Re: IBM Uses Keystroke-monitoring in NJ Mob Case (was Re:

2000-12-06 Thread John Young
>From reading the docs at EPIC, it is not clear that the FBI actually got data from the planted device. The USA application dated June 8 asks for a supplemental order of extension of time in order to break in and remove the device. This need was caused by Scarfo's unexpected removal of the equip

Re: Re: About 5yr. log retention

2000-12-06 Thread John Young
Jim Choate blindly wrote: >What law? The law was quoted just below the citation we provided: 18 USC 2703(f). The news report quotation exactly matches what the law says about preservation. Not that you'll read it but here it is again: Here's the source for news story report about data preserv

Carnivore Report

2000-11-22 Thread John Young
We offer an HTML version of the Carnivore technical review report released yesterday by DoJ (without appendices): http://cryptome.org/carnivore.rev.htm (164KB text, 8 images) The original PDF report is 9.4MB, 121 pages. One notable conclusion about Carnivore's shortcomings and why its cod

Re: Bob's Bank. Hi, I'm Bob. Just slip it in this pocket here.

2000-11-17 Thread John Young
Docket as of November 16, 2000 7:16 pm Page 9 Proceedings include all events. 3:00cr539-ALL USA v. Flowers, et al 11/15/00 1 INDICTMENT by AUSA Jen E Ihlo, Melissa Schraibman. Counts filed against Richard George Flowers (1) count(s) 1, 2-3,

CJ v. 9th Circuit

2000-11-17 Thread John Young
CJ has lofted a mortar at the 9th Circuit Court of Appeals for dismissing his appeal for the right to self-representation, and has requested a rehearing which, if granted will take place shortly: http://cryptome.org/cej-v-ca9.htm This provides a legal analysis of the dismissal, new precedents

Re: Schneier: Why Digital Signatures are not Signatures (was Re: CRYPTO-GRAM, November 15, 2000)

2000-11-16 Thread John Young
What is not clear in Schneier's several critiques of crypto weaknesses is what will be made of them to advance the burgeoning interests of law enforcement and the compsec industry in cybercrime control measures. While it may not be Bruce's intent to provide support for "the legitimate interests

Re: CIA Website Update

2000-11-14 Thread John Young
Yes, the 16,000 declassified Chile/Allende overthrow docs are available: http://foia.state.gov >From files of the State Dept, CIA, FBI, National Security Council, NARA, DIA, NSA, et al. A bounty of patriotic gore and defense/intel pork thanks to Dr. Strangelove and Dickster. And a new rep

Re: Predicting a succesful society

2000-11-14 Thread John Young
Jim Choate wrote: >It get's off it's home planet permanently. [and more.] Yes, thank you very much, indeed, absolutely. A suave-tailored and barbered and elocuted gentleman who runs UK's Internet Watch aroused the anti-censorship crowd with the query "should we allow an image of a penis up an

Re: ZKS, government regulation, and new "privacy" laws

2000-11-02 Thread John Young
Interesting take, Declan. Which highlights how most of natsec-developed technology entering the market gets the benefit of dual-use regulation. Janus the model. Self-policing is a kissing cousin of self-censorship, both pretend at keeping the fuzz out of private affairs by pretending to be doing

Re: NZ: Sweeping powers for spy agencies

2000-10-30 Thread John Young
This report is consistent with DoJ's advocacy of a US national, as well as international, system for police agencies to collect and share criminal justice information, and to do so while there is no law against using advanced technology for this purpose. As noted here recently, see a presentation

Re: CIA in Oregon, Intelink

2000-10-28 Thread John Young
Mail to [EMAIL PROTECTED] bounced. Rather a bounce message was returned from bendnet.com, and surely cloaks delivery of the message. And the cc to [EMAIL PROTECTED] would not even leave this mailer. So it seemed. But the window glass shivered. Spookery is awesome.

