[15]
What makes us rich, writes Murray Rothbard, is an abundance of goods,
and what limits that abundance is a scarcity of resources: . . .
Multiplying coin will not whisk these resources into being. We may feel
twice as rich for the moment, but clearly all we are doing is diluting the
money supply. P. 33. See Rothbard’s http://www.mises.org/money.aspWhat
Has Government Done to Our Money?

http://by1fd.bay1.hotmail.msn.com/cgi-bin/dasp/EN/rte___90801.asp#_ftnref16[16]
Here, wrote William Graham Sumner about a century ago,  we have the
Forgotten Man again, and once again we find him worthy of all respect and
consideration, but passed by in favor of the noisy, pushing and
incompetent. From Social Darwinsim. Selected Essays of William Graham
Sumner, p. 127, (Prentice-Hall, Englewood Cliffs, New Jersey, 1963).

http://by1fd.bay1.hotmail.msn.com/cgi-bin/dasp/EN/rte___90801.asp#_ftnref17[17]
The Republican Party, in 1952, turned away from isolationism when it
turned its back on Senator Robert Taft. He was the Reluctant Dragon,
unable to wage permanent war against the Soviet menace. The party,
instead, turned to the internationalist Dwight Eisenhower. See Prophets
on the Right. Profiles of Conservative Critics of American Globalism, by
Ronald Radosh, p. 192, (Simon and Shuster, New York, 1975).

http://by1fd.bay1.hotmail.msn.com/cgi-bin/dasp/EN/rte___90801.asp#_ftnref18[18]See
The Politics of War. The Story of Two Wars which Altered Forever the
Political Life of the American  Republic (1890–1920) by Walter Karp,
Harper Row, New York,  1979).

http://by1fd.bay1.hotmail.msn.com/cgi-bin/dasp/EN/rte___90801.asp#_ftnref19[19]
Ibid.

http://by1fd.bay1.hotmail.msn.com/cgi-bin/dasp/EN/rte___90801.asp#_ftnref20[20]
Germany has double the unemployment rate of the United States. See the
Wall Street Journal op-ed page of August 2, 2004,. Auf Wiedersehen to
the Leisure Economy,  p. A11.

http://by1fd.bay1.hotmail.msn.com/cgi-bin/dasp/EN/rte___90801.asp#_ftnref21[21]
See my http://www.mises.org/fullstory.aspx?control=344The Social
Security Deal of 1972 at mises.org or simply by doing on an on line search
using my name.

http://by1fd.bay1.hotmail.msn.com/cgi-bin/dasp/EN/rte___90801.asp#_ftnref22[22]See
Alexis de Tocqueville’s Democracy in America. Here De Tocqueville, over a
century and a half ago, warned of the potential for an administrative
despotism that would be unlike any other tyranny ever experienced in
history. It would resemble parental authority, if, fatherlike, it tried to
prepare its charges for a man’s life, but on the contrary, it only tries to
keep them in perpetual childhood. P. 692, Vol II, (Perrenial Classics, New
York, 2000).

In response to many requests, it is now possible to set your credit-card
contribution to the Mises Institute to be recurring. You can easily set
this up on-line with a donation starting at $10 per month. See the
https://www.mises.org/donate.aspMembership Page. This is one way to
ensure that your support for the Mises Institute is ongoing.

http://www.mises.org/fullstory.aspx?Id=1621[Print Friendly Page]

http://www.mises.org/blog/

http://www.mises.org/elist.aspMises Email List Services

https://www.mises.org/donate.aspJoin the Mises Institute
http://www.mises.org/storeMises.org Store

http://www.mises.org/Home | http://www.mises.org/about.aspAbout |
http://www.mises.org/elist.aspEmail List |
http://www.google.com/u/MisesSearch |
http://www.mises.org/contact.aspContact Us |
http://www.mises.org/journals.aspPeriodicals |
http://www.mises.org/articles.aspArticles |
http://www.mises.org/fun.aspGames  Fun
http://www.mises.org/StudyGuideDisplay.asp?SubjID=117EBooks |
http://www.mises.org/scholar.aspResources |
http://www.mises.org/catalog.aspCatalog |
https://www.mises.org/donate.aspContributions |
http://www.mises.org/calendar.aspFreedom Calendar

You are subscribed as: [EMAIL PROTECTED]
Manage
http://mises.biglist.com/list/article/?p=prefspre=le=13958347pw=1tyvx5togcyour
account. Unsubscribe
http://mises.biglist.com/list/article/?p=unsubpre=le=13958347pw=1tyvx5togchere
or send email to mailto:[EMAIL PROTECTED]this
address.

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Geopolitical Darwin Awards

2004-09-21 Thread R. A. Hettinga
At 8:11 PM -0700 9/20/04, Major Variola (ret) wrote:
At 04:57 PM 9/19/04 -0700, James A. Donald wrote:

But the Saudi Arabian elite, of among which Bin Laden was born with a
silver spoon in his mouth, are not getting screwed over.

1. you don't get religion
2. UBL's mom was a low-caste yemeni, dig?

Actually, UBL's *dad* was a low-caste Yemeni, too.

And your point is?

Like all cultural components, religion is about the allocation of scarce
resources. War is the penultimate form of this kind of allocation. In fact,
the actual content of religion is immaterial, except where it affects the
ability of a culture to raise the resources to fight a *war*, which, as
Hanson puts it so nicely in Carnage and Culture, is everything.

Because of its inability to raise the resources to fight a modern war --
capital (by several orders of magnitude, go look at a map with GDP
superimposed), and, most important the freedom to create new *science* to
produce that capital with, virtually out of thin air -- Islam is a dead
religion. It just doesn't know it yet.

UBL, and the entire Islamic culture, will eventually go the way of Hannibal
and Carthage.

Carthage sacrificed children to their gods too. Go for it, I say...

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



AOL to Sell Secure ID Tags to Fight Hackers

2004-09-21 Thread R. A. Hettinga
http://www.reuters.com/newsArticle.jhtml?type=internetNewsstoryID=6284760

Reuters



AOL to Sell Secure ID Tags to Fight Hackers
 Mon Sep 20, 2004 06:18 PM ET

  NEW YORK (Reuters) - America Online will begin offering to sell members a
security device and service that has been used to safeguard business
computer networks, the world's largest Internet service provider said on
Monday.

 AOL, a unit of Time Warner Inc. (TWX.N: Quote, Profile, Research) , signed
a deal with Internet security company RSA Security Inc. (RSAS.O: Quote,
Profile, Research) , to launch its new AOL PassCode, designed to add an
additional layer of protection to member accounts.

 PassCode users will be provided with a small handheld six-digit numeric
code key.

 To log onto an AOL account equipped with the service, users will have to
type in the six-digits, which refresh on the device every 60 seconds, on
top of using the regular password.

The code-key device will cost $9.95. Monthly service costs range from $1.95
to $4.95.

 AOL PassCode is like adding a deadbolt to your AOL account by
automatically creating a new secondary password every 60 seconds, said Ned
Brody, senior vice president of AOL Premium Services.

 Hackers coined the term phishing in 1996 to refer to the act of
swindling unsuspecting AOL customers into giving up their passwords through
phony e-mails or instant messages.
-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Geopolitical Darwin Awards

2004-09-21 Thread R. A. Hettinga
At 8:12 PM -0700 9/20/04, Major Variola (ret) wrote:
The yank minutemen were not above taking children as soldiers,
any more than Dan'l Boone was above taking a 14 year old as
a wife.

That's more a definition of adult, than anything else.

If they're old enough to blee-... Oh, forget it...

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



The internment taboo

2004-09-20 Thread R. A. Hettinga
 of internment, past and present.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: :-) (was re: How one can become a terrorist?)

2004-09-20 Thread R. A. Hettinga
At 9:30 PM -0500 9/19/04, J.A. Terranson wrote:
This is a well known joe-job.

Well, *sure*.

Too bad they didn't put blacknet's address on it, or something...

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Academics locked out by tight visa controls

2004-09-20 Thread R. A. Hettinga
http://www.mercurynews.com/mld/mercurynews/9710963.htm?template=contentModules/printstory.jsp

Posted on Mon, Sep. 20, 2004

Academics locked out by tight visa controls
U.S. SECURITY BLOCKS FREE EXCHANGE OF IDEAS
By Bruce Schneier


Cryptography is the science of secret codes, and it is a primary Internet
security tool to fight hackers, cyber crime, and cyber terrorism. CRYPTO is
the world's premier cryptography conference. It's held every August in
Santa Barbara.

This year, 400 people from 30 countries came to listen to dozens of talks.
Lu Yi was not one of them. Her paper was accepted at the conference. But
because she is a Chinese Ph.D. student in Switzerland, she was not able to
get a visa in time to attend the conference.

In the three years since 9/11, the U.S. government has instituted a series
of security measures at our borders, all designed to keep terrorists out.
One of those measures was to tighten up the rules for foreign visas.
Certainly this has hurt the tourism industry in the U.S., but the damage
done to academic research is more profound and longer-lasting.

According to a survey by the Association of American Universities, many
universities reported a drop of more than 10 percent in foreign student
applications from last year. During the 2003 academic year, student visas
were down 9 percent. Foreign applications to graduate schools were down 32
percent, according to another study by the Council of Graduate Schools.

There is an increasing trend for academic conferences, meetings and
seminars to move outside of the United States simply to avoid visa hassles.

This affects all of high-tech, but ironically it particularly affects the
very technologies that are critical in our fight against terrorism.

Also in August, on the other side of the country, the University of
Connecticut held the second International Conference on Advanced
Technologies for Homeland Security. The attendees came from a variety of
disciplines -- chemical trace detection, communications compatibility,
X-ray scanning, sensors of various types, data mining, HAZMAT clothing,
network intrusion detection, bomb diffusion, remote-controlled drones --
and illustrate the enormous breadth of scientific know-how that can
usefully be applied to counterterrorism.

It's wrong to believe that the U.S. can conduct the research we need alone.
At the Connecticut conference, the researchers presenting results included
many foreigners studying at U.S. universities. Only 30 percent of the
papers at CRYPTO had only U.S. authors. The most important discovery of the
conference, a weakness in a mathematical function that protects the
integrity of much of the critical information on the Internet, was made by
four researchers from China.

Every time a foreign scientist can't attend a U.S. technology conference,
our security suffers. Every time we turn away a qualified technology
graduate student, our security suffers. Technology is one of our most
potent weapons in the war on terrorism, and we're not fostering the
international cooperation and development that is crucial for U.S. security.

Security is always a trade-off, and specific security countermeasures
affect everyone, both the bad guys and the good guys. The new U.S.
immigration rules may affect the few terrorists trying to enter the United
States on visas, but they also affect honest people trying to do the same.

All scientific disciplines are international, and free and open information
exchange -- both in conferences and in academic programs at universities --
will result in the maximum advance in the technologies vital to homeland
security. The Soviet Union tried to restrict academic freedom along
national lines, and it didn't do the country any good. We should try not to
follow in those footsteps.

BRUCE SCHNEIER is a security technologist and chief technology officer of
Counterpane Internet Security, Inc., in Mountain View. He wrote this for
the Mercury News.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



O'Rourke: Why Americans hate foreign policy

2004-09-19 Thread R. A. Hettinga
 of South Carolina's JFK look-alike contest, John Edwards, and
the winner of Florida's Bob Gramm look-alike contest, Bob Gramm, said that
America had won the war in Iraq but was losing the peace because Iraq was
so unstable. When Iraq was stable, it attacked Israel in 1967 and 1973. It
attacked Iran. It attacked Kuwait. It gassed the Kurds. It butchered the
Shiites. It fostered terrorism in the Middle East. Who wanted a stable Iraq?

And perennial representative of the House of Representatives Dick Gephardt
wouldn't talk much about foreign policy. He was concentrating on economic
issues, claiming that he'd make the American Dream come true for everyone.

Gephardt may have been on to something there. Once people get rich, they
don't go in much for war-making. The shoes are ugly and the uniforms itch.
Some day, Osama bin Laden will call a member of one of his sleeper cells
- a person who was planted in the United States years before and told to
live like a normal American, and...

Dad, some guy named Ozzy's on the phone.

Oh, uh, good to hear from you. Of course, of course... Rockefeller
Center?... Next Wednesday?... I'd love to, but the kid's got her ballet
recital. You miss something like that, they never forget it... Thursday's
no good. I have to see my mom off on her cruise to Bermuda in the morning.
It's Fatima's yoga day. And I've got courtside seats for the Nets...
Friday, we're going to the Hamptons for the weekend...

But how, exactly, did Gephardt plan to make everyone on earth as
materialistic, self-indulgent, and over-scheduled as Americans? Would
Gephardt give foreigners options on hot dot-com stocks? That might have
worked during the Clinton years.

As of early 2004, America didn't seem to have the answers for postwar Iraq.
Then again, what were the questions?

Was there a bad man? And his bad kids? Were they running a bad country?
That did bad things? Did they have a lot of oil money to do bad things
with? Were they going to do more bad things?

If those were the questions, was the answer UN-supervised national
reconciliation or rapid return to self-rule? No. The answer was blow the
place to bits.

A mess was left behind. But it's a mess without a military to fight
aggressive wars; a mess without the facilities to develop dangerous
weapons; a mess that cannot systematically kill, torture, and oppress
millions of its citizens. It's a mess with a message - don't mess with us.

As frightening as terrorism is, it's the weapon of losers. When someone
detonates a suicide bomb, that person does not have career prospects.

And no matter how horrific the terrorist attack, it's conducted by losers.
Winners don't need to hijack airplanes. Winners have an air force.

This is an edited extract from Peace Kills: America's Fun New Imperialism
by P J O'Rourke (Atlantic), to be published on September 23. To order for
£14.99 + £2.25 pp, please call Telegraph Books Direct on 0870 155 7222


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



:-) (was re: How one can become a terrorist?)

2004-09-19 Thread R. A. Hettinga

--- begin forwarded text


Return-Path: [EMAIL PROTECTED]
Received: from bullae.ibuc.com ([unix socket])
by bullae.ibuc.com (Cyrus v2.1.13) with LMTP; Sun, 19 Sep 2004
21:29:53 -0400
X-Sieve: CMU Sieve 2.2
Received: from cpe-066-061-026-172.midsouth.rr.com
(cpe-066-061-026-172.midsouth.rr.com [66.61.26.172])
by bullae.ibuc.com (Postfix) with SMTP id C8526827C8D
for [EMAIL PROTECTED]; Sun, 19 Sep 2004 21:29:52 -0400 (EDT)
Message-ID: [EMAIL PROTECTED]
Date: Mon, 20 Sep 2004 01:33:55 +
From: [EMAIL PROTECTED]
Subject: How one can become a terrorist?
To: [EMAIL PROTECTED]
MIME-Version: 1.0
Content-Type: text/plain

Welcome to our web site www.shadowcrew.com/phpBB2/index.php

Please use http://63.240.81.5 in case of our domain outage.

You're invited to shop for large selection of bombs and different kinds of
rockets such as surface-to-air,
surface-to-surface and weaponry available at reduced price. With the
following types of rockets you will be
able to commit terrorist attacks, destroy buildings, electric power
stations, bridges, factories and anything
else that comes your mind. Most items are in stock and available for next
day freight delivery in the USA.
Worldwide delivery is available at additional cost. Prices are negotiable.

Please feel free to inquire by ICQ # 176928755 or contacting us directly:

+1-305-592-
+1-919-319-8249
+1-314-770-3395

Today special:

*** AIR BOMBS ***
OFAB-500U HE fragmentation air bomb
Fuel-air explosive air bombs -Not in stock
BETAB-500U concrete-piercing air bomb
ZB-500RT incendiary tank
500-KG SIZE RBK-500U unified cluster bomb
RBK-500U OAB-2.5PT loaded with fragmentation submunitions
RBK-500U BETAB-M loaded with concrete-piercing submunitions-Not in stock
RBK-500U OFAB-50UD loaded with HE fragmentation submunitions

*** UNGUIDED AIRCRAFT ROCKETS  ***
Main-purpose unguided aircraft rockets
S-8 unguided aircraft rockets
S-8KOM
S-8BM-Not in stock
S-13 unguided aircraft rockets
S-13, S-13T, S-13-OF, S-13D, S-13DF
S-25-0
S-25-OFM
S-24B -Not in stock
RS-82
RS-132-Not in stock

*** ROCKET PODS   ***
B-8M pod for S-8 rockets
B-8V20-A pod for S-8 rockets
B-13L pod for S-13 rockets

Recently received *NEW*

Hydra 70 2.75 inch Rockets
Air-Launched 2.75-Inch Rockets
FIM-92A Stinger Weapons System
Stinger 101: Anti-Air

Our clients are well known Al-Qaida, Hizballah, Al-Jihad, HAMAS, Abu Sayyaf
Group and many other terrorist groups. We are well known supplier in the
market and looking forward to expand our clientage with assistance of
Internet.

Do not hesitate to contact us via ICQ # 176928755

Impatiently awaiting for your orders,
ShadowCrew

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Nanometer Bamboo Carbon TEMPEST Protection

2004-09-15 Thread R. A. Hettinga
At 9:40 AM -0700 9/14/04, Bill Stewart wrote:
Hey, you cultural imperialist!
Western domination of the Tinfoil Hat market has got to stop!
Traditional Chinese materials can be equally effective and
aesthetically superior.

Who you callin' imperialist! You Veridian!!!

;-)

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Symantec labels China censor-busting software as Trojan

2004-09-15 Thread R. A. Hettinga
http://www.theregister.co.uk/2004/09/14/symantec_targets_freegate/print.html

The Register


 Biting the hand that feeds IT

The Register » Internet and Law » Digital Rights/Digital Wrongs »

 Original URL:
http://www.theregister.co.uk/2004/09/14/symantec_targets_freegate/

Symantec labels China censor-busting software as Trojan
By John Leyden (john.leyden at theregister.co.uk)
Published Tuesday 14th September 2004 18:10 GMT

Symantec has labelled a program that enables Chinese surfers to view
blocked websites as a Trojan Horse. Upshot? Users of Norton Anti-Virus
cannot access Freegate, a popular program which circumvents government
blocks, the FT reports.

Freegate has 200,000 users, Dynamic Internet Technology (DIT
(http://www.dit-inc.us)), its developer, estimates. It lets users view
sites banned by the Chinese government by taking advantage of a range of
proxy servers assigned to changeable internet addresses. But a recent
update to Symantec's AV definition files means the latest version of
Freegate is treated as malware and removed from systems protected by
Norton. Short of disabling Norton AV, users would have little say in this.

A Symantec staffer in China told the FT that Norton Anti-Virus identified
Freegate as a Trojan horse, but declined to provide a rationale for such a
definition. The absence of an explanation from Symantec raises concerns. We
hope that the mislabelling of Freegate is a simple mistake, soon rectified,
rather than yet another example of an IT firm helping Beijing implement
restrictions.

History provides as least one example
(http://www.vmyths.com/rant.cfm?id=316page=4) of the AV industry extending
favours to China that it would normally withhold. AV firms normally keep
virus samples under lock and key. But suppliers agreed to hand over virus
samples to the Chinese government a few years ago as a condition of trading
in the country. These samples could be easily found on the net but the
incident illustrates a precedent of China being treated as a special
exception.
-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



[irtheory] An Interview with Jacques Derrida

2004-09-13 Thread R. A. Hettinga
 [salut] of salvation. Not
alien to the salavation [salut] of the other, nor alien to the farewell or
to justice, but still rebellious towards the economy of redemption.Š I
thought this very beautiful. Almost a prayer to insert - into the everyday,
into our project. What is it, this messianism without religion?




