>From reading the docs at EPIC, it is not clear that the FBI actually
got data from the planted device. The USA application dated June 8
asks for a supplemental order of extension of time in order to break
in and remove the device. This need was caused by Scarfo's unexpected
removal of the equip
Jim Choate blindly wrote:
>What law?
The law was quoted just below the citation we provided:
18 USC 2703(f).
The news report quotation exactly matches what the law
says about preservation. Not that you'll read it but here it is again:
Here's the source for news story report about data preserv
We offer an HTML version of the Carnivore technical
review report released yesterday by DoJ (without appendices):
http://cryptome.org/carnivore.rev.htm (164KB text, 8 images)
The original PDF report is 9.4MB, 121 pages.
One notable conclusion about Carnivore's shortcomings
and why its cod
Docket as of November 16, 2000 7:16 pm Page 9
Proceedings include all events.
3:00cr539-ALL USA v. Flowers, et al
11/15/00 1 INDICTMENT by AUSA Jen E Ihlo, Melissa Schraibman. Counts
filed against Richard George Flowers (1) count(s) 1, 2-3,
CJ has lofted a mortar at the 9th Circuit Court of Appeals for
dismissing his appeal for the right to self-representation, and
has requested a rehearing which, if granted will take place
shortly:
http://cryptome.org/cej-v-ca9.htm
This provides a legal analysis of the dismissal, new precedents
What is not clear in Schneier's several critiques of crypto
weaknesses is what will be made of them to advance the
burgeoning interests of law enforcement and the compsec
industry in cybercrime control measures.
While it may not be Bruce's intent to provide support for
"the legitimate interests
Yes, the 16,000 declassified Chile/Allende overthrow docs
are available:
http://foia.state.gov
>From files of the State Dept, CIA, FBI, National Security
Council, NARA, DIA, NSA, et al. A bounty of patriotic
gore and defense/intel pork thanks to Dr. Strangelove
and Dickster.
And a new rep
Jim Choate wrote:
>It get's off it's home planet permanently. [and more.]
Yes, thank you very much, indeed, absolutely.
A suave-tailored and barbered and elocuted gentleman
who runs UK's Internet Watch aroused the anti-censorship
crowd with the query "should we allow an image of a penis
up an
Interesting take, Declan. Which highlights how most of
natsec-developed technology entering the market gets the
benefit of dual-use regulation. Janus the model.
Self-policing is a kissing cousin of self-censorship, both
pretend at keeping the fuzz out of private affairs by pretending
to be doing
This report is consistent with DoJ's advocacy of a US national,
as well as international, system for police agencies to collect
and share criminal justice information, and to do so while there
is no law against using advanced technology for this purpose.
As noted here recently, see a presentation
Mail to [EMAIL PROTECTED] bounced. Rather a
bounce message was returned from bendnet.com,
and surely cloaks delivery of the message.
And the cc to [EMAIL PROTECTED] would not even leave this
mailer. So it seemed. But the window glass shivered.
Spookery is awesome.
response.
Dear Mr. Mueller and Mr. S,
Would you please confirm that there is a CIA facility
in Bend, OR, and that the terms CPIC/West and
ISTAC are applicable to it?
Also, could you clarify whether CIA's ISTAC is related
to the ISTAC of the Bureau of Export Administration?
Thanks very
Yes, the BXA ISTAC is familiar since I'm on its
mailing list. The CIA ISTAC is a different dog.
And it was the Oregon rep which surprised, not
the Vienna, VA and DC addresses. Why Oregon?
Intel, Microsoft, In-Q-tel, or another bedmate helping
equip and run Intelink?
Intelink is reportedly restri
Would anyone in the Oregon area know about
a CIA organization acronymed ISTAC?
Here's the NIC entry, which includes a CIA rep
in Bend, OR. Note that the other CIA rep used
only a last name initial.
CIA (ISTAC-DOM)
1820 Electric Avenue
Vienna,
Adam Back wrote:
>The US export regulations no longer prevent export of crypto. PGP
>exported binary copies of PGP from US websites, as now do many other
>companies. Crypto source is exported also from numerous web sites.
>
>I don't follow why all the discussion talking as if ITAR and EARs were
Right, "Gideon's Spies."
