| Cryptome |
DECEMBER 2001 |
| Search |
+ At Cryptome.org | ^ At
Cartome.org | * At Nunce.org
|
Echelon
| NSA
TEMPEST Series | |
wtc122901.htm + WTC Area Photos December 29, 2001 December 29, 2001 fcc-x-linux.htm + FCC Bars LINUX from Universal Licensing System December 29, 2001 fox-il-spy.htm + Yanked Fox News Reports on Israeli US Spying December 29, 2001 trulock-v-fbi.htm + Trulock Wins 1A Against Freeh, FBI Agents December 29, 2001 usa-v-rcr-dkt.htm + USA v. Richard C. Reid - Docket 12/28/01 December 29, 2001 usa-v-zm-dkt.htm + USA v. Zacarias Moussaoui - Docket 12/27/01 December 28, 2001 nrc122801.htm + NRC Conceals Nuke Risk Information December 28, 2001 fincen122801.txt + FinCEN Rule on Money Instruments, Suspicions December 28, 2001 dot122801.txt + DOT Sets Up Transportation Security Office December 28, 2001 pm121201.txt + Prez on Marine War Risk Insurance December 28, 2001 obl-yemen.htm + Some Say Bin Laden Escapes to Yemen December 28, 2001 dnfsb122701.txt + Nuke Safety Board Testimony and Records December 27, 2001 nsa-4th-view.htm + NSA's SHAMROCK - A View From the NSA Side December 26, 2001 wtc-dap.htm + WTC Disaster Action Plan for Business Recovery December 26, 2001 s1867-talk.txt + CYA Probe: How Did Terrorists Out-Fox US Gov? December 26, 2001 hr3448-talk.txt + Public Health Security/Anti-Bioterrorism Panic December 26, 2001 dos122601.txt + State Dept Boosts Two More Terrorist Orgs December 26, 2001 ustr122601.txt + Is Canada Intellectual Property Pirate? December 26, 2001 istac-bend.htm + What Is ISTAC at Bend, Oregon? December 24, 2001 tbw-paper.htm + Thermobaric Tunnel Buster Briefing Paper December 24, 2001 ford-v-2600.htm + 2600 Wins in fuckgeneralmotors.com December 23, 2001 void-to-avoid.htm + How to Avoid Building Ground Zeros December 22, 2001 intel-probe.htm + Call for Commission on Terrorist Attacks December 21, 2001 usaid-afghan.htm + USAID's Natsios on Afghanistan's Reconstruction December 21, 2001 gao-nnsa.htm + Nuclear Weapons: Status of Stockpile Extension December 21, 2001 doj122101.txt + Rule on September 11 Victim Compensation Fund December 21, 2001
O f f s i t e Cop Rot ACLU Exposes Baltimore Cops Secret Spy Fund /JG December 29, 2001 AU Panic AU Secret Police Get New Powers /A December 28, 2001 mi-fm Military Intelligence /RE December 27, 2001 AAAT An Analysis of Al-Qaida Tradecraft December 26, 2001 FLT63 Passenger Report on Flight 63 to Miami /BD December 26, 2001 Vile Cops Cops Vile Snooping Software Downloads /Z December 24, 2001 Panic 7 Homeland Security, Homeland Profits /WM/DB December 23, 2001 Brand Dead New York Style Beside Sorrow December 23, 2001 Panic 6 More UK Stale US-Ape Terrorist Alarms /A December 21, 2001 UK ATCS 2001 Anti-terrorism, Crime and Security Act 2001 /OB December 21, 2001 GB Idiots The crime of distributed computing /J December 21, 2001 Lindows Winux /RH December 20, 2001 Navy Zap ^ Sonar Impulse Trauma Kills Whales December 20, 2001 Euro Key Euro bank notes to embed RFID chips by 2005 /A December 20, 2001 DoD 2 US Expands Investigation of Software Piracy /M December 20, 2001
"Contact your State Representative, Senators and the Federal Communication Commission Officers about a issue that is causing ALL UNIX/Linux and Apple users a problem. It seems that the FCC has chosen to exclude all NON Microshaft NT/95 users from being able to use their Internet Universal Licensing System which they have requested FCC Licenses holder to use for license renewals.
The problem is that it requires a JavaScript Plug-in that is a Microsoft product only.
Simply go to "http://wireless.fcc.gov/uls" and then select "ONLINE FILING". I believe this to be the complete path to the failure. Which is "This plug-in only runs on Windows NT/95".
We need to protect the finest operating system from being excluded from the United States by our Government Officials."
-- Donn Washburn, FCC Bars LINUX from Universal Licensing System, December 29, 2001
Notra Trulock served as the Director of the Office of Intelligence
of the U.S. Department of Energy ("DOE") from 1994 to 1998. From
1995 to 1998, Trulock also served as the DOE's Director of the
Office of Counterintelligence. Trulock alleges that he uncovered evi-
dence that Chinese spies had systematically penetrated U.S. weapons
laboratories, most significantly the Los Alamos Nuclear Laboratory.
Trulock contends that the White House, the FBI, and the Central
Intelligence Agency ("CIA") ignored his repeated warnings about the
espionage. Congress eventually learned of the security breach and in
1998 invited Trulock to testify, which he did on several occasions.
That same year, Trulock was demoted within the DOE; he was ulti-
mately forced out in 1999.