JD: The weak force indeed refers to the interpretation of Benjamin, but it
is not exactly mine. It is what I call messianicity without messianism: I
would say that today, one of the incarnations, one of the implementations
of this messianicity, of this messianism without religion, may be found in
the alter-globalisation movements. Movements that are still heterogeneous,
still somewhat unformed, full of contradictions, but that gather together
the weak of the earth, all those who feel themselves crushed by the
economic hegemonies, by the liberal market, by sovereignism, etc. I believe
it is these weak who will prove to be strongest in the end and who
represent the future. Even though I am not a militant involved in these
movements, I place my bet on the weak force of those alter-globalisation
movements, who will have to explain themselves, to unravel their
contradictions, but who march against all the hegemonic organisations of
the world. Not just the United States, also the International Monetary
Fund, the G8, all those organised hegemonies of the rich countries, the
strong and powerful countries, of which Europe is part. It is these
alter-globalisation movements that offer one of the best figures of what I
would call messianicity without messianism, that is to say a messianicity
that does not belong to any determined religion. The conflict with Iraq
involved numerous religious elements, from all sides-from the Christian
side as well as from the Muslim side. What I call messianicity without
messianism is a call, a promise of an independent future for what is to
come, and which comes like every messiah in the shape of peace and justice,
a promise independent of religion, that is to say universal. A promise
independent of the three religions when they oppose each other, since in
fact it is a war between three Abrahamic religions. A promise beyond the
Abrahamic religions, universal, without relation to revelations or to the
history of religions. My intent here is not anti-religious, it is not a
matter of waging war on the religious messianisms properly speaking, that
is to say Judaic, Christian, Islamic. But it is a matter of marking a place
where these messianisms are exceeded by messianicity, that is to say by
that waiting without waiting, without horizon for the event to come, the
democracy to come with all its contradictions. And I believe we must seek
today, very cautiously, to give force and form to this messianicity,
without giving in to the old concepts of politics (sovereignism,
territorialised nation-state), without giving in to the Churches or to the
religious powers, theologico-political or theocratic of all orders, whether
they be the theocracies of the Islamic Middle East, or whether they be,
disguised, the theocracies of the West. (In spite of everything, Europe,
France especially, but also the United States are secular in principle in
their Constiutions. I recently heard a journalist say to an American: how
do you explain that Bush always says 'God bless America', that the
President swears on the Bible, etc. and the American replied: don't
lecture us on secularity for we put the separation of Church and State into
our Constitution long before you did, that the State was not under the
control of any religion whatsoever, which does not stop Christian
domination from exerting itself, but there too it is imperative to be very
cautious). Messianicity without messianism, that is: independence in
respect of religion in general. A faith without religion in some sort.





Transcribed by Maïwenn Furic

(Ris Orangis, Thursday February 19 2004)

Translated by Ortwin de Graef








1 Derrida alludes to his reflection on Kant and his idea of a 'Völkerbund'
(alliance of peoples) in Voyous [Rogues], pp. 118-25.



 Yahoo! Groups Sponsor ~--
Make a clean sweep of pop-up ads. Yahoo! Companion Toolbar.
Now with Pop-Up Blocker. Get it for free!
http://us.click.yahoo.com/L5YrjA/eSIIAA/yQLSAA/_tgrlB/TM
~-


Yahoo! Groups Links

* To visit your group on the web, go to:
http://groups.yahoo.com/group/irtheory/

* To unsubscribe from this group, send an email to:
[EMAIL PROTECTED]

* Your use of Yahoo! Groups is subject to:
http://docs.yahoo.com/info/terms/


--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable

[ISN] Mitnick movie comes to the US

2004-09-13 Thread R. A. Hettinga
I wonder if they include Shinomura boffing Gilmore's girlfriend in the Toad
Hall hot tub?

Got Skills indeed...

Cheers,
RAH

--- begin forwarded text


Date: Thu, 9 Sep 2004 05:41:59 -0500 (CDT)
From: InfoSec News [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [ISN] Mitnick movie comes to the US
Reply-To: [EMAIL PROTECTED]
List-Id: InfoSec News isn.attrition.org
List-Archive: http://www.attrition.org/pipermail/isn
List-Post: mailto:[EMAIL PROTECTED]
List-Help: mailto:[EMAIL PROTECTED]
List-Subscribe: http://www.attrition.org/mailman/listinfo/isn,
mailto:[EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]

http://www.theregister.co.uk/2004/09/09/mitnick_movie_us/

[ http://www.amazon.com/exec/obidos/ASIN/B0002L57YQ/c4iorg  - WK]

By Kevin Poulsen,
SecurityFocus
9th September 2004

Nearly six years after it was filmed, Hollywood's trouble-plagued
movie version of the hunt for hacker Kevin Mitnick is headed for video
stores in the US

Originally titled Takedown, then Cybertraque, the film is set for a
September 28th U.S. release on DVD with the new title, Track Down.

The movie is from Miramax's horror and sci-fi label Dimension Films,
and is based on the book Takedown: The Pursuit and Capture of
America's Most Wanted Computer Outlaw - By The Man Who Did It,
authored by computer scientist Tsutomu Shimomura and New York Times
reporter John Markoff.

Shimomura electronically tracked Mitnick to his Raleigh, North
Carolina hideout in February, 1995, and sold the book and movie rights
for an undisclosed sum amidst the storm of publicity following the
fugitive hacker's arrest.

Early versions of the screenplay for the movie adaptation of Takedown
cast Mitnick - played by Scream star Skeet Ulrich - as violent and
potentially homicidal. In July, 1998, supporters of the
then-imprisoned cyberpunk rallied against the film outside Miramax's
New York City offices. Writers later revised the script, and shooting
wrapped on the project in December, 1998.

The film then languished without a US release date amid rumors of poor
test screenings and a re-shot ending. Perhaps hoping to recoup some of
their losses, Miramax finally released the movie to French theatres in
March, 2000, as Cybertraque. It was generally panned by critics: a
reviewer for the newspaper Le Monde noted the film's problems in
translating a virtual manhunt to the action-adventure genre. Can the
repeated image of faces sweating over keyboards renew the principles
of the Hollywood thriller?, the paper asked. It's easy to say that
the filmmaker hardly reaches that point, regardless of his saturation
of the soundtrack with rock music to defeat the boredom of the
viewer.

Cybertraque was later released in Europe on DVD with French subtitles,
and enjoyed some underground circulation on peer-to-peer networks,
often misidentified as the sequel to the 1995 film Hackers.

The real-life Mitnick cracked computers at cellphone companies,
universities and ISPs. He pleaded guilty in March, 1999, to seven
felonies, and was released from prison on 21 January, 2000, after
nearly five years in custody.

Now a security consultant and author, the ex-hacker says he's not
happy to see the movie come to America. I didn't expect the film
would ever be released to the US, so this is kind of shock to me, he
says. I'm kind of disappointed because the film depicts me doing
things that are not real.

The fictionalized plot of Track Down centers around Shimomura's
efforts to capture Mitnick before the hacker can access a terrifying
computer program capable of causing blackouts, disabling hospital
equipment and scrambling air traffic control systems. Hollywood's
Mitnick character is portrayed somewhat sympathetically, but is prone
to random outbursts of rage, and suffers a creepy penchant for
electronic eavesdropping and a lurking hatred of women.

You wouldn't believe the amount of emails I get from all around the
world saying, 'I saw this movie about you, it's great, you're my hero,
it was a fantastic movie,' says Mitnick. I'm thinking, these guys
are a little bit off... It's not an interesting film. I think it was
done pretty poorly.



_
Donate online for the Ron Santo Walk to Cure Diabetes -
http://www.c4i.org/ethan.html

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Spam Spotlight on Reputation

2004-09-13 Thread R. A. Hettinga
At 1:33 PM +0100 9/13/04, Ben Laurie wrote:
Surely you should check that:

a) The signature works
b) Is someone in your list of good keys

before whitelisting?

Amen.

A (cryptographic) whitelist for my friends, all others pay cash. :-)

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Call for 'hackers' to try to access voting machines draws stern warning

2004-09-11 Thread R. A. Hettinga
At 7:56 AM -0700 9/11/04, Major Variola (ret) wrote:
The No paper trail, no trust coalition

In St. Thomas, of course, it's No paper trail, no trus' mon. ;-)

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Perplexing proof

2004-09-10 Thread R. A. Hettinga
http://www.vnunet.com/print/1157970



 Perplexing proof

E-commerce is only one mathematical breakthrough away from disaster
Robert Valpuesta, IT Week 09 Sep 2004

The fact that even experts often do not fully understand how IT systems
work was underlined by recent reports that the Riemann hypothesis,
established in 1859, may finally have been proved.

It seems the hypothesis would explain the apparently random pattern of
prime numbers that form the basis for much internet cryptography, used for
e-commerce and online banking to guard accounts and credit card details.

Louis de Branges, a renowned mathematician at Purdue University in the US,
has claimed he can prove the hypothesis. But the maths is so complicated
that no one has yet been able to say whether his solution is right.

[The suggested proof] is rather incomprehensible, professor Marcus du
Sautoy of Oxford University told The Guardian, adding that if correct it
could lead to the creation of a prime spectrometer that would bring the
whole of e-commerce to its knees overnight.

Unfortunately, most managers have no way of telling whether the proof is
right or its implications are indeed as stated. This could be an
embarrassment if they are asked to assess risks for corporate governance
reports, since they clearly now have a duty to own up and admit that
business could be threatened by a theoretical prime spectrometer.

Alternatively they might accept that security is a matter of faith, declare
that nothing can truly be known, and add that the way of Zen shows that
security is probably an illusion anyway.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Flying with Libertarian Hawks

2004-09-10 Thread R. A. Hettinga
 for networks over hierarchies, as the
former tend to do a better job of sustaining complexity among agents in a
society. But further investigation along these lines may reveal something
like a feed-forward network that is formed when inputs of a certain type
allow a system is changed, in a sense, by example.

  

Of course, this is somewhat of a metaphor in the context of Iraq. And, of
course, nation-building isn't an exact science. But I would have always
preferred to hedge my bets that given enough of the appropriate initial
conditions, Iraqis would find that -- in the absence of a dangerous
dictator -- they would begin to form of the mutually beneficial
relationships with one another that bring about prosperity and peace. I
doubt they could've done this alone. I think the Coalition was right to
help them towards a tipping point. And if we fail, the failure will have
been a practical one, not a moral one.

 

My guess is that there are others who would like to see less of this
accretion of libertarians around the Dove. I am one of those who doesn't
fancy the idea of staring down the point of a chemical warhead before I
decide to act. (Even if such warheads turn out to be a chimera today, they
won't likely be tomorrow.) In the nuclear age, when the degree of certainty
that you will be attacked is at fifty percent, you are as good as done for
in terms of your ability to protect yourself. Thus, preventive action in a
world of uncertainty is, unfortunately, the only reasonable course. In the
meantime, it behooves us to try to make our enemies more like usŠ and then
allow globalization to proceed apace. For the more like us they are, the
more likely they are to enter into the tenuous human covenants that are our
only means of having peace.

 

 The author is a TCS contributor. He is Program Director, Institute for
Humane Studies.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Perplexing proof

2004-09-10 Thread R. A. Hettinga

--- begin forwarded text


Date: Fri, 10 Sep 2004 11:40:08 -0400
From: Victor Duchovni [EMAIL PROTECTED]
To: R. A. Hettinga [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: Perplexing proof
Mail-Followup-To: R. A. Hettinga [EMAIL PROTECTED],
[EMAIL PROTECTED]
User-Agent: Mutt/1.4.1i

On Fri, Sep 10, 2004 at 08:23:06AM -0400, R. A. Hettinga wrote:

 [The suggested proof] is rather incomprehensible, professor Marcus du
 Sautoy of Oxford University told The Guardian, adding that if correct it
 could lead to the creation of a prime spectrometer that would bring the
 whole of e-commerce to its knees overnight.

http://www.maths.ox.ac.uk/~dusautoy/flash/1hard/listpub.htm

So at least now we have a named source, even one who works on generalized
zeta functions. The out of the blue prime spectrometer claim is still
rather puzzling... Does anyone know why Du Sautoy is making this claim
(if it is indeed reported correctly).

-- 

 /\ ASCII RIBBON  NOTICE: If received in error,
 \ / CAMPAIGN Victor Duchovni  please destroy and notify
  X AGAINST   IT Security, sender. Sender does not waive
 / \ HTML MAILMorgan Stanley   confidentiality or privilege,
   and use is prohibited.

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



potential new IETF WG on anonymous IPSec

2004-09-09 Thread R. A. Hettinga

--- begin forwarded text


Delivered-To: [EMAIL PROTECTED]
From: Paul Syverson [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Cc: Paul Syverson [EMAIL PROTECTED]
Subject: potential new IETF WG on anonymous IPSec
User-Agent: Mutt/1.4.1i
Sender: [EMAIL PROTECTED]
List-Id: Primary NymIP discussion list nymip-res-group.nymip.org
List-Post: mailto:[EMAIL PROTECTED]
List-Help: mailto:[EMAIL PROTECTED]
List-Subscribe: http://www.nymip.org/mailman/listinfo/nymip-res-group,
mailto:[EMAIL PROTECTED]
List-Archive: http://www.nymip.org/pipermail/nymip-res-group/
Date: Wed, 8 Sep 2004 15:24:53 -0400

- Forwarded message from Catherine Meadows [EMAIL PROTECTED] -

From: Catherine Meadows [EMAIL PROTECTED]
Date: Tue, 7 Sep 2004 11:29:56 -0400

Paul:

The IETF has been discussing setting up a working group
for anonymous IPSec.  They will have a BOF at the next IETF
in DC in November.  They're also setting up a mailing list you
might be interested in if you haven't heard about it already.
Information is below.

At 10:08 PM -0700 9/6/04, Joe Touch wrote:
Hi, all,

To follow-up on related presentations at both SAAG and TCPM, we've
created a mailing list for discussions of anonymous security.

Further information on the list and how to join it, as well as
pointers to related resources can be found at:

   http://www.postel.org/anonsec

The mailing list address is:   [EMAIL PROTECTED]

Joe



Cathy

- End forwarded message -

___
NymIP-res-group mailing list
[EMAIL PROTECTED]
http://www.nymip.org/mailman/listinfo/nymip-res-group

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



BrinCity 2.0: Mayor outlines elaborate camera network for city

2004-09-09 Thread R. A. Hettinga
http://abclocal.go.com/wls/news/print_090904_ap_ns_camera.html

ABC7Chicago.com:

Mayor outlines elaborate camera network for city
By Paul Meincke
September 9, 2004 (Chicago) - From a hi-tech command center, the City of
Chicago plans to monitor a vast security network. Thousands of surveillance
cameras will be linked -- and authorities will be alerted to crimes and
terrorist acts. The mayor unveiled the plans for this new security network
at a news conference this morning.

 Some people are concerned about Big Brother invading their privacy but
Mayor Daley says the cameras will be located in public areas.

 The technology that is now so much a part of crime-fighting and
anti-terrorism has gone -- as one police spokesman says -- from Stone Age
to Star Wars in less than a decade. This step in the evolution will link
more than 2,000 public surveillance cameras in Chicago into a unified
system.

 George Orwell might be restless that Big Brother is growing, but the city
believes that more efficient response to emergency will help the public
rest easier

 There are, of course, thousands of cameras watching -- it seems --
everywhere. The city's plan is to route the live images provided by those
cameras on the public way into a unified network piped into the 911 Center.

 That includes every city department. That includes the Chicago public
schools, the CTA, city colleges. That includes the park district, any other
sister agencies that have cameras out there, said Mayor Daley.

 There are well over 2,000 cameras that the city and its sister agencies --
like the school system -- monitor everyday. The city is adding another 250
cameras to potential high risk areas, most of them downtown.

 For instance, if there is a crime on a CTA platform-- most of which are or
will be equipped with surveillance cameras, a call to 911 will activate a
video link-up.

 When the system determines there's a camera in the vicinity of the 911
call, it will automatically beam back an image to the call-taker of the
origin of where it occurred, said Ron Huberman, Emergency Mgt. and Com.
Dir.

 The 911 dispatcher will have -- in many cases -- the ability to remotely
control cameras at the scene of a crime miles away. The system is also
equipped with software that can alert the 911 Center to changes in traffic
flow, or the presence of people where they're not supposed to be.

 If this is a water filtration plant or a field in O'Hare where no one
should be walking, it will issue an alert that someone is walking, said
Huberman.

 All those images will be monitored in a room that is under construction as
the 911 Operations Center. In 18-months it will look more like the bridge
of the Starship Enterprise with a wall of 200 constantly changing images.
How the software is tweaked will determine which pictures pop up, which the
city says will greatly enhance emergency response.

 The mayor dismisses concerns about invasion of privacy since the cameras
record what happens on the public way.

 You could photograph me walking down the street. They do it every day. I
don't object. You do it every day. You have that right. Why do you have
that right? said Mayor Daley.

 Critics say the cameras ought not be regarded as a panacea in crime
fighting. They say the more there are, the greater the potential for abuse.

 In some Chicago neighborhoods, the cameras have led to a marked reduction
in crime. The new unified system is being financed by a $5 million grant
from the Department of Homeland Security and is scheduled to be up and
running in 18 months. It will also have the capacity to watch crowds at the
marathon downtown, football games, etc...


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Digital content spurs micropayments resurgence

2004-09-07 Thread R. A. Hettinga
 content, to subscriptions, and now per-item
sales, with the options for vendors and consumers growing quickly.

 At Peppercoin, the emphasis is placed squarely on e-commerce vendors. The
Waltham, Mass., company acts as a proxy between vendors and credit card
companies, allowing its users to aggregate their small-value transactions
into larger bills to cut down on the fees charged them by the credit card
companies themselves.

 Peppercoin signed a deal with the Smithsonian Institute last year to help
the organization begin marketing music files stored in its archives on a
per-song basis. The organization had previously struggled to do so, based
on the percentage of its income that was in turn headed back out to the
credit companies in the form of transaction fees.

 According to Rob Carney, vice president of marketing at Peppercoin,
increased demand for digital content is driving short-term growth of
micropayments, but the potential for the market is far greater.

 Online digital content sales, specifically for music, are generating more
attention for micropayments than ever before, but it makes sense, because
what are you going to sell for dollars online that you have to pay to
ship? Carney said. Digital content is leading the way, but it's really
just the thin edge of the wedge when you consider the possibilities in the
physical world as well.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Maths holy grail could bring disaster for internet

2004-09-06 Thread R. A. Hettinga
 the
world over understood that he tackled the essential challenge. Once again
the jury is still out: this time, however, his fellow mathematicians
believe he may be onto something big.

 The plus: the multidimensional topology of space in three dimensions will
seem simple at last and a million dollar reward will be there for the
asking. The minus: the solver does not claim to have found a solution, he
doesn't want the reward, and he certainly doesn't want to talk to the media.

 There is good reason to think the kind of approach Perelman is taking is
correct. However there are some problems. He is very reclusive, won't talk
to the press, has shown no indication of publishing this as a paper, which
you would have to do if you wanted to get the prize from the Clay
Institute, and has shown no interest in the prize whatsoever, Dr Devlin
said.

 Has it been proved? We don't know. We have good reason to assume it has
been and within the next 12 months, in the inner core of experts in
differential geometry, which is the field we are speaking about, people
will start to say, yes, OK, this looks right. But there is not going to be
a golden moment.

 The implications of a proof of the Poincaré conjecture would be enormous,
but like the problem itself, very difficult to explain, he said. It can't
fail to have huge ramifications: not only the result, but the methods as
well. At that level of abstraction, that level of connection, so much can
follow. Differential geometry is the subject that is really underneath
understanding everything about space and spacetime.

 Seven baffling pillars of wisdom

1 Birch and Swinnerton-Dyer conjecture Euclid geometry for the 21st
century, involving things called abelian points and zeta functions and both
finite and infinite answers to algebraic equations

2 Poincaré conjecture The surface of an apple is simply connected. But the
surface of a doughnut is not. How do you start from the idea of simple
connectivity and then characterise space in three dimensions?

 3 Navier-Stokes equation The answers to wave and breeze turbulence lie
somewhere in the solutions to these equations

 4 P vs NP problem Some problems are just too big: you can quickly check if
an answer is right, but it might take the lifetime of a universe to solve
it from scratch. Can you prove which questions are truly hard, which not?

 5 Riemann hypothesis Involving zeta functions, and an assertion that all
interesting solutions to an equation lie on a straight line. It seems to
be true for the first 1,500 million solutions, but does that mean it is
true for them all?

 6 Hodge conjecture At the frontier of algebra and geometry, involving the
technical problems of building shapes by gluing geometric blocks together

 7 Yang-Mills and Mass gap A problem that involves quantum mechanics and
elementary particles. Physicists know it, computers have simulated it but
nobody has found a theory to explain it

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Spam Spotlight on Reputation

2004-09-06 Thread R. A. Hettinga
http://www.eweek.com/print_article/0,1761,a=134748,00.asp

EWeek

 Spam Spotlight on Reputation


Spam Spotlight on Reputation

September 6, 2004
 By   Dennis Callaghan



As enterprises continue to register Sender Protection Framework records,
hoping to thwart spam and phishing attacks, spammers are upping the ante in
the war on spam and registering their own SPF records.