The Toronto Star has two more Promis-spying stories today:
Murders linked to Promis:
http://thestar.com/editorial/updates/top/2828NEW01b_NA-MOUNTIE28.html
Mounties debugged software in 94, after a decade of US, Israel spying:
http://www.thestar.com/thestar/edi
Tim May wrote:
>This story has been around for at least a dozen years. Not saying it
>isn't factual, just that it's been around since the late 80s. I've
>heard Bill Hamilton being interviewed many times over the years, as
>well as the claims of Elliot Richardson, his lawyer, and so on.
>
>Iron
Cryptome offers the ADK bug-fix PGP Freeware 6.5.8:
http://jya.com/pgpfree/PGPFW658Win32.zip (7.8MB)
http://jya.com/pgpfree/PGPFW658Mac_sit.bin (5.6MB)
Analyses of the ADK fix and any others most welcome.
Secretary of Defense Cohen in a speech yesterday to
the VFW about how the US "Superpower" name
invites "asymmetrial attacks," stated:
What we have to do is intensify our anti-proliferation types
of measures to cut down on the technology that so many
of our friends or allies or adversaries
Kaplan's overt prejudice from day one surely diminished
respect for federal justice. I had not seen such behavior
before in New York. And when the prejudice was flaunted
increasingly during trial it occurred to me that he was
diabolically aiming to show just how biased the DMCA
is toward the cop
Forwarding a cypherpunks@toad. com message:
-
From: "jim bell" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>, "Darcy Bender" <[EMAIL PROTECTED]>
Subject: So, what's happening?
Date: Thu, 10 Aug 2000 15:49:04 -0700
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content
We offer the unsealed FBI complaints which led to the recent
bust of two Kazakstan "hackers" accused of extortion for
breaking into Bloomberg's computer system and asking for
$200,000 to tell how it was done:
http://cryptome.org/bloomberg-bust.htm
The complaints describe how the defendants w
In a Guardian article yesterday Duncan Campbell reviewed
the multi-nation effort to coordinate law enforcement snooping
and access to all forms of telecommunications through the
ILETS program. A point he makes is that the operation is
run by LE officials without participation of government lawyers
http://216.167.120.50/cia-cryptome.htm
3 August 2000
A note from John Young, operator of Cryptome.
My father-in-law was a long-time career officer in the
Central Intelligence Agency, one of its earliest members,
and chief of station in several countries. He retired in
1979, and is 80 years
Stephen Dorril's 1999 book on MI6 (just out in the US)
alludes to several ciphers and communications security
methods whose names he has disguised on legal advice,
presumably to avoid violation of Britain's Official Secrets Act.
We would appreciate receiving information on these ciphers
and met
We have finally been able to get the error log of jya and cryptome.
Assistance in interpreting logs would be appreciated.
Background: late Friday, July 21, service for both sites began to be
very slow and there have been repeated outages since then.
Our ISP, Digital Nation, has checked on our
Ray wrote:
>IMHO, a better solution would have been adding a page for the wrong
>url to not report 404's but to report the content advertised. I know
>it's The Druge Report's fault, but in this (web) business, it's the
>"right" thing. Of course, it's JY's perogative to do as he wishes to.
We'v
The sites have not been yanked, though they are
nearly inaccessible.
The server of both sites is still clogged by massive hits,
and it shuts down automatically when it reaches its
limit. Our ISP, Digital Nation, a Verio branch, worked
yesterday to restart, but after restart the hits soon
overwhe
The person who sent the CIA and PSIA docs gave
permission today to reveal his name: Hironari Noda,
a former officer in PSIA. He wrote that he had been
arrested in Japan for previous disclosures so has
"nothing to lose by being named." Noda's message
was not verified, but we've got a CIA certifica
Special Agent James Castano said the call he made to me
was his first for matter like that. He was friendly, open, answered
all my questions the best he could, and asked others if he didn't
know. We chatted about the DeCSS trial here in NY. His unit he
said deals with computer crime, IP violation
quest not to identify the two FBI Special
Agents to whom I spoke today.
I told you that I would be publishing an account of this on Cryptome.