Re: CIA in Oregon, Intelink

2000-10-28 Thread John Young
response. Dear Mr. Mueller and Mr. S, Would you please confirm that there is a CIA facility in Bend, OR, and that the terms CPIC/West and ISTAC are applicable to it? Also, could you clarify whether CIA's ISTAC is related to the ISTAC of the Bureau of Export Administration? Thanks very

RE: CIA in Oregon, Intelink

2000-10-25 Thread John Young
Yes, the BXA ISTAC is familiar since I'm on its mailing list. The CIA ISTAC is a different dog. And it was the Oregon rep which surprised, not the Vienna, VA and DC addresses. Why Oregon? Intel, Microsoft, In-Q-tel, or another bedmate helping equip and run Intelink? Intelink is reportedly restri

CIA in Oregon, Intelink

2000-10-25 Thread John Young
Would anyone in the Oregon area know about a CIA organization acronymed ISTAC? Here's the NIC entry, which includes a CIA rep in Bend, OR. Note that the other CIA rep used only a last name initial. CIA (ISTAC-DOM) 1820 Electric Avenue Vienna,

Re: export reg timewarp? (Re: RC4 source as a literate program)

2000-09-03 Thread John Young
Adam Back wrote: >The US export regulations no longer prevent export of crypto. PGP >exported binary copies of PGP from US websites, as now do many other >companies. Crypto source is exported also from numerous web sites. > >I don't follow why all the discussion talking as if ITAR and EARs were

Re: Re: Bugged Promis in Canada... wheee

2000-08-28 Thread John Young
Right, "Gideon's Spies." The Toronto Star has two more Promis-spying stories today: Murders linked to Promis: http://thestar.com/editorial/updates/top/2828NEW01b_NA-MOUNTIE28.html Mounties debugged software in 94, after a decade of US, Israel spying: http://www.thestar.com/thestar/edi

Re: Re: Bugged Promis in Canada... wheee

2000-08-28 Thread John Young
Tim May wrote: >This story has been around for at least a dozen years. Not saying it >isn't factual, just that it's been around since the late 80s. I've >heard Bill Hamilton being interviewed many times over the years, as >well as the claims of Elliot Richardson, his lawyer, and so on. > >Iron

PGP ADK Bug Fix

2000-08-26 Thread John Young
Cryptome offers the ADK bug-fix PGP Freeware 6.5.8: http://jya.com/pgpfree/PGPFW658Win32.zip (7.8MB) http://jya.com/pgpfree/PGPFW658Mac_sit.bin (5.6MB) Analyses of the ADK fix and any others most welcome.

Superpower Invites Attack

2000-08-22 Thread John Young
Secretary of Defense Cohen in a speech yesterday to the VFW about how the US "Superpower" name invites "asymmetrial attacks," stated: What we have to do is intensify our anti-proliferation types of measures to cut down on the technology that so many of our friends or allies or adversaries

Re: MPAA Wins New York DeCSS Case

2000-08-18 Thread John Young
Kaplan's overt prejudice from day one surely diminished respect for federal justice. I had not seen such behavior before in New York. And when the prejudice was flaunted increasingly during trial it occurred to me that he was diabolically aiming to show just how biased the DMCA is toward the cop

Jim Bell Msg: So, what's happening?

2000-08-15 Thread John Young
Forwarding a cypherpunks@toad. com message: - From: "jim bell" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]>, "Darcy Bender" <[EMAIL PROTECTED]> Subject: So, what's happening? Date: Thu, 10 Aug 2000 15:49:04 -0700 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content

Feds Bust Kazakstan Hackers

2000-08-15 Thread John Young
We offer the unsealed FBI complaints which led to the recent bust of two Kazakstan "hackers" accused of extortion for breaking into Bloomberg's computer system and asking for $200,000 to tell how it was done: http://cryptome.org/bloomberg-bust.htm The complaints describe how the defendants w

Re: France and "Crypto Schizophrenia"