E-mail security company MX Logic Inc. will report this week that 10 percent
of all spam includes such SPF records, which are used to authenticate IP
addresses of e-mail senders and stop spammers from forging return e-mail
addresses. As a result, enterprises will need to increase their reliance on
a form of white-listing called reputation analysis as a chief method of
blocking spam.

E-mail security appliance developer CipherTrust Inc., of Alpharetta, Ga.,
also last week released a study indicating that spammers are supporting SPF
faster than legitimate e-mail senders, with 38 percent more spam messages
registering SPF records than legitimate e-mail.

The embrace of SPF by spammers means enterprises' adoption of the framework
alone will not stop spam, which developers of the framework have long
maintained.

Enter reputation analysis. With the technology, authenticated spammers
whose messages get through content filters would have reputation scores
assigned to them based on the messages they send. Only senders with
established reputations would be allowed to send mail to a user's in-box.
Many anti-spam software developers already provide such automated
reputation analysis services. MX Logic announced last week support for such
services.

There's no question SPF is being deployed by spammers, said Dave
Anderson, CEO of messaging technology developer Sendmail Inc., in
Emeryville, Calif.

Companies have to stop making decisions about what to filter out and start
making decisions about what to filter in based on who sent it, Anderson
said.

The success of reputation lists in organizations will ultimately depend on
end users' reporting senders as spammers, Anderson said. In the system
we're building, the end user has the ultimate control, he said.

Scott Chasin, chief technology officer of MX Logic, cautioned that
authentication combined with reputation analysis services still won't be
enough to stop spam. Chasin said anti-spam software vendors need to work
together to form a reputation clearinghouse of good sending IP addresses,
including those that have paid to be accredited as such.

There is no central clearinghouse at this point to pull all the data that
anti-spam vendors have together, said Chasin in Denver. We're moving
toward this central clearinghouse but have to get through authentication
first.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Tilting at the Ballot Box

2004-08-25 Thread R. A. Hettinga
 are decrypted (using a
complicated Chaumian mathematical process that's all but tamperproof).
Meanwhile, the encoded images are posted on the Web, so that you can go
online afterward and confirm that your vote was counted by using a serial
number on your strip.

 There's no denying that Votegrity teeters on the brink of genius. By
letting voters take receipts, Chaum's system would erect formidable hurdles
to election fraud -- while simultaneously, through encryption, preserving
the sacrosanct anonymity of the ballot box.

 That said, I can think of at least three glaring reasons to be skeptical
of Votegrity's prospects. First, the system isn't exactly a paragon of
simplicity; it took nearly four hours of explication by Chaum for me to get
my head fully around it. Second, election officials are by inclination a
deeply conservative lot, especially around new technology. A system
combining cryptography and the Web isn't likely to set their pulses racing
-- or cause their checkbooks to spring open. Third, there's verified
voting. Whatever the imperfections of ballot-under-glass, I suspect that
many people who distrust e-voting will consider it a good-enough safeguard.
And as the history of technology makes abundantly clear, in a contest
between perfect and good enough, the latter wins every time.

 Naturally, Chaum disagrees. Given the intensity of the uproar over the
current touchscreen terminals, he believes that states will have no choice
but to adopt a more sophisticated system. The more people swear that the
machines should be trusted, the less trust there is, he says. Forget
whether they're really secure or reliable. What matters is that major
chunks of the public don't believe they are. We've got a crisis of voter
confidence on our hands -- and it's not going to go away. As for verified
voting, Chaum simply says, I don't think a system that's equivalent to
punch cards is going to cut it at this point.

 Depending on what happens in November, Chaum could be proven right. With
the election only two months off, the backlash against e-voting has
produced a situation bordering on chaos. At the start of the year, it
appeared that some 50 million voters-roughly 30 percent of the total --
would be casting their ballots digitally. Now, who knows? In California,
the secretary of state has banned the Diebold machines from use and
decertified all the rest. In other states, there are movements afoot to
require verified voting. In still others, officials are pressing ahead with
the machines despite the hue and cry. All of which suggests one thing: If
the election turns out to be as close as most polls suggest, we may be
headed for a multistate postelection conflagration, complete with protests
and litigation, that will make the contretemps over Florida in 2000 look
like a schoolyard spat.

 For Chaum, who's in the process of rounding up investors and hiring
executives for the firm he's starting around Votegrity, such a
conflagration would be, perversely, the best news imaginable. Not that he's
the kind of guy who'd root for such an outcome. A bone-deep do-gooder, a
privacy crusader, he's an unabashed idealist whose desire to make the world
better is so earnest it's slightly painful. When I asked him why he was
still tilting at windmills even after the anguish of DigiCash, he smiled,
shrugged, and softly replied, This is really important stuff -- someone's
got to do it.

 On that point he'll get no argument from me. No matter what transpires on
Election Day and in its aftermath, Chaum and his allies have already
rendered an invaluable service: not only exposing the flaws of e-voting
today, but pointing toward something better for tomorrow. Coming up with
that something -- a digital system that's secure, private, and verifiable
-- will plainly be no mean feat. As more and more geeks take up the
challenge, the odds will inevitably decline that Chaum's will be the system
that triumphs. But I can't help hoping that, for once in his life, he kicks
the windmill's ass.?

 John Heilemann wrote Pride Before the Fall. His next book is The Valley.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: MD5 collisions?

2004-08-18 Thread R. A. Hettinga
At 8:58 PM -0500 8/17/04, Declan McCullagh wrote:
I hadn't noticed. How uncharacteristic of him. Never would have guessed.

..and my mother dresses me funny?

You can do better than that, Declan -- if you do say so yourself.

Self-important git.

-RAH



-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: MD5 collisions?

2004-08-18 Thread R. A. Hettinga
..and another thing...

At 7:33 PM -0500 8/17/04, Declan McCullagh wrote:

-Declan TCM McCullagh

Does this mean you spend all day in a Barcolounger dry-jacking a Mossberg,
muttering about Janet Reno?

;-)

Cheers,
RAH
Banks in Hong Kong and Shanghai, indeed...

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: MD5 collisions?

2004-08-18 Thread R. A. Hettinga
At 7:33 PM -0500 8/17/04, Declan McCullagh wrote:
One is enough. Less is more. Let's eliminate redundancy, thus eliminating
redundancy.

Yawn.

Let's piss up a rope, shall we?

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: MD5 collisions?

2004-08-18 Thread R. A. Hettinga
At 10:03 PM -0500 8/17/04, Declan McCullagh wrote:

Sigh. RAH has descended to the level of a net.kook.

Never would have guessed.

You've exactly the same used the same rhetorical device twice now. Are you
just lazy, or, more likely, have you just peaked too soon?

How does it feel to be someone whose best years are a decade behind him,
Declan?

You are *sooo* boring.

RAH


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Owning Ones Own Words, Peaking Too Soon, The Cypherpunk Purity Test, and Bora-Bora (Re: MD5 collisions?)

2004-08-18 Thread R. A. Hettinga
,
*any* forwards are equivalent to *all* forwards?

I thought not.



Hey, I got an idea, myself. Let's just close down the list and do it
*all* on the web? Maybe CNET can stick pop-up ads in our faces for
the privilege, Declan an up his click-count, and CNET will send him
to the Black Rock Desert, or Bora-Bora, or the Crimea, or wherever,
for some conference or other. Or a Senate hearing. Or whatever.

I mean, who needs that pesky 'd' key, anyway?

In the meantime, Declan, own *these* words: don't be a putz.


Cheers,
RAH


-BEGIN PGP SIGNATURE-
Version: PGP 8.0.3

iQA/AwUBQSNXn8PxH8jf3ohaEQJwTQCg+hpBwCoGQryuoJAdyYP4awO3nDYAoLKa
UKwhmMOEdC2q2yA/JLjIbFuV
=fO4K
-END PGP SIGNATURE-

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Dope-Slaps and the Imaginary Axis (Re: Cryptome on ABC Evening News?)

2004-08-17 Thread R. A. Hettinga
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

At 5:44 PM -0700 8/14/04, Bill Stewart wrote:
the site there
showing pictures of cable landings

Wow. Didn't know that. I was *at* Spencer Beach on the Big Island
last month, *looking*, :-), and I didn't see *anything*.

V8-autodope-slap I coulda looked at cryptome /v-a-s.

I was at Morro Bay with Vin and Cyn once, popping over from SLO, but
we weren't looking then for what is the other end of several other
pipes fulla pan-pacific fiber...


There sure isn't much else around Spencer Beach, though, and,
besides, the wife likes Hilo anyway. (It's, um, dry there, at Spencer
Beach. She hates ABQ's climate, too, where most of my, heh,
addressable family lives: My God!!! It looks like the *moon* out
there!!! she says to the plane window the first time out, Where are
the *trees*??? :-) A shopping trip to Old Town and a Death by Santa
Fe Style outfit later she's over the problem. Gotta keep her away
from Corpus, though, or I'm doomed. Or maybe I just show her a
post-hurricane pic of the T and L heads, covered in beached
yachts...)


I was all depressed about maybe retiring to Hilo -- it was my idea we
were there to begin with, c'punkly visions in my head about a
financial-crypto lab/detox facility, or something -- until I saw the
biz/lab-park up above UH-Hilo where all the observatories (except
Keck in Waimea/Kamuela) have their headquarters. Nice fat fiber
pipes going in and out. Kewl. I knew there was fiber to Mauna Kea, a
ranger named Pablo up there showed me a huge junction box(?); nice
they ran it down the other side. I shoulda realized, as the Gemini
scopes are all We're Internet2, donchaknow

The local connectivity providers, who sell WiFi to the touristas
for $5/hr (or not, one says WiFi's not safe, methinks he doth not
know his firewall from his elbow), had no idea where the fiber, if
any, was on the whole wet side of the island, so they weren't any
help. The proximal cause of said depression, that was. Besides having
flashbacks of various deep-and-recent past Caribbean Island-Time
episodes.

Anyway, there's bandwidth with a capital b, and I keep forgetting
about the Island Time thing. Something about me and what Beaver
called the imaginary axis. Like a moth and a flame.

Cheers,
RAH

-BEGIN PGP SIGNATURE-
Version: PGP 8.0.3

iQA/AwUBQSJVQMPxH8jf3ohaEQL+vgCg0Zo1xxbPInOfb40buM1zTxts0/YAn1TN
BSV8PdaVmrXaC8Odr5nuk9If
=lDFR
-END PGP SIGNATURE-

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



[e-gold-list] An interesting technology for cashlike tokens.

2004-08-16 Thread R. A. Hettinga
And James makes the next step. The online gold systems, like goldmoney and
e-gold, certainly have an enormously cheaper cost of entry than trying to
plug into, say, the ATM system.

Cheers,
RAH

--- begin forwarded text


From: James A. Donald [EMAIL PROTECTED]
To: e-gold Discussion [EMAIL PROTECTED]
Date: Sun, 15 Aug 2004 21:28:19 -0700
Subject: [e-gold-list] An interesting technology for cashlike tokens.
Priority: normal

--
Reusable Proofs of Work by Hal Finney rpow.net

Hal Finney has an interesting technology for electronic money.

The intended application is electronic postage, an anti spam
measure.

The same technique could be used to anonymously transfer
certificates of possession of gold.

The method is like trusted computing in reverse.  Instead of
the client computer needing to prove to the server it is
trustworthy, the server must prove to the client it is
trustworthy.

For transactions that involve substantially greater periods
than email, a money based on gold is better than a money based
on proofs of computational work, since the cost of mining gold
changes only slowly, while the cost of doing computations
diminshes rapidly, but for the intended application, a high
inflation rate is not a problem.

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 qaxLVMrKlZJuFzjYAxmdhu7F4wsAds1g0b9s1d2G
 4fcchBYWopL00KqdJyRYp/27QCChV9H4oizZtSKGc
s

---
You are currently subscribed to e-gold-list as: [EMAIL PROTECTED]
To unsubscribe send a blank email to [EMAIL PROTECTED]

Use e-gold's Secure Randomized Keyboard (SRK) when accessing your e-gold
account(s) via the web and shopping cart interfaces to help thwart
keystroke loggers and common viruses.

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



F.B.I. Goes Knocking for Political Troublemakers

2004-08-16 Thread R. A. Hettinga
 participants, injuries to citizens, injuries to
police and first responders.

 F.B.I. officials would not say how many people had been interviewed in
recent weeks, how they were identified or what spurred the bureau's
interest.

 They said the initiative was part of a broader, nationwide effort to
follow any leads pointing to possible violence or illegal disruptions in
connection with the political conventions, presidential debates or the
November election, which come at a time of heightened concern about a
possible terrorist attack.

 F.B.I. officials in Washington have urged field offices around the country
in recent weeks to redouble their efforts to interview sources and gather
information that might help to detect criminal plots. The only lead to
emerge publicly resulted in a warning to authorities before the Boston
convention that anarchists or other domestic groups might bomb news vans
there. It is not clear whether there was an actual plot.

 The individuals visited in recent weeks are people that we identified
that could reasonably be expected to have knowledge of such plans and plots
if they existed, Mr. Parris said.

 We vetted down a list and went out and knocked on doors and had a laundry
list of questions to ask about possible criminal behavior, he added. No
one was dragged from their homes and put under bright lights. The
interviewees were free to talk to us or close the door in our faces.

 But civil rights advocates argued that the visits amounted to harassment.
They said they saw the interrogations as part of a pattern of increasingly
aggressive tactics by federal investigators in combating domestic
terrorism. In an episode in February in Iowa, federal prosecutors
subpoenaed Drake University for records on the sponsor of a campus antiwar
forum. The demand was dropped after a community outcry.

 Protest leaders and civil rights advocates who have monitored the recent
interrogations said they believed at least 40 or 50 people, and perhaps
many more, had been contacted by federal agents about demonstration plans
and possible violence surrounding the conventions and other political
events.

This kind of pressure has a real chilling effect on perfectly legitimate
political activity, said Mark Silverstein, legal director for the American
Civil Liberties Union of Colorado, where two groups of political activists
in Denver and a third in Fort Collins were visited by the F.B.I. People
are going to be afraid to go to a demonstration or even sign a petition if
they justifiably believe that will result in your having an F.B.I. file
opened on you.

The issue is a particularly sensitive one in Denver, where the police
agreed last year to restrictions on local intelligence-gathering operations
after it was disclosed that the police had kept files on some 3,000 people
and 200 groups involved in protests.

But the inquiries have stirred opposition elsewhere as well.

In New York, federal agents recently questioned a man whose neighbor
reported he had made threatening comments against the president. He and a
lawyer, Jeffrey Fogel, agreed to talk to the Secret Service, denying the
accusation and blaming it on a feud with the neighbor. But when agents
started to question the man about his political affiliations and whether he
planned to attend convention protests, that's when I said no, no, no,
we're not going to answer those kinds of questions, said Mr. Fogel, who is
legal director for the Center for Constitutional Rights in New York.

 In the case of the three young men subpoenaed in Missouri, Denise
Lieberman, legal director for the American Civil Liberties Union in St.
Louis, which is representing them, said they scrapped plans to attend both
the Boston and the New York conventions after they were questioned about
possible violence.

The men are all in their early 20's, Ms. Lieberman said, but she would not
identify them.

 All three have taken part in past protests over American foreign policy
and in planning meetings for convention demonstrations. She said two of
them were arrested before on misdemeanor charges for what she described as
minor civil disobedience at protests.

 Prosecutors have now informed the men that they are targets of a domestic
terrorism investigation, Ms. Lieberman said, but have not disclosed the
basis for their suspicions. They won't tell me, she said.

Federal officials in St. Louis and Washington declined to comment on the
case. Ms. Lieberman insisted that the men didn't have any plans to
participate in the violence, but what's so disturbing about all this is the
pre-emptive nature - stopping them from participating in a protest before
anything even happened.

 The three men were really shaken and frightened by all this, she said,
and they got the message loud and clear that if you make plans to go to a
protest, you could be subject to arrest or a visit from the F.B.I.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http

Apparently one can spell Snake Oil in Capital Letters, too (Re: CRYPTO-GRAM, August 15, 2004)

2004-08-15 Thread R. A. Hettinga
At 11:26 PM -0500 8/14/04, Bruce Schneier wrote:
From: Ken Lavender [EMAIL PROTECTED]
Subject: ICS Atlanta

I am APPAULED at your comments that you had made on your website:

   http://www.schneier.com/crypto-gram-0407.html#9

You have statements are nothing but slander  defamation.  They shall
be dealt with accordingly.

Lie #1:  How do they demonstrate Tree's security?  'Over 100
professionals in mathematics  in computer science at Massachusetts
Institute of Technology  at Georgia Tech, had sample encoded messages
submitted to them. Not a single person could break this code!'  That
is not the ONLY way we prove it.  We have examples  offer to allow
people to submit their OWN messages to have encoded to SEE how good the
code is.  So there are THREE methods, NOT just ONE as you IMPLY.

Lie #2:  These guys sent unsolicited e-mails...  HOW do you KNOW that
this was the case?  Have any PROOF of such?  NO!

Lie #3:  And if all that isn't enough to make you run screaming from
these guys, their website proudly proclaims: 'Tree Encoded Files Can Be
Zipped.'  Because they can be zipped does NOT mean that it is bad
encoding.  The code talkers of ww2 used LANGUAGE to code the
messages, and THOSE COULD BE ZIPPED!!!  And that code was NEVER BROKEN!!!

Lie #4:  That's right; their encryption is so lousy that the
ciphertext doesn't even look random.  AGAIN, HOW would you
KNOW???  Did you break it?  NO!  And what is random???

   random : without definite aim, direction, rule, or method

So lousy?  HOW WOULD YOU KNOW???  You would have to KNOW how we
encode BEFORE you can make such a statement,  YOU DO NOT KNOW
HOW!!!  If it is SO LOUSY, how come NOBODY HAS BROKEN IT YET???  And we
have people ALL THE TIME trying to, with ZERO SUCCESS.

I do not like you slandering something that you do not
understand.  ATALL!!!

The ONLY question you asked was how long is the key AND THAT WAS
IT!  HOW long was the key that the 'code talkers' used? ZERO!!! JUST AS
OUR IS.  The encoding routine was created, tested,  verified on PAPER
 PENCIL WITHOUT COMPUTERS!  A child could encode data using our
routine.  The computer is merely used to speed-up the process, NOT TO
CREATE IT.  Our routine is based on LANGUAGE, NOT MATH.  So all of you
comments are just false, misleading  just plain ole lies!  SHOW 
PROVE that it is NOT random.  What is the PATTERN THEN???

I am DEMANDING A FULL RETRACTION OF YOUR COMMENTS  A FULL, COMPLETE
APOLOGY TO THESE AND ALL STATEMENTS.

I am a person who tries to work with people as a man w/o having to
drag others into the mess.  Others?  THE COURTS.  You have violated
Calf law by your statements.

[Text of California Civil Code Section 46 deleted.]

Your LIES have damaged my respect in my job  has damaged any sales of
this routine.  You have ZERO proof of your comments, ANY OF
THEM!!!  I beseech of you, do the RIGHT THING and comply.  I DO NOT
wish to escalate this matter any higher.  And remember this, Tree is
based on LANGUAGE, NOT MATH!

[Phone number deleted out of mercy.]