In early 2000, Trulock wrote an account of his findings, which crit-
icized the White House, the DOE, the FBI, and the CIA for turning
a blind eye to the security breach. Trulock claims that the manuscript
did not include any classified information. Nonetheless, in March of
2000, Trulock submitted the manuscript to the DOE for a security
review, but the DOE declined to examine it. Afterward, Trulock sent
the manuscript to the National Review, which published an excerpt in
an edition that was circulated in early July of 2000. Although neither
side placed the article in the record, the parties agree that it charged
the administration with incompetence. ...
In his final claim, Trulock alleges that the Defendants trammeled
his First Amendment right to free speech by retaliating for his
National Review article. The district court dismissed Trulock's claim,
holding that "other than the timing of the interrogation and search, the
complaint presents no indication that the actions by the Defendants
were other than a good faith effort to determine whether classified
information was being unlawfully possessed." (J.A. at 43.) We must
disagree.
The First Amendment guarantees an individual the right to speak
freely, including the right to criticize the government and government
officials.8 New York Times v. Sullivan, 376 U.S. 254, 273 (1964);
accord Barrett v. Harrington, 130 F.3d 246, 264 (6th Cir. 1997). To
protect that right, public officials are prohibited from retaliating
against individuals who criticize them. Suarez Corp. Indus. v.
McGraw, 202 F.3d 676, 685 (4th Cir. 2000). Fear of retaliation may
chill an individual's speech, and, therefore, permit the government to
"`produce a result which [it] could not command directly.'" Perry v.
Sinderman, 408 U.S. 593, 597 (1972) (alterations in original)(citation
omitted); ACLU v. Wicomico County, Md., 999 F.2d 780, 785 (4th
Cir. 1993).
To establish a First Amendment retaliation claim, a plaintiff must
prove three elements: (i) that his speech was protected; (ii) that the
defendant's alleged retaliatory action adversely affected his constitu-
tionally protected speech; and (iii) that a causal relationship existed
between his speech and the defendant's retaliatory action. Suarez, 202
F.3d at 685-86.
In count two of the complaint, Trulock alleges that the Defendants
retaliated against him for publishing the critical article. The Defen-
dants argue that dismissal was justified because: (i) the complaint
does not allege facts which, if proven, would show the causal rela-
tionship between Trulock's speech and the Defendants' actions; and
(ii) the Defendants are entitled to qualified immunity.
Whether Trulock's claim can survive a motion for summary judg-
ment remains to be seen, but we find that Trulock has alleged suffi-
cient facts in support of his retaliation claim to withstand a motion to
dismiss and proceed to discovery. The complaint contains facts that
bolster Trulock's claim of improper motive. First, the timing of the
search raises an inference of retaliatory motive. Stever v. Independent
School District No. 625, 943 F.2d 845, 852 (8th Cir. 1991). The arti-
cle was published in early July 2000 and the search occurred on July
14, 2000. The article chastised the White House, the CIA, the DOE,
and the FBI, the very agency that executed the search. According to
the Plaintiffs, a criminal referral is necessary for the FBI to com-
mence an official investigation. The complaint alleges, however, that
the FBI initiated the investigation without receiving a criminal refer-
ral from the DOE. Sanchez told Conrad, on behalf of the FBI, that
there was a search warrant when there was none. Finally, two weeks
after the incident, Sanchez told Conrad that if she initiated a lawsuit,
Sanchez, to protect the "Bureau," would deny telling Conrad that the
FBI claimed to have a search warrant. All of these factors, when
viewed together and accepted as true, raise a reasonable inference that
the interrogation and search were retaliatory. We cannot conclude
beyond all doubt that Trulock can prove no set of facts in support of
his claim that would entitle him to relief.
-- Fourth Circuit Court of Appeals, Trulock, Conrad v. Louis Freeh, et al, FBI Agents, December 28, 2001
Notice is hereby given that by the following three petitions, the Nuclear Regulatory Commission (NRC) was requested to take immediate corrective actions to protect the public against the possibility of terrorists seizing control of a large commercial jetliner and crashing into a nuclear power plant in the United States.
1. From Mr. Norm Cohen, on behalf of the UNPLUG Salem Campaign, dated September 17, 2001. [http://unplugsalem.org/airplane.htm]
2. From Mr. Michael D. Kohn, on behalf of the National Whistleblower Center and Randy Robarge, dated October 24, 2001.
[http://www.whistleblowers.org/nrcpetition.htm]
3. From Messrs. Alex Matthiessen, and Karl Coplan, on behalf of the Riverkeeper, Inc., et al, dated November 8, 2001.
[http://www.riverkeeper.org/new/indianpoint/NRC_Petition.pdf]
The petitioners requested that the NRC staff take certain specified compensatory measures, to protect the public and environment from the catastrophic impact of a terrorist attack on a nuclear power plant or a spent fuel pool.
Since the subject of these petitions involves safeguards matters, the NRC has decided not to make the petitions public or publicly discuss the petitions to avoid disclosure of potentially sensitive security information.
-- Nuclear Regulatory Commission Conceals Nuclear Plant Threats, December 28, 2001
The New York Times Family Newspaper Hardcopy, December 27, 2001
Pompeii's Erotic Frescoes Awake
By Melinda Henneberger [Excerpt]
The eight surviving frescoes, painted in vivid gold, green and a red the color of dried blood, show graphic scenes of various sex acts and include the only known artistic representation of cunnilingus [scene III] from the Roman era, she said. Because each fresco is numbered, and each number corresponds to a picture of a box drawn underneath it, it is Dr. Jacobelli's theory that the depictions may have served as a kind of memory aid for customers who might have been more apt to forget that their clothes were in Locker 6, for example, than that they were in the box right under the group sex scene.