2000-08-11 Thread John Young
In a Guardian article yesterday Duncan Campbell reviewed the multi-nation effort to coordinate law enforcement snooping and access to all forms of telecommunications through the ILETS program. A point he makes is that the operation is run by LE officials without participation of government lawyers

Cryptome Ex-CIA Link

2000-08-03 Thread John Young
http://216.167.120.50/cia-cryptome.htm 3 August 2000 A note from John Young, operator of Cryptome. My father-in-law was a long-time career officer in the Central Intelligence Agency, one of its earliest members, and chief of station in several countries. He retired in 1979, and is 80 years

MI6 Ciphers and Comsec

2000-07-29 Thread John Young
Stephen Dorril's 1999 book on MI6 (just out in the US) alludes to several ciphers and communications security methods whose names he has disguised on legal advice, presumably to avoid violation of Britain's Official Secrets Act. We would appreciate receiving information on these ciphers and met

JYA, Cryptome Help Request

2000-07-26 Thread John Young
We have finally been able to get the error log of jya and cryptome. Assistance in interpreting logs would be appreciated. Background: late Friday, July 21, service for both sites began to be very slow and there have been repeated outages since then. Our ISP, Digital Nation, has checked on our

Re: Re: cryptome.org?

2000-07-24 Thread John Young
Ray wrote: >IMHO, a better solution would have been adding a page for the wrong >url to not report 404's but to report the content advertised. I know >it's The Druge Report's fault, but in this (web) business, it's the >"right" thing. Of course, it's JY's perogative to do as he wishes to. We'v

Re: JYA down?

2000-07-24 Thread John Young
The sites have not been yanked, though they are nearly inaccessible. The server of both sites is still clogged by massive hits, and it shuts down automatically when it reaches its limit. Our ISP, Digital Nation, a Verio branch, worked yesterday to restart, but after restart the hits soon overwhe

Source of CIA PSIA Docs

2000-07-22 Thread John Young
The person who sent the CIA and PSIA docs gave permission today to reveal his name: Hironari Noda, a former officer in PSIA. He wrote that he had been arrested in Japan for previous disclosures so has "nothing to lose by being named." Noda's message was not verified, but we've got a CIA certifica

RE: FBI Requests File Removal

2000-07-21 Thread John Young
Special Agent James Castano said the call he made to me was his first for matter like that. He was friendly, open, answered all my questions the best he could, and asked others if he didn't know. We chatted about the DeCSS trial here in NY. His unit he said deals with computer crime, IP violation

FBI Requests File Removal

2000-07-20 Thread John Young
quest not to identify the two FBI Special Agents to whom I spoke today. I told you that I would be publishing an account of this on Cryptome. Regards, John Young Cryptome

Flakes

2000-07-10 Thread John Young
NYT reports today on a patent for a system which samples the plume of dead skin flakes which rise from humans to identify carriers of bombs, weapons, contraband, dirty money, narcotics, chem-bio warfare ingredients, nuclear materials, and other hazardous material. The devices could be set up a

Re: CIA pdf

2000-06-21 Thread John Young
The PDF files are the secret CIA report on the overthrow of Mossadeq in 1953, made available on the New York Times web site: http://www.nytimes.com/library/world/mideast/041600iran-cia-index.html Redactions of names in the report of Iranian participants were made digitally by the NYT, and I

SilentRunner Resend

2000-06-14 Thread John Young
The Wall Street Journal reports today on Raytheon's snooping program, SilentRunner, which is claimed to be the best yet for snooping on computer users and for being undetectable by ordinary computer users. It utilizes a TA algorithm to search for suspicious patterns as well as keywords. Crypto in

SilentRunner

2000-06-14 Thread John Young
The Wall Street Journal reports today on Raytheon's snooping program, SilentRunner, which is claimed to be the best yet for snooping on computer users and for being detectable by ordinary computer users. It utilizes a TA algorithm to search for suspicious patterns as well as keywords. Crypto in pa