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



[osint] FBI Warns Storage Unit Operators

2004-08-15 Thread R. A. Hettinga

--- begin forwarded text


To: Bruce Tefft [EMAIL PROTECTED]
Thread-Index: AcSAr6Y/Mj9PmYHqQZO/G2/Eo29FYgAgaLTg
From: Bruce Tefft [EMAIL PROTECTED]
Mailing-List: list [EMAIL PROTECTED]; contact [EMAIL PROTECTED]
Delivered-To: mailing list [EMAIL PROTECTED]
Date: Fri, 13 Aug 2004 08:30:35 -0400
Subject: [osint] FBI Warns Storage Unit Operators
Reply-To: [EMAIL PROTECTED]




FBI Warns Storage Unit Operators
Terrorist  alert is extended to self-storage units

Joyce Lavoy is a manager for South Toledo Self Storage.  Lavoy says she was
stunned when an FBI agent walked into her office and told her  to be on the
lookout for possible terrorist activity. Local FBI agents are  visiting
about 350
storage places in 19 northwest Ohio communities, including  Toledo, Lucas
County, and Sandusky. They're handing out alerts to owners and  employees on

potential terrorist activity in storage facilities.
Federal sources tell 13 Action News in the past, terror suspects have been
known to use storage units to devise their plans. Everytime Joyce Lavoy
unlocks
 an empty storage unit and lifts the door, she's looking for the warning
signs of  possible terrorist activity. Lavoy has worked in the storage
business
for five  years. She says she's never had an FBI agent walk into her office.
I
thought  there was someone renting a storage unit he was looking for. That
wasn't the  case.
Lavoy says FBI agents wanted to put managers on alert that terrorists have
been known to store and mix deadly chemicals in storage units. The FBI alert

cautions storage owners and employees to be on the lookout for:  suspicious
people who visit the storage facility late at night or at unusual  times.
unusual fumes, liquids, residues or odors emanating from their storage unit.

explosives, blasting caps, fuses, weapons, and ammunition.  flight manuals
or other
similar materials.
Lavoy says security cameras are in place and she's taking extra trips around

the building with her employees looking for anything suspicious.
Source: _http://abclocal.go.com/wtvg/news/811_storageunits.html_
(http://abclocal.go.com/wtvg/news/811_storageunits.html)

This information is provided by PURE PURSUIT as a service to  members of the

Military and Air Defense Community with the purpose of offering  relevant
and
timely information on defense, aviation, emergency, law enforcement  and
terrorism issues.  Posts may be forwarded to other individuals,
organizations and
lists for non-commercial purposes. For new subscriptions  please send an
e-mail with Pure Pursuit in the subject line to Nena Wiley at :
[EMAIL PROTECTED]




 Yahoo! Groups Sponsor ~--
Yahoo! Domains - Claim yours for only $14.70
http://us.click.yahoo.com/Z1wmxD/DREIAA/yQLSAA/TySplB/TM
~-

--
Want to discuss this topic?  Head on over to our discussion list,
[EMAIL PROTECTED]
--
Brooks Isoldi, editor
[EMAIL PROTECTED]

http://www.intellnet.org

  Post message: [EMAIL PROTECTED]
  Subscribe:[EMAIL PROTECTED]
  Unsubscribe:  [EMAIL PROTECTED]


*** FAIR USE NOTICE. This message contains copyrighted material whose use
has not been specifically authorized by the copyright owner. OSINT, as a
part of The Intelligence Network, is making it available without profit to
OSINT YahooGroups members who have expressed a prior interest in receiving
the included information in their efforts to advance the understanding of
intelligence and law enforcement organizations, their activities, methods,
techniques, human rights, civil liberties, social justice and other
intelligence related issues, for non-profit research and educational
purposes only. We believe that this constitutes a 'fair use' of the
copyrighted material as provided for in section 107 of the U.S. Copyright
Law. If you wish to use this copyrighted material for purposes of your own
that go beyond 'fair use,' you must obtain permission from the copyright
owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
Yahoo! Groups Links

* To visit your group on the web, go to:
http://groups.yahoo.com/group/osint/

* To unsubscribe from this group, send an email to:
[EMAIL PROTECTED]

* Your use of Yahoo! Groups is subject to:
http://docs.yahoo.com/info/terms/


--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



The New Digital Media: You Might Have It, But Not Really Own It

2004-08-15 Thread R. A. Hettinga
, for instance, be able to make a copy of the Toy
Story 4 DVD for your laptop -- but not do the same thing with Charlie's
Angels 5.

Those variations will likely require some form of labeling on DVDs so
consumers will know what they're getting, according to companies involved
in planning them.

Alan Davidson, associate director of the civil liberties group Center for
Democracy and Technology, says he isn't opposed to DRM, but worries
consumers may not understand what rights come with content they purchase.
DRM underscores the point that consumers are going to have to become a lot
more sophisticated about what they're buying, he says.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Cryptome on ABC Evening News?

2004-08-13 Thread R. A. Hettinga
At 12:49 AM +0200 8/13/04, Thomas Shaddack wrote:
Can somebody record it in MPEG or DivX, please? :) It's difficult to get
ABC News across the Atlantic without a dish.

I didn't see anything. But, like an idiot, I surfed out of it.

ADD's a bitch. :-).

Anyone see the whole show?

Cheers,
RAH
-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Cryptome on ABC Evening News?

2004-08-13 Thread R. A. Hettinga
There's a teaser for tonight's 6:30 news about a wesite that publishes
pipeline maps and the names and addresses of government employees. The
horror.

:-)

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Too Much Information?

2004-08-13 Thread R. A. Hettinga
http://abcnews.go.com/sections/WNT/US/internet_sensitive_info_040812.html
 

Too Much Information?
Web Site Raises Questions About Public Access to Sensitive Government Info
By JakeTapper
ABCNEWS.com

Aug. 12, 2004- John Young, a 69-year-old architect, was contacted a few
weeks ago by Department of Homeland Security officials, who expressed
concern about what he was posting on his Web site.

Officials questioned Young about information he had posted about the 2004
Democratic National Convention, including satellite photos of the
convention site and the location of specific police barricades referred to
on the site as a complete joke.

 In response to a complaint, two special agents from the FBI's
counterterrorism office in New York City interviewed Young in November 2003.

 They said, 'Why didn't you call us about this? Why are you telling the
public?' And we said, 'Because it's out there and you can see it. You folks
weren't doing anything,'  Young told ABC News.

 The agents, according to Young, stressed they knew that nothing on the
site was illegal. Young added: They said, 'What we'd like you to do, if
you're approached by anyone that you think intends to harm the United
States, we're asking you to let us know that.' 

 I know there are a lot of people in the government who find him
troublesome, said former White House terrorism adviser Richard Clarke, now
an ABC News consultant. There is a real tension here between the public's
right to know and civil liberties, on the one hand, and security on the
other.

 But Young argues his actions enhance national security, since he points
out to the public vulnerabilities the government does not want to
acknowledge.

 Like others who run similar Web sites, Young does so by using information
from the public domain, such as:

 * Photographs of preparations for the upcoming Republican National
Convention at New York City's Madison Square Garden

 * Detailed maps of bridges and tunnels leading in and out of Manhattan

 * Maps of New York City's single natural gas pipeline

 * The location of an underground nuclear weapons storage complex in New Mexico

 Enabling the Enemy?

 I think it's very, very bad for the country to have anyone putting
together information that makes it easier for anyone that wants to injure
Americans to do so, said Rep. Chris Cox, R-Calif., chair of the House
Homeland Security Committee.

 Law enforcement officials were particularly upset that Young posted the
satellite photos and addresses for the homes of top Bush administration
officials.

 We think public officials should be totally transparent. There should be
no secrecy, said Young. We are opposed to government secrecy in all of
its forms.

 Officials call that argument outrageous and argue some secrecy is necessary.

 The Department of Homeland Security has taken aggressive measures to
protect critical infrastructure across the country, said a Department of
Homeland Security spokeswoman. We discourage Web posting of detailed
information about critical infrastructure. This information is not helpful
to our ongoing efforts to protect the American people and our nation's
infrastructure.

 When asked how he would respond to those who consider his Web site
unpatriotic since it could provide useful information for those who seek to
harm the United States, Young said, If this is not done, more Americans
are going to die. More harm is going to come to the United States. It is
more patriotic to get information out than to withhold it.

 Officials acknowledge there is not much they can do; Young has not broken
any laws.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Joux found a collision for SHA-0 !

2004-08-13 Thread R. A. Hettinga
 *


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: SF Bay Area Cypherpunks August 2004 Physical Meeting Announcement

2004-08-11 Thread R. A. Hettinga
At 9:33 PM -0400 8/10/04, R. A. Hettinga wrote:
--- begin forwarded text


Date: Tue, 10 Aug 2004 09:56:44 -0700
To: [EMAIL PROTECTED], [EMAIL PROTECTED]

doh!

I meant to send it to perrypunks.

One more time. You won't even notice...

:-)

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: ...Hold still for the camera, Mehdi...

2004-08-11 Thread R. A. Hettinga
At 7:49 PM -0700 8/10/04, James A. Donald wrote:
Presumably the IDs do not display true names

I would bet you're stretching the bounds of presumption, myself.

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
Several times a week, to enter a TV studio say, or to board a plane, I
have to produce a tiny picture of my face.  -- Christopher Hitchens



...Hold still for the camera, Mehdi...

2004-08-11 Thread R. A. Hettinga
From Tyler's Iraq SLO-expat S-ISP CTO blog
(http://www.livejournal.com/users/giantlaser/):

http://www.aljazeera.net/news/arabic/2004/8/8-6-13.htm

Al Sadr got himself a laminator. His goons, er, freedom fighters, have ID's
now.

Skip the arabic, notice the guy on the left in the first pic.

BWAHAHAHAHA!


Cheers,
RAH


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



...and Mr. Hughes wants to give it to him.

2004-08-09 Thread R. A. Hettinga
.

 The average Joe wants something for nothing. With knowledge and
information, we can come as close as possible to this ideal. Let the
scarcity economists haggle over flesh. We won't appreciably change GDP
figures. The new institution is an exercise in abundance economics. Free
knowledge and information add untold real wealth to the world. Let our
revenge upon scarcity be that its limitation upon wealth become miniscule.


Eric Hughes ([EMAIL PROTECTED]) was one of the founders of cypherpunks, and has
been worried about software infrastructure ever since. He is Chief
Technology Officer of Signet Assurance Company, LLC, a development company
soon to announce its first products and services.



-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Every Vote Counts - If It's Counted

2004-08-09 Thread R. A. Hettinga
 of proof ought to be
on the vendor. You ask about the hardware. 'Secret.' The software?
'Secret.' What's the cryptography? 'Can't tell you because that'll
compromise the secrecy of the machines.' ... Federal testing procedures?
'Secret'! Results of the tests? 'Secret'! Basically we are required to have
blind faith.

Dugger also quotes recent testimony from Johns Hopkins' Avi Rubin to the
federal Election Assistance Commission: I do not know of a single computer
security expert who would testify that these machines are secure.

Advocates of e-voting have portrayed criticism as coming from a handful of
unhappy academics, or as being motivated by partisan politics -- claims the
media have largely bought into. Among the chief proponents of the new
system is Gov. Jeb Bush, who presided over the 2000 debacle from which his
brother emerged with an official winning margin of 537 votes. As the Miami
Herald reported last month, Gov. Bush has suggested that, as the paper put
it, people who repeatedly raise questions about the touch-screen machines
were doing it to motivate their voters in the upcoming presidential
election, in which Florida will be a battleground state.

But that's not necessarily true elsewhere. The Republican secretaries of
state in Nevada and Missouri -- both expected to be hotly contested this
fall -- have expressed concerns about the reliability of the equipment. As
a result, they have required that touch-screen voting machines also be
equipped with a voter-verified paper trail in November. (This is an
inexpensive add-on to the machine, which allows a voter to confirm manually
his or her vote before it is cast; that confirmation is retained
independently of the computer tally in the event a recount is required.) It
is this type of backup that Adam Cohen and others believe will eliminate
many of the potential problems with e-voting.

Nevada's 2,000 electronic voting machines will all come equipped with
printers this fall. Secretary of State Dean Heller told the Associated
Press that paper receipts are an intrinsic component of voter confidence.
Nevada is the first state to institute such a policy statewide. Nationally,
legislation requiring printed backups is pending in both the House and
Senate -- but no action is expected before November.

So, the question remains: Will this year's contested presidential election
proceed smoothly, or will the scenario be closer to what a letter-writer to
The New York Times predicted: [T]he havoc wreaked by the butterfly ballot
[in 2000] will soon be compounded by a plague of worms, the kind encoded in
electronic voting machines that leave no 'voter verified paper trail.'

No one knows. But it sure sounds like a story worth pursuing by more than a
few lonely souls like The Nation's Ronnie Dugger and the Times' Adam Cohen.

Posted 08/08/04 at 12:01 AM

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



IRS may use First Data info for help in finding tax evaders

2004-08-04 Thread R. A. Hettinga
http://www.denverpost.com/cda/article/print/0,1674,36%257E33%257E2312378,00.html



The Denver Post



IRS may use First Data info for help in finding tax evaders
 By Andy Vuong
 Denver Post Staff Writer


 Wednesday, August 04, 2004 -

 A federal judge has granted the Internal Revenue Service the right to seek
information from First Data Corp. about certain credit-card transactions
the company has processed.

 The IRS wants the information as part of its crackdown on tax evaders.

 Specifically, the IRS wants information about holders of American Express,
Visa and MasterCard credit cards that were issued by or on behalf of
certain offshore financial institutions.

 The government listed more than 30 offshore jurisdictions, including
Aruba, the Bahamas, Bermuda, the Cayman Islands, Hong Kong, Singapore and
Switzerland.

 The IRS said in a court filing that it believes those account holders may
fail, or may have failed, to comply with internal revenue laws.

 The IRS is targeting people who held such accounts between Dec. 31, 1999,
and Dec. 31, 2003.

 The government is seeking the names of the account holders, their
credit-card statements, their credit limit and information on when they
opened their accounts.

 We haven't seen the order, but we always comply with the law, said First
Data spokeswoman Staci Busby.

 She declined to comment further about the order by U.S. District Judge
Phillip Figa, which was made Monday.

 In 2003, Greenwood Village-based First Data processed 12.2 billion payment
transactions, Busby said.

 Judges have granted so-called John Doe summons in five similar
situations, the IRS said in court documents.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Terror Threat Level Is Raised For Key U.S. Financial Buildings

2004-08-01 Thread R. A. Hettinga
http://online.wsj.com/article_print/0,,SB109136672993879685,00.html

The Wall Street Journal


 August 1, 2004 2:46 p.m. EDT

 WORLD NEWS


Terror Threat Level Is Raised
 For Key U.S. Financial Buildings

Associated Press
August 1, 2004 2:46 p.m.


NEW YORK -- The federal government warned today of possible terrorist
attacks against iconic financial institutions in New York City,
Washington and Newark, N.J., saying a confluence of intelligence over the
weekend pointed to a car or truck bomb.

Specifically, the government named these buildings as potential targets:
The Citicorp building and the New York Stock Exchange in New York City; The
International Monetary Fund and the World Bank buildings in Washington; and
the Prudential Financial building in Newark.

The government said the new intelligence indicated the meticulous planning
of al Qaeda. He identified explosives as the likely mode of attack, as
opposed to a chemical or biological attack or a radiological dirty bomb.

Mr. Ridge said the government's threat level for financial institutions in
just these three cities would be raised to orange, or high alert, but would
remain at yellow, or elevated, elsewhere.

The government provided a wealth of detail that it had picked up in the
past 36 hours, but a senior intelligence official described it only on
condition of anonymity. The official described excruciating detail and
meticulous planning indicative of al Qaeda.

The official said the intelligence included security in and around these
buildings; the flow of pedestrians; the best places for reconnaissance; how
to make contact with employees who work in the buildings; the construction
of the buildings; traffic patterns; locations of hospitals and police
departments; and which days of the week present less security at these
buildings.

To illustrate the level of detail obtained, the official cited these
examples: midweek pedestrian traffic of 14 people per minute on each side
of the street for a total of 28 people; that some explosives might not be
hot enough to melt steel; and that the construction of some buildings might
prevent them from falling down.

The official said he had not seen such extraordinary detail in his 24 years
in intelligence work.

Mr. Ridge said it would be up to New York City officials to decide whether
to move to the highest level, red. The city has remained on orange since
the attacks of Sept. 11, 2001. The threat potential remains through the
Nov. 2 elections, he said.

The secretary said the government took the unprecedented step of naming
specific buildings because of the level of specificity of the intelligence.
This is not the usual chatter. This is multiple sources that involve
extraordinary detail, Mr. Ridge said. He said the government decided to
notify the public because of the specificity of detail it had obtained.

Mr. Ridge acknowledged that protecting these buildings, located in heavily
populated areas, would require additional security measures, especially
because thousands of cars and trucks travel through these cities daily.

Car and truck bombs are one of the most difficult tasks we have in the war
on terror, Mr. Ridge said.

Local and state officials were notified earlier in the day and Mr. Ridge
said new security procedures were already being put in place.

A White House spokeswoman, Erin Healy, said the intelligence on the threat
was very new, coming in during the last 72 hours.

The president made the final decision today agreeing with the
recommendation of Secretary Ridge to go ahead and raise the threat level in
these select areas, Ms. Healy said.

This was the first time the color-coded warning system had been used in
such a narrow, targeted way, Mr. Ridge said at a news conference at
department headquarters. With this kind of information comes action, he
said. This is sobering news.

Referring to terrorists who are hostile to the U.S., Mr. Ridge said,
Iconic economic targets are at the heart of their interest.

He said workers at the five specific buildings should get guidance from
security officers at each site and remain alert as they go to work.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



ECC 2004

2004-07-30 Thread R. A. Hettinga
 to be
added to the mailing list for the third announcement, please send a
brief email to [EMAIL PROTECTED] The announcements are also
available from the web site
www.cacr.math.uwaterloo.ca/conferences/2004/ecc2004/announcement.html
---


REGISTRATION:

The website for registration is open and can be found at:
http://www.ruhr-uni-bochum.de/hgi/tanja.html

For this year the full conference fee is 170 EUR, we offer a reduced
fee of 80 EUR for students. Please register as soon as possible as
the number of participants is limited.
--

ACCOMMODATIONS:

We set aside a number of rooms on a first-come first-serve basis at
following hotels.  To get the prices listed below include the
respective quotations when making your reservation


Hotel Acora
http://www.acora.de/html/bochum.html
Tel.: (+49)234 68 96 0
Fax: (+49)234 68 96 700
Nordring 44-50 (center of Bochum)
single 66,50 EUR
double 80,50 EUR
both including breakfast
mention ECC-Workshop
These rooms are set aside till 30.07.2004.

Holiday Inn Bochum
http://www.ichotelsgroup.com/h/d/hi/394/de/hd/bocge
Tel.: 49-234-9690
Fax: 49-234-969
Massenbergstrasse 19-21 (center, close to main station)
single 85,00 EUR incl. breakfast
mention ECC-Workshop
These rooms are set aside till 13.08.2004.


Hotel Haus Oekey
http://www.oekey.de/
Tel.: (+49)234 388 13 0
Fax: (+49)234 388 13 88
Auf dem Alten Kamp 10 (halfway between university and city center)
single 52 EUR
double 70 EUR
both including breakfast
mention Ruhr-University, Lange
These rooms are set aside till 10.08.2004.


Hotel IBIS am Hauptbahnhof
http://www.ibishotel.com
Tel.:   (+49)234/91430
Fax :   (+49)234/680778
Kurt- Schumacher- Platz 13-15 (next to main station)
single 58 EUR
double 67 EUR
(The prices include breakfast for 9 EUR.) The fee includes free public
transport in Bochum
mention ECC
These rooms are set aside till 12.08.2004.

Hotel Kolpinghaus
http://www.kolpinghaus-bochum.de/html/hotel.html
Maximilian-Kolbe-Str. 14-18 (close to main station, center)
single 46 EUR
double 24 EUR
including breakfast. Facilities include linen and have communal
bathrooms on each floor.
Please make your booking via Tanja Lange [EMAIL PROTECTED] and mention
with whom you would like to share a room.
These rooms are available till 09.08.2004.


Other hotels can be found at

http://www.bochum.de/english/
http://www.bochum.de/bochum/bohotel.htm
(the hotel page is available in German only)

==


FURTHER INFORMATION:

For further information, please contact:

Tanja Lange
Information Security and Cryptography
Ruhr-University Bochum

e-mail:   [EMAIL PROTECTED]
Fax:  +49 234 32 14430
Tel:  +49 234 32 23260

==

---

---

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



More American vigilantes may be in Afghanistan, U.S. military says

2004-07-25 Thread R. A. Hettinga
http://www.billingsgazette.com/printer.php?id=1display=rednews/2004/07/24/stories/world/55-afghan.txt
BillingsGazette.com printable article


More American vigilantes may be in Afghanistan, U.S. military says

 Associated Press


KABUL, Afghanistan - The U.S. military said Saturday there could be more
vigilantes hunting terror suspects here after a group of Americans were
arrested for allegedly abusing Afghans in a private jail.