The last of the frescoes [scene VI], showing a man with monstrously enlarged testicles, is the clincher for Dr. Jacobelli. "This man had a disease, and the Romans, who were not known for their compassion, used to laugh at people with physical defects of all kinds," she said. "It all points to this being something to laugh at.
"A subsequent review by the President's Foreign Intelligence Advisory Board of the resulting limitations on intelligence collection found some troubling issues related to gaps and timeliness of responses to crisis. Others have expressed some concerns along the same lines. On balance, however, most objective officials would tend to agree that the procedures put into place and those authorized by the Foreign Intelligence Surveillance Act of 1978 have removed the ambiguity long troubling responsible officials over the last century. The rights and privacy of US persons are being protected even as technology changes because the primary focus is on the protection of the US person and only secondarily on the technology. That is perhaps the most significant contribution coming out of the long and difficult period during the investigations and the lawsuits and inquiries conducted after the committees and other investigating entities published their reports.
The controversy has not totally ended. There are those today who do not know or chose to ignore this history and the existence of the Executive Orders and the Foreign Intelligence Surveillance Act of 1978. Through the Internet and other media, they assert the existence of new technology and allege actions that they perceive violate the rights of US persons, They ignore the important point noted above, which is that the focus of the law and Executive Orders is on the protection of the rights and privacy of the person, not on specific types of technology.
In his article, Britt Snider concludes 'that NSA has been especially scrupulous' in abiding by the restrictions and requirements of law. I can readily support that conclusion. A strong and healthy General Counsel's office, usually headed by an experienced General Counsel drawn from practice outside of the Agency, provides daily guidance on intelligence collection operations. The NSA Signals Intelligence efforts are reviewed by the DOJ for compliance with the procedures and warrants, by the classified federal court for warrant compliance, and by the congressional committees for oversight purposes. In addition, as required by Executive Order, the NSA Inspector General continually reviews all operations organizations for compliance. Likewise, a special office within the DoD also conducts oversight reviews as do the inspectors general of the respective military services. There are few other outside activities in either the public or private sector that receive this level of continuing, detailed review. NSA employees and their military associates involved in Signals Intelligence operations are provided training and are required to be knowledgeable on all aspects of the procedures regardless of their grade or responsibility. The focus, when I retired, was on the protection of rights and privacy of the US person, as I am sure it remains today."
-- James Hudec, retired NSA executive, Unlucky SHAMROCK -- The View From the Other Side, Winter-Spring 2001
So far nothing about the Richard Reid incident distinguishes it from a low-level security test. Whether Reid was informed of his role by the operation planners could be questioned, and whether the planners were "terrorists" or the counter-terrorism industry.
Time Magazine, 31 December 2001:
"White House aides tell Time they are envisioning a war against terrorism that could last 50 years. As a model for fashioning a long-term game plan, Bush aides have been looking at old cold-war national-security documents, such as NSC-68, a plan the Truman Administration drafted in 1950 to contain the Soviets."
Terrorism is a godsend for those forever looking for terrifying enemies of the state, family, church.
Cryptome: Fox News, beginning mid-December, reported a four-part series on alleged Israeli spying on the US telecommunication systems through firms which provide telephone billing and assist FBI wiretaps. Recently the series was withdrawn by Fox News without explanation. The series has been recovered from private archives:
http://cryptome.org/fox-il-spy.htm
When the series first appeared it seemed to be another case of Israel bashing, in particular the parts that rehashed years-old allegations (we've linked to a 1996 GAO report cited by Fox, and other alleged participants' Web sites). And the series may well be calculated disinformation, if not by Fox then by its sources.
However, Fox's unexplained yanking the series is worth noting. Except for a few comments on the Net, there has been no mainline media follow-up on the reason for the yank. If Fox found that the reports are in error, that is the sort of thing that usually brings heat from competitors. If the withdrawal was due to government intervention that would indeed be news, but hardly unprecedented these days. If the yank was due to private intervention that too would be worth learning about -- who, when, why.
__________
Date: Thu, 20 Dec 2001 10:41:33 -0500
To: cryptography@wasabisystems.com
From: "Ronald L. Rivest" <rivest@mit.edu>
Subject: Israeli compromise of U.S. telecommunications?
I found the following four-part report by Carl Cameron rather shocking:
Part 1: http://www.foxnews.com/story/0,2933,40684,00.html
Part 2: http://www.foxnews.com/story/0,2933,40747,00.html
Part 3: http://www.foxnews.com/story/0,2933,40824,00.html
Part 4: http://www.foxnews.com/story/0,2933,40981,00.html
Why should we be freely giving to Israeli corporations information (call records, CALEA information) that requires court orders to obtain in this country? Such information is obviously sensitive, and the well-motivated efforts to strengthen and protect our national infrastructure should reasonably include mandating that such information not be routinely handled by any foreign entities...
A more recent story indicates that the compromise was probably severe; criminals were escaping detection because of the compromise:
http://www.newsmax.com/archives/articles/2001/12/18/224826.shtml
This vindicates concerns many of us have expressed over the years about creating single points of failure in wiretapping systems (e.g. the vulnerability of key escrow, etc.). Of course, in this case the vulnerability was intentionally created, it seems, by giving critical capabilities to foreign entities...