RE: Trusting HavenCo [was: Sealand Rant] CPUNK

2000-06-11 Thread John Young
Lucky: >I agree with Peter in that Sealand may wish to consider adding a nuke to >their budget of small arms. Nuclear powers are the only sovereigns that >command any kind of respect from the other members in the club. Kick that N up to BC arms so the start-up budget is doable. The cost of a sui

Cpunk Subscribers

2000-06-04 Thread John Young
Here today's tally of CDR subscribers, by way of "who" command: 841 [EMAIL PROTECTED] 115 [EMAIL PROTECTED] 50 [EMAIL PROTECTED] 31 [EMAIL PROTECTED] 8 [EMAIL PROTECTED] - [EMAIL PROTECTED] - "who" disabled - sunder.net - "cypherpunks" not recognized - [EMAIL PRO

Cpunk Havenco

2000-06-04 Thread John Young
More information would be appreciated on Havenco, reported on by John Markoff in today's New York Times. It is a project to set up an off-shore data haven on Sealand, a former anti-aircraft structure six miles off the coast of England which declared itself a sovereign nation a few years back. Have

Microsoft Stonewalls NSA_key Exchange

2000-05-25 Thread John Young
Duncan Campbell has provided his latest exchanges with Microsoft on the NSA_key, which Microsoft has now refused to continue (see letter below): http://cryptome.org/nsakey-ms-dc.htm - 12 May 2000 Dear Richard [Purcell, Director of Corporate Privacy, Microsoft], You will recall talking

htaccess help

2000-05-19 Thread John Young
We need help on analyzing the adverse effect of using .htaccess to block misbehaving IP addresses. We first installed the file in September 1999 to block a single looping machine at kisa.or.kr. Then added a few more as such loopings occurred from other addresses. Recently we discovered that near

Re: Did MI5 finally kill John Young?

2000-05-12 Thread John Young
Cryptome is down due to a glitch in switching to a new server. Should be up again today, unless this is MI5 sucking your brain.

MPAA v. 2600 Defendants' Reply Brief

2000-05-04 Thread John Young
rations by: Harold Abelson Andrew Appel Chris DiBona Bruce Fries Martin Garbus John Gilmore Robin Gross Lewis Kurlantzick Eben Moglen Matt Pavlovich Bruce Schneier Barbara Simons Frank Stevenson Dave Touretsky David Wagner John Young

Updated A5/1 Paper

2000-04-27 Thread John Young
Adi Shamir has provided "Real Time Cryptanalysis of A5/1 on a PC," an 18-page paper by Alex Biryukov, Adi Shamir and David Wagner presented at the Fast Encryption Software Workshop in New York City on April 10. It is an updated version of the December 1999 preliminary draft by Biryukov and Sham

MI5 Asks FBI Help

2000-04-23 Thread John Young
The UK Sunday Times reports today: http://www.the-times.co.uk/news/pages/sti/2000/04/23/stinwenws01014.html "MI5 has requested the assistance of the American Federal Bureau of Investigation in tracking down and erasing copies of the document from the internet. Officials are particula

CIA on GAK

2000-04-23 Thread John Young
Greg Broiles has provided two FOIA documents from the CIA in September 1996 to Clinton and Gore on the US's plan to promote key recovery encryption worldwide, to assure continued US dominance of the cryptography market and to fulfill the wishes of intel and law enforcement of the US and allies

Re: Looking for Jim Bell

2000-04-14 Thread John Young
Now how in hell can it be determined if Jim is wolfing for the feds to bring in the lambs? What the hell has he been fabricating for Jessica Stern and Declan, and whose names are they taking to report on and testify against next, quoting Jim's amazingly selective memory? What the hell is this na

Re: Re: Crypto-Anarchy/Anarcho-Capitalist Errors in Understanding

2000-04-12 Thread John Young
Jim, Your understated messages, following quotes of those by Declan McCullagh and Tim May, are the best ever, I think. I am dumbfounded by their profundity, subtlety, eloquence, impenetrability, clarity, wit, generosity, amazing gracefulness. How do you do it? The purity of an unmarked canvas.