The U.S. government is offering big rewards for the capture of top
terrorist suspects, including a US$50 million bounty on al-Qaida leader
Osama bin Laden.




It remains unclear if the three Americans who went on trial in the Afghan
capital on Wednesday charged with hostage-taking and torture were hoping to
cash in _ or if they were the only such group in the country.




It is entirely possible that there are others acting independently,
military spokesman Maj. Jon Siepmann said.




Afghanistan is awash with shadowy foreign security operatives. Some work
for private contractors protecting reconstruction workers, others
apparently with the military or secret services.




The U.S. military has tried to distance itself from the three detained
Americans, led by a former U.S. soldier on a self-appointed
counter-terrorism mission.




But both the Americans and NATO peacekeepers acknowledge contact with the
group, which dressed in army fatigues and wore the beards and dark glasses
favored by special forces soldiers.




NATO troops helped the trio with three raids in the capital last month,
while the U.S. military gratefully accepted a detainee at Bagram Air Field,
north of Kabul, in May.




Afghan authorities, who also mistook the men for U.S. special forces,
arrested them only in July after NATO troops and the U.S. military
denounced them as impostors and raised the alarm.




Siepmann didn't say whether the military knew of any other freelancers or
bounty-hunters in Afghanistan.




However, I think the issue of Mr. Idema has brought a heightened awareness
to everyone involved ... to be on the lookout for this kind of behavior,
Siepmann said.




I think Mr. Idema's arrest and current judicial process will serve as a
warning to others who will attempt to do this in Afghanistan, he said.




The three face up to 20 years in jail if convicted.




Afghan security forces freed eight prisoners from the group's makeshift
jail in a house in downtown Kabul. Firearms were also seized in the house.




Idema, who claims to have fought with Afghan forces against the Taliban in
2001-2002, says the men were arrested to avert an al-Qaida plot to attack
foreign troops and assassinate a string of Afghan political leaders.




He told reporters in court on Wednesday that he had support from within the
U.S. Department of Defense and that he could produce evidence to prove it _
a claim Pentagon officials dispute.




The trial is expected to resume early next month.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Internet providers test ways to outsmart spam

2004-07-25 Thread R. A. Hettinga
 marketers will have no choice but to
authenticate their messages to prevent them from being blocked. And if they
authenticate, ISPs and other spam fighters will be able to keep track of
senders and their reputations.

 Companies would be held accountable for the sending habits of their
employees, and ISPs would be responsible for their customers' e-mail. Those
that developed a reputation for generating spam could find their e-mail
blocked -- a situation that could force e-mail providers to ensure that
their customers' computers are secured, so spammers couldn't hijack them to
send junk mail.

 Legitimate e-mail marketers that allow recipients to remove themselves
from mailing lists and that obey other professional codes of conduct would
have their messages whisked around spam filters instead of getting blocked.

 Technologies like DomainKeys and Sender ID are needed to take SMTP from
being dangerously wide open to being much more controlled, said Steve
Jillings, chief executive of FrontBridge Technologies Inc., a Marina del
Rey, Calif., e-mail security company that plans to implement Sender ID.

 The catch is that an authentication standard has to be widely adopted to
be effective. Getting companies across the world to agree on a standard and
implement it seems highly unlikely to technologists such as Carnegie
Mellon's Farber.

 But the future of e-mail depends on it, said Scott Weiss, chief executive
of the anti-spam company IronPort Systems Inc. The innovation of e-mail
now needs to catch up with many of the rich features that have now been
rendered virtually unusable.
Back

Copyright ©1997-2004 PG Publishing Co., Inc. All Rights Reserved.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



As Cash Fades, America Becomes A Plastic Nation

2004-07-24 Thread R. A. Hettinga
 experiment in which she used plastic for every purchase
over $10. Rushing through airports from country to country to join
qualifying meets, she never had to change currencies.

For roughly 60 million Americans without bank accounts, however, living
without cards is getting harder. They can't easily rent cars or stay in
hotels, among other things. You're effectively locked out of the American
Dream if you don't have some kind of plastic, and it's going to get worse,
says Mr. Simmons, the hip-hop mogul, whose RushCard lets holders put their
paychecks onto plastic.

U-Haul International Inc., the truck-rental company, has begun issuing
payroll cards to about 3,000 of its employees, or about 17% of its work
force. They are mostly hourly workers who lack bank accounts. Workers can
withdraw cash once a week from any automated teller machine without paying
a fee, and they can use the cards wherever Visa is accepted. They can even
get cash back after a purchase from the supermarket without any charge. The
company, meanwhile, says it is saving about $500,000 a year in costs
associated with issuing checks.

More technological innovation is coming, and plastic itself may eventually
fall into disuse. After all, it is the numbers carried on plastic, not the
plastic cards themselves, that are necessary to complete transactions.
Since cards are susceptible to theft and fraud, the industry is working on
biometric identification techniques. Computers would link credit-card
numbers, housed on an electronic database, to unique body parts such as
fingerprints, irises or facial characteristics.

Card industry executives envision consumers being identified at cash
registers with devices such as fingerprint readers or eye scanners, which
would replace the signature or PIN that consumers currently use to verify
identity.

Online shoppers might identify themselves by pressing fingers to a silicon
wafer embedded in the keyboard, which would read the fingerprint, match it
online with a copy held by bank or merchant, then authorize the sale. They
wouldn't need a card at all.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Anonymity, ... - A Proposal for Terminology v 0.18

2004-07-22 Thread R. A. Hettinga
I've been sent the pdf and .doc versions of this. If you can't get this
through the site or the author, ping me and I can send you what they sent
me.

Cheers,
RAH
--- begin forwarded text


Delivered-To: [EMAIL PROTECTED]
To: long list snipped
From: Andreas Pfitzmann [EMAIL PROTECTED]
Subject: Anonymity, ... - A Proposal for Terminology v
 0.18
Sender: [EMAIL PROTECTED]
List-Id: Primary NymIP discussion list nymip-res-group.nymip.org
List-Post: mailto:[EMAIL PROTECTED]
List-Help: mailto:[EMAIL PROTECTED]
List-Subscribe: http://www.nymip.org/mailman/listinfo/nymip-res-group,
mailto:[EMAIL PROTECTED]
List-Archive: http://www.nymip.org/pipermail/nymip-res-group/
Date: Thu, 22 Jul 2004 09:21:49 +0200

Hi all,

Marit Hansen and myself are happy to release herewith

   Anonymity, Unobservability, Pseudonymity, and Identity Management -
   A Proposal for Terminology v0.18

Since the beginning of this undertaking in 2000, it is joint work with
many criticizing and contributing. Thanx a lot to them all.

May I encourage you to make use of this document and help in its
further development as well?

To help you in this, I did put online at

   http://dud.inf.tu-dresden.de/Literatur_V1.shtml

all older versions of this document (starting with v0.5) not only in
.pdf, but in .doc as well. The latter you can use easily using, e.g. MS
Word, to highlight any delta between versions, e.g. the differences
between the last version you have read and the current version.

Happy to hear from you

Andreas

--
Andreas Pfitzmann

Dresden University of Technology Phone   (mobile) +49 170 443 87 94
Department of Computer Science   (office) +49 351 463 38277
Institute for System Architecture (secretary) +49 351 463 38247
01062 Dresden,  Germany  Fax  +49 351 463 38255
http://dud.inf.tu-dresden.de e-mail[EMAIL PROTECTED]



Content-Type: application/pdf;
x-unix-mode=0644;
name=Anon_Terminology_v0.18.pdf
Content-Disposition: inline;
filename=Anon_Terminology_v0.18.pdf



Content-Type: application/msword;
x-mac-type=5738424E;
x-unix-mode=0644;
x-mac-creator=4D535744;
name=Anon_Terminology_v0.18.doc
Content-Disposition: attachment;
filename=Anon_Terminology_v0.18.doc



--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



[ISN] Stolen code shop back in business - on Usenet

2004-07-20 Thread R. A. Hettinga

--- begin forwarded text


Date: Tue, 20 Jul 2004 07:12:55 -0500 (CDT)
From: InfoSec News [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [ISN] Stolen code shop back in business - on Usenet
Reply-To: [EMAIL PROTECTED]
List-Id: InfoSec News isn.attrition.org
List-Archive: http://www.attrition.org/pipermail/isn
List-Post: mailto:[EMAIL PROTECTED]
List-Help: mailto:[EMAIL PROTECTED]
List-Subscribe: http://www.attrition.org/mailman/listinfo/isn,
mailto:[EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]

http://www.itworld.com/Man/2681/040719stolencode/

Paul Roberts
IDG News Service
7/19/04

An online group claiming to have the source code for two popular
computer programs for sale opened its doors for business again on
Saturday.

An e-mail message that claims to come from larry hobbles and the
Source Code Club was sent to the Full-Disclosure security discussion
list. The message said that the group has moved operations to Usenet,
the network of online bulletin boards that makes up part of the
Internet, where interested customers can buy the source code for the
Dragon intrusion detection system (IDS) software from Enterasys
Networks Inc. and peer-to-peer server and client software from Napster
LLC, now owned by Roxio Inc.

The club made headlines last week after posting messages to online
discussion groups that advertised a Web site selling the source code
and design documents for Dragon and Napster. By Thursday, the group's
Web page displayed a message saying the club had ceased operations due
to fears our customers faced.

A subsequent newsletter from the club dated July 17 and posted to
the Usenet group alt.gap.international.sales at 10:28 PM Pacific
Standard Time called Usenet the official home of the Source Code
Club and said the informal network was better suited to the club and
would give potential customers two ways to contact club members:
through a club e-mail address and through messages posted in the
Usenet group.

The newsletter claims that the Source Code Club soon hopes to go
underground and stop offering code for sale in public, but is offering
the Dragon and Napster code to authenticate our skills. The
Enterasys code would allow purchasers to understand the secrets
behind Dragon, whereas the Napster code could give any company
interested in breaking into the online music industry a jump-start,
the newsletter said.

The club also expressed regret for the public fiasco that ensues when
you publicly offer source code, an apparent reference to media
attention to the group's unveiling.

The club also posted instructions for potential customers to purchase
the stolen code.

Customers are encouraged to contact the group using e-mail and PGP
(Pretty Good Privacy) encryption to disguise their requests. Source
code for the Dragon software was priced at US$16,000 and Napster for
$10,000, with payments made through one of a number of online payment
services. Those wary of sending money to the club have the option of
buying the source code in $500 increments to build confidence.

Enterasys is working with the U.S. Federal Bureau of Investigation and
reviewing the club's claims. The company claims that its product code
was lifted off stolen media, such as a compact disc or computer hard
drive, rather than stolen directly from its computer network,
according to Kevin Flanagan, an Enterasys spokesman.

A Napster spokeswoman said last week that while Roxio owns the rights
to the original Napster code being sold by the club, the current
Napster online service does not use any code from the original, free
music swapping service and is not affected by the alleged theft.



_
Help InfoSec News with a donation: http://www.c4i.org/donation.html

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



A cypherpunk in Baghdad (was re: giantlaser: Ali Baba returns)

2004-07-19 Thread R. A. Hettinga
-18 08:41  (link)

Another note-to-self: emergency shoes. Nothing like trying to flee from a
building when glass is all over the floor.

(Reply to this)
gori11a
2004-07-18 09:21  (link)

In Nairobi, our Askari (night guard? There's no real translation) carried
Rungas, which are short narrow clubs with knotted gnarls at the end.
Bandits usually were armed with Machettes. A siren and spinning light alarm
on the top of a house would summon all the Askaris on the block to beat the
bandits to within an inch of their lives.

It was not uncommon for an Askari to be found asleep on his watch.

I'm glad guns weren't as prevalent there as they seem to be in Baghdad.

(Reply to this)
cambler
2004-07-18 10:14  (link)

I've said it before, and I'll say it again - I look forward to your book
more than you can know.

(Reply to this)

re: turns of phrase
(Anonymous)
2004-07-18 12:30  (link)

faithful manservant, eh?
aide-de-camp is also very good.

(Reply to this)
pinkish
2004-07-18 23:55  (link)

What about good ole motion sensor lights? Scare the shit out of me walking
by someone's garage at 4am.

(Reply to this)

 (Post a new comment)

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: TCG(TCPA) anonymity and Lucky Green

2004-06-30 Thread R. A. Hettinga
At 4:18 PM -0400 6/29/04, An Metet wrote:
On August 6, 2002, Lucky Green wrote a reply to Anonymous (whom I will
now come clean and admit was none other than me)

Prove it.

;-)

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Third announcement ECC 2004

2004-06-30 Thread R. A. Hettinga
 for registration is open and can be found at:
http://www.ruhr-uni-bochum.de/hgi/tanja.html

For this year the full conference fee is 170 EUR, we offer a reduced
fee of 80 EUR for students. Please register as soon as possible as
the number of participants is limited.
--

ACCOMMODATIONS:

We set aside a number of rooms on a first-come first-serve basis at
following hotels.  To get the prices listed below include the
respective quotations when making your reservation


Hotel Acora
http://www.acora.de/html/bochum.html
Tel.: (+49)234 68 96 0
Fax: (+49)234 68 96 700
Nordring 44-50 (center of Bochum)
single 66,50 EUR
double 80,50 EUR
both including breakfast
mention ECC-Workshop
These rooms are set aside till 30.07.2004.


Hotel Haus Oekey
http://www.oekey.de/
Tel.: (+49)234 388 13 0
Fax: (+49)234 388 13 88
Auf dem Alten Kamp 10 (halfway between university and city center)
single 52 EUR
double 70 EUR
both including breakfast
mention Ruhr-University, Lange
These rooms are set aside till 10.08.2004.


Hotel IBIS am Hauptbahnhof
http://www.ibishotel.com/
Tel.:   (+49)234/91430
Fax :   (+49)234/680778
Kurt- Schumacher- Platz 13-15 (next to main station)
single 49 EUR
breakfast is available for 9 EUR. The fee includes free public
transport in Bochum
mention ECC
These rooms are set aside till 12.08.2004.

Hotel Kolpinghaus
http://www.kolpinghaus-bochum.de/html/hotel.html
Maximilian-Kolbe-Str. 14-18 (close to main station, center)
single 46 EUR
double 24 EUR
including breakfast. Facilities include linen and have communal
bathrooms on each floor.
Please make your booking via Tanja Lange [EMAIL PROTECTED] and mention
with whom you would like to share a room.
These rooms are available till 09.08.2004.


Other hotels can be found at

http://www.bochum.de/english/
http://www.bochum.de/bochum/bohotel.htm
(The hotel page is available in German only)

==


FURTHER INFORMATION:

For further information, please contact:

Tanja Lange
Information Security and Cryptography
Ruhr-University Bochum

e-mail:   [EMAIL PROTECTED]
Fax:  +49 234 32 14430
Tel:  +49 234 32 23260

==

---

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



GeoEcon: Fahrenheit 9/11 -- Sticking the Motorcycle's Irony Gauge

2004-06-29 Thread R. A. Hettinga
 thought not...

Cheers,
RAH
- ---

-BEGIN PGP SIGNATURE-
Version: PGP 8.0.3

iQA/AwUBQOCcK8PxH8jf3ohaEQJu3ACeOHP1fqembZi5WG412cDnHEsDvfwAn08y
CwvcyvgOntaJUfB2qgCaH1eH
=0EFe
-END PGP SIGNATURE-

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Privacy fears on welfare offensive

2004-06-29 Thread R. A. Hettinga
Try not to laugh too hard, now, boys and girls...

Cheers,
RAH
---

http://australianit.news.com.au/common/print/0,7208,9982358%5E15319%5E%5Enbv%5E15306,00.html

Australian IT


Privacy fears on welfare offensive
Karen Dearne
JUNE 29, 2004

THE crackdown on welfare cheats is hotting up as more federal police are
assigned to help Centrelink track social security fraud identified by data
matching.

Centrelink gained access to AusTRAC's financial transactions database
earlier this year and took on 46 specialists to deal with the increased
cross-matching and analysis workload.

 Centrelink also does online matching with Australian Tax Office and
Immigration Department databases.

 Justice Minister Chris Ellison and Children and Youth Affairs Minister
Larry Anthony have agreed to more than double, from four to 10, the number
of AFP agents posted to Centrelink's fraud investigation teams.

 They expect the move to result in 1200 extra investigations this year,
rising to 3000 in 2006-07 with projected net savings of $60 million over
four years.

 Centrelink's access to AusTRAC resources was aimed at cracking down on
high-end welfare cheats, they said.

 According to AusTRAC data, about 5 per cent of suspicious transaction
reports concern social security fraud - about 400 cases a year.

 The Child Support Agency and the Department of Veterans' Affairs were also
given access to AusTRAC data.

 As techniques to perpetrate fraud against the social security system are
becoming more sophisticated, the AFP and Centrelink are working more
closely to put law enforcement one step ahead of criminals trying to
defraud the system, Senator Ellison and Mr Anthony said.

 Australia has a generous welfare system and the Government recognises
that most people are honest.

 However, there are always some people who take more than their share.

 Taxpayers can rest assured that Centrelink and the Australian Federal
Police (AFP) are making sure people are only paid their correct entitlement
- no more, no less.

 The Australian Privacy Foundation has expressed concern about the large
expansion of citizens' data-matching occurring between AusTRAC and other
agencies, at a time when AusTRAC is taking on increased responsibilities
for international money laundering and terrorist financing reform.

 We objected very strongly to the extension of access to Centrelink, Child
Support and Veterans' Affairs when the legislation went through late last
year, APF convenor Nigel Waters said.

 It was a major extension of the scheme.

 We've also put in a very strong submission about the proposed extension
of AusTRAC's operations under changes to the Financial Transactions
Reporting Act.

 We believe this is one of the most dangerous developments yet, because it
basically extends that sort of spying routine that banks already do on
their customers to other people, like real estate agents.

 Australian Consumers Association IT policy spokesman Charles Britton said
AusTRAC appeared to be positioning itself as a manager of citizens'
identity data, rather than a cash transactions manager.

 It's a subtle change, but AusTRAC appears to be taking on that identity
manager role, particularly as far as government agencies are concerned, Mr
Britton said.

 I'm sure it's within their charter, I'm not suggesting it's not, but they
seem to be emphasising an aspect to their work that isn't exactly what
springs to people's minds in relation to AusTRAC.

 Mr Waters said the APF was concerned that there was no independent
oversight of AusTRAC's activities.

 Part of the problem is that they don't claim to be exercising any
independent judgment, he said.

 AusTRAC says it is just a clearing house, so it can't be blamed for the
way information is used.

 That comes down to the law enforcement agencies, the Australian Tax
office (ATO) and Centrelink.

 We think that's totally inadequate.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



VeriSign service takes on spam

2004-06-29 Thread R. A. Hettinga
..A whitelist for my friends...

Cheers,
RAH
---

http://news.com.com/2102-7355_3-5250010.html?tag=st.util.print

CNET News

 VeriSign service takes on spam

 By  Dinesh C. Sharma
 Special to CNET News.com
 http://news.com.com/2100-7355-5250010.html

 Story last modified June 28, 2004, 8:11 AM PDT


VeriSign on Monday announced a new e-mail security service designed to stop
viruses and spam.

 The service uses custom blacklists, fingerprinting and heuristic tools,
which calculate the probability that a particular e-mail message is spam by
examining a pattern of characteristics in the message. VeriSign's heuristic
tools use more than 10,000 rules to determine whether a message is spam,
the company said.

 For blocking malicious mail, the service deploys three antivirus engines.
For policy enforcement, customers can use domain-level filtering to scan
inbound and outbound e-mail. And a disaster recovery feature allows for
automatic switchover to VeriSign's network to provide SMTP connections that
queue e-mail, if a company's e-mail server is not available.


The company has begun free trials of the service, which will be available
on July 12. Pricing details were not announced.

 VeriSign said it plans to add more functions, such as verification of
sender identity and domain authentication. Domain names of all incoming
mail will be checked against the company's list of verified domains. This
list will be made available free to antispam software and service providers.

 Although e-mail has become a critical tool for business communication, it
is often saddled with problems caused by spam, viruses and worms.