Regards,
John Young
Cryptome
NYT reports today on a patent for a system which samples
the plume of dead skin flakes which rise from humans to
identify carriers of bombs, weapons, contraband, dirty money,
narcotics, chem-bio warfare ingredients, nuclear materials,
and other hazardous material. The devices could be set up
a
The PDF files are the secret CIA report on the overthrow of
Mossadeq in 1953, made available on the New York Times
web site:
http://www.nytimes.com/library/world/mideast/041600iran-cia-index.html
Redactions of names in the report of Iranian participants were
made digitally by the NYT, and I
The Wall Street Journal reports today on Raytheon's
snooping program, SilentRunner, which is claimed to
be the best yet for snooping on computer users and
for being undetectable by ordinary computer users. It utilizes
a TA algorithm to search for suspicious patterns as
well as keywords. Crypto in
The Wall Street Journal reports today on Raytheon's
snooping program, SilentRunner, which is claimed to
be the best yet for snooping on computer users and
for being detectable by ordinary computer users. It utilizes
a TA algorithm to search for suspicious patterns as
well as keywords. Crypto in pa
Lucky:
>I agree with Peter in that Sealand may wish to consider adding a nuke to
>their budget of small arms. Nuclear powers are the only sovereigns that
>command any kind of respect from the other members in the club.
Kick that N up to BC arms so the start-up budget is doable. The cost of
a sui
Here today's tally of CDR subscribers, by way of "who" command:
841 [EMAIL PROTECTED]
115 [EMAIL PROTECTED]
50 [EMAIL PROTECTED]
31 [EMAIL PROTECTED]
8 [EMAIL PROTECTED]
- [EMAIL PROTECTED] - "who" disabled
- sunder.net - "cypherpunks" not recognized
- [EMAIL PRO
More information would be appreciated on Havenco,
reported on by John Markoff in today's New York Times.
It is a project to set up an off-shore data haven on Sealand,
a former anti-aircraft structure six miles off the coast of
England which declared itself a sovereign nation a few
years back. Have
Duncan Campbell has provided his latest exchanges with
Microsoft on the NSA_key, which Microsoft has now refused
to continue (see letter below):
http://cryptome.org/nsakey-ms-dc.htm
-
12 May 2000
Dear Richard [Purcell, Director of Corporate Privacy, Microsoft],
You will recall talking
We need help on analyzing the adverse effect of using
.htaccess to block misbehaving IP addresses.
We first installed the file in September 1999 to block a
single looping machine at kisa.or.kr. Then added a few
more as such loopings occurred from other addresses.
Recently we discovered that near
Cryptome is down due to a glitch in switching to a new
server. Should be up again today, unless this is MI5
sucking your brain.
rations by:
Harold Abelson
Andrew Appel
Chris DiBona
Bruce Fries
Martin Garbus
John Gilmore
Robin Gross
Lewis Kurlantzick
Eben Moglen
Matt Pavlovich
Bruce Schneier
Barbara Simons
Frank Stevenson
Dave Touretsky
David Wagner
John Young
Adi Shamir has provided "Real Time Cryptanalysis of A5/1 on a PC,"
an 18-page paper by Alex Biryukov, Adi Shamir and David Wagner
presented at the Fast Encryption Software Workshop in New York City
on April 10. It is an updated version of the December 1999 preliminary
draft by Biryukov and Sham
The UK Sunday Times reports today:
http://www.the-times.co.uk/news/pages/sti/2000/04/23/stinwenws01014.html
"MI5 has requested the assistance of the American
Federal Bureau of Investigation in tracking down and
erasing copies of the document from the internet.
Officials are particula
Greg Broiles has provided two FOIA documents from the
CIA in September 1996 to Clinton and Gore on the US's
plan to promote key recovery encryption worldwide, to
assure continued US dominance of the cryptography
market and to fulfill the wishes of intel and law enforcement
of the US and allies
Now how in hell can it be determined if Jim is wolfing
for the feds to bring in the lambs?
What the hell has he been fabricating for Jessica Stern
and Declan, and whose names are they taking to report
on and testify against next, quoting Jim's amazingly
selective memory?
What the hell is this na
Jim,
Your understated messages, following quotes of those by
Declan McCullagh and Tim May, are the best ever, I think.
I am dumbfounded by their profundity, subtlety, eloquence,
impenetrability, clarity, wit, generosity, amazing gracefulness.