Why Crypto Fails Privacy

2000-04-11 Thread John Young
During a break in FSE yesterday Ross Anderson offered comments on why crypto could not protect privacy against weak comprehensive systems security. Much of what he said was confirmed by the news report today on new Dutch privacy invasion law for intelligence and law enforcement. He stated tha

Re: Republican Leadership's dot.gov Scam?

2000-04-09 Thread John Young
"We" is .gov victims. Who aren't going to take it anymore. We are going to assure that governments do the right thing, wither away. Enough is enough. We are certain that if good people insist on government wither that will make it happen. We are not naive. We know that government works hard to

Re: Republican Leadership's dot.gov Scam?

2000-04-08 Thread John Young
Moreover, it is fairly common for government agencies to contract with a commercial service for Web services, one reason is for more reliable service than is available on government servers. Other agencies use commercial ISPs to cloak their surfing activities. Law enforcement and intelligence agen

Net Moles

2000-04-01 Thread John Young
France's Le Monde yesterday had a long piece on Echelon which closed with speculation about alleged ex-spies going into commerce around the world as moles and reporting back economic espionage to the agencies which sent them out for this purpose under guise of downsizing, or as with undercover na

Net Libel

2000-04-01 Thread John Young
The NYT today reports on the UK's Demon Internet paying a wad of money to Laurence Godfrey, a physicist allegedly libeled on a news group, soc.culture.thai, first on January 12, 1997, there again later, and subsequently on uk.legal. Phill Hallam-Baker is mentioned as having been required in a

Cellular Modem TEMPEST

2000-03-27 Thread John Young
Last summer World Net Daily published an article on a hacker group called "Hong Kong Blondes" in which the hackers claimed that compromising electromagnetic emanations from computer equipment could be acquired up by cellular modems. Can cellular modems be used for this purpose? If so, what is i

MPAA v. 2600

2000-03-23 Thread John Young
Martin Garbus, an internationally distinguished New York attorney, and his firm have been retained by the defense in the New York MPAA DeCSS case. Two of the three defendants have withdrawn under consent agreements, leaving only the magasine 2600, which succeeds its publisher, Emmanuel Goldste

Re: French InfoSec Initiative

2000-03-16 Thread John Young
Barney Wolff wrote: >IR != RF. Woops, I screwed that. Here is the original French, and I'd appreciate an accurate translation of "radioélectrique." First I thought it was electromagnetic, then radio-frequency, then infra-red. My native language is grunt, s'il vous plait. - Les risques inhé

French InfoSec Initiative

2000-03-16 Thread John Young
Yesterday France initiated a new information security administration whose aim is to counter the panoply of digital threats involving economic espionage, cryptology, TEMPEST, snooping, PW snarfing, DDoS, Echelon and a few that are new to me: http://cryptome.org/dcssi.htm It recounts a bit o

Cryptome CD

2000-03-14 Thread John Young
Cryptome offers a CD of the full archive from June 1996 to March 14, 2000. About 4,000 files, with hyperlinked lists of contents, 300MB. Price $100. E-mail requests with mailing address to: <[EMAIL PROTECTED]>. Pay after you get it.

RE: Brands on privacy

2000-03-05 Thread John Young
Austin Hill wrote: >If within these functions, there exists a market demand for payor and payee >anonymous digital cash, then you can be assured that some ambitious startup >will license from us and attack that market. I would appreciate being placed as close to the front of that applicant list

RE: Vin McLellan & Charles Mudd On Denial of Service Attacks

2000-03-05 Thread John Young
>>Ooops, sorry Tim! On the net you both look alike you know. >>I'll get it right in the book. > >Still not right. And getting farther off the mark. From the surveillance video I've seen John and Tim do not look alike. When streaking for a hot tub one wears a modesty apron, for example, the othe