 Last week, malicious software infected some Web sites, redirecting
visitors to a Russian server that downloaded software onto surfers'
computers. Some have speculated that the purpose of this malicious plan was
spam distribution. Recently, IBM introduced a security management service
to help businesses stop viruses and spam before they enter their networks.

The introduction of this service will help enterprises restore the
productivity gains from e-mail communication that are now under threat from
spam and viruses, Judy Lin, executive vice president at VeriSign, said in
a statement. With a service-oriented approach, enterprises can easily
obtain comprehensive e-mail protection in a matter of hours, without
deploying any software or hardware. This service will enable customers to
rely on VeriSign's highly available and scalable infrastructure for
mission-critical functions.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Shuffling to the sound of the Morlocks' dinner bell

2004-06-28 Thread R. A. Hettinga
principles, who (no matter which wins) will proceed to raise your taxes,
take away more of your freedoms, and continue frittering away whatever
remains of America's reputation for decency by continuing the violent
military occupation of scores of foreign countries that have never attacked
nor declared war upon us. All this in hopes of temporarily propping up the
bottom lines of sundry well-heeled banks, oil companies and federally
subsidized engineering and construction firms.

 All because you don't want to throw away your vote -- and register your
disapproval with that state of affairs -- by voting for a guy who would
make you feel decent and clean.

 Because he's going to lose.

 So, I don't get it: Let's say you flip a coin and manage to pick the winner.

 What do you win?

 Vin Suprynowicz is assistant editorial page editor of the Review-Journal
and author of the books Send in the Waco Killers and The Ballad of Carl
Drega. His Web site is www.privacyalert.us.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Florida to Tax Home Networks

2004-06-28 Thread R. A. Hettinga
http://www.wired.com/news/print/0,1294,63962,00.html

Wired News


Florida to Tax Home Networks 
By Michelle Delio?

Story location: http://www.wired.com/news/business/0,1367,63962,00.html

02:00 AM Jun. 24, 2004 PT

Florida state officials are considering taxing home networks that have more
than one computer, under a modified 1985 state law that was intended to tax
the few businesses that used internal communication networks instead of the
local telephone company.

 Officials from Florida's Department of Revenue held a meeting on Tuesday
to see whether the law would apply to wired households, and exactly who
would be taxed. About 200 people attended, including community and business
representatives.


 In 1985 the state passed a law to tax businesses using their own
communications networks, because otherwise the state could not collect tax
revenue on the businesses' local telephone service. In 2001, that law was
expanded to make any system that is used for voice or data that connects
multiple users with the use of switching or routing technology taxable up
to 16 percent.

 The law is so broad that it would apply to networked computers, wireless
services, two-way radios and even fax machines -- or substitute
communications systems, as the state calls them. The tax would be
applicable (PDF) to the costs of operating such a substitute communications
system, not to the purchase of the system's components.

 In some cases, it appears the tax would be collected by the providers of
communications services such as wireless companies or voice-over-IP firms.
The tax would be added to the user's bill and then turned over to the
Department of Revenue.

 But some substitute communications services don't require a service plan.
For those, the state could take the tax from the amount deducted on
business, and perhaps personal, tax filings.

 According to my accountant, the way the law is written, if my tax filing
includes deductions for the repair or maintenance of my two computer and
one printer network, those costs will be subject to state communication
taxes, said graphic artist Linda Kellman, who works from home.
Self-employed people get slammed with insane taxes everywhere, and I've
sadly but grudgingly accepted that. But this tax, if they ever try to
collect it, would be the last straw. Can I outsource my network to a more
sensible state, do you think?

 Florida businesses and residents -- and even some officials in the Florida
Department of Revenue -- agree that the wording of the law is too broad.

 In May, the Florida Senate unanimously passed a bill that would have
prevented collection of the tax until 2006, during which time the law could
be carefully reviewed. The bill was then sent to the House, but wasn't
voted on before the summer break, clearing the way for officials to begin
collecting the tax.

 As a result, the Florida Department of Revenue, which, according to local
newspaper reports, was in favor of the bill to delay the collection of the
tax, must now begin to address how the tax should be implemented.

 The tax language is so broad that virtually any communication
technologies in your home or office could be subject to this tax, said
Chris Hart, spokesman for ITFlorida, a not-for-profit industry organization
for the state's technology professionals. It's difficult to imagine a more
anti-technology, anti-business tax. It directly attacks the efficient use
of information technology.

 Florida businesses aren't in favor of the tax.

 It also could tax almost any Florida resident who uses any sort of modern
communications technology, something that Florida's battalions of retirees
on fixed incomes have just begun to become aware of, according to Hart.

 Information on this issue is starting to reach the general public, and it
probably isn't widely understood just yet, he said. However, once people
do realize how this tax could impact them on a personal level, they wake up
very fast.

 All my life, I've willingly paid my fair share of taxes in exchange for
community services, said 73-year-old George Fedoro, a retired engineer who
now lives in Boca Raton. But this tax is not fair and could turn senior
citizens into criminals, because no one that I know can or will pay it.

 Florida Gov. Jeb Bush would have to approve any rule the tax department
suggests. Bush has said he isn't in favor of the tax, but many fear he may
be swayed by city and county government officials. The tax would go, in
part, toward school construction and other projects.

 Additional meetings on the proposed rules for the tax will be held in
other locations around the state later in the year, Department of Revenue
officials said.

 If the law is implemented, Florida would have the most wide-reaching state
tax on technology. But it may not be the last -- state officials estimate
enforcement of the tax could bring in more than $1 billion a year in
revenue for the state.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED

Senate Passes Two Measures To Combat Piracy on the Web

2004-06-28 Thread R. A. Hettinga
http://online.wsj.com/article_print/0,,SB108820092814147912,00.html

The Wall Street Journal


 June 28, 2004

 E-COMMERCE/MEDIA


Senate Passes Two Measures
 To Combat Piracy on the Web

By NICK WINGFIELD
Staff Reporter of THE WALL STREET JOURNAL
June 28, 2004; Page B3


The Senate passed two pieces of legislation designed to help crack down on
individuals who trade pirated music and other material over the Internet.
But another Senate proposal is causing a growing uproar among technology
companies, which are afraid it could stifle innovation and make devices
such as Apple Computer Inc.'s iPod a possible target of
entertainment-industry lawsuits.

The Senate on Friday passed the Protecting Intellectual Rights Against
Theft and Expropriation, or Pirate, Act, introduced by Senators Patrick
Leahy and Orrin Hatch, under which the Department of Justice will be able
to bring civil copyright-infringement cases against people who download
unauthorized copies of music, movies and other works using Internet
file-sharing programs such as Kazaa. Under current law, the Justice
Department can bring only criminal prosecutions, making
copyright-infringement cases more difficult to prove in court.

The Senate on Friday also passed a bill introduced by Sens. John Cornyn
(R., Texas) and Dianne Feinstein (D., Calif.) that would increase penalties
for distributing pre-release copyrighted works and create a federal law
against use of camcorders in movie theaters. Comparable bills still need to
be passed by the House of Representatives.

While the bills were praised by the entertainment industry and criticized
by technology-advocacy groups, the greatest controversy stemmed from a
proposal introduced in the Senate Judiciary Committee last week by Sen.
Hatch (R., Utah), called the Inducing Infringement of Copyrights Act. The
bill, co-sponsored by a powerful bipartisan group including Senators Bill
Frist (R., Tenn.), Tom Daschle (D., S.D.) and Barbara Boxer (D., Calif.),
would allow entertainment companies to bring lawsuits against any company
that intentionally induces individuals to violate copyrights by making
unauthorized copies of songs, movies and other works.

High-tech companies have often been at loggerheads with legislation backed
by the entertainment industry, but the latest proposal seems to have struck
an especially sensitive nerve in the tech world. The fear: that the
proposal could effectively invalidate a key 1984 Supreme Court ruling in a
lawsuit between Sony Corp. and the movie industry over the video cassette
recorder. The ruling protected the VCR, which allowed users to make bootleg
copies of movies, because it also had substantial noninfringing uses.

Critics of the Hatch proposal say it could go far beyond penalizing the
file-sharing programs that allow users to swap music and movies. Indeed,
they said, it could make targets of manufacturers of DVD and CD recorders,
personal computers and other hardware. We are concerned it will have an
immediate chilling effect on the introduction of new technologies, says
Jeff Joseph, a spokesman for the Consumer Electronics Association.

Cindy Cohn, an attorney for the Electronic Frontier Foundation, an online
civil-liberties group, said that under the Hatch proposal it could be
argued, for instance, that the huge song storage capacity of Apple's iPod
audio player induces copyright violations since it enhances the appeal of
file-sharing programs and the piracy therein. Similarly, Toshiba Corp.,
maker of the iPod's hard drive, and CNET Networks Inc., which has explained
how to use music on the iPod, might be considered inducers, the EFF said.

Supporters of the bill insisted that such examples are unrealistic and that
the proposal is aimed at a more a narrow group of companies, such as makers
of file-sharing programs.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



And now, USA Today Presents a Word from Horseman #2

2004-06-28 Thread R. A. Hettinga
http://www.usatoday.com/tech/news/2004-06-27-terrorweb-usat_x.htm

USA Today




Internet's many layers give terrorists room to post, then hide


Terrorists are increasingly using the Internet to spread shocking images
and state their demands. In the past month, video and photos of the
beheadings of American Paul Johnson Jr. and South Korean Kim Sun Il were
posted on Web sites sympathetic to Islamic terrorists. Last week, a Saudi
Web site posted a statement from alleged terrorist leader Abu Musab
al-Zarqawi claiming responsibility for attacks across Iraq.

Weimann says the Web offers terrorists anonymity, easy access ... and the
ability to disappear.
By Stephen J. Boitano, AP

The sites are often shut down by the governments of the countries in which
they're based, but new ones quickly appear. USA TODAY's Mark Memmott talked
with an expert on terrorists' use of the Internet, Gabriel Weimann, a
senior fellow at the federally funded U.S. Institute of Peace. Their
conversation has been edited for length and clarity.

Q: Can't terrorists be caught by tracing who posts their messages?

A: You can track it. ... The question is, how deep can you go and how far
can you go? Let me explain the layers. ... The first layer will be to look
at the Web site and see the address. With the address, you can track the
server (host computer) that is used - you can see where the Web site is
based. That can be done in seconds. It's not a problem. ... That is being
done by security agencies and counterterrorism forces all over the world.

 Q: What's the next layer?

A: To know where the message or the video or the announcement or the
picture or whatever was sent from. ... If I try to post something on a Web
site, I'm using a server, too. There are two servers connected: the server
that I'm using and the server that posts it on your Web site.

 Q: Sounds simple to trace.

A: But there are many options. You can access different servers from
different domains, which are public. It can be a university library. You go
to a public library or a university library or an Internet cafe.

Q: So, physically, there's little evidence to find if investigators get to
that library or cafe?

A: Now we're getting to the third level: the user. Let's say that I find
the server that you used. I still didn't get to the individual user. I can
say, 'This was sent from a computer in Jakarta' ... or from wherever. It
was in a library or a computer network. ... But the user may disappear
seconds after posting the message. Usually they do. So the deeper you go,
the harder it is to find the user. This is one of the most important
advantages of the Internet for terrorists. Anonymity, easy access, free
access and the ability to disappear.

Q: And if the person who sat at the computer and sent the video out is ever
found, who is he likely to be?

A: The guy who's posting the messages for the terrorists, or doing the
downloading, is like the smallest of actors in the theater. You won't find
the scriptwriters.

I'm sure modern terrorists are quite aware of the possibility to track them
down. So the chains (in their organizations) will be very long, and
probably nobody knows who's the third link from him.

 Q: How do you, and investigators, monitor terrorists' use of the Web?

A: It takes time. ... Al-Qaeda right now is moving among 50 different Web
addresses. ... You have to follow the psychology of terrorists, the
publicity-seeking mind of terrorists. They want you to find (information
they put on the Web). They want people who are supporters or potential
supporters, and journalists, to find them. To do so they have to publicize
the new (Web addresses). They will go into Internet chat rooms and notify
people.

Q: So you monitor the chat rooms, watching for messages?

A: We call it lurking. You sit quietly in a chat room. You do nothing. Just
join it and sit quietly in the dark. This is what I do and what my research
assistants are doing. You find very important information.

 (Relevant chat rooms can be found, for example, by performing a Google
groups search using key words such as al-Qaeda or jihad.)

Q: What are the messages like?

A: Someone might ask, Where can I find video of a Chechen slitting the
throat of a Russian? A few lines later, someone will answer, Go to this
Web site, and you'll see it.

Q: People are looking for such things, then?

A: Yes, and now we're coming to the speed at which things move. Once
(terrorists' messages or video) appears somewhere, especially after an
execution or dramatic event, within seconds it will be diffused and posted
on other Web sites. You can find it within seconds all over the Internet.
Even the beheading of Mr. Johnson. It was posted first on an Arab (Web)
forum in England. But within seconds, it was also posted on American
servers and American Web sites and then worldwide.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar

SciAm: The Mystery of the Voynich Manuscript

2004-06-28 Thread R. A. Hettinga
. But a crucial question remains: Does the
manuscript contain only meaningless gibberish or a coded message?

 I found two ways to employ the grilles and tables to encode and decode
plaintext. The first was a substitution cipher that converted plaintext
characters to midfix syllables that are then embedded within meaningless
prefixes and suffixes using the method described above. The second encoding
technique assigned a number to each plaintext character and then used these
numbers to specify the placement of the Cardan grille on the table. Both
techniques, however, produce scripts with much less repetition of words
than Voynichese. This finding indicates that if the Cardan grille was
indeed used to make the Voynich manuscript, the author was probably
creating cleverly designed nonsense rather than a ciphertext. I found no
evidence that the manuscript contains a coded message.

 This absence of evidence does not prove that the manuscript was a hoax,
but my work shows that the construction of a hoax as complex as the Voynich
manuscript was indeed feasible. This explanation dovetails with several
intriguing historical facts: Elizabethan scholar John Dee and his
disreputable associate Edward Kelley visited the court of Rudolf II during
the 1580s. Kelley was a notorious forger, mystic and alchemist who was
familiar with Cardan grilles. Some experts on the Voynich manuscript have
long suspected that Kelley was the author.

 My undergraduate student Laura Aylward is currently investigating whether
more complex statistical features of the manuscript can be reproduced using
the Cardan grille technique. Answering this question will require producing
large amounts of text using different table and grille layouts, so we are
writing software to automate the method.

 This study yielded valuable insights into the process of reexamining
difficult problems to determine whether any possible solutions have been
overlooked. A good example of such a problem is the question of what causes
Alzheimer's disease. We plan to examine whether our approach could be used
to reevaluate previous research into this brain disorder. Our questions
will include: Have the investigators neglected any field of relevant
expertise? Have the key assumptions been tested sufficiently? And are there
subtle misunderstandings between the different disciplines that are
involved in this work? If we can use this process to help Alzheimer's
researchers find promising new directions, then a medieval manuscript that
looks like an alchemist's handbook may actually prove to be a boon to
modern medicine.


GORDON RUGG became interested in the Voynich manuscript about four years
ago. At first he viewed it as merely an intriguing puzzle, but later he saw
it as a test case for reexamining complex problems. He earned his Ph.D. in
psychology at the University of Reading in 1987. Now a senior lecturer in
the School of Computing and Mathematics at Keele University in England,
Rugg is editor in chief of Expert Systems: The International Journal of
Knowledge Engineering and Neural Networks. His research interests include
the nature of expertise and the modeling of information, knowledge and
beliefs.

© 1996-2004 Scientific American, Inc. All rights reserved.
 Reproduction in whole or in part without permission is prohibited.
-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Cryptography Research's Nate Lawson to Speak at USENIX '04

2004-06-28 Thread R. A. Hettinga
http://biz.yahoo.com/prnews/040628/sfm086_1.html

Yahoo! Finance
  

Press Release
Source: Cryptography Research, Inc.

Cryptography Research's Nate Lawson to Speak at USENIX '04
Monday June 28, 9:05 am ET

Presents Lessons Learned in Secure Storage for Digital Cinema

SAN FRANCISCO, June 28 /PRNewswire/ -- Digital cinema transforms the
protection and physical transport of film cans into an outsourced storage
security problem, but security expert Nate Lawson believes that
conventional IT solutions are not up to the task. Lawson, senior security
engineer at Cryptography Research, Inc., has used open source software to
rapidly prototype digital cinema storage solutions and will offer advice on
how to maintain security throughout the entire cinema life cycle, from
filming and production to projection, at the USENIX '04 Annual Technical
Conference.

ADVERTISEMENT
Lawson's presentation, Building a Secure Digital Cinema Server Using
FreeBSD, is scheduled for 3:30 p.m. on Tuesday, June 29 in the Boston
Marriott Copley Place Hotel.

Traditional storage security solutions are designed to operate within a
data center under the data owner's physical management and control, but in
digital cinema, the data representing the film passes through multiple
parties with different incentives and levels of security, said Lawson.
While encryption is important, it is not sufficient to ensure data
integrity or provide the evidence needed to ensure accountability and
mitigate leaks at critical junctures in film production and distribution.

According to Lawson, the projection booth at the local cinema is rapidly
taking on many of the aspects of a traditional IT data center, with racks
of computers and storage devices, high-bandwidth LANs and SANs, and other
equipment. Digital cinema is still in an embryonic stage, with about 90
digital cinema-ready theaters across the U.S. Lawson's talk will present
new criteria for evaluating storage security solutions, from disk
encryption or file system encryption to other storage security products,
and show how open source software supported the rapid development of a
prototype digital cinema server in a proprietary environment. Lawson will
also discuss the importance of standardization efforts, including the
Digital Cinema Initiative.

Nate Lawson, senior security engineer at Cryptography Research, is focused
on the design and analysis of platform and network security. Previously, he
was the original developer of ISS RealSecure and various products for
digital cinema, storage security, network mapping, and IPSEC. Nate has
evaluated cryptographic systems for FIPS 140 and other secure standards. He
is a FreeBSD developer in his spare time, contributing a SCSI target driver
and working on ACPI and CAM. Nate holds a B.S. computer science degree from
Cal Poly and is a member of USENIX and SMPTE.

USENIX, the Advanced Computing Systems Association, supports and
disseminates practical research, provides a neutral forum for discussion of
technical issues and encourages computing outreach into the community at
large. USENIX conferences have become essential meeting grounds for the
presentation and discussion of advanced developments in all aspects of
computing systems.

About Cryptography Research, Inc.

Cryptography Research, Inc. provides consulting services and technology to
solve complex security problems. In addition to security evaluation and
applied engineering work, CRI is actively involved in long-term research in
areas including tamper resistance, content protection, network security,
and financial services. This year, security systems designed by
Cryptography Research engineers will protect more than $60 billion of
commerce for wireless, telecommunications, financial, digital television,
and Internet industries. For additional information or to arrange a
consultation with a member of our technical staff, please contact Jennifer
Craft at 415-397-0329 or visit www.cryptography.com.



 Source: Cryptography Research, Inc.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Spam sender sentenced in Russia for the first time

2004-06-27 Thread R. A. Hettinga
http://english.pravda.ru/printed.html?news_id=13170


 Spam sender sentenced in Russia for the first time - 06/23/2004 19:32

 On June 22 student Dmitry Anosov from the city of Chelybinsk was sentenced
forcreating software causing uncontrolled blocking computers and copying
information?.

   His crime was about sending unsolicited messages to the owners of
GSM-telephones, that is spam.

  The student was put on probation for one year and required to pay fine of
3,000 roubles ($100), the Kommersant reported.

  In the summer of 2003 the employees of cell operator companyUralsky GSM?,
the subsidiary of Megafon company, complained to the police that more than
15,000 cell phone owners were receiving unquotable SMS-messages on May
23-24. The suspect was detected, his apartment was searched, and the police
confiscated the material evidence ˆ the computer having the software for
sending SMS-messages. According to the police, the student created the
software for sending SMS-messages to the customers of Uralsky GSM company.
In February, 2003 Androsov tested his software by sending several
SMS-messages to a company customer. In the end of May, 2003 Androsov used
somebody else?s data to connect to the Internet, and uploaded his software
to the server hosted in St. Petersburg to avoid being detected, and started
the software. As a result, the customers received unquotable SMS-message
discrediting the image of cell phone operator Megafon company.

   SMS-spam sender pleaded guilty. This case can create precedent and help
Russian law-enforcers and legal system to safeguard Russian society people
from spam.