Ronald L. Rivest
Room 324, 200 Technology Square, Cambridge MA 02139
Tel 617-253-5880, Fax 617-258-9738, Email <rivest@mit.edu>
"A phalanx of software companies, consultants, and defense contractors stand to reap billions of dollars over the next few years by selling surveillance and information-gathering systems to government agencies and the private sector. Law enforcement agencies like the FBI already have at their disposal a massive information sharing network through which federal, state, local, and foreign police forces can exchange information on groups felt to pose a threat. The system, RISSNET, or Regional Information Sharing System Network, which existed before the September 11th attacks, recently got a boost when Congress authorized additional money for it in the USA PATRIOT Act. RISSNET is a secure intranet that connects 5,700 law enforcement agencies in all 50 states, as well as agencies in Ontario and Quebec, the District of Columbia, Guam, the U.S. Virgin Islands, Puerto Rico, and Australia.
Companies that are positioning themselves to help the government surveill the web came out in force at a recent Homeland Security Conference in Washington. They included Oracle, Microsoft, Information Builders, Choice Point, Man Tech, AMS, and Booz Allen & Hamilton. Government speakers from civilian and military agencies all stressed that they urgently need the technology to store surveillance-derived intelligence and exchange it with other agencies. If these corporations step up to the plate on developing new surveillance, monitoring, and biometric ID systems, they stand to make billions. Companies like Top Layer Networks, Inc. of Westboro, Massachusetts, are developing ways for FBI to install surveillance systems at a few key Internet hubs which would allow federal agents to remotely flip a switch and pound a few keys to begin monitoring the e-mail or web-based mail of any targeted group or individual. According to chief Top Layer engineer Ken Georgiades, the firm is working with a number of partners to develop new standards for the legal interception of communications at the Internet Service Provider level and at higher gigabit speeds.
The large defense and intelligence consulting and engineering firm Booz, Allen & Hamilton has not only developed the FBI's Carnivore capability but it has assisted the bureau in ensuring that all telecommunications companies engineer their systems to ensure they are "wiretap friendly." What if a target decides to use encryption to protect their e-mail from interception? That is not a problem for the FBI. Booz Allen & Hamilton has helped develop a system code-named Magic Lantern, which permits a virus containing a key logging program to be secretly transmitted to a recipient. After installing itself on the target's computer, any time the target types in a password to decrypt a message, that same password is immediately picked up by Magic Lantern and transmitted to the FBI. Essentially, the FBI has a virtual master key to break any encryption program used by a surveillance target.
The rush by the government to monitor the Internet has the backing of a group of federal contract research facilities that have pounded out report after report warning about the threat of cyberspace to national security. These "think tanks" include Rand Corporation and Analytical Services Corporation (ANSER). They are assisted in this policy laundering effort by the Center for Strategic and International Studies, the K Street rest home for former Pentagon, intelligence, and State Department political appointees. But all the technology in the world will not protect citizens from terrorist attacks, unless the government knows how to use the information effectively. As the government and a few selected companies and think tanks push for new surveillance laws and more monitoring of the Internet and telecommunications in general, the words of Mary Schiavo, the Transportation Department's former Inspector General and outspoken critic of lax airline security, are particularly poignant. Speaking in Washington on December 18, Schiavo pointed out that the "United States already had laws to prevent what happened on September 11th . . . they weren't being enforced."
-- Wayne Madsen, Homeland Security, Homeland Profits, December 21, 2001 (offsite)
"After Sept. 11, there was a lot of pontificating about how Americans would be forever changed and ennobled by the tragedy. We would no longer be cynical. Or jaded. Or rude. Or materialistic. Or shallow. Or sybaritic. We would rediscover what was primary and soulful, and banish the frivolous and decadent. Luxury and snob appeal would be gone. Warmth and simplicity would swaddle us. We are supposed to be in the era of the real rather than the pretentious, the warm rather than the cool, the fundamental rather than the grandiose. So we must ask: Is the vast new $40 million Prada store that has just opened not far from Ground Zero, trumpeted by the company as "the New York Epicenter" and designed by the hot architect Rem Koolhaas, a relic of our gluttonous ways or a resumption of them?
Seat cushions are made of medical orthopedic recovery gel. Video flat panels flash everywhere, with hyper-hip montages of Prada fashion shows (which you can't get into), the Prada America's Cup yacht (which you can't get onto) and attractive people in swimsuits (which you can't squeeze into). Like a museum, the store lovingly displays "unique luxury items" - white mink capes for $13,200, men's crocodile overnight bags for $19,000, black mink and leather-trimmed throws for $7,400, a Mongolian lamb pillow for $5,100. I ask a salesman how much a small ostrich overnight bag for men is. "It's $5,800," he says, sounding startled. "My, that's a good price."
The new dressing rooms are monuments to the old narcissism. With the press of a floor button, the doors go from clear to opaque, so other customers can't see you. You can press other buttons to see yourself in bright or night lighting, and a camera reflects your back view (whether you have the nerve to look or not). Designed back when movie stars, rather than firemen and police officers, were celebrities, the store offers a separate V.I.P. entrance for stars so they don't have to polloi with the hoi, and their own dressing rooms, which the Times architecture critic dubbed 'specialness alcoves.' The palace may be the surreal epicenter of downtown. But the real epicenter will always be the pit. And no matter what noisy glamour surrounds it, its quiet power will always haunt us.
-- Maureen Dowd, Style Beside Sorrow, December 23, 2001 (offsite)
Still, Guiliani is Man of the Year, picked by Time over Bin Laden upon instructions of the White House who preferred Rudy get the kiss of death and not challenge Bush in 2004.
"Questions about rebulding Ground Zero that initially seemed pressing -- taller towers versus lower ones; modernist plazas versus Ye Olde Towne Squares -- are moot. Even if Larry Silverstein, the leaseholder on the twin towers, feels compelled to produce designs to satisfy his insurers, no one else need think about new buildings yet.