Re: Shimomura, Markoff, and Packet Sniffers

2000-03-04 Thread John Young
No, I had not read the early archives, at the time I got on board there was plenty going on to electrify 6 inches of callus off my near-dead carcass. Then, later, the early stuff disappeared with Bilblio, when I had assumed it would be around whenever needed. And, then the Cyphernomicon was a r

Re: Vin McLellan & Charles Mudd On Denial of Service Attacks

2000-03-04 Thread John Young
It's worth pondering what demonization and criminalization may evolve from close study of the early Cypherpunk archives made availalble a few days ago by Ralph Seberry : http://lanesbry.com/cypherpunks After a fews days of reading those remarkable exchanges, it would be a surprise if they ar

Re: Vin McLellan & Charles Mudd On Denial of Service Attacks

2000-03-04 Thread John Young
Phill wrote: >I know enough people who were involved in the previous investigations >of Mitnick to corroborate the points I made, namely that Mitnick is a nasty >piece of work and a pathetic loser rather than the harmless chap his >defence attorney would have people believe. Watching Mitnick y

Cylink Doc

2000-03-03 Thread John Young
A provocative document on Cylink has been put on Cryptome today: http://cryptome.org/cylinked.htm Confirmations, supplements and rebuttals welcomed. Bill Crowell has been invited to give Cylink's response. Excerpt: 41. Which United States agency recruited Cylink to work with the KGB tra

Re: The price of bread in Romania

2000-03-03 Thread John Young
Robert Hettinga wrote: >> Well, it seems that we're arguing about word definitions, which is a most >> stupid thing to do. > >Sorry if you feel that way. I was just going for a laugh, and not really >arguing with you at all... Charlie Trie said the same in Congress a few days ago, when explaini

Hotmail

2000-03-01 Thread John Young
What is going around as a way to warn users of Hotmail that the originating address is not concealed, as with Alex Rogers below? We got Hotmail the other day claiming that Queen Elizabeth was to be assassinated by thugs hired by Mohammah al-Fayed in Sidney, Australia, in March. Our response ask

BXA Updated Crypto Regs

2000-03-01 Thread John Young
BXA Updated Commercial Encryption Export Controls February 28, 2000 http://www.bxa.doc.gov/Encryption/Default.htm This provides links to the following: Export of Encryption Technology http://www.bxa.doc.gov/Encryption/tech.htm Updated Q&A http://www.bxa.doc.gov/Encryption/qanda.htm E

RE: Crypto Framing in Britain

2000-02-26 Thread John Young
Uni wrote: >Not at all what I am talking about. But then again, I've never been >disappointed (with noted exceptions) by the inability to read displayed by >the masses of this list. Let us remain calm at Uni's mock taunt. We know cypherpunks *write* code, they do not read, period, knowing full

Re: Damn french ;-) (Re: damn commie hypocrite leech! (was Re: Re: Re: why worry?))

2000-02-26 Thread John Young
Okay, Robert, who wore a thong monokini at FC00? Who's got implants since FC99, unable to face the naked ridicule at 00? Were infections running wild as predicted? Who died? Where'd you stash the carcass, sewing a pickled corpse in a donkey's stomach, head out the navel, aint novel, well, not

First Echelon Source

2000-02-25 Thread John Young
Making history: the original source for the 1988 first Echelon report steps forward London, Friday 25 February, 2000 By Duncan Campbell In the circumstances of the extensive worldwide political and media attention that is currently focussed on the Echelon communications surveillance networ

Re: Alternative To Handguns Package (fwd)

2000-02-25 Thread John Young
Randolph Graham wrote: >1) If someone comes to rape you, Kill them. >2) If someone comes to rob you, Kill them >3) If someone comes to carjack you, Kill them >4) If someone comes to murder you, Kill them. >5) If someone comes to abduct you, Kill them. > >After you have killed these five, your l