  There is a special law on spam in the USA, but Russia lacks such a law.
The legal regulating of the Internet is only being discussed in Russia.
Internet companies do not try to lobby special anti-spam laws. Therefore,
this court verdict was unique for Russia.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



For Liars and Loafers, Cellphones Offer an Alibi

2004-06-27 Thread R. A. Hettinga
 of such clubs focusing on subjects large and small, ranging
from animal rights to the question of whether pirates or ninjas are tougher.

 In Ms. Logan's case, she promptly used the alibi club she had started to
get out of a blind date. She sent out a text message asking for help, and
in came a response from a stranger in San Jose, Calif., who agreed to call
the blind date, pretend to be Ms. Logan's boss, and explain that she had to
go to Europe for a training seminar.

These days, Ms. Logan spends much of her time overseeing the e-mail traffic
and watching her club grow. It now has 3,400 members, with hundreds of new
members signing up each week. One member recently used the club to fool his
wife so he could stay at a sports bar to watch the N.B.A. finals. Another
member - the wife of a soldier stationed in Iraq - sent out a message
asking for help to conjure up an excuse after becoming pregnant by another
man. But in that case, many responders urged the woman to tell her husband
the truth, according to club members.

 The European alibi club which inspired Ms. Logan grew to 4,000 members,
but was shut down late last year by its founder, Kayle Hanson, 21. I got a
new girl and she wasn't too keen on it, said Mr. Hanson, who lives in
Hamburg, Germany. She thought it was immoral. Imagine that!

Ms. Logan said she was not terribly concerned about lying. Still, she said
one reason she preferred counting on strangers to help her was that she did
not want her friends to know what she was doing.

You wouldn't really want your friends to know you're sparing people's
feelings with these white lies, she said, laughing.

Another problem, which even alibi club members admit, is that other members
may not be entirely trustworthy. Mr. Hall, the student in Denver, said that
when he gave away his girlfriend's phone number to a stranger, he worried
that the stranger might do more than make an excuse.

I didn't want him hitting on her or telling her what I was up to, Mr.
Hall said. But now he is a believer in the power of the cellphone-assisted
alibi. It worked out good, actually.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Sewing Machine Escrow...

2004-06-24 Thread R. A. Hettinga
 Links

* To visit your group on the web, go to:
 http://groups.yahoo.com/group/osint/

* To unsubscribe from this group, send an email to:
 [EMAIL PROTECTED]

* Your use of Yahoo! Groups is subject to:
 http://docs.yahoo.com/info/terms/


--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Police fudge on ID theft: expert

2004-06-22 Thread R. A. Hettinga
http://australianit.news.com.au/common/print/0,7208,9890733%5E15319%5E%5Enbv%5E15306,00.html

Australian IT

Police fudge on ID theft: expert
Kelly Mills
JUNE 22, 2004

REPORTS of increasing identity fraud attacks have been exaggerated by law
enforcement agencies seeking to maintain budgets, according to a former
Scotland Yard detective.

Identity fraud attacks, such as phishing, have increased in the past year
as international syndicates target Australian financial institutions.

 However, SAS Institute fraud and anti-money laundering solutions director
Rowan Bosworth-Davies, a former Scotland Yard detective and lawyer, says
identity theft is relatively rare.

 I would need more evidence from law enforcement agencies of identity
theft before I got too excited about it, he says.

 It is a sexy subject and you can say what you like and no-one will say
that you are wrong.

 Bosworth-Davies says there is a lot of hype around identity theft and a
great deal of misinformation, which he attributes partly to some police
agencies that want to increase funding.

 If someone was living the life of Riley on your credit card, wouldn't you
know within a month, when you got your credit card statement?

 Bosworth-Davies says genuine cases of identity fraud, using stolen credit
card details and other identity documents, are relatively few.

 Speaking at the SAS International Forum 2004 in Copenhagen,
Bosworth-Davies was also critical of banks' ability to deal with money
laundering.

 Prior to September 11, 2001, there was debate about money laundering, and
if banks had software it was largely developed internally, he says.

 In the past three or four years, however, large banks had installed
anti-money-laundering software to comply with new international regulations.

 Leading banks in the UK have adopted new solutions, but it would be less
true in Australia, which has different regulatory drivers.

 Kelly Mills attended SAS Forum International 2004 in Copenhagen as a guest
of SAS Australia.


This report appears on australianIT.com.au.
-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Let the Patriot Act Die

2004-06-21 Thread R. A. Hettinga
 in to showcase the very latest in citizen
surveillance wares.

 The US Chamber of Commerce has hired the former deputy assistant to the
Joint Chiefs of Staff to act as a liaison between the chamber and
businesses seeking homeland security contracts. PoliticalMoneyline says
that 444 groups and individuals have registered as lobbyists to deal with
terror and security issues.

IBM has opened a Government Solutions Center in Vienna, Virginia. The
high-tech Unisys Corporation has established a similar exhibition for
inspection by federal surveillance planners, called the Homeland Security
Center for Excellence.

 Both corporations are racing to cash in on billions of dollars for facial
recognition systems at airports and, in anticipation of trusted traveler
cards, a high-tech ID tied to extensive background checks and biometric
identification.

And finally this: with all of its new data banks, the Department of Justice
announced last March (2003) that accuracy is no longer a concern for the
building of one of the world's largest databases called the National Crime
Information Center (NCIC).

The NCIC has been exempted from the Privacy Act of 1974 that requires
information entered into government databases be timely, relevant, complete
and accurate.

Also exempt are two other Department of Justice databases, the Central
Records System and the National Center for Analysis of Violent Crime. The
rational for exempting some of the nation's largest databases is that
law-enforcement officers need bad data entered into NCIC in order to hurry
in solving cases.

 The false hope, Mr. President, is that repealing our liberties in the
name of fighting terrorism will somehow lead to peace. Let the Patriot Act
die and keep the American dream alive.




About the Author:  Tom DeWeese is the publisher/editor of The DeWeese
Report and president of the American Policy Center: www.americanpolicy.org


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Gross Minus Net Equals Zero: Repeal the Sixteenth Amendment

2004-06-21 Thread R. A. Hettinga
.

 At the philosophic level there is something morally repugnant in forcing
people who get off their butt and work for a living to pay for that
privilege. Life can be trying to say the least but when one works, prospers
and finally succeeds it is a travesty to levy a tax on that person's good
fortune. No working person should have to look over their shoulder to see
where the taxman is hiding. The income tax system makes citizens angry at
their government, and distrustful to boot. It makes enemies of people who
vie to place tax burdens on their fellow countrymen. It divides the nation
into permanent classes of the haves versus the have-nots, divisions
that accentuate envy and ill will among the populace.

Finally I note that taxing income is hardly fair as it fails miserably as a
barometer of who should pay what. With great envy (see above paragraph) I
calculate that for the year 2003 I paid a higher income tax rate than
ketchup nabob Theresa Heinz Inheritance Kerry (me, 20% average rate on
income of 200k, Ms. Kerry, 11.5%, on income of 5.1M). Her fabulous wealth
immune from government pillage, she smugly endorses taxation on others so
that all below her can be equally poor. I marvel continuously that such a
system would ever employ the term fair as an adjective.

Of course the income tax system is not fair, has never been fair, and
indeed can never be fair. As the Ms. Kerry example demonstrates, our tax
system is based on the faulty premise that a person's income can be
arbitrarily classified to produce a tax that affects all taxpayers
equitably. A person making $200,000 in San Francisco may be worse off
financially than a rustic living in Idaho on an income of $30,000. Net
worth is the true measure of wealth, not income.

The solution to these systemic injustices is not to tweak the tax code so
that Ms. Kerry pays more. The solution is to scrap the entire system.
Anything that has had one hundred years to prove itself and fails to do so
is, well, a failure. Dismally so. The efforts of our great people must be
directed toward invention, business and improving life rather than filling
tax forms, hiring accountants and fighting the government. Work must always
be rewarded. So let us begin the fight against freedom's enemies by finally
making gross -minus net-pay equal to zero.




 About the Author:  Mr. Michael Marriott has been in the information
technology field for nineteen years. He has worked for some large companies
in the capacity of consultant including Allstate insurance, Transamerica
Financial and Saudi Aramco. Mr. Michael Marriott writes for Capitalism
Magazine.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Antipiracy bill targets technology

2004-06-21 Thread R. A. Hettinga
http://news.com.com/2102-1028_3-5238140.html?tag=st.util.print

CNET News

 Antipiracy bill targets technology

 By  Declan McCullagh
 Staff Writer, CNET News.com
 http://news.com.com/2100-1028-5238140.html

 Story last modified June 17, 2004, 5:32 PM PDT


A forthcoming bill in the U.S. Senate would, if passed, dramatically
reshape copyright law by prohibiting file-trading networks and some
consumer electronics devices on the grounds that they could be used for
unlawful purposes.

News.context

What's new:
 A bill called the Induce Act is scheduled to come before the Senate
sometime next week. If passed, it would make whoever aids, abets, induces
(or) counsels copyright violations liable for those violations.

 Bottom line:If passed, the bill could dramatically reshape copyright law
by prohibiting file-trading networks and some consumer electronics devices
on the grounds that they could be used for unlawful purposes.

More stories on this topic

The proposal, called the Induce Act, says whoever intentionally induces
any violation of copyright law would be legally liable for those
violations, a prohibition that would effectively ban file-swapping networks
like Kazaa and Morpheus. In the draft bill seen by CNET News.com,
inducement is defined as aids, abets, induces, counsels, or procures and
can be punished with civil fines and, in some circumstances, lengthy prison
terms.

 The bill represents the latest legislative attempt by influential
copyright holders to address what they view as the growing threat of
peer-to-peer networks rife with pirated music, movies and software. As
file-swapping networks grow in popularity, copyright lobbyists are becoming
increasingly creative in their legal responses, which include proposals for
Justice Department lawsuits against infringers and action at the state
level.

 Originally, the Induce Act was scheduled to be introduced Thursday by Sen.
Orrin Hatch, R-Utah, but the Senate Judiciary Committee confirmed at the
end of the day that the bill had been delayed. A representative of Senate
Majority Leader Bill Frist, a probable co-sponsor of the legislation, said
the Induce Act would be introduced sometime next week, a delay that one
technology lobbyist attributed to opposition to the measure.

 Though the Induce Act is not yet public, critics are already attacking it
as an unjustified expansion of copyright law that seeks to regulate new
technologies out of existence.

 They're trying to make it legally risky to introduce technologies that
could be used for copyright infringement, said Jessica Litman, a professor
at Wayne State University who specializes in copyright law. That's why
it's worded so broadly.

 Litman said that under the Induce Act, products like ReplayTV,
peer-to-peer networks and even the humble VCR could be outlawed because
they can potentially be used to infringe copyrights. Web sites such as
Tucows that host peer-to-peer clients like the Morpheus software are also
at risk for inducing infringement, Litman warned.

 Jonathan Lamy, a spokesman for the Recording Industry Association of
America, declined to comment until the proposal was officially introduced.

 It's simple and it's deadly, said Philip Corwin, a lobbyist for Sharman
Networks, which distributes the Kazaa client. If you make a product that
has dual uses, infringing and not infringing, and you know there's
infringement, you're liable.

 The Induce Act stands for Inducement Devolves into Unlawful Child
Exploitation Act, a reference to Capitol Hill's frequently stated concern
that file-trading networks are a source of unlawful pornography. Hatch is a
conservative Mormon who has denounced pornography in the past and who
suggested last year that copyright holders should be allowed to remotely
destroy the computers of music pirates.

 Foes of the Induce Act said that it would effectively overturn the Supreme
Court's 1984 decision in the Sony Corp. v. Universal City Studios case,
often referred to as the Betamax lawsuit. In that 5-4 opinion, the
majority said VCRs were legal to sell because they were capable of
substantial noninfringing uses. But the majority stressed that Congress
had the power to enact a law that would lead to a different outcome.

 At a minimum (the Induce Act) invites a re-examination of Betamax, said
Jeff Joseph, vice president for communications at the Consumer Electronics
Association. It's designed to have this fuzzy feel around protecting
children from pornography, but it's pretty clearly a backdoor way to
eliminate and make illegal peer-to-peer services. Our concern is that
you're attacking the technology.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



International conference targets Internet hate speech

2004-06-18 Thread R. A. Hettinga
http://www.cnn.com/2004/TECH/internet/06/17/online.hate.ap/index.html

CNN


International conference targets Internet hate speech

Thursday, June 17, 2004 Posted: 10:14 AM EDT (1414 GMT)
 International delegates are meeting for two days in Paris.

PARIS, France (AP) -- European neo-Nazis post online pictures of
paint-smeared mosques. Web sites of Islamic radicals call for holy war on
the West. Aliases like Jew Killer pop up on Internet game sites.

International experts met Wednesday in Paris to tackle the tricky task of
fighting anti-Semitic, racist and xenophobic propaganda on the Internet --
seen as a chief factor in a rise in hate crime.

Purveyors of hate have found a potent tool in the Internet, spreading fear
with such grisly images as the beheading of Wall Street Journal reporter
Daniel Pearl in 2002.

The new technology has proven to be a boon for hatreds of old, many experts
say.

Our responsibility is to underline that by its own characteristics --
notably, immediacy and anonymity -- the Internet has seduced the networks
of intolerance, French Foreign Minister Michel Barnier said in opening
remarks at the two-day conference.

France, which is spearheading the effort, has faced a surge in anti-Semitic
violence in the last two years. Some fault the growth of Internet use among
hate groups.

But differing views about the limits of free speech and the ease of public
access to the nebulous, anonymous Web largely stymied officials hoping to
find common ground in Wednesday's talks.

A sticking point was whether the United States, which has championed nearly
unfettered free speech, would line up with European countries that have
banned racist or anti-Semitic speech in public.

The dilemma is all the more acute because the Internet is global, easy to
use and tough to regulate -- as shown by widespread sharing of music
online, an illegal practice that has confounded record companies. Terror
groups have also used the Internet to plot attacks.

American approach differs

There are no easy solutions, delegates said. Many urged more youth
education, better cooperation between governments and Internet service
providers, or new studies on links between Web racism and hate crimes.

The Organization for Security and Cooperation in Europe, a 55-country body
that promotes security and human rights, organized the conference with the
backing of the French government. Six countries in the Middle East and
North Africa also sent envoys. The meeting is one of three OSCE conferences
on anti-Semitism and racism this year.

U.S. Assistant Attorney General Dan Bryant acknowledged the American
approach differs from that of other countries.

We believe that government efforts to regulate bias-motivated speech on
the Internet are fundamentally mistaken, Bryant said. At the same time,
however, the United States has not stood and will not stand idly by, when
individuals cross the line from protected speech to criminal conduct.

He said the United States believes the best way to reduce hate speech is to
confront it, by promoting tolerance, understanding and other ideas that
enlighten.

Robert Badinter, a former French justice minister, said that of 4,000
racist sites counted worldwide in 2002, some 2,500 were based in the
United States.

Growing problem

There are signs that online hate is getting worse.

The French foreign minister cited a recent report in Britain that showed
the number of violent and extremist sites had ballooned by 300 percent in
the last four years in 15 OSCE countries surveyed.

France last year banned a Web site responsible for thousands of daily
racist messages, one of which claimed responsibility for dousing mosques
with paint in the colors of the French flag, the International Network
Against Cyber Hate wrote in a report released Wednesday.

Christopher Wolf, chairman of the Internet Task Force of the U.S.
Anti-Defamation League, pointed out how one student on a blog site at
Brandeis University described playing an Internet video game against a
rival who had nicknamed himself Jew Killer.

In Egypt, some sites have shown pictures of American soldiers in Iraq to
dredge up anti-U.S. feeling; one purportedly showed the June 8 killing of
American civilian Robert Jacobs in Saudi Arabia.

Rabbi Abraham Cooper, associate dean of the Simon Wiesenthal Center, a
Jewish human rights group based in Los Angeles, said one strategy is for
Internet service providers in the United States to honor anti-racism
language in their own contracts.

But even that won't stamp out Internet hate, he said.

Will this put the (Ku Klux Klan) out of business? No. They will be able to
find some way of getting their messages back online, he said. But it will
put a crimp in that subculture on the Internet.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness

Feds: VoIP a potential haven for terrorists

2004-06-18 Thread R. A. Hettinga
VOIP operators: The fifth horsemen of the infocalypse?

Cheers,
RAH
---

http://zdnet.com.com/2102-1105_2-5236233.html?tag=printthis



Feds: VoIP a potential haven for terrorists
 By  Declan McCullagh
 CNET News.com
 June 16, 2004, 10:54 AM PT
 URL:  http://zdnet.com.com/2100-1105-5236233.html

 WASHINGTON--The U.S. Department of Justice on Wednesday lashed out at
Internet telephony, saying the fast-growing technology could foster drug
trafficking, organized crime and terrorism.

 Laura Parsky, a deputy assistant attorney general in the Justice
Department, told a Senate panel that law enforcement bodies are deeply
worried about their ability to wiretap conversations that use voice over
Internet Protocol (VoIP) services.


Get Up to Speed on...
VoIP?
Get the latest headlines and
company-specific news in our
expanded GUTS section.?I am here to underscore how very important it is
that this type of telephone service not become a haven for criminals,
terrorists and spies, Parsky said. Access to telephone service,
regardless of how it is transmitted, is a highly valuable law enforcement
tool.

 Police been able to conduct Internet wiretaps for at least a decade, and
the FBI's controversial Carnivore (also called DCS1000) system was designed
to facilitate online surveillance. But Parsky said that discerning what
the specific (VoIP) protocols are and how law enforcement can extract just
the specific information are difficult problems that could be solved by
Congress requiring all VoIP providers to build in backdoors for police
surveillance.

 The Bush administration's request was met with some skepticism from
members of the Senate Commerce committee, who suggested that it was too
soon to impose such weighty regulations on the fledgling VoIP industry.
Such rules already apply to old-fashioned telephone networks, thanks to a
1994 law called the Communications Assistance for Law Enforcement Act
(CALEA).

 What you need to do is convince us first on a bipartisan basis that
there's a problem here, said Sen. Ron Wyden, D-Ore. I would like to hear
specific examples of what you can't do now and where the law falls short.
You're looking now for a remedy for a problem that has not been documented.

 Wednesday's hearing was the first to focus on a bill called the VoIP
Regulatory Freedom Act, sponsored by Sen. John Sununu, R-N.H. It would ban
state governments from regulating or taxing VoIP connections. It also says
that VoIP companies that connect to the public telephone network may be
required to follow CALEA rules, which would make it easier for agencies to
wiretap such phone calls.

 The Justice Department's objection to the bill is twofold: Its wording
leaves too much discretion with the Federal Communications Commission,
Parsky argued, and it does not impose wiretapping requirements on
Internet-only VoIP networks that do not touch the existing phone network,
such as Pulver.com's Free World Dialup.

 It is even more critical today than (when CALEA was enacted in 1994) that
advances in communications technology not provide a haven for criminal
activity and an undetectable means of death and destruction, Parsky said.

 Sen. Frank Lautenberg, D-N.J., wondered if it was too early to order VoIP
firms to be wiretap-friendly by extending CALEA's rules. Are we premature
in trying to tie all of this down? he asked. The technology shift is so
rapid and so vast.

 The Senate's action comes as the FCC considers a request submitted in
March by the FBI. If the request is approved, all broadband Internet
providers--including companies using cable and digital subscriber line
technology--will be required to rewire their networks to support easy
wiretapping by police.

 Wednesday's hearing also touched on which regulations covering 911 and
universal service should apply to VoIP providers. The Sununu bill would
require the FCC to levy universal service fees on Internet phone calls,
with the proceeds to be redirected to provide discounted analog phone
service to low-income and rural American households.

 One point of contention was whether states and counties could levy taxes
on VoIP connections to support services such as 911 emergency calling.
Because of that concern, I would not support the bill as drafted and I
hope we would not mark up legislation at this point, said Sen. Byron
Dorgan, D-N.D.

 Sen. Conrad Burns, R-Mont., added: The marketplace does not always
provide for critical services such as emergency response, particularly in
rural America. We must give Americans the peace of mind they deserve.