In general, however, this phase was notable for the lack of substantial ideas it produced. Efforts to rally the city's architects resulted in rounds of meetings, organizational strategies, motivational pep talks and general scurrying. Eventually, those efforts could be pivotal in reframing architectural discourse in this country around issues of cultural weight. If so, it will be because of the monumental vacuum that this hyperactivity exposed.
What we face now, in fact, are twin voids, one local, the other global. The first arises from the abdication of the public sector in the area of city planning. The second comes from New York's isolation from the rest of the urbanizing globe. Both stem from the collapse of historical perspective under the pressures of privatization.
The aggressive response of corporate architecture firms and their developer clients to the terrorist attacks was not New York architecture's finest hour. Nonetheless, much of this behavior can be diagnosed as a symptom of the privatization of city planning over the last two decades. Never has this surrender of civic responsibility been more starkly illustrated than in recent weeks.
'We should think like capitalists, not like Communists,' Mayor Rudolph W. Giuliani said in his budget address earlier this year. The implied equation of the commonweal with the Cominterm sums up a role reversal that began during the Koch administration and is now nearly complete. City officials scurry about like Mickey Mouse entrepreneurs, plotting their next career moves. Corporate architects, despite clear conflicts of interest, try to act like public servants, with evident sincerity in a few cases. Nobody, meanwhile, bothers to look to the City Planning Commission for leadership. That demoralized, dysfunctional agency represents the power void in which all were operating before the state's redevelopment agency was set up.
Will the public sector reclaim it? For an extended period or for emergency use only? These questions deserve protracted debate. There will be efforts to neutralize the discussion, however. Municipal politics and real estate development have become, in effect, two divisions of the same industry: the City Hall-Development Complex, we might call it.
Politicians depend on real estate developers to finance their campaigns. Developers need politicians to help keep things all in the family when private contracts are awarded or special permits are sought. Architects may or may not like this status quo, but few of them are suicidal enough or courageous enough to demand reform.
A planning agency for contemporary New York should be guided by an overarching set of ideas that looks beyond municipal boundaries: great cities always have more in common with one another than with the nations in which they are located. Technology has drawn into close proximity great cities from the past as well as today's urban centers. Urban policy is now inseparable from foreign policy, at least on the cultural plane. The city is global.
Such an agency could create something substantial out of Void 2. In the last 14 weeks, we have witnessed the shocking culmination of a crisis that has been building for more than a decade. The war on terrorism illuminates, among other things, the widening gap between our advanced technology and the world that technology has enabled us to dominate.
George Bush Sr. described the Persian Gulf War of 1991 as a defense of the American way of life. His son has defined the current conflict as a defense of civilization itself. We would like to think that those two objectives are compatible. But the increasing divergence between them has been the overarching story of the post-cold war period.
This gap has expanded even further since Sept. 11. Hot war is not the ideal way to build bridges. The appearance on best-seller lists of books on Islam is one sign that the gap may eventually be narrowed. It may take more than a generation before this cultural perspective penetrates foreign policy. But the work we do now at Ground Zero could help move the process forward.
Television. Skyscrapers. Jet planes. Mr. Atta took three examples of modern technology and combined them into a single weapon of mass destruction and terror. The result was a cultural statement as well as an act of murderous aggression. One can't unpack the meaning of Ground Zero without understanding its historical dimensions. We might start by recognizing that one third of the world's population embraces Islam. We could also recall the number of nations convinced of their destiny to lead.
The system is down. There is little coherent relationshjp between foreign policy and historical awareness. Our foreign policy is for machines. We have not found ways to integrate into policy the global civilization that technology is creating. This task should be performed by cities, starting with New York."
-- Herbert Muschamp, Leaping From One Void Into Others, December 23, 2001
ORDER DENYING PLAINTIFFS MOTION FOR PRELIMINARY INJUNCTION The essential facts in this case are undisputed. Defendants 2600 Enterprises and Eric Corley, a/k/a Emmanuel Goldstein,1 are the registrants of the domain name fuckgeneralmotors.com. When an Internet user enters this domain into a web browser, he is automatically linked to the official website of Plaintiff Ford Motor Company (Ford), which is located at ford.com.2 ____________________ 1 Mr. Corleys nom de guerre is taken from George Orwells 1984. Mr. Corley asserts that, like Orwells fictional Goldstein, he is being persecuted for trying to expose Big Brother--here, for Big Brothers intrusion into the Internet. Incidently, Mr. Corley is the publisher of Hackers Quarterly, an online magazine for computer hackers. While the title sounds ominous, Mr. Corley claims that the magazines mission is to enhance the protection of confidential materials by exposing weak encryption methods before crackers (i.e., hackers with criminal intent) do something worse. As expounded in an CNN interview, Mr. Corleys view is that [w]hile you may resent the fact that some 14-year-old from Topeka proved your security sucks, think of what could have happened had you not learned of this and had someone else done it instead. See http://www.cnn.com/TECH/specials/hackers/qandas/ goldstein.html (last visited Nov. 6, 2001). 2 Since the time that the complaint in this matter was filed, the website has been changed so that the opening page reads To learn more about FuckGeneralMotors.com click here. If the Internet user clicks on the word here, he is taken to the webpage fordreallysucks.com. If the user clicks on the FuckGeneralMotors.com link, he is taken to Ford Motor Companys homepage at ford.com. If after approximately five seconds the user has done nothing, he is linked to the ford.com page automatically. Defendant Corley, a self-proclaimed artist and social critic, apparently considers this piece of so-called cyber-art one of his most humorous. Ford is not amused. ... For the reasons set forth above, while Plaintiff understandably may be disturbed by Defendants acts, the Lanham Act provides no remedy. Having failed to demonstrate any likelihood of succeeding on the merits of its claim, Plaintiff is not entitled to an injunction. Accordingly, IT IS ORDERED that Plaintiffs Motion for Preliminary Injunction is DENIED.