How do you do it? The purity of an unmarked canvas.
During a break in FSE yesterday Ross Anderson offered
comments on why crypto could not protect privacy against
weak comprehensive systems security. Much of what he
said was confirmed by the news report today on new Dutch
privacy invasion law for intelligence and law enforcement.
He stated tha
"We" is .gov victims. Who aren't going to take it anymore.
We are going to assure that governments do the right thing,
wither away. Enough is enough. We are certain that if good
people insist on government wither that will make it happen.
We are not naive. We know that government works hard to
Moreover, it is fairly common for government agencies to
contract with a commercial service for Web services, one
reason is for more reliable service than is available on
government servers. Other agencies use commercial
ISPs to cloak their surfing activities. Law enforcement and
intelligence agen
France's Le Monde yesterday had a long piece on Echelon
which closed with speculation about alleged ex-spies going
into commerce around the world as moles and reporting
back economic espionage to the agencies which sent
them out for this purpose under guise of downsizing, or
as with undercover na
The NYT today reports on the UK's Demon Internet paying
a wad of money to Laurence Godfrey, a physicist allegedly
libeled on a news group, soc.culture.thai, first on January 12,
1997, there again later, and subsequently on uk.legal.
Phill Hallam-Baker is mentioned as having been required
in a
Last summer World Net Daily published an article on
a hacker group called "Hong Kong Blondes" in which
the hackers claimed that compromising electromagnetic
emanations from computer equipment could be acquired
up by cellular modems.
Can cellular modems be used for this purpose? If so,
what is i
Martin Garbus, an internationally distinguished New York
attorney, and his firm have been retained by the defense in
the New York MPAA DeCSS case. Two of the three defendants
have withdrawn under consent agreements, leaving only the
magasine 2600, which succeeds its publisher, Emmanuel
Goldste
Barney Wolff wrote:
>IR != RF.
Woops, I screwed that. Here is the original French, and
I'd appreciate an accurate translation of "radioélectrique."
First I thought it was electromagnetic, then radio-frequency,
then infra-red. My native language is grunt, s'il vous plait.
-
Les risques inhé
Yesterday France initiated a new information security
administration whose aim is to counter the panoply of
digital threats involving economic espionage, cryptology,
TEMPEST, snooping, PW snarfing, DDoS, Echelon and
a few that are new to me:
http://cryptome.org/dcssi.htm
It recounts a bit o
Cryptome offers a CD of the full archive from June 1996
to March 14, 2000. About 4,000 files, with hyperlinked lists
of contents, 300MB. Price $100. E-mail requests with
mailing address to: <[EMAIL PROTECTED]>. Pay after you get it.
Austin Hill wrote:
>If within these functions, there exists a market demand for payor and payee
>anonymous digital cash, then you can be assured that some ambitious startup
>will license from us and attack that market.
I would appreciate being placed as close to the front of that applicant list
>>Ooops, sorry Tim! On the net you both look alike you know.
>>I'll get it right in the book.
>
>Still not right.
And getting farther off the mark. From the surveillance video I've seen
John and Tim do not look alike. When streaking for a hot tub one wears
a modesty apron, for example, the othe
No, I had not read the early archives, at the time I got on
board there was plenty going on to electrify 6 inches of callus
off my near-dead carcass. Then, later, the early stuff disappeared
with Bilblio, when I had assumed it would be around whenever
needed. And, then the Cyphernomicon was a r
It's worth pondering what demonization and criminalization
may evolve from close study of the early Cypherpunk archives
made availalble a few days ago by Ralph Seberry :
http://lanesbry.com/cypherpunks
After a fews days of reading those remarkable exchanges, it would
be a surprise if they ar
Phill wrote:
>I know enough people who were involved in the previous investigations
>of Mitnick to corroborate the points I made, namely that Mitnick is a nasty
>piece of work and a pathetic loser rather than the harmless chap his
>defence attorney would have people believe.
Watching Mitnick y
A provocative document on Cylink has been put on Cryptome
today:
http://cryptome.org/cylinked.htm
Confirmations, supplements and rebuttals welcomed.
Bill Crowell has been invited to give Cylink's response.
Excerpt:
41. Which United States agency recruited Cylink to work
with the KGB tra
Robert Hettinga wrote:
>> Well, it seems that we're arguing about word definitions, which is a most
>> stupid thing to do.
