Re: About 5yr. log retention

2000-12-05 Thread John Young
Here's the source for the data preservation requirement: http://www.usdoj.gov/criminal/cybercrime/COEFAQs.htm Preservation is not a new idea; it has been the law in the United States for nearly five years. 18 U.S.C. 2703(f) requires an electronic communications service provider to "take

IBM Uses Keystroke-monitoring in NJ Mob Case (was Re: BNA'sInternet Law News (ILN) - 12/5/00)

2000-12-05 Thread R. A. Hettinga
At 8:30 AM -0500 on 12/5/00, BNA Highlights wrote: KEYSTROKE MONITORING AND THE SOPRANOS A federal gambling case against the son of a New Jersey mob boss may provide the courts with the opportunity to weigh in on the privacy issues surrounding keystroke monitoring. The FBI's surveillance

ip: Chaos Theory

2000-12-05 Thread R. A. Hettinga
A nice rant, below, from a fellow anarcho-capitalist lapsed conservative apparently Hillsdale College grad. [I swear, folks, I *tried* snipping this to relevant bits. :-). I mean, there's a URL in it and all, and, admittedly, he's preaching to the choir around here, but this is nicely done that

Sex abuse Denver Need Help

2000-12-05 Thread PAul
Ritual Satanic Ritual Abuse in Denver Need Help HI and Prrraise the Lord: My wife Rev. Helen ( [EMAIL PROTECTED] ) got the following e mail message. I didn't know what to do with it. Maybe you know someone that can check this out or pass it on to someone in the Denver area. I sent it

I Need Your Help :)

2000-12-05 Thread Company Nurse
I am currently doing market research for a client -- Company Nurse(r). They reduce your worker's compensation Insurance cost. I was interested in finding out what advantages you see for your company to use Company Nurse. I have included some basis information for your review. I would really

Re: ecash, cut choose and private credentials (Re: Jim Bell)

2000-12-05 Thread lcs Mixmaster Remailer
Adam Back wrote: I think the thing that killed MT / digicash for this application was MT at the time was reported to be closing accounts related to pornography -- they apparently didn't want the reputation for providing payment mechanisms for the porn industry or something. James Donald

Re: CDR: Re: manual crypto

2000-12-05 Thread lcs Mixmaster Remailer
There's no particular need to make it a single-image random dot stereogram. Double images are much easier to make and provide an extra bonus (see below). Here is an example from a post to cypherpunks on September 23, 1997: VGhpcyBpcyBhIHRlc3Qg VGhpcyBpcyBhIHRlc3Qg bWVzc2FnZSB3aGljaCBp

Keystroke-monitoring in NJ Mob Case

2000-12-05 Thread David Lesher
re: the keystroke sniffer: http://inq.philly.com/content/inquirer/2000/12/04/front_page/JMOB04.htm The FBI application is at: http://www.epic.org/crypto/breakin/application.pdf The court order is at: http://www.epic.org/crypto/breakin/order.pdf -- A host is a host from coast to

Re: IBM Uses Keystroke-monitoring in NJ Mob Case (was Re: BNA's Internet Law News (ILN) - 12/5/00)

2000-12-05 Thread R. A. Hettinga
At 2:58 PM -0500 on 12/5/00, Somebody wrote: So what does this have to do with IBM? Oops. Somehow I conflated IBM with FBI? It was merely a typo. Really it was. Pay no attention to the man behind the curtain... Of course, (if) it turns out that IBM actually *built* a keyboard sniffer,

Re: IBM Uses Keystroke-monitoring in NJ Mob Case (was Re:BNA'sInternet Law News (ILN) - 12/5/00)

2000-12-05 Thread R. A. Hettinga
--- begin forwarded text Date: Tue, 05 Dec 2000 08:47:20 -0800 From: Somebody To: "R. A. Hettinga" [EMAIL PROTECTED] Subject: Re: IBM Uses Keystroke-monitoring in NJ Mob Case (was Re: BNA'sInternet Law News (ILN) - 12/5/00) An instructive case. Apparently they used the keystroke monitoring

Re: About 5yr. log retention

2000-12-05 Thread Greg Newby
On Tue, Dec 05, 2000 at 07:05:37PM -0500, John Young wrote: The lilly-livered sys admins who betray people's trust in their systems are a plague on the Internet, all braying about the need to secure their systems from bad users, and all of them -- along with their bosses and investors who

Destruction of evidence

2000-12-05 Thread Greg Broiles
On Tue, Dec 05, 2000 at 06:06:41PM -0800, [EMAIL PROTECTED] wrote: To prove destruction of evidence you must prove that it existed in a form that was retrievable ( good luck ) and then that its destruction was done by a person who was aware of the crime ( not always so in the networking world

ecash, cut choose and private credentials

2000-12-05 Thread R. A. Hettinga
I'm misattributed below, at least as far as the quoted content goes, anyway. :-). A victim of misplaced forward references, and certainly not deliberate, I'm sure. Cheers, RAH --- begin forwarded text From: "Trotter, Frank" [EMAIL PROTECTED] To: Digital Bearer Settlement List [EMAIL

Secure communications + Human rights

2000-12-05 Thread R. A. Hettinga
--- begin forwarded text From: [EMAIL PROTECTED] Date: Tue, 05 Dec 2000 22:02:18 -0500 To: [EMAIL PROTECTED] Subject: Secure communications + Human rights Sender: [EMAIL PROTECTED] Technomads, Good day from Western Australia! I recently met with Peace Brigades International (PBI)

damsel in distress

2000-12-05 Thread Jill Flomenhoft
Help! Can anyone refer me to a copy of the film "Cryptic Seduction" (1998)? I can't find it anywhere... Many thanks, Jill

Data Logs

2000-12-05 Thread mmotyka
Jim, The bloke with the extra ventilation notwithstanding, with an open OS and open applications it seems easy to do pretty much whatever you want with disk data and logs regardless of what the letter of the law says. Electronic data is so malleable that its use as evidence seems questionable to

Hello, You're Dead

2000-12-05 Thread Dave Del Torto
http://www.abcnews.go.com/sections/world/DailyNews/phone001205.html "...Hitting the 5, 6, 7 and 8 buttons on the phone gun fires four .22-caliber rounds in quick succession. ..." OK, so I can accept that only Mad Dogs (Home Office) Englishmen may be looney enough to sit around under the