-- US District Court Judge Robert Cleland, Ford Motor Co. v. 2600 Enterprises, December 20, 2001
Chemical and Biological Warfare Documents ka102099.htm Testimony of Dr. Ken Alibek on Bio Weapons October 29, 1999 smallpox-wmd.htm Richard Preston: The Demon In the Freezer July 17, 1999 vx-gb-terr.htm Fear of VX-GB Weapons Disposal September 14, 1998 chemterr.htm Chemical Terrorism Resources September 13, 1998 vx-msds.htm Lethal Nerve Agent (VX) September 9, 1998 biowar-cole.htm The Specter of Biological Weapons April 11, 1998 bioweap-kyl.htm Russian Biological Warfare Program March 14, 1998 cbw-grim.htm Do's and Don'ts Of Handling Chemical Attacks March 8, 1998 bioweap.htm Richard Preston: The Bioweaponeers March 2, 1998 cwm.htm Chem-Bio Warfare Materiel and Select Agents December 11, 1997 |
Beale Screamer's FreeMe crack of MS DRM2: Technical details and philosophy of the crack: http://cryptome.org/ms-drm.htm Zipped file of everything: FreeMe executable program, source code, technical details and philosophy: Via Freenet:freenet:KSK@msdrm2 Mirror URLs of Beale Screamer's zipped welcomed. Send to jya@pipeline.com. PK below. Beale Screamer's messages posted to newsgroup sci.crypt: http://cryptome.org/beale-sci-crypt.htm
A major newspaper would like to interview Beale Screamer on the MS DRM crack. Beale is requested to propose a secure protocol for anonymous communication with a reporter and to authenticate being the author of the crack. Post the protocol to sci.crypt and/or send encrypted to jya@pipeline.com. PK below.
|
Privacy Alert: To balance the load on Cryptome
automatic mirrors have been established:
www.eu.cryptome.org -- the main mirror, which has two or more hardly transparent back-ups: Anonymous operators of these mirrors swear no access logs are kept, not even for the usual undisclosed purposes, so be sure to protect yourself there and here and all around the Net. |
| A caution on bots: Anybody -- gov, mil, edu, com,
or individual -- can download all the files here, the whole 8,000+ if desired,
preferrably limited to a hundred per day. However, malconfigured bots and
spiders that repetitively download mindlessly, or generate thousands of error
messages for files already downloaded, and in doing so exluding others' access,
are not welcome and will be blocked in perpetuity. The FBI
bot cited below was doing that and demonstrates that a malconfigured
machine was operating without human control or a human was attacking by
pretending to be a bot or demon hacker (pretty common these flush days of
inept cybersecurity peddling -- none of the ept gov bots has screwed up here
like the FBI's MAS, no doubt a Booz Allen Hamilton
DIRTy Magic
rig). Don't use bots unless you know for sure they are not causing damage.
Test them on your own site before trashing the net as if begging for payback.
December 21, 2001: Cryptome yesterday lifted all blocks of idiot bots and within hours the greedy monsters were rampaging. A powerful daily FBI jackal gobbles by excluding others, and this one (65.207.53.150) needs lion-eating (also piggish: altman.u-strasbg.fr): MAS (NETBLK-UU-65-207-53) 935 Pennsylvania Ave NW, Washington, DC 20535 US Netname: UU-65-207-53, Netblock: 65.207.53.0 - 65.207.53.255 Coordinator: Dastur, Brian (BD680-ARIN) bdastur@fbi.gov 202-324-6124 Innocents affected complain to jya. ______________________________ Thanks to A for mirror: http://www.lessgov.org/cryptome Thanks to SC for crypto software: http://cnsint01.senecac.on.ca:8140/ Thanks to AJ for mirrors: http://cryptome.sabotage.org the whole shebang is available at: ftp://ftp.zedz.net/pub/varia/Cryptome/ Thanks to mb for mirror: http://while1.org/~xm/cryptome.tgz Thanks to VP for mirror: http://munitions.vipul.net/documents/cryptome/ Thanks to GB: People who want/need a copy of Cryptome as of Sep 16 2001 can get a copy athttp://www.parrhesia.com/cryptome.tgz (248 Mb!) Quintessenz mirror located in Vienna, Austria: Australian mirror:
______________________________ Note: Cryptome is nearly shutdown by excessive downloading of the full archive. Most of Cryptome is non-essential stuff and doesn't deserve archiving elsewhere or mirroring. The crypto programs listed at http://jya.com/crypto-free.htm are much more important and should be widely mirrored. We will distribute a few compressed copies of Cryptome for hosting elsewhere and those URLs will be publicized when ready. We would appreciate limiting downloads to recent material and not the whole wad; our modest server cannot handle the overload. Otherwise to avoid unintentional shutdown we will have to reinstitute blocks recently lifted. ______________________________ Cryptome and a host of other crypto resources are likely to be shutdown if the war panic continues. What methods could be used to assure continued access to crypto for homeland and self-defense by citizens of all nations against communication transgressors? A while back a list of global sites for accessing crypto and privacy tools was set up: http://jya.com/crypto-free.htm This list of crypto sources, and additions to it, should be mirrored and the mirrors widely publicized to aid citizen access to tools for personal and homeland protection worldwide from those urging war and terrorism at home and