>
>Sorry if you feel that way. I was just going for a laugh, and not really
>arguing with you at all...
Charlie Trie said the same in Congress a few days ago, when explaini
What is going around as a way to warn users of Hotmail that
the originating address is not concealed, as with Alex Rogers
below?
We got Hotmail the other day claiming that Queen Elizabeth was
to be assassinated by thugs hired by Mohammah al-Fayed
in Sidney, Australia, in March.
Our response ask
BXA Updated Commercial Encryption Export Controls
February 28, 2000
http://www.bxa.doc.gov/Encryption/Default.htm
This provides links to the following:
Export of Encryption Technology
http://www.bxa.doc.gov/Encryption/tech.htm
Updated Q&A
http://www.bxa.doc.gov/Encryption/qanda.htm
E
Uni wrote:
>Not at all what I am talking about. But then again, I've never been
>disappointed (with noted exceptions) by the inability to read displayed by
>the masses of this list.
Let us remain calm at Uni's mock taunt. We know cypherpunks *write*
code, they do not read, period, knowing full
Okay, Robert, who wore a thong monokini at FC00?
Who's got implants since FC99, unable to face the naked
ridicule at 00?
Were infections running wild as predicted?
Who died? Where'd you stash the carcass, sewing a
pickled corpse in a donkey's stomach, head out the
navel, aint novel, well, not
Making history: the original source for the 1988
first Echelon report steps forward
London, Friday 25 February, 2000
By Duncan Campbell
In the circumstances of the extensive worldwide
political and media attention that is currently
focussed on the Echelon communications surveillance
networ
Randolph Graham wrote:
>1) If someone comes to rape you, Kill them.
>2) If someone comes to rob you, Kill them
>3) If someone comes to carjack you, Kill them
>4) If someone comes to murder you, Kill them.
>5) If someone comes to abduct you, Kill them.
>
>After you have killed these five, your l
Following the four EuroParl reports last year on Echelon
and electronic surveillance in general, a fifth report has
appeared, dated October 1999, but as far as we know
not heretofore widely publicized:
http://cryptome.org/dst-pa.htm (108K)
This report briefly outlines the first four and the
Thanks to Cindy Cohn and Lee Tien we offer BXA's four-page
response to Bernstein's request for clarification of the new
encryption export regulations, February 18, 2000:
http://cryptome.org/bxa-bernstein.htm
Excerpts, by James Lewis, BXA:
You ask for an advisory opinion in light of your co
Echelon will get a segment on 60 Minutes, February 27,
this coming Sunday, according to Margaret Newsham,
an ex-employee of Lockheed Martin, who worked at
NSA's Menwith Hill Station and trained agency personnel,
and who testified in a secret congressional hearing in the
80s. She'll be a main pla
Sounds as if e-gold got hit by a n undercoverbanking op aping
a Diallo.
Has there been an ID of the fake 13-year-old that baby-dolled
the meet-me-at-Dariy Queen?
Why has NSA been breaking into banks and governments?
As Madsen claims. Or is it Shimomura aping a rogue state?
Tim May wrote:
>Cryptome site (and sites that preceeded this exact
>name).
Wah, I didn't know that. I'd like to credit those. Indeed, giving
credit is what keeps Cryptome going, for nearly all of it comes
from contributions by others, especially Cypherpunks and
its offshoots and graduates.
I
This list is the first place I heard of Echelon, and a lot of other
things, from crypto to TEMPEST and more. Maybe it's not at
the moment at its peak level on politico-technology, but nuggets
continue to appear, particularly those which provide a densepack
of information dressed up with enligh
Very well, your rebuttal would be an informative addition
to the file, if you don't object.
To pick up on a couple of your points:
There should be a sustained burst of activity from Europe
on the Echelon affair as EuroParl deliberates on it, guided by
the four 1999 Echelon reports prepared by
A French intelligence report alleges that Microsoft was
set up with NSA funding and that NSA imposed MS-DOS
on IBM, and also alleges that NSA agents are now working
at Microsoft:
http://cryptome.org/nsa-ms-spy.htm
The full confidential report has not been published and these
allegations are
Sent to the Copyright Office today:
DMCA Comments by Computers & Communications Industry
Association
[Excerpt from: http://cryptome.org/dmca-ccia.htm]
"The Computer & Communications Industry Association (CCIA)
strongly supported ratification and implementation of the World
Intellectual Prope
Peter Lewis writes in today's NY Times about a couple of
programs that will (1) check your computer ports to see if any
are open to Net trollers looking for logged on boxes to host
DDoS and such, and (2) block such trolls.
