very modest sophistication
from capturing the over the air in the clear transport stream and
passing it around on P2P networks or whatever - there is already plenty
of PCI hardware out there to receive ATSC transmissions (MyHD and many
others) and supply the transport stream to software running on
recovering data from one
of those at a distance using a good telescope may be possible and most
people don't think of the gentle flicker of the LED as carrying actual
information that could be intercepted.
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass 02493
mpletely shitfaced getting off the
helo at the WH on the way back from campaigning in Johnstown Pa this
past Thursday ? Too much pressure to keep that Jim Beam bottle in
the cabinet... one almost can't blame him...
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass 02493
their interests...
Of course the headers of jpegs from cameras (and maybe
elsewhere) often contain serial numbers and other identifying
information so to the first order this is irrelevant to average users,
but interesting none the less.
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE
w.cellular-news.com/story/11407.shtml
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass 02493
apping
virtually anything in digital format - at least by copying it from a
storage device such as a latch inside the communications equipment that
properly carries the traffic - is perfectly legal without exception
under this absurd ruling.
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass 02493
ting compared to other methods of obtaining the same information
(such as black bag jobs with disk copiers and use of trojans to capture
passphrases).
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass 02493
than the expected places...
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass 02493
e LEAs will be
difficult to resolve both legally and in practical terms, given the
architecture of modern telecommunications networks, they add.
www.telecomweb.com
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass 02493
e content" to pass over its
wires under such a scheme.
And once one must register to obtain certificates for Palladium/NGSCB
attestation, one really does have a form of net drivers license.
> steve
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass 02493
goals are...
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass 02493
PGP fingerprint 1024D/8074C7AB 094B E58B 4F74 00C2 D8A6 B987 FB7D F8BA 8074 C7AB
nitor public safety
communications (expressly permitted under federal law) might fall under
this rubric too, as the public safety agencies may not have give
express consent. Under the Mass. bill this would criminalize mere
possession of such radio equipment.
--
Dave Emery N1PRE, [
hs
old would be very much less interesting in most cases than near real
time intercepts - particularly of targets like terrorists.
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass.
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18
ear.
The loop also incorporates an NSA facility that does
something (can't imagine what ;-) on the fiber.
Doug
Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
- End forwarded message -
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, We
tity MIGHT have grabbed your
keys or crypto chips, you have to take precautions (changing keys and
so forth) which cost lots of money so trying to find the crypto box
and the chips and keys makes a lot of sense as it save considerable
effort and expense later on.
--
Dave Emery N1PRE,
So how real is the threat - what does it cost to have it done
and how expensive is the gear ? Who actually has working setups in use ?
And how many layers down can they really read ? And with what BER ?
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass.
PGP
te by developing the latent image
and making either an optical or contact print of it on a similar medium.
>
> Comments, hints, keywords to look up?
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass.
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18
me exact results.
Thus it seems that at least around the wealthy Boston suburbs
they have already made it impossible to make a long distance coin
call, and one presumes this is for obvious reasons...
We are closer to the police state that everyone fears than
we know....
--
rab terrorists to me....
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass.
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18
On Wed, Nov 20, 2002 at 12:40:26AM -0500, Declan McCullagh wrote:
> On Fri, Nov 15, 2002 at 10:48:37PM -0500, Dave Emery wrote:
> > I might hasten to add that as I am sure Declan knows, this
> > addition to the Homeland Defense Act also includes the CSEA provisions
>
On Fri, Nov 15, 2002 at 10:20:42PM -0800, Steve Schear wrote:
> At 11:59 PM 11/15/2002 -0500, Dave Emery wrote:
> >And I am on record as advising some of the folks doing gnu-radio
> >that in my personal opinion it was rather unlikely that a user
> >programmable open
ds of hams for use on ham bands (and more such
ham projects appear every day).
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass.
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18
those the government doesn't
approve of... they certainly won't increase communications privacy
or security and may in fact decrease it if they allow the draconian
penalties to be used as an excuse for not spending the money to
implement secure and effective encryption of anything sensit
On Mon, Oct 28, 2002 at 09:32:48PM -0500, Tyler Durden wrote:
> Any chance this is the same Dave Emery who does the radio broadcasts? (I
> listen from WFMU). If so, man! If a tiny fraction of the stuff you have
> said over the years is true, well...brrr. A good example is "Los Ami
On Mon, Oct 28, 2002 at 02:56:29PM -0800, Richard Crisp wrote:
> hmm, it seems to me that video riding in a stegano fashion on a cell phone
> call would exceed the bandwidth capability of the channel. It's one thing to
> send a single image steganographically on a cell call, but it is another to
>
uld apply and trump everything else - especially
if you are a ham as most of the 2.4 ghz 802.11b band is also allocated
as a ham band. I know of no court tests of whether the cordless phone
prohibitions (with cordless phones at both 2.4 ghz and 900 mhz which
are both ham bands too) apply to hams intercepting cordless phones that
also operate in those bands... nor how that impacts WEP interception.
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass.
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18
(which of
course most scanner list intercepts are).
Thus the legal climate has fundamentally changed, and one can
assume that since the Bush administration has been pushing for the
passage of this bill that they perhaps intend to start prosecuting at
least some category of radio u
t
raw public votes will control over Hollywood money.
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass.
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18
28 matches
Mail list logo