EuroParl Echelon Report 5

2000-02-24 Thread John Young
Following the four EuroParl reports last year on Echelon and electronic surveillance in general, a fifth report has appeared, dated October 1999, but as far as we know not heretofore widely publicized: http://cryptome.org/dst-pa.htm (108K) This report briefly outlines the first four and the

BXA on Bernstein Inquiry

2000-02-22 Thread John Young
Thanks to Cindy Cohn and Lee Tien we offer BXA's four-page response to Bernstein's request for clarification of the new encryption export regulations, February 18, 2000: http://cryptome.org/bxa-bernstein.htm Excerpts, by James Lewis, BXA: You ask for an advisory opinion in light of your co

60 Minutes Does Echelon

2000-02-21 Thread John Young
Echelon will get a segment on 60 Minutes, February 27, this coming Sunday, according to Margaret Newsham, an ex-employee of Lockheed Martin, who worked at NSA's Menwith Hill Station and trained agency personnel, and who testified in a secret congressional hearing in the 80s. She'll be a main pla

Re: e-gold: Frozen accounts, returned funds, a few of my favorite things...

2000-02-21 Thread John Young
Sounds as if e-gold got hit by a n undercoverbanking op aping a Diallo. Has there been an ID of the fake 13-year-old that baby-dolled the meet-me-at-Dariy Queen? Why has NSA been breaking into banks and governments? As Madsen claims. Or is it Shimomura aping a rogue state?

Re: MS Funded/Founded by NSA?

2000-02-19 Thread John Young
Tim May wrote: >Cryptome site (and sites that preceeded this exact >name). Wah, I didn't know that. I'd like to credit those. Indeed, giving credit is what keeps Cryptome going, for nearly all of it comes from contributions by others, especially Cypherpunks and its offshoots and graduates. I

Re: MS Funded/Founded by NSA?

2000-02-19 Thread John Young
This list is the first place I heard of Echelon, and a lot of other things, from crypto to TEMPEST and more. Maybe it's not at the moment at its peak level on politico-technology, but nuggets continue to appear, particularly those which provide a densepack of information dressed up with enligh

Re: MS Funded/Founded by NSA?

2000-02-19 Thread John Young
Very well, your rebuttal would be an informative addition to the file, if you don't object. To pick up on a couple of your points: There should be a sustained burst of activity from Europe on the Echelon affair as EuroParl deliberates on it, guided by the four 1999 Echelon reports prepared by

MS Funded/Founded by NSA?

2000-02-19 Thread John Young
A French intelligence report alleges that Microsoft was set up with NSA funding and that NSA imposed MS-DOS on IBM, and also alleges that NSA agents are now working at Microsoft: http://cryptome.org/nsa-ms-spy.htm The full confidential report has not been published and these allegations are

CCIA Comments on DMCA

2000-02-17 Thread John Young
Sent to the Copyright Office today: DMCA Comments by Computers & Communications Industry Association [Excerpt from: http://cryptome.org/dmca-ccia.htm] "The Computer & Communications Industry Association (CCIA) strongly supported ratification and implementation of the World Intellectual Prope

Snoop Protection

2000-02-17 Thread John Young
Peter Lewis writes in today's NY Times about a couple of programs that will (1) check your computer ports to see if any are open to Net trollers looking for logged on boxes to host DDoS and such, and (2) block such trolls. 1. The checking service is Steve Gibson's site: www.grc.com 2. The

Re: Re: why worry?

2000-02-16 Thread John Young
Tim May wrote: >Millions in America need killing. This is taken out of the property is theft context, still it rings true as if eternal oracle. Some want more customers, some want fewer social leeches, some want more slaves for their life style, some want fewer vote thieves and more dead elect

Re: Choate Detritus Revisited

2000-02-16 Thread John Young
The Org's put a tail on Jim in Austin, and rigged taps on his telecomm cables, and emanation snags on his water and sewage piping, and put an illegal family of Mexican narcs out of Matamoros planting Middle East saltpeter in his double-wide, and locked a geostationary bird to slurp residual k