1. The checking service is Steve Gibson's site:
www.grc.com
2. The
Tim May wrote:
>Millions in America need killing.
This is taken out of the property is theft context, still it rings true
as if eternal oracle.
Some want more customers, some want fewer social leeches,
some want more slaves for their life style, some want fewer vote
thieves and more dead elect
The Org's put a tail on Jim in Austin, and rigged taps on his telecomm
cables, and emanation snags on his water and sewage piping,
and put an illegal family of Mexican narcs out of Matamoros planting
Middle East saltpeter in his double-wide, and locked a geostationary
bird to slurp residual k
We offer the 1995 secret UK report on the plot to
overthrow Kadaffi reported in Britain Saturday:
http://cryptome.org/qadahfi-plot.htm
We've been told the report has been taken down from
the Yahoo site by someone who learned the URL and found
it gone already. HMG acted faster this time -- The Times
report first appeared on Saturday and by then the gov
knew about the offering.
Any lead to a copy would be welcome. Ready to host i
We would appreciate the URL for this report.
The Sunday Times, today;
http://www.the-times.co.uk/news/pages/Times/frontpage.html?1124027
"A top-secret report linking MI6 with a failed attempt to
assassinate Colonel Gadaffi appeared on an American
internet site yesterday, refuting Robin Cook
The story that's intriguing is that the cyber-attacks are the work
of the dark side of NSA, the ones opposed to the new DIRNSA's
housecleaning and deadwood chopping. A warning No. 3 after
the brownout of the intel sat receiving stations (No. 1) and the
computer meltdown (No. 2).
Civilians Barba
Forward:
Date: Wed, 9 Feb 2000 23:02:12 -0500
Sender: Law & Policy of Computer Communications
<[EMAIL PROTECTED]>
From: Seth Finkelstein <[EMAIL PROTECTED]>
Subject: DMCA Anti-Circumvention comments - deadline Feb 17
To: [EMAIL PROTECTED]
Did you lik
Aaron existentially emissioned:
> Mental masturbation doesn't actualize anything.
Out of 35 years devoted to gobbling everything emissed
by this list(s) Aaron's takes the Petard Prize. And all
the rest of you, yes each and every subscriber, poster,
lurker, snoozer, spy, got to blow through the
Cryptome got a demand letter from the MPAA Anti-Priacy Unit
yesterday to remove DeCSS as well as to immediately perform
other unnatural acts:
http://cryptome.org/dvd-mpaa-ccd.htm
A number of responses to the letter have come in which
might be of interest here:
http://cryptome.org/dvd-mp
Ray Hirschfield wrote:
>We welcome serious proposals for hosting future meetings of the FC
>conference at locations other than Anguilla. If you would like to
>submit one, please contact Adam Shostack <[EMAIL PROTECTED]>.
If one is held at Tim's spread I would attend. From accounts of his
unbou
Judge Kaplan has issued his Memorandum Opinion in
the DeCSS MPAA v. 3 suit in New York:
http://www.nysd.uscourts.gov/courtweb/pdf/00-01149.PDF
We offer an HTML version:
http://cryptome.org/dvd-mpaa-3-mo.htm
Judge Kaplan aims at settling the code as expression
dispute, citing Bernstein,
1 Feb 2000
Unedited 762
Algebra218
SSZ 44
Cyberpass 12
Total 1036
Are there other CDRs?
Majordomo at toad says there's no plain cypherpunks,
so it looks as though subs to toad go to unedited.
Except mail to [EMAIL PROTECTED] comes through
from toad and it al
Just learned that I was axed by Cyberpass in the last few days
and have re-subbed. So:
Anybody attending Linux World Expo in New York this week?
BTW, there are only 12 subscribers on Cyberpass. Who snatched
the bodies?
Who's attending Linux World Expo in New York this week?
94 matches
Mail list logo