 Some VoIP companies, however, have announced plans to support 911 calling.
In addition, Internet-based phone networks have the potential to offer far
more useful information about people who make an emergency call than analog
systems do.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may

Breaking Iranian Codes (Re: CRYPTO-GRAM, June 15, 2003)

2004-06-15 Thread R. A. Hettinga
other intelligence source of theirs.

During the 1950s, the Americans dug under East Berlin in order to
eavesdrop on a communications cable.  They received all sorts of
intelligence until the East Germans discovered the tunnel.  However,
the Soviets knew about the operation from the beginning, because they
had a spy in the British intelligence organization.  But they couldn't
stop the digging, because that would expose George Blake as their spy.

If the Iranians knew that the U.S. knew, why didn't they pretend not to
know and feed the U.S. false information?  Or maybe they've been doing
that for years, and the U.S. finally figured out that the Iranians
knew.  Maybe the U.S. knew that the Iranians knew, and are using the
fact to discredit Chalabi.

The really weird twist to this story is that the U.S. has already been
accused of doing that to Iran.  In 1992, Iran arrested Hans Buehler, a
Crypto AG employee, on suspicion that Crypto AG had installed back
doors in the encryption machines it sold to Iran -- at the request of
the NSA.  He proclaimed his innocence through repeated interrogations,
and was finally released nine months later in 1993 when Crypto AG paid
a million dollars for his freedom -- then promptly fired him and billed
him for the release money.  At this point Buehler started asking
inconvenient questions about the relationship between Crypto AG and the
NSA.

So maybe Chalabi's information is from 1992, and the Iranians changed
their encryption machines a decade ago.

Or maybe the NSA never broke the Iranian intelligence code, and this is
all one huge bluff.

In this shadowy world of cat-and-mouse, it's hard to be sure of anything.


Hans Buehler's story:
http://www.aci.net/kalliste/speccoll.htm

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



2 million bank accounts robbed

2004-06-15 Thread R. A. Hettinga
 banking online, and Gartner's study
confirms some of that group's worst fears: that accounts can be tapped into
by criminals.

They should be afraid, Litan said. The banks should be requiring more
than just passwords to use online banking. They all know they have to do
something, but they are all afraid to take the first step.

Identity theft expert Rob Douglas described the study results as
blockbuster, and said banks may be forced to re-think the way they are
giving consumers access to checking accounts online.

They may say it's because customers are not practicing the appropriate
safeguards, he said.  But when it comes to online banking, they are not
doing a good enough job of educating customers what to watch out for.
Someone is making a lot of money.

Litan said the industry was reeling in part because there is no software
designed to detect unusual checking account withdrawal patterns, outside of
software that looks for money laundering, which doesn't catch simple
unauthorized withdrawals.

Most credit card users are familiar with industry software called Falcon,
which alerts issuers when out-of-the-ordinary purchases are attempted. Such
software will often cause a card issuer to call a consumer and ask
questions like, Are you really in London buying a diamond necklace right
now?

There's no similar product for online banking, Litan said.

 Still, there are simpler solutions banks could implement to protect
themselves and consumers. One idea is a shared secret -- a picture that
consumers would give to a bank, which would then appear each time the
consumer visited the bank's site, confirming it was the authentic corporate
Web site and not a spoof site controlled by a hacker.

There's a lot at stake here, Litan said. And there's a lot that banks
can do.

Limited window for refunds
In most cases, analysts say, consumers are eventually refunded the money
they lose. Federal regulations governing electronic transfers, known as
Regulation E, requires banks to refund the money as long as consumers
notify the institution within 60 days of receiving their bank statement.
But outside the 60-day window, banks are under no obligation to issue
refunds.

  Fact File
Know your rights

Regulation E protects consumers when they are hit by electronic financial fraud

*
What's covered

*
Consumer liability

*
What consumers should do

*
What banks are required to do

*
For more information

Consumers have well-defined rights with respect to fraudulent electronic
transfers, and should generally be able to obtain refunds with little
hassle. The rights are spelled out in what's known as Reg-E, or the
Federal Reserve Board's Regulation E. The Fed was authorized to draw up the
regulation by the Electronic Funds Transfer Act of 1979. The regulation
covers all manner of transfers into and out of bank accounts outside of
paper checks, including the use of debit cards. It does not cover credit
card transactions.

* Print this

Many banks don't make consumer rights clear enough, said George Tubin, an
analyst at Tower Group. He praised Bank of America, Citibank, and Wells
Fargo for offering credit-card style zero liability policies on their
online banking products.

Until a bank is comfortable enough with their product to say you're
covered, how can consumers feel comfortable? he said.

Betty Reese, a spokeswoman for Bank of America, said her firm simply
requires consumers to report any fraud on a timely basis.  She decline to
disclose fraud statistics.

 Still, getting a refund can be inconvenient, and there are scattered
reports of banks not making the process easy.  And ultimately, all
consumers pay when banks increase fees to recoup their losses.

The new Gartner results are staggering numbers, said Jim Bruene, editor
and founder of the Online Banking Report.

 If that's true, we are really facing a monster problem, he said. It's
something that could have been anticipated by the banks. ... There should
be and will be more controls in place.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: 2 million bank accounts robbed

2004-06-15 Thread R. A. Hettinga
At 12:22 PM -0400 6/15/04, Jack Lloyd wrote:
I mean really.


I'd lay this at the feet of book-entry settlement, but I'm supposed to say
that.

:-)

Cheers,
RAH
-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



He Pushed the Hot Button of Touch-Screen Voting

2004-06-15 Thread R. A. Hettinga
 father also served in Congress and the
California Legislature, where, he was one of two lawmakers to vote against
the internment of Japanese-Americans in World War II.

My dad's vote seems like a no-brainer now, Mr. Shelley said. But at the
time, it spoke to who he was and what he believed in, and he passed that on
to me. (Jack Shelley died of lung cancer in 1974, when his son was 18.)

Mr. Shelley began his career as a legislative director in Washington for
Representative Phil Burton, a liberal icon in California. He was elected to
the San Francisco Board of Supervisors and then the State Assembly, where
he served for the allowable limit of three two-year terms and became
majority leader.

He said he ran for secretary of state because he wanted to counteract the
decline in voting, though he has used the office to highlight other issues,
like domestic partner rights and corporate responsibility. Mr. Shelley did
not deny an interest in the governor's office someday but said his goal for
now was to make policy and set precedent; it has nothing to do with my
future.

Eric Jaye, a political consultant here and longtime associate of Mr.
Shelley, said he had transformed what was essentially an administrative
post into a bully pulpit.

Several recent analyses have bolstered Mr. Shelley's view that touch
screens need more security. These include a recommendation by the chairman
of the federal Election Assistance Commission that every voting
jurisdiction that uses touch screens enhance their security, with either
paper trails or other methods, by November.

 A joint report issued yesterday by the Kennedy School of Government at
Harvard and the National Science Foundation endorsed touch screens with
paper trails as the most effective voting system.

Still, many officials who run elections believe the push for paper trails
is more window-dressing than a necessary expense.

San Bernardino County, which is among those suing Mr. Shelley, plans to
ignore his directive to provide separate paper ballots for those
uncomfortable with touch screens. It would be an expression of a lack of
confidence in the machines, for which the county just spent $14 million,
said David Wert, a spokesman for the county supervisors.

In May, the supervisors noted that Mr. Shelley had certified the county's
system before the March 2 primary and that absolutely nothing has occurred
since that certification to call the system's performance or reliability
into question.

 To those who say he is only fanning fears, Mr. Shelley laughs.

If a machine breaks down in San Diego, and it breaks down in Georgia, and
they break down in Maryland, and they break down in Alameda and we have
high schools where they can hack into the systems, the deficiencies are in
the machines, he said.

Look, he added, I believe these machines have a very, very firm place in
our future, but I also believe that in responding to the chaos in Florida
in 2000 these machines were rushed out before all the kinks were worked
out.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Breaking Iranian Codes (Re: CRYPTO-GRAM, June 15, 2003)

2004-06-15 Thread R. A. Hettinga
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

At 2:09 PM -0400 6/15/04, Jack Lloyd wrote:
Erm... he disassembled source code? With what? Emacs? Or vim maybe?

If you look down a bit, you might notice he's pulling your leg. If
you're not *real* careful, he'll pull it clean off and beat you over
the head with it.

Besides, he's an architect, ferchrissakes. The only disassembly he
knows about is done with stuff like this:
http://www.rocklandmfg.com/demolition_attachments.htm

BTW, I met a guy once who swore you were an fed informer. I mean, he
sounded really positive. Said you had told him yourself.

Naw. That was his brother-in-law, or something. The one in Maryland,
someplace.

A venerated man in his profession, John's still an old lefty from way
back. If you squint real hard, maybe you can see him in the crowd
here: http://www.columbia.edu/acis/history/68-dead.html.

;-)



He ain't no spook. His heart would stop, or something. There are lots
of people who hate the state from the left. John's one of 'em -- if
you can understand what he says. :-)

Cheers,
RAH

-BEGIN PGP SIGNATURE-
Version: PGP 8.0.3

iQA/AwUBQM9UZsPxH8jf3ohaEQIF+ACgwp8+iQCp0ZQvJfQ+tHgd9592IdkAnRvQ
JIgNq+x70jzgFNAoWmwKBcRJ
=KS9O
-END PGP SIGNATURE-

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



[osint] Assassination Plans Found On Internet

2004-06-14 Thread R. A. Hettinga
, and on to
Somalia where he fought with the militant groups against the Ethiopian
forces. He was arrested in Somalia, and extradited to Saudi Arabia, where he
was sentenced to four years in prison. He was released after two years on
good behavior.

A month after his release, he made his way back to Yemen, and then to
Afghanistan in 2001.There he joined combat operations with the Taliban
against the American troops. After the fall of the Taliban, he returned to
Saudi Arabia, to his home in the Swedish district of Riyadh.

He immediately became involved in the establishment of jihad training camps
in the middle and western regions of Saudi Arabia. When Khaled Al Bin Al Haj
was killed on March 15 in a shootout with the Saudi security forces, Abu
Hajar assumed leadership of Al Qaeda in the Arabian Peninsula.

Abu Hajar was raised in the city of Riyadh. He is a high school dropout. He
was married at the age of 19, and has one child (currently 10 years old)
with this wife. According to the biography, Abu Hajar remarried without the
knowledge of his family, and had a second child, who died before the age of
2.


 Yahoo! Groups Sponsor ~--
Yahoo! Domains - Claim yours for only $14.70
http://us.click.yahoo.com/Z1wmxD/DREIAA/yQLSAA/TySplB/TM
~-

--
Want to discuss this topic?  Head on over to our discussion list,
[EMAIL PROTECTED]
--
Brooks Isoldi, editor
[EMAIL PROTECTED]

http://www.intellnet.org

  Post message: [EMAIL PROTECTED]
  Subscribe:[EMAIL PROTECTED]
  Unsubscribe:  [EMAIL PROTECTED]


*** FAIR USE NOTICE. This message contains copyrighted material whose use
has not been specifically authorized by the copyright owner. OSINT, as a
part of The Intelligence Network, is making it available without profit to
OSINT YahooGroups members who have expressed a prior interest in receiving
the included information in their efforts to advance the understanding of
intelligence and law enforcement organizations, their activities, methods,
techniques, human rights, civil liberties, social justice and other
intelligence related issues, for non-profit research and educational
purposes only. We believe that this constitutes a 'fair use' of the
copyrighted material as provided for in section 107 of the U.S. Copyright
Law. If you wish to use this copyrighted material for purposes of your own
that go beyond 'fair use,' you must obtain permission from the copyright
owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
Yahoo! Groups Links

* To visit your group on the web, go to:
 http://groups.yahoo.com/group/osint/

* To unsubscribe from this group, send an email to:
 [EMAIL PROTECTED]

* Your use of Yahoo! Groups is subject to:
 http://docs.yahoo.com/info/terms/


--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: [osint] Assassination Plans Found On Internet

2004-06-14 Thread R. A. Hettinga
At 6:12 PM -0400 6/14/04, Sunder wrote:
Or it could just be agitprop meant to raise the theat level back up a
notch, or provide more funding to the surveillance kitty.

On Mon, 14 Jun 2004, R. A. Hettinga wrote:

 At 10:45 PM +0200 6/14/04, Thomas Shaddack wrote:
 It may be also a very cheap method of attack.

 True enough.

I usually apply occam's razor to these things, but, around here, that's
cheating...

:-)

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: [osint] Assassination Plans Found On Internet

2004-06-14 Thread R. A. Hettinga
At 10:45 PM +0200 6/14/04, Thomas Shaddack wrote:
It may be also a very cheap method of attack.

True enough.

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: [irtheory] War ain't beanbag. Irony is conserved.

2004-06-13 Thread R. A. Hettinga

--- begin forwarded text


To: [EMAIL PROTECTED]
From: R. A. Hettinga [EMAIL PROTECTED]
Mailing-List: list [EMAIL PROTECTED]; contact
[EMAIL PROTECTED]
Delivered-To: mailing list [EMAIL PROTECTED]
Date: Sun, 13 Jun 2004 17:01:04 -0400
Subject: Re: [irtheory] War ain't beanbag. Irony is conserved.
Reply-To: [EMAIL PROTECTED]

At 4:43 PM -0400 6/13/04, Daniel Nexon wrote:
The quotation marks here, I assume, are a disclaimer. Liberalism is not
Marxism. Nor, for that matter, is support for social democracy.

There *you* go again.

:-)

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'


 Yahoo! Groups Sponsor ~--
Make a clean sweep of pop-up ads. Yahoo! Companion Toolbar.
Now with Pop-Up Blocker. Get it for free!
http://us.click.yahoo.com/L5YrjA/eSIIAA/yQLSAA/_tgrlB/TM
~-


Yahoo! Groups Links

* To visit your group on the web, go to:
 http://groups.yahoo.com/group/irtheory/

* To unsubscribe from this group, send an email to:
 [EMAIL PROTECTED]

* Your use of Yahoo! Groups is subject to:
 http://docs.yahoo.com/info/terms/


--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: [irtheory] War ain't beanbag. Irony is conserved.

2004-06-13 Thread R. A. Hettinga

--- begin forwarded text


To: [EMAIL PROTECTED]
From: Daniel Nexon [EMAIL PROTECTED]
Mailing-List: list [EMAIL PROTECTED]; contact
[EMAIL PROTECTED]
Delivered-To: mailing list [EMAIL PROTECTED]
Date: Sun, 13 Jun 2004 16:43:00 -0400
Subject: Re: [irtheory] War ain't beanbag. Irony is conserved.
Reply-To: [EMAIL PROTECTED]


 At 3:37 PM +0100 6/13/04, Lee James wrote:
 I'd like to hear how children who werent old enough to pronounce the
 colour were 'reds' who were rightly tortured (apparently) in your
 view, as well as the many women raped and tortured at the hands of
 SOA graduates.

 Funny how liberals always do the debits and not the credits in
 these grotesque calculations. Shall we count the
 several-orders-of-magnitude number of starved (*and* butchered)
 children in various Marxist paradises around the world, too? I
 thought not. It wouldn't be fair.

The quotation marks here, I assume, are a disclaimer. Liberalism is not
Marxism. Nor, for that matter, is support for social democracy. I don't
see how antipathy towards the right-wing dictatorships that committed
gross violations of human rights against opponents seeking peaceful
change or political liberalization translates into having to champion
Stalin, Pol Pot, Mao, or whomever.


 I'd also be keen to see evidence of this free-market success of
 which you talk, because it isn't in central america for the
 countless millions in poverty.

 Freedom, market or otherwise, isn't about the fool's errand of forced
 income redistribution, which is, invariably, what actually causes
 famine and tragedy.

Why do so many on your side of this argument use definitional fiat to
wind up rationalizing Pinochet's reign of terror, Guatemala's genocide
against the Mayans, an so on? Indeed, freedom, on face, isn't about
arbitrary imprisonment or torture. Is taxation for social goods, which
often involves income redistribution, an equivalent violation of
freedom? I'm not so sure.

Income redistribution in the US did not cause famine and tragedy, nor
in the UK, France, the Federal Republic of Germany, Denmark, etc. It
seems to me famine and/or tragedy were direct results, however, of the
policies put into place by many graduates of the SOA.

 I prefer to think about the McDonald's paradox: No country that has a
 McDonald's has attacked another. :-). We'll see how long *that*
 stands up.

Already happened. Kosovo campaign.


 As for democracy somehow being magical, remember that
 Athens brought on the Peloponnesian war, not Sparta.

I'm not sure what this has to do with the supposed democratic peace.

 I'm not sure that it is defensive to defend a country against its
 own people, when europe did so it was called colonisation.

 Yawn. When Europe did it it was called economics. A word you seem
 to be unfamiliar with. When their economic interests were attacked
 (First the Portuguese, then the Spanish, then The Dutch, then the
 English), surprise, they won. See Diamond's Guns, Germs, and Steel,

A remarkably flawed book, deployed in an even more remarkably strange
way here. To wit:

 for details. Eventually, having won all these mostly defensive wars,
^^

These would be?

The goal of the Portuguese, the Spanish, and the Dutch, for example,
was to secure monopolies through military coercion... often, in the
process, breaking apart other European powers' monopolies (e.g., the
Dutch struggle against Portugal and Spain).
---
Daniel Nexon
Assistant Professor of Government / School of Foreign Service
Georgetown University
Washington, DC
202-687-2273



 Yahoo! Groups Sponsor ~--
Yahoo! Domains - Claim yours for only $14.70
http://us.click.yahoo.com/Z1wmxD/DREIAA/yQLSAA/_tgrlB/TM
~-


Yahoo! Groups Links

* To visit your group on the web, go to:
 http://groups.yahoo.com/group/irtheory/

* To unsubscribe from this group, send an email to:
 [EMAIL PROTECTED]

* Your use of Yahoo! Groups is subject to:
 http://docs.yahoo.com/info/terms/


--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



[irtheory] Re: War ain't beanbag. Irony is conserved.

2004-06-13 Thread R. A. Hettinga

--- begin forwarded text


To: [EMAIL PROTECTED]
From: R. A. Hettinga [EMAIL PROTECTED]
Mailing-List: list [EMAIL PROTECTED]; contact
[EMAIL PROTECTED]
Delivered-To: mailing list [EMAIL PROTECTED]
Date: Sun, 13 Jun 2004 17:00:23 -0400
Subject: [irtheory] Re: War ain't beanbag. Irony is conserved.
Reply-To: [EMAIL PROTECTED]

At 8:37 PM + 6/13/04, Carmi Turchick wrote:
Thank you for the perfect illustration of pure evil

There you go again.

;-)

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'


 Yahoo! Groups Sponsor ~--
Make a clean sweep of pop-up ads. Yahoo! Companion Toolbar.
Now with Pop-Up Blocker. Get it for free!
http://us.click.yahoo.com/L5YrjA/eSIIAA/yQLSAA/_tgrlB/TM
~-


Yahoo! Groups Links

* To visit your group on the web, go to:
 http://groups.yahoo.com/group/irtheory/

* To unsubscribe from this group, send an email to:
 [EMAIL PROTECTED]

* Your use of Yahoo! Groups is subject to:
 http://docs.yahoo.com/info/terms/


--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



War ain't beanbag. Irony is conserved.

2004-06-13 Thread R. A. Hettinga
 of force-monopoly with
free markets someday, war, and monopolistic violence, is,
paradoxically, how we protect free markets, and, through them,
freedom itself.

Irony, apparently, is abundant in the universe, and, like matter and
energy, force and fraud, it is conserved as well.


Cheers,
RAH


-BEGIN PGP SIGNATURE-
Version: PGP 8.0.3

iQA/AwUBQMxbPcPxH8jf3ohaEQIV1QCg3WCvUqbISoWl83PYkCi04IflyJsAoI8p
/FuTkpzHwSDUaTG392g2yuB1
=nx0v
-END PGP SIGNATURE-

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



RE: [irtheory] War ain't beanbag. Irony is conserved.

2004-06-13 Thread R. A. Hettinga
At 10:17 PM +0200 6/13/04, Thomas Shaddack wrote:
Weapons can mean a lot, but they are far from being everything.

Tell that to the USSR.

An economy produces weapons. Just the prospect of a new battlefield, real
or not, coupled with the largest military buildup in history, crushed them.

When they signed an agreement saying that nuclear war was unwinnable and
should happen, they lost, right then and there.

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



  1   2   3   4   5   >