Kadaffi Report

2000-02-14 Thread John Young
We offer the 1995 secret UK report on the plot to overthrow Kadaffi reported in Britain Saturday: http://cryptome.org/qadahfi-plot.htm

Re: Top Secret Report on Kadaffi Plot

2000-02-13 Thread John Young
We've been told the report has been taken down from the Yahoo site by someone who learned the URL and found it gone already. HMG acted faster this time -- The Times report first appeared on Saturday and by then the gov knew about the offering. Any lead to a copy would be welcome. Ready to host i

Top Secret Report on Kadaffi Plot

2000-02-13 Thread John Young
We would appreciate the URL for this report. The Sunday Times, today; http://www.the-times.co.uk/news/pages/Times/frontpage.html?1124027 "A top-secret report linking MI6 with a failed attempt to assassinate Colonel Gadaffi appeared on an American internet site yesterday, refuting Robin Cook

Re: Good Christ!

2000-02-11 Thread John Young
The story that's intriguing is that the cyber-attacks are the work of the dark side of NSA, the ones opposed to the new DIRNSA's housecleaning and deadwood chopping. A warning No. 3 after the brownout of the intel sat receiving stations (No. 1) and the computer meltdown (No. 2). Civilians Barba

DMCA Comments Due

2000-02-09 Thread John Young
Forward: Date: Wed, 9 Feb 2000 23:02:12 -0500 Sender: Law & Policy of Computer Communications <[EMAIL PROTECTED]> From: Seth Finkelstein <[EMAIL PROTECTED]> Subject: DMCA Anti-Circumvention comments - deadline Feb 17 To: [EMAIL PROTECTED] Did you lik

Re: Re: CDR: Re: Nietzsche as the G”del of Philosophy

2000-02-08 Thread John Young
Aaron existentially emissioned: > Mental masturbation doesn't actualize anything. Out of 35 years devoted to gobbling everything emissed by this list(s) Aaron's takes the Petard Prize. And all the rest of you, yes each and every subscriber, poster, lurker, snoozer, spy, got to blow through the

MPAA Anti-Piracy Invite

2000-02-08 Thread John Young
Cryptome got a demand letter from the MPAA Anti-Priacy Unit yesterday to remove DeCSS as well as to immediately perform other unnatural acts: http://cryptome.org/dvd-mpaa-ccd.htm A number of responses to the letter have come in which might be of interest here: http://cryptome.org/dvd-mp

Re: Boston flights to FC00

2000-02-08 Thread John Young
Ray Hirschfield wrote: >We welcome serious proposals for hosting future meetings of the FC >conference at locations other than Anguilla. If you would like to >submit one, please contact Adam Shostack <[EMAIL PROTECTED]>. If one is held at Tim's spread I would attend. From accounts of his unbou

DeCSS MPAA New York Opinion

2000-02-03 Thread John Young
Judge Kaplan has issued his Memorandum Opinion in the DeCSS MPAA v. 3 suit in New York: http://www.nysd.uscourts.gov/courtweb/pdf/00-01149.PDF We offer an HTML version: http://cryptome.org/dvd-mpaa-3-mo.htm Judge Kaplan aims at settling the code as expression dispute, citing Bernstein,

Cypherpunks Stats

2000-02-01 Thread John Young
1 Feb 2000 Unedited 762 Algebra218 SSZ 44 Cyberpass 12 Total 1036 Are there other CDRs? Majordomo at toad says there's no plain cypherpunks, so it looks as though subs to toad go to unedited. Except mail to [EMAIL PROTECTED] comes through from toad and it al

Pardon 2

2000-02-01 Thread John Young
Just learned that I was axed by Cyberpass in the last few days and have re-subbed. So: Anybody attending Linux World Expo in New York this week? BTW, there are only 12 subscribers on Cyberpass. Who snatched the bodies?

Pardon

2000-02-01 Thread John Young
Who's attending Linux World Expo in New York this week?