around the globe. To supplement that, Cryptome would appreciate hearing by encrypted mail (anonymous remail too) what others have done or could do to stockpile and distribute self-dense tools. We've sent out a few hundred CDs of the Cryptome collection, and are considering offering here a ~100MB compressed package of the ~8000 files. If so, we would first make more of the packages available to other global sites to offset our bandwidth limitations. There are only a few crypto programs in the files, mostly PGP since 2.62. We might grab more for inclusion unless others are doing that. To comply with law we'd have to notify BXA of any new program offerings. Responses welcome: jya Pipeline.com is owned by Earthlink, one of the ISPs reportedly now intercepted by Carnivore; Verio, host of this site, may be as well, your hosts too. John Young PK below. |
Advanced eBook Processor (AEBPR) "Colleen Pouliot, Senior Vice President and General Counsel for Adobe, said, 'ElcomSoft's Advanced eBook Processor software is no longer available in the United States.' " -- Adobe, EFF Call for Release of Dmitry Sklyarov, July 23, 2001 For background information and to download a trial version of the Adobe eBook-cracking program, AEBPR, see the ElcomSoft site: http://www.elcomsoft.com Cryptome mirror of the AEBPR trial version: http://cryptome.org/aebpr/aebpr22.zip (746KB) For cryptographic scientific research allowed under the DMCA here is a key from Anonymous to boost the trial version -- which decrypts 25% of an eBook -- to its 100% capability (though not verified): LEPR-T2K7-NA8Z-3DUE-EVDQS-TMPV-MBAUB Thanks to ET: "To verify the unlock key for Dimitry Sklyarov's AEBPR application create the following STRING VALUE in the registry:HKEY_LOCAL_MACHINE\SOFTWARE\Elcom\Advanced eBook Processor\Registration\Code Dmitry needs funds for legal defense. If you use AEBPR consider contributing to EFF or to Dmitry through PayPal. "Call for Technical Submissions I am interested in receiving and publishing the following kinds of information:
Mail submissions to Dave Touretzky. Anonymous submissions are fine." -- Gallery of Adobe Remedies (offsite) |
"Ever-more subtle and sophisticated Panoptic mechanisms continue to reduce
the individual's privacy and integrity. Panopticism continues to limit the
space in which civil liberties can be freely deployed. In the face of
manipulative technologies, inventive reverse-engineering strategies are
necessarily distributed, multiple, simultaneous, hybrid, interdisciplinary,
opportunistic. We recall the dazzling efficacy of Ariadne's fragile silk
thread in the face of the Minotaur's brutality. Last night, panelists reviewing
the challenges to civil liberties wrought by SDMI and DMCA underscored the
need for resistance through collaborations that reach across disciplinary
boundaries and specializations. Institutional and disciplinary isolation
-- and preaching to the choir -- constitute a prison of their own. Unexpected
collaborations can offer productive strategies, and it is hoped that Cryptome
and Cartome libraries offer useful tools towards the conceptualization of
such novel strategies."
-- Deborah Natsios, Reversing the Panopticon, August 16, 2001 (at Cartome)
"A sparsely attended trial which unfolded in Tacomas US district courthouse the first week of April 2001 hardly seemed an event that might open a small but revealing view onto the shifting national security apparatus. But to outside observers following the criminal prosecution of Washington State resident Jim Bell, accused of stalking and intimidating local agents of the IRS, Treasury Department and BATF, the defendant was a symptomatic target, and the governments stated case against him only a fragment of a more complex campaign linked to the evolving landscape of national and homeland defense. In the governments estimation, Bell had placed its Pacific Northwest agents "in reasonable fear of death or serious bodily injury". But for some trial-watchers, the case against James Dalton Bell, 43, was underpinned by a constellation of factors that made him more than the disaffected neighbor projecting antigovernment bile. Bell had invited the governments fullest prosecutorial zeal because his technical skills placed him in more ambiguous terrain, that of untested gray zones within emerging national defense landscapes, which, by calling into question the impregnability of the national border, have been taking national security tactics incountry in unprecedented ways, deploying new rules of engagement to challenge national security threats within the US domestic interior." -- Deborah Natsios, Homeland Defense and the Prosecution of Jim Bell, June 8, 2001 (At Cartome.org) |
| Cartome, a companion site to
Cryptome, has been inaugurated. It is an archive of spatial and geographic
documents on privacy, cryptography, dual-use technologies, national security
and intelligence -- communicated by imagery systems: cartography, photography,
photogrammetry, steganography, climatography, seismography, geography,
camouflage, maps, images, drawings, charts, diagrams, imagery intelligence
(IMINT) and their reverse-panopticon and counter-deception potential.
Administrator is architect
Deborah Natsios, longtime
Cryptome partner.
"But Admiral Wilson wins the award for the most creative neologism, C3D2, which stands for 'cover, concealment, camouflage, denial and deception,' as in: 'Many potential adversaries -- nations, groups, and individuals -- are undertaking more and increasingly sophisticated C3D2 operations against the United States.' " -- Vernon Loeb, CIA's Tenet Finds the Going Easier in 2001, February 19, 2001 (offsite) |
| Note: Due to recurring problems with abuse by spiders, bots, siphons and various automatic download programs, the originating addresses of all such programs will now be blocked. Please help stop burgeoning spider abuse. |
| Cryptome Archives |
|
Cryptout |
Cryptomb
9 |
Cryptomb
8 |
Cryptomb
7 |
Cryptomb
6 |
Cryptomb
5 |
Cryptomb
4 |
Cryptomb
3 |
Cryptomb
2 |
Cryptomb
1 |
| Cryptome welcomes
documents for publication that are prohibited by governments
worldwide, in particular material on freedom of expression, privacy, cryptology,
dual-use technologies, national security and intelligence -- open, secret
and classified documents -- but not limited to those.
Documents are removed from this site only by order served directly by a US court having jurisdiction. No court order has ever been served; any order will be published here or elsewhere if gagged by order. Bluffs will be published if comical but otherwise ignored.
Send by e-mail, fax or mail: August 26, 2000: To avoid the ADK bug use PGP 2.6.2: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.2 mQCNAzHMJLAAAAEEALQamOmaVP3dWAxTWAtoK6SMp8smRTcLweBSLerX0BAAK5s8 c87yZSxKNGHwIejM0MpqbcpTOO5KwMSxAbefGfbOe815TB43pnHMET+itOCmwYsL lHiuy12o63wETsr1d5EdqWh+dS+p35Ne3qiapoADm1KktJcqIudR7MF7a6tdAAUR tB1Kb2huIFlvdW5nIDxqeWFAcGlwZWxpbmUuY29tPg== =c8jN -----END PGP PUBLIC KEY BLOCK----- August 27, 2000: New PGP 6.5.8 Key: ID: 0xC3207009 Fingerprint: 3791 CC39 66E8 EF1D CCA4 CA48 0C56 D974 C320 7009 -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com> mQGiBDmpjpURBAD6LkFyCYrXyetmgvdjf2DXynnYsy1j8keHW7qbiVQ2y3SgrEp1 bz5OTnqZ/qmLDUQ45s1q3PxgP473bEqK8PeXllJ5kRzOwfdexv2VBlQLLEQGlcza Ke2vGXjWm5XGCIeVtYe2ToBh//6xkGn2tSp6U8Sj+NPYc0t8DvXyyIT7pQCg/0z1 y06zARLlS3fJn9W8gd6fJIED/1QUPbQS71kaS8zExgqzR716mMSD82yp3/qC6yOD nTbCPV/vFGeM8zUvEz+HzAEHtQ9JAYfSukamWPM0N2hrNzDb9wRaWoQ9dWZdBwep NlLW7vkwmhJsrTv+tabhCKYBM8b9XcWlM8aiwDtT8X/d5DoGTxSGTSk5tE3tMRng g/ZTA/9h/iSEXTcRug1qPsnIqcquLVFt9VVR3xTPnN1CqosLIv9oL3K4LkEvWzn/ j5TLQBxPPfPiNnYtk0JuXj/fRVbSVTvFZMawwp43+PCSVB0mtsulzmrTosqI568q Qp5/fM903AGdh2GGDV9IA22CX2BtMEAUXsc4ShwhH0dFh6fWZ7QdSm9obiBZb3Vu ZyA8anlhQHBpcGVsaW5lLmNvbT6JAE4EEBECAA4FAjmpjpUECwMCAQIZAQAKCRAM Vtl0wyBwCYBDAJ9H5kmH+Lzk/uF5C1o983nDh8Ll4gCfdtVIfGZ2nVIKPb+LzN9b A4Yh5K+5Ag0EOamOlRAIAPZCV7cIfwgXcqK61qlC8wXo+VMROU+28W65Szgg2gGn VqMU6Y9AVfPQB8bLQ6mUrfdMZIZJ+AyDvWXpF9Sh01D49Vlf3HZSTz09jdvOmeFX klnN/biudE/F/Ha8g8VHMGHOfMlm/xX5u/2RXscBqtNbno2gpXI61Brwv0YAWCvl 9Ij9WE5J280gtJ3kkQc2azNsOA1FHQ98iLMcfFstjvbzySPAQ/ClWxiNjrtVjLhd ONM0/XwXV0OjHRhs3jMhLLUq/zzhsSlAGBGNfISnCnLWhsQDGcgHKXrKlQzZlp+r 0ApQmwJG0wg9ZqRdQZ+cfL2JSyIZJrqrol7DVekyCzsAAgIH/i3wAsfX3gaaq21t eXKBv6YO85gUFa6CFzRZemwFW9n1RzAnYUCNoLSZ4pmGnWKs7t50zS9sie1fLHCA aZ6CuJNQOF8MAaxgX3DqQRnInKJyK+WSSH5YOG4N5Bq7CMvbLiMDVKOtJFxEX4Kq Dd+0nCkGce7uwoBzU+rbINEeEVZdo6Pr+J5dfm+4Ac8WQ/HeHlwUmkg0YXZPkkDD MdjrxoTvUEKECjk3Orwrymj/531hIKZDDme4LqjDbPCOon1WaKIBJEudXMESUiIW tdQNGCHEZKChfwuX7tq9SFfHlc5fzOqBfXxHvvMMgRk4IfZWI3ZPWdbSoGQ+9mFK 59AToVuJAEYEGBECAAYFAjmpjpUACgkQDFbZdMMgcAlX4QCgwjrFBkAq+Q6CvsLW I/Z8BY/ETR0AoOcddpzxnmLBjf97J4WUII7tNcZ4 =0rDn -----END PGP PUBLIC KEY BLOCK----- |
| JYA is a companion archive of Cryptome. Information there describes the sites' operator. |